Disclosed Chromium Security Bugs
←Back to Dashboardmruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::BuiltinFuncsruby_fuzzer::Statement::clear_stmt_oneof in ruby_fuzzer::Statement::~Statement
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in __JS_FreeValueRT
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
feign:BodyTemplateFuzzer: Security exception in java.base/java.util.regex.Pattern$GroupTail.match
$0
1/1/1970
apache-commons-jxpath:JXPathFuzzer: Security exception in org.apache.commons.jxpath.ri.compiler.CoreFunction.toString
$0
1/1/1970
libreoffice:htmlfuzzer: Heap-use-after-free in SwTextNode::Len
$0
1/1/1970
libheif:file_fuzzer: Container-overflow in StreamReader_memory::read
$0
1/1/1970
Cross-origin image loaded in tag can make additional request and leak referrer
$0
1/1/1970
libheif:file_fuzzer: Crash in HeifPixelImage::overlay
$0
1/1/1970
libheif:box_fuzzer: Container-overflow in Box_saio::parse
$0
1/1/1970