Disclosed Chromium Security Bugs
←Back to DashboardMaglev's handling of target and new.target is incorrect
$50,000
3/19/2026
V8 Sandbox Bypass: AAW/PC control via dispatch entry UAF during InstantiateAsmJs by hijacking start
$20,000
3/12/2026
[bugSWAT] GPU process crash via WebGPU shader - wild-deref in Mesa aco::combine_instruction
$10,000
3/10/2026
DCHECK Fail when Maglev Generates Exception Handler Trampoline Instructions
$10,000
2/17/2026
V8 Sandbox Bypass: AAW/PC control via CallKnownJSFunction reduction for builtins
$22,000
2/7/2026
Maglev - CallBuiltin (input @0 = LoadHoleyFixedDoubleArrayElement) type HoleyFloat64 is not Tagged
$11,000
2/7/2026
V8 Sandbox Bypass: WasmCPT handle UAF by import dispatch table corruption (multiple variants of b/446113730)
$20,000
2/6/2026
Incorrect Optimization of ArrayConstructor by Maglev Leads to Creation of Malformed JSArray Objects
$50,000
1/31/2026
V8 Sandbox Bypass: Wasm streaming compilation cache confusion via "double streaming"
$20,000
1/31/2026
Security: Compromised renderer can control mouse after single tap (UXSS, sandbox escape, and more)
$30,000
1/30/2026