Chromium Disclosed Security Bugs
@BugsChromium
Followers
8K
Following
1
Media
0
Statuses
5K
Tweets publicly disclosed bugs in Chromium. Not an official Google product. Run by @SecurityMB. Mastodon: @[email protected]
Joined May 2020
Because of the migration of Chromium bug tracker from Monorail to Buganizer, this account won't submit new bugs temporarily (until it's migrated to fetch the data from the new source). Sorry!
4
1
17
Security: arbitrary address access in vrend_renderer_blit_gl (reward: $2000)
0
1
7
Use-after-poison in cppgc::internal::HeapVisitor<cppgc::internal::UnmarkedObjectsPoisoner>::Traverse
0
0
2
Use-after-poison in cppgc::internal::MarkingStateBase::MarkAndPush
0
0
1
Security: Contextual search selection offsets should be sanitized
0
0
0
chrome.inspectedWindow.eval execution on Web Store with trailing URL dot (reward: $5000)
0
7
31
Security: Chrome OS: Multiple controllable OOB write bugs in Qcom camx drivers may cause sandbox escape to kernel
0
0
5
Security: Race Condition UAF in virtio_transport_space_update (reward: $2000)
0
1
3
Use-after-poison in blink::HTMLPlugInElement::DetachLayoutTree
0
1
4
heap-buffer-overflow in ~SingleShotFrameHandler(imagecapture/image_capture_frame_grabber.cc) (reward: $8000)
0
1
4
lightweight-heap-use-after-free : web_app::WebAppCommandManager::StartCommand
0
0
0
Security: UAF in gpu::ClientSharedImageInterface::DestroySharedImage(browser process) (reward: $2000)
0
1
7
Security: Heap buffer overflow write due to bound check missing
0
0
3
Security: Out-of-Bound Write due to bound check missing (reward: $5000)
0
1
3
Security: Integer-Overflow in ChapsAdaptor::GenerateRandom
0
0
1
Heap-buffer-overflow in v8::internal::Simulator::WriteW
0
0
1
Security: readanything render frame UAF fix of https://t.co/HiUARXjmCH is not robust. (reward: $2000)
0
1
6
Security: Heap-use-after-free in ReadAnythingUntrustedPageHandler::LogTextStyle (reward: $2000)
0
1
4
security: libmbim | out-of-bounds access on mbim-message.c (reward: $250)
0
1
2