Disclosed Chromium Security Bugs
←Back to Dashboardlibssh2:ssh2_client_fuzzer: Null-dereference READ in kex_method_diffie_hellman_group16_sha512_key_exchange
$0
12/24/2025
yara:rules_fuzzer: Use-of-uninitialized-value in yara_yyparse
$0
12/24/2025
assimp:assimp_fuzzer: Segv on unknown address in aiMaterial::~aiMaterial
$0
12/24/2025
Video Document In Document spoof login box
$3,000
12/24/2025
Cross-context string leakage via V8 string_table
$5,000
12/24/2025
Crash in v8::internal::maglev::MaglevGraphBuilder::TrySpecializeLoadContextSlotToFunction
$0
12/24/2025
V8 Sandbox Bypass: AAW/PC control via JSDispatchEntry UAF
$20,000
12/24/2025
V8 Sandbox Bypass: Argument count inconsistency due to bound args double-fetch in Generate_PushBoundArguments
$5,000
12/24/2025
joni:RegexMatcherFuzzer: Security exception in org.joni.Parser.parseCharClass
$0
12/23/2025
flex:fuzz-main: Global-buffer-overflow in flexscan
$0
12/23/2025