Disclosed Chromium Security Bugs
←Back to Dashboardlibucl:ucl_add_string_fuzzer: Heap-use-after-free in kh_put_ucl_hash_node
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
threetenbp:ThreetenbpFuzzer: Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse
$0
1/1/1970
matio:matio_fuzzer: Use-of-uninitialized-value in Mat_uint16Swap
$0
1/1/1970
clamav:clamav_dbload_WDB_fuzzer: Heap-buffer-overflow in cli_bm_addpatt
$0
1/1/1970
jackson-databind:ObjectReaderRandomClassFuzzer: Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept
$0
1/1/1970
icu:uregex_match_fuzzer: Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.statement
$0
1/1/1970
kimageformats:kimgio_ora_fuzzer: Global-buffer-overflow in QByteArray::QByteArray
$0
1/1/1970
karchive:karchive_fuzzer: Global-buffer-overflow in parseExtraField
$0
1/1/1970