Google Google Software and search

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Google product.

RSS Feeds for Google security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Google products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Google Sorted by Most Security Vulnerabilities since 2018

Google Android5798 vulnerabilities
Mobile operating system

Google Chrome2381 vulnerabilities
Web browser

Google Tensorflow432 vulnerabilities
Open source machine learning / AI library

Google ChromeOS51 vulnerabilities

Google Protobuf8 vulnerabilities

Google Gvisor7 vulnerabilities

Google Fuchsia5 vulnerabilities

Google Protobuf Java5 vulnerabilities

Google Gerrit4 vulnerabilities

Google Protobuf Javalite4 vulnerabilities

Google Protobuf Kotlin3 vulnerabilities

Google Web Toolkit3 vulnerabilities

Google Chromecast Firmware2 vulnerabilities

Google Firebase Php Jwt2 vulnerabilities

Google Nearby2 vulnerabilities

Google Protobuf Kotlin Lite2 vulnerabilities

Google Protobuf Python2 vulnerabilities

Google Updater2 vulnerabilities

Google Web Designer2 vulnerabilities

Google Androidx Car App1 vulnerability

Google Bazel For Clion1 vulnerability

Google Bazel For Intellij1 vulnerability

Google Car1 vulnerability

Google Cloud Looker1 vulnerability

Google Secops Soar1 vulnerability

Google Looker1 vulnerability

Google Nftables1 vulnerability

Google Osv Scalibr1 vulnerability

Google Pixel1 vulnerability

Google Reverb1 vulnerability

Google Safearchive1 vulnerability

Google Tensorflow Serving1 vulnerability

Google Tink C1 vulnerability

Google Tink Java1 vulnerability

Google Vertex Ai1 vulnerability

Google Vertex Gemini Api1 vulnerability

Recent Google Security Advisories

Advisory Title Published
2025-12-01 Android Security Bulletin—December 2025 December 1, 2025
2025-11-01 Android Security Bulletin—November 2025 November 1, 2025
2025-10-01 Android Security Bulletin—October 2025 October 1, 2025
2025-09-01 Android Security Bulletin—September 2025 September 1, 2025
Chrome Releases: Stable Channel Update for Desktop August 13, 2025
Chrome Releases: Stable Channel Update for Desktop August 7, 2025
2025-08-01 Android Security Bulletin—August 2025 August 1, 2025
Chrome Releases: Stable Channel Update for Desktop July 22, 2025
2025-07-01 Android Security Bulletin—July 2025 July 1, 2025
Chrome Releases: Stable Channel Update for Desktop June 30, 2025

Known Exploited Google Vulnerabilities

The following Google vulnerabilities have recently been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Google Chromium Out of Bounds Memory Access Vulnerability Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2025-14174 Exploit Probability: 0.7%
December 12, 2025
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows for heap corruption.
CVE-2025-13223 Exploit Probability: 1.2%
November 19, 2025
Google Chromium V8 Type Confusion Vulnerability Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.
CVE-2025-10585 Exploit Probability: 0.7%
September 23, 2025
Google Chromium ANGLE and GPU Improper Input Validation Vulnerability Google Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2025-6558 Exploit Probability: 0.1%
July 22, 2025
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2025-6554 Exploit Probability: 0.4%
July 2, 2025
Google Chromium V8 Out-of-Bounds Read and Write Vulnerability Google Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2025-5419 Exploit Probability: 1.7%
June 5, 2025
Google Chromium Loader Insufficient Policy Enforcement Vulnerability Google Chromium contains an insufficient policy enforcement vulnerability that allows a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2025-4664 Exploit Probability: 0.0%
May 15, 2025
Google Chromium Mojo Sandbox Escape Vulnerability Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2025-2783 Exploit Probability: 38.1%
March 27, 2025
Google Chromium V8 Inappropriate Implementation Vulnerability Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2024-7965 Exploit Probability: 27.1%
August 28, 2024
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2024-7971 Exploit Probability: 0.9%
August 26, 2024
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2024-5274 Exploit Probability: 6.4%
May 28, 2024
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.
CVE-2024-4947 Exploit Probability: 1.0%
May 20, 2024
Google Chromium V8 Out-of-Bounds Memory Write Vulnerability Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2024-4761 Exploit Probability: 3.2%
May 16, 2024
Google Chromium Visuals Use-After-Free Vulnerability Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.
CVE-2024-4671 Exploit Probability: 0.2%
May 13, 2024
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page.
CVE-2023-4762 Exploit Probability: 40.2%
February 6, 2024
Google Chromium V8 Out-of-Bounds Memory Access Vulnerability Google Chromium V8 contains an out-of-bounds memory access vulnerability. Specific impacts from exploitation are not available at this time.
CVE-2024-0519 Exploit Probability: 0.5%
January 17, 2024
Google Skia Integer Overflow Vulnerability Google Skia contains an integer overflow vulnerability affecting Google Chrome and ChromeOS, Android, Flutter, and possibly other products.
CVE-2023-6345 Exploit Probability: 1.4%
November 30, 2023
Google Chrome libvpx Heap Buffer Overflow Vulnerability Google Chrome libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2023-5217 Exploit Probability: 3.6%
October 2, 2023
Google Chromium Heap-Based Buffer Overflow Vulnerability Google Chromium contains a heap-based buffer overflow vulnerability in WebP that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page.
CVE-2023-4863 Exploit Probability: 94.1%
September 13, 2023
Google Chromium V8 Type Confusion Vulnerability Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2023-3079 Exploit Probability: 1.6%
June 7, 2023

The vulnerability CVE-2023-4863: Google Chromium Heap-Based Buffer Overflow Vulnerability is in the top 1% of the currently known exploitable vulnerabilities. 3 known exploited Google vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.

Top 10 Riskiest Google Vulnerabilities

Based on the current exploit probability, these Google vulnerabilities are on CISA's Known Exploited vulnerabilities list (KEV) and are ranked by the current EPSS exploit probability.

Rank CVE EPSS Vulnerability
1 CVE-2023-4863 94.1% Google Chromium Heap-Based Buffer Overflow Vulnerability
2 CVE-2020-15999 92.9% Google Chrome FreeType Memory Corruption
3 CVE-2021-21220 92.6% Chromium V8 Input Validation Vulnerability
4 CVE-2018-17463 92.2% Google Chromium V8 Remote Code Execution Vulnerability
5 CVE-2019-13720 89.7% Google Chrome Use-After-Free Vulnerability
6 CVE-2019-5786 89.5% Google Chrome Use-After-Free Vulnerability
7 CVE-2018-6065 88.8% Google Chromium V8 Integer Overflow Vulnerability
8 CVE-2020-6418 85.3% Chromium V8 Type Confusion Vulnerability
9 CVE-2020-16009 84.4% Chromium V8 Implementation Vulnerability
10 CVE-2021-30632 83.2% Google Chrome Out-of-bounds write

By the Year

In 2026 there have been 15 vulnerabilities in Google with an average score of 8.0 out of ten. Last year, in 2025 Google had 663 security vulnerabilities published. Right now, Google is on track to have less security vulnerabilities in 2026 than it did last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.97.




Year Vulnerabilities Average Score
2026 15 8.04
2025 663 7.07
2024 1106 7.27
2023 1537 6.65
2022 1579 6.85
2021 1124 7.02
2020 988 7.11
2019 809 7.11
2018 419 7.41

It may take a day or so for new Google vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Google Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-1260 Jan 22, 2026
Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file, which is not created in the normal training procedure.
CVE-2026-0908 Jan 20, 2026
Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Chrome
CVE-2026-0907 Jan 20, 2026
Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Chrome
CVE-2026-0906 Jan 20, 2026
Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59 Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
Chrome
CVE-2026-0905 Jan 20, 2026
Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)
Chrome
CVE-2026-0904 Jan 20, 2026
Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
Chrome
CVE-2026-0903 Jan 20, 2026
Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 allowed a remote attacker to bypass dangerous file type protections via a malicious file. (Chromium security severity: Medium)
Chrome
CVE-2026-0901 Jan 20, 2026
Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59 Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2026-0902 Jan 20, 2026
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Chrome
CVE-2026-0900 Jan 20, 2026
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2026-0899 Jan 20, 2026
Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2025-48647 Jan 16, 2026
In cpm_fwtp_msg_handler of cpm/google/lib/tracepoint/cpm_fwtp_ipc.c, there is a possible memory overwrite due to improper input validation In cpm_fwtp_msg_handler of cpm/google/lib/tracepoint/cpm_fwtp_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-36911 Jan 15, 2026
In key-based pairing, there is a possible ID due to a logic error in the code In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2026-0897 Jan 15, 2026
Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms  Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.
CVE-2026-0628 Jan 06, 2026
Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)
Chrome
CVE-2025-13427 Dec 18, 2025
Auth Bypass in Google Cloud Dialogflow CX Messenger via init params An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthenticated users to interact with restricted chat agents, gaining access to the agents' knowledge and the ability to trigger their intents, by manipulating initialization parameters or crafting specific API requests. All versions after August 20th, 2025 have been updated to protect from this vulnerability. No user action is required for this.
CVE-2025-47382 Dec 18, 2025
Bootloader memory corruption via invalid firmware load (CVE-2025-47382) Memory corruption while loading an invalid firmware in boot loader.
Android
CVE-2025-47372 Dec 18, 2025
Memory Corruption in ELF Parser: Oversized Size Abuse Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
Android
CVE-2025-47323 Dec 18, 2025
Memory Corruption in GPR Packet Routing (CVE-2025-47323) Memory corruption while routing GPR packets between user and root when handling large data packet.
Android
CVE-2025-47319 Dec 18, 2025
Info Disclosure via Android TA-to-TA APIs Exposed to HLOS Information disclosure while exposing internal TA-to-TA communication APIs to HLOS
Android
CVE-2025-14766 Dec 16, 2025
V8 OOB Read/Write in Google Chrome <143.0.7499.147 Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2025-14765 Dec 16, 2025
Google Chrome WebGPU UAF in v143.0.7499.147 Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2025-14373 Dec 12, 2025
Chrome Android <143.0.7499.110 Domain Spoof via Toolbar (Chromium) Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
Chrome
CVE-2025-14372 Dec 12, 2025
UAF in Chrome Password Manager <143.0.7499.110 sandbox escape Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Chrome
CVE-2025-14174 Dec 12, 2025
Out-of-Bounds in ANGLE, Google Chrome <143.0.7499.110, Mac Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Chrome
CVE-2025-36938 Dec 11, 2025
U-Boot append_uint32_le Fault Injection Physical PrivEsc without Interaction In U-Boot of append_uint32_le(), there is a possible fault injection due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36937 Dec 11, 2025
CVE-2025-36937: OOB write in AudioDecoder::HandleProduceRequest (RCE) In AudioDecoder::HandleProduceRequest of audio_decoder.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36936 Dec 11, 2025
Tachyon Server: OOB Write via Int Overflow in GetTachyonCommand In GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36935 Dec 11, 2025
Trusty OS Shared Mem SMCall Uninitialized Data Mem Corruption Priv Esc In trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible memory corruption due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36934 Dec 11, 2025
Local Priv Escalation via UAF in BigO Worker Thread (Google Video) In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36932 Dec 11, 2025
Local Priv Esc via Memory Overwrite in Google Tracepoint IPC In tracepoint_msg_handler of cpm/google/lib/tracepoint/tracepoint_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36931 Dec 11, 2025
LPE via OOB Write in gxp_buffer.h In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36930 Dec 11, 2025
Local PrivEsc via OOB write in gxp_buffer.h GetHostAddress In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36929 Dec 11, 2025
Local Info Leak in gxp_fence_manager via AreFencesRegistered In AreFencesRegistered of gxp_fence_manager.cc, there is a possible information leak due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36928 Dec 11, 2025
Out-of-bounds write in gxp_buffer.h leads to LPE In GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36927 Dec 11, 2025
OOB Write in GetTachyonCommand Enables Local Priv Escalation In GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36925 Dec 11, 2025
Out-of-bounds write in libaoc_waves local privilege escalation In WAVES_send_data_to_dsp of libaoc_waves.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36924 Dec 11, 2025
Out-of-Bounds Write in ss_LcsManagement.c Enables Priv Escalation In ss_DecodeLcsAssistDataReqMsg(void) of ss_LcsManagement.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36923 Dec 11, 2025
Out-of-Bounds Heap Write in NrmmDecoder::DecodeSORTransparentContext (EoP) In NrmmDecoder::DecodeSORTransparentContext of cn_NrmmDecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36922 Dec 11, 2025
Unprivileged Kernel UAF in bigo_iommu.c Enables Priv Escalation In bigo_map of bigo_iommu.c, there is a possible information disclosure due to a use after free. This could lead to local escalation of privilege in the OS Kernel level with System execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36921 Dec 11, 2025
Local Info Disclosure via OOB Read in ProtocolPsUnthrottleApn() Baseband In ProtocolPsUnthrottleApn() of protocolpsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
Android
CVE-2025-36919 Dec 11, 2025
AOCC Double Free in aoc_channel_dev.c Enables Local Priv Escalation In aocc_read of aoc_channel_dev.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36918 Dec 11, 2025
Local Priv Esc via OOB Read in aoc_service_read_message (CVE-2025-36918) In aoc_service_read_message of aoc_ipc_core.c, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36917 Dec 11, 2025
Remote DoS in up_L2commonPdcpSecurity.cpp (SwDcpItg) In SwDcpItg of up_L2commonPdcpSecurity.cpp, there is a possible denial of service due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36916 Dec 11, 2025
Local Priv Esc via Double-Fetch Race in gxp_main_actor.cc In PrepareWorkloadBuffers of gxp_main_actor.cc, there is a possible double fetch due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36912 Dec 11, 2025
Remote DOS via Logic Error in Cellular Modem In cellular modem, there is a possible denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-36889 Dec 11, 2025
Android: CameraActivity Permission Bypass leads to Local Info Disclosure In onCreateTasks of CameraActivity.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Android
CVE-2025-12952 Dec 10, 2025
Dialogflow CX Privilege Escalation via Webhook Agent Token A privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required.
CVE-2025-9571 Dec 10, 2025
RCE in Google Cloud Data Fusion AppFabric (>=6.11.1) A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+  Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .
CVE-2025-13428 Dec 09, 2025
RCE via Custom Integration Upload in SecOps SOAR <=6.3.63 A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemmed from weak validation of uploaded Python package code. An attacker could upload a package containing a malicious setup.py file, which would execute on the server during the installation process, leading to potential server compromise. No customer action is required. All customers have been automatically upgraded to the fixed version: 6.3.64 or higher.
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.