Disclosed Chromium Security Bugs
←Back to DashboardV8 Sandbox Bypass: In-sandbox corruption allows execution of dangerous / experimental code
$20,000
1/13/2026
Type confusion in inline cache prototype loading with Webassembly object prototype
$50,000
1/13/2026
Check failed: !WriteBarrier::IsRequired(heap_object, Tagged(value)).
$10,000
1/3/2026
heap-use-after-free in content::indexed_db::Database::connections_ when force_closing_ is true
$100,000
1/2/2026
Triggering screenshare from an unloading page in a cross-process navigation displays the wrong origin
$10,000
1/2/2026
V8 Sandbox Bypass: WasmCPT handle UAF by import dispatch table growth
$20,000
1/1/2026
Wasm type confusion due to custom descriptors spec ambiguity in `ref.get_desc` exactness typing
$55,000
12/31/2025
Wasm type confusion due to missing exactness check on JS-Wasm boundary
$55,000
12/31/2025
Wasm type confusion due to wrong reachability analysis in `WasmGCTypeAnalyzer::ProcessBranchOnTarget()` with custom descriptor casts
$55,000
12/31/2025
Wasm type confusion due to custom descriptors spec unsoundness on `ref.func` exact typing
$55,000
12/31/2025