Disclosed Chromium Security Bugs
←Back to Dashboardopen62541:fuzz_json_decode: Heap-buffer-overflow in removeFieldFromEncoding
$0
1/1/1970
pcre2:pcre2_fuzzer_3l: Negative-size-param in recurse_update_offsets
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in __JS_FreeValueRT
$0
1/1/1970
quickjs:fuzz_compile: Use-of-uninitialized-value in js_bigint_to_string1
$0
1/1/1970
net-snmp:snmp_parse_args_fuzzer: Stack-buffer-overflow in snmp_log_options
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::StatementSeq from invalid vptr in ruby_fuzzer::Statement::clear_stmt_oneof
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
matio:matio_fuzzer: Heap-buffer-overflow in Mat_VarPrint
$0
1/1/1970
mruby:mruby_fuzzer: Segv on unknown address in gc_mark_children
$0
1/1/1970
javaparser:parseFuzzer: Security exception in com.github.javaparser.GeneratedJavaParser.Expression
$0
1/1/1970