Disclosed Chromium Security Bugs
←Back to Dashboardnet-snmp:snmp_parse_args_fuzzer: Stack-buffer-overflow in se_read_conf
$0
1/1/1970
mupdf:pdf_fuzzer: Heap-use-after-free in convert_to_boxes
$0
1/1/1970
wolfssl:fuzzer-wolfssh-client-randomize: Use-of-uninitialized-value in DoUserAuthInfoRequest
$0
1/1/1970
net-snmp:snmp_agent_e2e_fuzzer: Heap-use-after-free in snmp_agent_e2e_fuzzer.c
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
mrab-regex:fuzz_search: Crash in any_case
$0
1/1/1970
ffmpeg:ffmpeg_AV_CODEC_ID_AAC_LATM_fuzzer: Use-of-uninitialized-value in av_buffer_unref
$0
1/1/1970
upx:decompress_packed_file_fuzzer: Heap-buffer-overflow in PackLinuxElf32::unpack
$0
1/1/1970
ndpi:fuzz_ndpi_reader_pl7m: Heap-buffer-overflow in ___interceptor_strncat
$0
1/1/1970
ndpi:fuzz_ndpi_reader_pl7m_internal: Crash in ndpi_free_flow_data
$0
1/1/1970