Back to Glossary

Fuzzing

An automated testing technique that provides invalid, unexpected, or random data as inputs to find crashes, hangs, and security vulnerabilities.

methodologytestingautomation

Fuzzing (or fuzz testing) is a technique that involves providing invalid, unexpected, or random data as input to a computer program to find bugs, crashes, and security vulnerabilities. Modern fuzzing has evolved far beyond random input generation — coverage-guided fuzzers like AFL and libFuzzer use code coverage feedback to intelligently mutate inputs and explore new code paths.

Fuzzing is exceptionally effective at finding memory corruption bugs (buffer overflows, use-after-free), parsing errors, assertion failures, and undefined behavior. It has discovered thousands of vulnerabilities in critical software including browsers, operating systems, and network protocols.

Web application fuzzing applies similar principles to HTTP parameters, API inputs, file uploads, and protocol messages. Tools send malformed or boundary-case inputs to discover how the application handles unexpected data, revealing vulnerabilities like injection flaws, denial of service, and error-based information leakage.

How APVISO tests for this: APVISO's scanner agent employs intelligent fuzzing techniques, generating context-aware mutated inputs for all discoverable parameters. Unlike traditional fuzzers that generate random noise, APVISO's AI-guided fuzzing understands the expected input format and makes smart mutations to maximize vulnerability discovery.

Test your applications for fuzzing vulnerabilities

APVISO's AI agents automatically test for this and many more vulnerability categories.

Start Testing Free