Disclosed Chromium Security Bugs
←Back to Dashboardlibreoffice:htmlfuzzer: Heap-use-after-free in SwTextNode::Len
$0
1/1/1970
libxml2:api: Stack-use-after-scope in xmlEscapeText
$0
1/1/1970
php:php-fuzz-function-jit: Heap-use-after-free in ZEND_BIND_STATIC_SPEC_CV_HANDLER
$0
1/1/1970
haproxy:fuzz_cfg_parser: Heap-buffer-overflow in sanitize_for_printing
$0
1/1/1970
libxml2:valid: Stack-use-after-scope in xmlEscapeText
$0
1/1/1970
jq:jq_fuzz_execute: Heap-buffer-overflow in jv_string_vfmt
$0
1/1/1970
libraw:libraw_cr2_fuzzer: Index-out-of-bounds in LibRaw::ahd_interpolate_r_and_b_in_rgb_and_convert_to_cielab
$0
1/1/1970
mysql-server:fuzz_initfile: Null-dereference READ in JOIN::optimize
$0
1/1/1970
checkstyle:CheckstyleFuzzer: Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr
$0
1/1/1970
freetype2:glyphs-outlines: Heap-buffer-overflow in TT_RunIns
$0
1/1/1970