You need to agree to share your contact information to access this model

This repository is publicly accessible, but you have to accept the conditions to access its files and content.

Log in or Sign Up to review the conditions and access this model content.

GGUF Integer Overflow PoC

Security research PoC for integer overflow vulnerabilities in third-party GGUF parsers.

Affected software: gguf-rs, gguf-parser-go Bug class: Integer overflow (CWE-190) Impact: Memory corruption via incorrect size computation

The PoC files demonstrate this issue. Access is gated โ€” requests are reviewed before granting download access.

Downloads last month
21
GGUF
Model size
0.1B params
Architecture
llama
Hardware compatibility
Log In to add your hardware

We're not able to determine the quantization variants.

Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support