Disclosed Chromium Security Bugs
←Back to Dashboardlibxml2:api: Heap-use-after-free in dropNode
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
libreoffice:htmlfuzzer: Heap-buffer-overflow in SwTextNode::Len
$0
1/1/1970
threetenbp:ThreetenbpFuzzer: Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse
$0
1/1/1970
libxml2:api: Heap-use-after-free in xmlGetNsListSafe
$0
1/1/1970
gpac:fuzz_probe_analyze: Heap-buffer-overflow in m2tsdmx_declare_pid
$0
1/1/1970
ndpi:fuzz_config: Stack-buffer-overflow in ndpi_init_packet
$0
1/1/1970
wamr:wamr_fuzz_classic_interp: Crash in load_init_data_section
$0
1/1/1970
cbor-java:FuzzDec: Security exception in co.nstant.in.cbor.CborDecoder.decodeNext
$0
1/1/1970
opensc:fuzz_pkcs15_reader: Stack-buffer-overflow in fuzz_reader_transmit
$0
1/1/1970