Disclosed Chromium Security Bugs
←Back to Dashboardquickjs:fuzz_compile: Use-of-uninitialized-value in js_bigint_to_string1
$0
1/1/1970
net-snmp:snmp_parse_args_fuzzer: Stack-buffer-overflow in snmp_log_options
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::StatementSeq from invalid vptr in ruby_fuzzer::Statement::clear_stmt_oneof
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
matio:matio_fuzzer: Heap-buffer-overflow in Mat_VarPrint
$0
1/1/1970
mruby:mruby_fuzzer: Segv on unknown address in gc_mark_children
$0
1/1/1970
javaparser:parseFuzzer: Security exception in com.github.javaparser.GeneratedJavaParser.Expression
$0
1/1/1970
ghostscript:gs_device_psdcmyk_fuzzer: Heap-buffer-overflow in s_opjd_process
$0
1/1/1970
ffmpeg:ffmpeg_BSF_APV_METADATA_fuzzer: Index-out-of-bounds in cbs_apv_derive_tile_info
$0
1/1/1970
njs:njs_process_script_fuzzer: Segv on unknown address in njs_string_prop
$0
1/1/1970