Thursday, April 24, 2025
HomeSecurity NewsMicrosoft Launches VulnScan Tool to Detect Memory Corruption Bugs

Microsoft Launches VulnScan Tool to Detect Memory Corruption Bugs

Published on

SIEM as a Service

Follow Us on Google News

Microsoft launched new tool Vulnscan that automates the process of detecting the root cause of memory corruption issues.Vulnscan will be part of Microsoft Security Risk Detection.

It is a tool designed and developed by MSRC allows users and companies to upload their app and have it automatically determine the vulnerability type and root cause of memory corruption bugs with the wide variety of Windows or Linux platforms.

It is one of the latest addition to the Microsoft Security Risk Detection service that is currently in beta, after being launched in September 2016, then named Project Springfield.

- Advertisement - Google News
VulnScan

Root Cause Detection-VulnScan

Most of the tools and features included with the Microsoft Security Risk Detection platform work using a technique called fuzzing, which searches for vulnerabilities that could enable awful performers to dispatch malicious attacks or just crash the system.

Also Read Google Chrome Will Block Tab-Under Behavior

Vulnscan bug detection during fuzz testing in memory-related issues.The tool helps security engineers and developers determine the vulnerability type and root cause of memory corruption bugs.” VulnScan works by producing reports like these.

Microsoft says  VulnScan is a tool designed and developed by MSRC to help security engineers and developers determine the vulnerability type and root cause of memory corruption bugs. It is built on top of two internally developed tools: Debugging Tools for Windows (WinDbg) and Time Travel Debugging (TTD).

Over a 10-month time frame where VulnScan was utilized to triage all memory defilement issues for Microsoft Edge, Microsoft Internet Explorer, and Microsoft Office items. It had a win rate around 85%, sparing an expected 500 hours of building time for MSRC engineers.

VulnScan
Source: Microsoft

Organizations and Developers can sign-up for the Microsoft Security Risk Detection service beta and test it for free before the service launches, most likely under a hefty paid subscription.

Back 2016 google launches a free Open source Fuzz testing tool OSS-Fuzz to make open source software more secure and stable.

Latest articles

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...