Disclosed Chromium Security Bugs
←Back to Dashboardarrow:parquet-arrow-fuzz: Heap-buffer-overflow in std::__1::pair arrow::util::R
$0
10/21/2025
flyway:LocationFuzzer: Security exception in com.code_intelligence.jazzer.sanitizers.RegexInjection.hookInternal
$0
10/21/2025
wasmtime:wast_tests: Crash in wasmtime::runtime::func::invoke_wasm_and_catch_traps::h953b03e393d1c21c
$0
10/21/2025
mruby:mruby_fuzzer: Segv on unknown address in codegen_masgn
$0
10/21/2025
nodejs:fuzz_httpparser1: Heap-use-after-free in v8::internal::GlobalHandles::NodeSpace::Relea
$0
10/21/2025
IO thread bound services in utility process can run before sandbox locked down
$0
10/21/2025
use-after-poison in blink::MediaStreamAudioTrack::StopAndNotify(class base::OnceCallback<(void)>)
$8,000
10/21/2025
Security: Bypass the Protection of input fields cache (Autofill) Similar to (1358647 ,1395164 ,1108181) with Different Vector
$3,000
10/21/2025
Heap-use-after-free in dawn::native::vulkan::TextureView::DestroyImpl
$0
10/19/2025
Chrome sandbox escape via libGLES_mali.so exploited in the wild
$0
10/18/2025