Disclosed Chromium Security Bugs
←Back to Dashboardmruby:mruby_fuzzer: Global-buffer-overflow in gen_addsub
$0
10/9/2025
arrow:parquet-arrow-fuzz: Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch
$0
10/9/2025
"File might be harmful" dialog does not have origin
$1,000
10/9/2025
P2PSocket(this) object is freed, causing Use-After-Free vulnerability
$25,000
10/9/2025
webcodecs_in_process_fuzzer: Heap-use-after-free in blink::FontCache::CreateTypeface
$0
10/9/2025
V8 Sandbox Bypass: OOB write in wasm::WellKnownImportsList::Update
$5,000
10/9/2025
binutils:fuzz_dlltool: Use-of-uninitialized-value in bfd_getl64
$0
10/8/2025
CHECK failure: is_loadable()
$0
10/8/2025
Crash in v8::internal::SemiSpaceNewSpace::VerifyObjects
$0
10/8/2025
V8 Sandbox Bypass: OOB write in bigint::ProcessorImpl::FromStringLarge
$5,000
10/7/2025