Disclosed Chromium Security Bugs
←Back to Dashboardopensc:fuzz_pkcs15_decode: Null-dereference READ in sc_card_ctl
$0
11/1/2025
opensc:fuzz_pkcs15init: Stack-buffer-underflow in sc_append_path_id
$0
11/1/2025
libwebp:enc_fuzzer@Enc.EncTest: Use-of-uninitialized-value in WebPCleanupTransparentArea
$0
11/1/2025
libwebp:enc_fuzzer@Enc.EncTest: Use-of-uninitialized-value in HasAlpha32b_SSE2
$0
11/1/2025
libwebp:enc_fuzzer@Enc.EncTest: Use-of-uninitialized-value in WebPMultRow_C
$0
10/31/2025
libwebp:enc_fuzzer@Enc.EncTest: Use-of-uninitialized-value in AlphaReplace_SSE2
$0
10/31/2025
bloaty:fuzz_target: Crash in std::__1::basic_string, std::__1::allocator
$0
10/31/2025
V8 sandbox bypass due to NativeModule swapping while module instantiation was ongoing
$20,000
10/31/2025
Command injection in "Copy as cURL (cmd)" due to improper sanitization
$1,500
10/31/2025
qemu:qemu-fuzz-i386-target-generic-fuzz-am53c974: Heap-buffer-overflow in scsi_cdb_length
$0
10/30/2025