Disclosed Chromium Security Bugs
←Back to Dashboardjavaparser:parseFuzzer: Security exception in com.github.javaparser.ast.expr.FieldAccessExpr.accept
$0
12/2/2025
renderer_in_process_mojolpm_fuzzer: Heap-use-after-free in SkDrawTiler::SkDrawTiler
$0
12/2/2025
Mojo’s ChannelPosix incorrectly handles >128 file descriptors in a message, leading to fd confusion
$30,000
12/2/2025
webnn_graph_mojolpm_fuzzer: Stack-use-after-return in base::internal::Invoker
$0
12/2/2025
[BIGSLEEP-440027817] PDFium: out-of-bounds read in PatchDrawer::Draw
$0
12/2/2025
javaparser:parseFuzzer: Security exception in com.github.javaparser.GeneratedJavaParserBase.lambda$propagateRangeGrowthOnRight
$0
12/1/2025
ruby:fuzz_prism: Heap-use-after-free in pm_parse
$0
12/1/2025
kimageformats:kimgio_heif_fuzzer: Heap-buffer-overflow in Op_YCbCr420_to_RRGGBBaa::convert_colorspace
$0
12/1/2025
wolfssl:fuzzer-wolfssl-client-randomize: Use-of-uninitialized-value in AesEncrypt_C
$0
12/1/2025
pcapplusplus:FuzzTarget: Heap-buffer-overflow in pcpp::TelnetLayer::getFieldLen
$0
12/1/2025