Chromium Security Bugs
←Back to Dashboardcbor-java:FuzzDec: Security exception in co.nstant.in.cbor.CborDecoder.decodeNext
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
ffmpeg:ffmpeg_dem_VQF_fuzzer: Use-of-uninitialized-value in vqf_read_header
$0
1/1/1970
open62541:fuzz_json_decode: Heap-buffer-overflow in removeFieldFromEncoding
$0
1/1/1970
pcre2:pcre2_fuzzer_3l: Negative-size-param in recurse_update_offsets
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in __JS_FreeValueRT
$0
1/1/1970
quickjs:fuzz_compile: Use-of-uninitialized-value in js_bigint_to_string1
$0
1/1/1970
net-snmp:snmp_parse_args_fuzzer: Stack-buffer-overflow in snmp_log_options
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::StatementSeq from invalid vptr in ruby_fuzzer::Statement::clear_stmt_oneof
$0
1/1/1970