Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Total 13168 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-20721 2 Google, Mediatek 15 Android, Iot Yocto, Mt6886 and 12 more 2025-10-15 N/A 7.8 HIGH
In imgsensor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10089545; Issue ID: MSV-4279.
CVE-2025-20722 4 Google, Mediatek, Openwrt and 1 more 19 Android, Mt6835, Mt6878 and 16 more 2025-10-15 N/A 5.5 MEDIUM
In gnss driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920036; Issue ID: MSV-3798.
CVE-2025-20723 2 Google, Mediatek 15 Android, Mt6835, Mt6878 and 12 more 2025-10-15 N/A 7.8 HIGH
In gnss driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920033; Issue ID: MSV-3797.
CVE-2025-11717 2 Google, Mozilla 2 Android, Firefox 2025-10-15 N/A 9.1 CRITICAL
When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox < 144.
CVE-2025-11718 2 Google, Mozilla 2 Android, Firefox 2025-10-15 N/A 6.5 MEDIUM
When the address bar was hidden due to scrolling on Android, a malicious page could create a fake address bar to fool the user in response to a visibilitychange event This vulnerability affects Firefox < 144.
CVE-2025-11720 2 Google, Mozilla 2 Android, Firefox 2025-10-15 N/A 8.1 HIGH
The Firefox and Firefox Focus UI for the Android custom tab feature only showed the "site" that was loaded, not the full hostname. User supplied content hosted on a subdomain of a site could have been used to fool a user into thinking it was content from a different subdomain of that site. This vulnerability affects Firefox < 144.
CVE-2024-20854 2 Google, Samsung 2 Android, Camera 2025-10-10 N/A 5.9 MEDIUM
Improper handling of insufficient privileges vulnerability in Samsung Camera prior to versions 12.1.0.31 in Android 12, 13.1.02.07 in Android 13, and 14.0.01.06 in Android 14 allows local attackers to access image data.
CVE-2025-1122 1 Google 2 Chrome, Chrome Os 2025-10-06 N/A 6.7 MEDIUM
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0 stable on Cr50 Boards allows an attacker with root access to gain persistence and Bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
CVE-2025-1292 1 Google 2 Chrome, Chrome Os 2025-10-06 N/A 6.7 MEDIUM
Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and bypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process.
CVE-2025-55556 1 Google 1 Tensorflow 2025-10-03 N/A 6.5 MEDIUM
TensorFlow v2.18.0 was discovered to output random results when compiling Embedding, leading to unexpected behavior in the application.
CVE-2025-55559 1 Google 1 Tensorflow 2025-10-03 N/A 7.5 HIGH
An issue was discovered TensorFlow v2.18.0. A Denial of Service (DoS) occurs when padding is set to 'valid' in tf.keras.layers.Conv2D.
CVE-2025-6044 1 Google 1 Chrome Os 2025-10-03 N/A 6.1 MEDIUM
An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.
CVE-2025-2509 1 Google 1 Chrome Os 2025-10-03 N/A 7.8 HIGH
Out-of-Bounds Read in Virglrenderer in ChromeOS 16093.57.0 allows a malicious guest VM to achieve arbitrary address access within the crosvm sandboxed process, potentially leading to VM escape via crafted vertex elements data triggering an out-of-bounds read in util_format_description.
CVE-2025-20926 2 Google, Samsung 2 Android, Myfiles 2025-10-03 N/A 5.5 MEDIUM
Improper export of Android application components in My Files prior to version 15.0.07.5 in Android 14 allows local attackers to access files with My Files' privilege.
CVE-2025-21024 1 Google 1 Android 2025-10-02 N/A 3.3 LOW
Use of Implicit Intent for Sensitive Communication in Smart View prior to Android 16 allows local attackers to access sensitive information.
CVE-2025-20980 1 Google 1 Android 2025-10-02 N/A 4.0 MEDIUM
Out-of-bounds write in libsavscmn prior to Android 15 allows local attackers to cause memory corruption.
CVE-2025-20979 1 Google 1 Android 2025-10-02 N/A 8.4 HIGH
Out-of-bounds write in libsavscmn prior to Android 15 allows local attackers to execute arbitrary code.
CVE-2023-21482 2 Google, Samsung 2 Android, Camera 2025-10-01 N/A 6.1 MEDIUM
Missing authorization vulnerability in Camera prior to versions 11.1.02.18 in Android 11, 12.1.03.8 in Android 12 and 13.1.01.4 in Android 13 allows physical attackers to install package through Galaxy store before completion of Setup wizard.
CVE-2021-39810 1 Google 1 Android 2025-09-30 N/A 7.8 HIGH
In verifyDefaults of CardEmulationManager.java, there is a possible way to set a third party app as the default contactless payment app without user consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-21342 1 Google 1 Android 2025-09-30 N/A 7.8 HIGH
In RemoteSpeechRecognitionService of RemoteSpeechRecognitionService.java, there is a possible way to launch an activity from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.