Disclosed Chromium Security Bugs
←Back to Dashboardruby:fuzz_prism: Stack-use-after-return in parser_lex
$0
12/19/2025
ruby:fuzz_regex: Crash in forward_search_range
$0
12/19/2025
ox-ruby:fuzz_parse: Dynamic-stack-buffer-overflow in _ox_err_set_with_location
$0
12/19/2025
jq:jq_fuzz_compile: Heap-buffer-overflow in jvp_string_append
$0
12/19/2025
ruby:fuzz_iseq: Crash in RCLASS_EXT_READABLE
$0
12/19/2025
ruby:fuzz_json: Crash in json_push_value
$0
12/19/2025
imagemagick:encoder_tiff64_fuzzer: Use-of-uninitialized-value in PixarLogDecode
$0
12/19/2025
DCHECK failure in !IsAnyHole(key) in scavenger.cc
$0
12/19/2025
V8 Sandbox Bypass: OOB write in v8::bigint::AddAndReturnOverflow
$5,000
12/19/2025
Confusion on permission prompt lead to spoof (using split view)
$1,000
12/19/2025