Disclosed Chromium Security Bugs
←Back to Dashboardkamailio:fuzz_parse_msg: Heap-use-after-free in parse_from_header
$0
9/29/2025
mruby:mruby_fuzzer: Heap-buffer-overflow in mrb_vformat
$0
9/29/2025
sleuthkit:sleuthkit_fls_apfs_fuzzer: Crash in std::__1::basic_string, std::__1::allocator
$0
9/29/2025
openssl:provider: Heap-buffer-overflow in aes_xts_init
$0
9/28/2025
joni:RegexMatcherFuzzer: Security exception in org.joni.Parser.parseCharClass
$0
9/28/2025
quickjs:fuzz_compile: Use-of-uninitialized-value in JS_DefineProperty
$0
9/28/2025
graphicsmagick:coder_AVIF_fuzzer: Use-of-uninitialized-value in put_weighted_bipred_8_fallback
$0
9/27/2025
docker-client:RegistryAuthFuzzer: Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer
$0
9/27/2025
[Security] Tapjacking on payment request dialog using window alert
$1,000
9/27/2025
Crash in v8::internal::Map::instance_size_in_words
$0
9/27/2025