Disclosed Chromium Security Bugs
←Back to Dashboardhaproxy:fuzz_cfg_parser: Stack-buffer-overflow in parse_line
$0
1/1/1970
gpac:fuzz_probe_analyze: Heap-buffer-overflow in m2tsdmx_declare_pid
$0
1/1/1970
quickjs:fuzz_eval: Use-of-uninitialized-value in JS_FreeRuntime
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in JS_FreeRuntime
$0
1/1/1970
javaparser:parseFuzzer: Security exception in com.github.javaparser.GeneratedJavaParser.Expression
$0
1/1/1970
haproxy:fuzz_cfg_parser: Segv on unknown address in sanitize_for_printing
$0
1/1/1970
opensc:fuzz_pkcs15_reader: Stack-buffer-overflow in fuzz_reader_transmit
$0
1/1/1970
quickjs:fuzz_eval: Heap-buffer-overflow in JS_CallInternal
$0
1/1/1970
quickjs:fuzz_eval: Use-of-uninitialized-value in JS_FreeRuntime
$0
1/1/1970
libraw:libraw_cr2_fuzzer: Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab
$0
1/1/1970