Chromium Security Bugs
←Back to Dashboardquickjs:fuzz_compile: Use-of-uninitialized-value in JS_DefineProperty
$0
1/1/1970
libvips:tiffsave_buffer_fuzzer: Container-overflow in Box_saio::parse
$0
1/1/1970
libheif:box_fuzzer: Container-overflow in Box_saiz::parse
$0
1/1/1970
cpython3:fuzz_json_loads: Segv on unknown address in _Py_Dealloc
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::BuiltinFuncsruby_fuzzer::Statement::clear_stmt_oneof in ruby_fuzzer::Statement::~Statement
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in __JS_FreeValueRT
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
feign:BodyTemplateFuzzer: Security exception in java.base/java.util.regex.Pattern$GroupTail.match
$0
1/1/1970
apache-commons-jxpath:JXPathFuzzer: Security exception in org.apache.commons.jxpath.ri.compiler.CoreFunction.toString
$0
1/1/1970
libreoffice:htmlfuzzer: Heap-use-after-free in SwTextNode::Len
$0
1/1/1970