Disclosed Chromium Security Bugs
←Back to DashboardV8 Sandbox Bypass: in icu_77::UnicodeString::doAppend
$0
2/10/2026
libconfig:config_read_fuzzer: Stack-buffer-overflow in fuzz_data_path
$0
2/9/2026
gpsd:FuzzDriversStructured: Crash in gpsd_poll
$0
2/8/2026
ruby:fuzz_ruby_parser: Crash in literal_hash
$0
2/8/2026
ffmpeg:ffmpeg_AV_CODEC_ID_DCA_DEC_fuzzer: Use-of-uninitialized-value in get_rice
$0
2/7/2026
graphicsmagick:coder_WMF_fuzzer: Segv on unknown address in DrawComposite
$0
2/7/2026
ffmpeg:ffmpeg_AV_CODEC_ID_DXV_DEC_fuzzer: Use-of-uninitialized-value in dxt5_block_internal
$0
2/7/2026
gpsd:FuzzDrivers: Crash in gpsd_poll
$0
2/7/2026
File Download Origin Spoof Using Long Subdomain
$500
2/7/2026
V8 Sandbox Bypass: AAW/PC control via CallKnownJSFunction reduction for builtins
$22,000
2/7/2026