Disclosed Chromium Security Bugs
←Back to Dashboardblink_crabbyavif_decoder_fuzzer: Heap-use-after-free in _free_base
$0
8/23/2025
webcodecs_image_decoder_fuzzer: Heap-use-after-free in ctx_refill
$0
8/23/2025
DCHECK failure in IsUseLessGeneral(input_use_infos_[index], use_info) in simplified-lowering.cc
$0
8/23/2025
CSA_DCHECK failed: Torque assert '!Is(val)' failed [src/objects/contexts.tq:280]
$0
8/23/2025
glslang:compile_fuzzer: Bad parameters to --sanitizer-annotate-contiguous-container in glslang::TPpContext::scanToken
$0
8/22/2025
mpv:fuzzer_loadfile: Global-buffer-overflow in exif_parse_ifd_list
$0
8/22/2025
pdf_font_fuzzer: Heap-buffer-overflow in Ins_NPUSHB
$0
8/22/2025
pdf_font_fuzzer: Heap-buffer-overflow in tt_glyph_load
$0
8/22/2025
Google Linux package signing keys include 1024-bit DSA key
$1,000
8/22/2025
V8 Sandbox Bypass: OOB writ in Module::GetModuleNamespace
$5,000
8/22/2025