Disclosed Chromium Security Bugs
←Back to Dashboardbinutils:fuzz_addr2line: Heap-buffer-overflow in bfd_getb16
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
joni:RegexMatcherFuzzer: Security exception in org.joni.Parser.parseCharClass
$0
1/1/1970
apache-commons-jxpath:JXPathFuzzer: Security exception in org.apache.commons.jxpath.ri.compiler.CoreFunction.toString
$0
1/1/1970
opus:opus_multistream_decode_fuzzer_floating_qext: Use-of-uninitialized-value in opus_decode_frame
$0
1/1/1970
metadata-extractor:ImageMetadataReaderFuzzer: Security exception in com.drew.imaging.tiff.TiffReader.processIfd
$0
1/1/1970
karchive:karchive_fuzzer: Heap-buffer-overflow in K7Zip::K7ZipPrivate::readHashDigests
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
javaparser:parseFuzzer: Security exception in com.github.javaparser.CommentsInserter.insertComments
$0
1/1/1970
suricata:fuzz_siginit: Use-of-uninitialized-value in luaS_new
$0
1/1/1970