Disclosed Chromium Security Bugs
←Back to Dashboardgpac:fuzz_probe_analyze: Heap-buffer-overflow in gf_props_insert_property
$0
1/1/1970
mysql-server:fuzz_initfile: Segv on unknown address in Query_block::walk
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in JS_FreeRuntime
$0
1/1/1970
libredwg:llvmfuzz: Index-out-of-bounds in dwg_decode_eed
$0
1/1/1970
quickjs:fuzz_compile: Use-of-uninitialized-value in JS_DefineProperty
$0
1/1/1970
libvips:tiffsave_buffer_fuzzer: Container-overflow in Box_saio::parse
$0
1/1/1970
libheif:box_fuzzer: Container-overflow in Box_saiz::parse
$0
1/1/1970
cpython3:fuzz_json_loads: Segv on unknown address in _Py_Dealloc
$0
1/1/1970
mruby:mruby_proto_fuzzer: Bad-cast to ::ruby_fuzzer::BuiltinFuncsruby_fuzzer::Statement::clear_stmt_oneof in ruby_fuzzer::Statement::~Statement
$0
1/1/1970
quickjs:fuzz_eval: Heap-use-after-free in __JS_FreeValueRT
$0
1/1/1970