Disclosed Chromium Security Bugs
←Back to Dashboardlibplist:bplist_fuzzer: Heap-buffer-overflow in parse_bin_node_at_index
$0
2/12/2026
fluent-bit:flb-it-fuzz-cmetrics_decode_fuzz_OSSFUZZ: Heap-buffer-overflow in cmt_mpack_consume_uint_tag
$0
2/12/2026
DCHECK failure in HasOutputRegister(target) in maglev-graph-builder.h
$0
2/12/2026
DCHECK failure in (checked_value()) == nullptr in maglev-known-node-aspects.h
$0
2/12/2026
DCHECK failure in properties().can_eager_deopt() || properties().is_deopt_checkpoint() in maglev-i
$0
2/12/2026
libdwarf:fuzz_set_frame_all: Heap-use-after-free in _dwarf_exec_frame_instr
$0
2/11/2026
Windows download logic flaw: % triggers double extension sanitization bypass (.lnk .lnk, .scf .scf)
$3,000
2/11/2026
the permission prompt is not in the correct position lead to spoofing
$500
2/11/2026
race condition on pip window lead to spoof address bar
$500
2/11/2026
Security: opens a new window at the same time as the previous window in fullscreen mode, (the window enters fullscreen mode which is closed by another new window) leads to spoof
$1,000
2/11/2026