Disclosed Chromium Security Bugs
←Back to DashboardPermission element inner div with style -webkit-text-stroke-width: thick;font-weight: bolder; can be abused if no element in the parent chain has any -webkit-text-stroke-width: thick;font-weight: bolder; are set.
$0
10/15/2025
DCHECK failure in (thread_graph_labeller) == nullptr in maglev-graph-labeller.cc
$0
10/15/2025
CHECK failure: ValueRepresentationIs(input->properties().value_representation(), NodeT::kInputT
$0
10/15/2025
DCHECK failure in base::FPU::GetFlushDenormals() == isolate->flush_denormals() in local-isolate.cc
$0
10/15/2025
quickjs:fuzz_compile: Use-of-uninitialized-value in JS_DefineProperty
$0
10/12/2025
blink_gif_decoder_fuzzer: CHECK failure: frame.GetStatus() == ImageFrame::kFrameInitialized || frame.GetStatus() == Image
$0
10/12/2025
libwebp:advanced_api_fuzzer@AdvancedApi.AdvancedApiTest: Crash in RescalerImportRowExpand_SSE2
$0
10/11/2025
libwebp:advanced_api_fuzzer@AdvancedApi.AdvancedApiTest: Heap-buffer-overflow in ProcessRows
$0
10/11/2025
libwebp:advanced_api_fuzzer@AdvancedApi.AdvancedApiTest: Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2
$0
10/11/2025
Permission element inner div with style text-emphasis:꧁; and text-emphasis-position: over right; can be abused if no element in the parent chain has any text-emphasis:꧁; and text-emphasis-position: over right; are set.
$1,000
10/11/2025