Disclosed Chromium Security Bugs
←Back to DashboardV8 Sandbox Bypass: Heap Use-After-Free in v8::internal::HeapLayout::CheckYoungGenerationConsistency
$1,000
10/7/2025
binutils:fuzz_readelf: Crash in byte_put_little_endian
$0
10/6/2025
selinux:checkpolicy-fuzzer: Heap-double-free in policydb_destroy
$0
10/6/2025
mruby:mruby_fuzzer: Segv on unknown address in mod_compare_hierarchy
$0
10/6/2025
Intercepting console errors might lead to XSSI
$0
10/6/2025
php:php-fuzz-execute: Use-of-uninitialized-value in find_implicit_binds_recursively
$0
10/6/2025
Permission element inner div with style text-decoration-line: line-through; and text-decoration-thickness can be abused if no element in the parent chain has any text-decoration-line: line-through; and text-decoration-thickness are set.
$500
10/5/2025
DCHECK failure in !IsEmptyNodeType(GetType(other)) in maglev-graph-builder.cc
$0
10/5/2025
php:php-fuzz-parser: Heap-use-after-free in zend_compile_call_common
$0
10/5/2025
php:php-fuzz-execute: Use-of-uninitialized-value in find_implicit_binds_recursively
$0
10/5/2025