Disclosed Chromium Security Bugs
←Back to Dashboardwasmtime:call_async: Null-dereference READ in wasmtime::runtime::vm::sys::unix::signals::trap_handler::ha6c97a5308add0e4
$0
1/1/1970
wasmtime:call_async: Segv on unknown address in module.wasm
$0
1/1/1970
ghostscript:gs_device_faxg3_fuzzer: Crash in chunk_obj_alloc
$0
1/1/1970
ghostscript:gstoraster_pdf_fuzzer: Crash in insert_free
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::AssignmentStatementruby_fuzzer::Statement::clear_stmt_oneof in ruby_fuzzer::Statement::~Statement
$0
1/1/1970
net-snmp:snmp_parse_args_fuzzer: Heap-buffer-overflow in usm_set_user_password
$0
1/1/1970
mruby:mruby_proto_fuzzer: Crash in gc_mark_children
$0
1/1/1970
joni:AddrListFixFuzzer: Security exception in org.joni.Parser.parseCharClass
$0
1/1/1970
qpid-proton:fuzz-connection-driver: Crash in pn_free
$0
1/1/1970
qpid-proton:fuzz-connection-driver: Heap-buffer-overflow in pn_string_setn
$0
1/1/1970