Disclosed Chromium Security Bugs
←Back to DashboardCHECK failure: (value & uint64_t{ADDRESS}) != unexpected || (value & uint64_t{ADDRESS}) == uint
$0
10/18/2025
qemu:qemu-fuzz-i386-target-generic-fuzz-e1000: Stack-buffer-overflow in eNUMBER_receive_iov
$0
10/15/2025
Download origin spoofing using malformed data url.
$5,000
10/15/2025
V8 Sandbox Bypass: Arbitrary code execution via interpreter-to-baseline OSR Code type confusion
$20,000
10/15/2025
Permission element inner div with style -webkit-text-stroke-width: thick;font-weight: bolder; can be abused if no element in the parent chain has any -webkit-text-stroke-width: thick;font-weight: bolder; are set.
$0
10/15/2025
DCHECK failure in (thread_graph_labeller) == nullptr in maglev-graph-labeller.cc
$0
10/15/2025
CHECK failure: ValueRepresentationIs(input->properties().value_representation(), NodeT::kInputT
$0
10/15/2025
DCHECK failure in base::FPU::GetFlushDenormals() == isolate->flush_denormals() in local-isolate.cc
$0
10/15/2025
quickjs:fuzz_compile: Use-of-uninitialized-value in JS_DefineProperty
$0
10/12/2025
blink_gif_decoder_fuzzer: CHECK failure: frame.GetStatus() == ImageFrame::kFrameInitialized || frame.GetStatus() == Image
$0
10/12/2025