Disclosed Chromium Security Bugs
←Back to Dashboardmruby:mruby_fuzzer: Stack-use-after-return in udiv
$0
10/27/2025
mruby:mruby_fuzzer: Stack-use-after-return in mrb_byte_hash
$0
10/27/2025
mruby:mruby_fuzzer: Stack-use-after-return in limb_addmul_1
$0
10/27/2025
mruby:mruby_proto_fuzzer: Stack-use-after-return in mrb_bint_mod
$0
10/27/2025
mruby:mruby_fuzzer: Stack-use-after-return in mrb_bint_add_n
$0
10/27/2025
mruby:mruby_proto_fuzzer: Stack-use-after-return in mrb_bint_as_int
$0
10/27/2025
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement
$0
10/26/2025
libucl:ucl_add_string_fuzzer: Heap-use-after-free in kh_put_ucl_hash_node
$0
10/25/2025
V8 Sandbox Bypass: UB in ValueTypeBase::raw_heap_representation
$0
10/25/2025
graphicsmagick:coder_MVG_fuzzer: Global-buffer-overflow in void jxl::N_AVX2::WriteToOutputStage::StoreUnsignedRow
$0
10/24/2025