Disclosed Chromium Security Bugs
←Back to Dashboardpcapplusplus:FuzzTargetNg: Heap-buffer-overflow in pcpp::Asn1BooleanRecord::decodeValue
$0
12/22/2025
pcapplusplus:FuzzTarget: Negative-size-param in pcpp::RawPacket::insertData
$0
12/22/2025
pcapplusplus:FuzzTargetNg: Use-of-uninitialized-value in pcpp::byteArrayToHexString
$0
12/22/2025
ffmpeg:ffmpeg_AV_CODEC_ID_VVC_fuzzer: Use-of-uninitialized-value in ff_vvc_coding_tree_unit
$0
12/22/2025
pcapplusplus:FuzzTarget: Crash in pcpp::computeChecksum
$0
12/22/2025
pyodbc:fuzz_curs_exec: Heap-buffer-overflow in libodbc.so.2
$0
12/22/2025
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement
$0
12/22/2025
pcapplusplus:FuzzTargetNg: Use-of-uninitialized-value in pcpp::HeaderField::HeaderField
$0
12/22/2025
sleuthkit:fls_ntfs_fuzzer: Heap-buffer-overflow in ntfs_make_data_run
$0
12/22/2025
ffmpeg:ffmpeg_dem_FLV_fuzzer: Negative-size-param in cbs_read_data
$0
12/22/2025