Disclosed Chromium Security Bugs

arrow:parquet-arrow-fuzz: Heap-buffer-overflow in std::__1::pair arrow::util::R

#451150486Reporter: 87...@developer.gserviceaccount.com
$0
10/21/2025

flyway:LocationFuzzer: Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal

#42529208Reporter: mo...@clusterfuzz-external.iam.gserviceaccount.com
$0
10/21/2025

wasmtime:wast_tests: Crash in wasmtime::runtime::func::invoke_wasm_and_catch_traps::h953b03e393d1c21c

#451711188Reporter: 87...@developer.gserviceaccount.com
$0
10/21/2025

mruby:mruby_fuzzer: Segv on unknown address in codegen_masgn

#449498801Reporter: 87...@developer.gserviceaccount.com
$0
10/21/2025

nodejs:fuzz_httpparser1: Heap-use-after-free in v8::internal::GlobalHandles::NodeSpace::Relea

#448701326Reporter: 87...@developer.gserviceaccount.com
$0
10/21/2025

IO thread bound services in utility process can run before sandbox locked down

#430623995Reporter: wf...@chromium.org
$0
10/21/2025

use-after-poison in blink::MediaStreamAudioTrack::StopAndNotify(class base::OnceCallback<(void)>)

#426054987Reporter: m....@gmail.com
$8,000
10/21/2025

Security: Bypass the Protection of input fields cache (Autofill) Similar to (1358647 ,1395164 ,1108181) with Different Vector

#40074918Reporter: el...@gmail.com
$3,000
10/21/2025

Heap-use-after-free in dawn::native::vulkan::TextureView::DestroyImpl

#429112750Reporter: 24...@project.gserviceaccount.com
$0
10/19/2025

Chrome sandbox escape via libGLES_mali.so exploited in the wild

#427162086Reporter: he...@google.com
$0
10/18/2025
Showing 131-140 of 8802 bugs