Disclosed Chromium Security Bugs
←Back to DashboardV8 Sandbox Bypass: stack corruption due to parameter count mismatch
$0
1/1/1970
V8 Sandbox Bypass: Interpreted Function Argument Mismatch
$0
1/1/1970
V8 sandbox violation if SFI::formal_parameter_count doesn't match the parameter count of a function's code
$0
1/1/1970
V8 Sandbox Bypass: control-flow hijacking via WASM Table Indirect call
$5,000
1/1/1970
V8 Sandbox Bypass: Code Pointer Table Index Confusion leading to Stack Corruption
$0
1/1/1970
V8 Sandbox Bypass: AAR/W via generic JSToWasmWrapper type sbxcheck() bypass
$5,000
1/1/1970
chrome://blob-internals has a loose CSP
$0
1/1/1970
unrar:unrar_fuzzer: Use-of-uninitialized-value in DataHash::Cmp
$0
1/1/1970
mruby:mruby_fuzzer: Segv on unknown address in udiv
$0
1/1/1970
cpython3:fuzz_ast_literal_eval: Heap-use-after-free in dictkeys_decref
$0
1/1/1970