Google Software and search
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Google product.
RSS Feeds for Google security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Google products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Google Sorted by Most Security Vulnerabilities since 2018
Recent Google Security Advisories
| Advisory | Title | Published |
|---|---|---|
| 2025-12-01 | Android Security Bulletin—December 2025 | December 1, 2025 |
| 2025-11-01 | Android Security Bulletin—November 2025 | November 1, 2025 |
| 2025-10-01 | Android Security Bulletin—October 2025 | October 1, 2025 |
| 2025-09-01 | Android Security Bulletin—September 2025 | September 1, 2025 |
| Chrome Releases: Stable Channel Update for Desktop | August 13, 2025 | |
| Chrome Releases: Stable Channel Update for Desktop | August 7, 2025 | |
| 2025-08-01 | Android Security Bulletin—August 2025 | August 1, 2025 |
| Chrome Releases: Stable Channel Update for Desktop | July 22, 2025 | |
| 2025-07-01 | Android Security Bulletin—July 2025 | July 1, 2025 |
| Chrome Releases: Stable Channel Update for Desktop | June 30, 2025 |
Known Exploited Google Vulnerabilities
The following Google vulnerabilities have recently been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Google Chromium Out of Bounds Memory Access Vulnerability |
Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2025-14174 Exploit Probability: 0.7% |
December 12, 2025 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows for heap corruption. CVE-2025-13223 Exploit Probability: 1.2% |
November 19, 2025 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine. CVE-2025-10585 Exploit Probability: 0.7% |
September 23, 2025 |
| Google Chromium ANGLE and GPU Improper Input Validation Vulnerability |
Google Chromium contains an improper input validation vulnerability in ANGLE and GPU. This vulnerability could allow a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2025-6558 Exploit Probability: 0.1% |
July 22, 2025 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that could allow a remote attacker to perform arbitrary read/write via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2025-6554 Exploit Probability: 0.4% |
July 2, 2025 |
| Google Chromium V8 Out-of-Bounds Read and Write Vulnerability |
Google Chromium V8 contains an out-of-bounds read and write vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2025-5419 Exploit Probability: 1.7% |
June 5, 2025 |
| Google Chromium Loader Insufficient Policy Enforcement Vulnerability |
Google Chromium contains an insufficient policy enforcement vulnerability that allows a remote attacker to leak cross-origin data via a crafted HTML page. CVE-2025-4664 Exploit Probability: 0.0% |
May 15, 2025 |
| Google Chromium Mojo Sandbox Escape Vulnerability |
Google Chromium Mojo on Windows contains a sandbox escape vulnerability caused by a logic error, which results from an incorrect handle being provided in unspecified circumstances. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2025-2783 Exploit Probability: 38.1% |
March 27, 2025 |
| Google Chromium V8 Inappropriate Implementation Vulnerability |
Google Chromium V8 contains an inappropriate implementation vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2024-7965 Exploit Probability: 27.1% |
August 28, 2024 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2024-7971 Exploit Probability: 0.9% |
August 26, 2024 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2024-5274 Exploit Probability: 6.4% |
May 28, 2024 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. CVE-2024-4947 Exploit Probability: 1.0% |
May 20, 2024 |
| Google Chromium V8 Out-of-Bounds Memory Write Vulnerability |
Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2024-4761 Exploit Probability: 3.2% |
May 16, 2024 |
| Google Chromium Visuals Use-After-Free Vulnerability |
Google Chromium Visuals contains a use-after-free vulnerability that allows a remote attacker to exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. CVE-2024-4671 Exploit Probability: 0.2% |
May 13, 2024 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. CVE-2023-4762 Exploit Probability: 40.2% |
February 6, 2024 |
| Google Chromium V8 Out-of-Bounds Memory Access Vulnerability |
Google Chromium V8 contains an out-of-bounds memory access vulnerability. Specific impacts from exploitation are not available at this time. CVE-2024-0519 Exploit Probability: 0.5% |
January 17, 2024 |
| Google Skia Integer Overflow Vulnerability |
Google Skia contains an integer overflow vulnerability affecting Google Chrome and ChromeOS, Android, Flutter, and possibly other products. CVE-2023-6345 Exploit Probability: 1.4% |
November 30, 2023 |
| Google Chrome libvpx Heap Buffer Overflow Vulnerability |
Google Chrome libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. CVE-2023-5217 Exploit Probability: 3.6% |
October 2, 2023 |
| Google Chromium Heap-Based Buffer Overflow Vulnerability |
Google Chromium contains a heap-based buffer overflow vulnerability in WebP that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. CVE-2023-4863 Exploit Probability: 94.1% |
September 13, 2023 |
| Google Chromium V8 Type Confusion Vulnerability |
Google Chromium V8 contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. CVE-2023-3079 Exploit Probability: 1.6% |
June 7, 2023 |
The vulnerability CVE-2023-4863: Google Chromium Heap-Based Buffer Overflow Vulnerability is in the top 1% of the currently known exploitable vulnerabilities. 3 known exploited Google vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.
Top 10 Riskiest Google Vulnerabilities
Based on the current exploit probability, these Google vulnerabilities are on CISA's Known Exploited vulnerabilities list (KEV) and are ranked by the current EPSS exploit probability.
| Rank | CVE | EPSS | Vulnerability |
|---|---|---|---|
| 1 | CVE-2023-4863 | 94.1% | Google Chromium Heap-Based Buffer Overflow Vulnerability |
| 2 | CVE-2020-15999 | 92.9% | Google Chrome FreeType Memory Corruption |
| 3 | CVE-2021-21220 | 92.6% | Chromium V8 Input Validation Vulnerability |
| 4 | CVE-2018-17463 | 92.2% | Google Chromium V8 Remote Code Execution Vulnerability |
| 5 | CVE-2019-13720 | 89.7% | Google Chrome Use-After-Free Vulnerability |
| 6 | CVE-2019-5786 | 89.5% | Google Chrome Use-After-Free Vulnerability |
| 7 | CVE-2018-6065 | 88.8% | Google Chromium V8 Integer Overflow Vulnerability |
| 8 | CVE-2020-6418 | 85.3% | Chromium V8 Type Confusion Vulnerability |
| 9 | CVE-2020-16009 | 84.4% | Chromium V8 Implementation Vulnerability |
| 10 | CVE-2021-30632 | 83.2% | Google Chrome Out-of-bounds write |
By the Year
In 2026 there have been 15 vulnerabilities in Google with an average score of 8.0 out of ten. Last year, in 2025 Google had 663 security vulnerabilities published. Right now, Google is on track to have less security vulnerabilities in 2026 than it did last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.97.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 15 | 8.04 |
| 2025 | 663 | 7.07 |
| 2024 | 1106 | 7.27 |
| 2023 | 1537 | 6.65 |
| 2022 | 1579 | 6.85 |
| 2021 | 1124 | 7.02 |
| 2020 | 988 | 7.11 |
| 2019 | 809 | 7.11 |
| 2018 | 419 | 7.41 |
It may take a day or so for new Google vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Google Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-1260 | Jan 22, 2026 |
Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model fileInvalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file, which is not created in the normal training procedure. |
|
| CVE-2026-0908 | Jan 20, 2026 |
Use after free in ANGLE in Google Chrome prior to 144.0.7559.59Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low) |
|
| CVE-2026-0907 | Jan 20, 2026 |
Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) |
|
| CVE-2026-0906 | Jan 20, 2026 |
Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59Incorrect security UI in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low) |
|
| CVE-2026-0905 | Jan 20, 2026 |
Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium) |
|
| CVE-2026-0904 | Jan 20, 2026 |
Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium) |
|
| CVE-2026-0903 | Jan 20, 2026 |
Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 allowed a remote attacker to bypass dangerous file type protections via a malicious file. (Chromium security severity: Medium) |
|
| CVE-2026-0901 | Jan 20, 2026 |
Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2026-0902 | Jan 20, 2026 |
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) |
|
| CVE-2026-0900 | Jan 20, 2026 |
Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2026-0899 | Jan 20, 2026 |
Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2025-48647 | Jan 16, 2026 |
In cpm_fwtp_msg_handler of cpm/google/lib/tracepoint/cpm_fwtp_ipc.c, there is a possible memory overwrite due to improper input validationIn cpm_fwtp_msg_handler of cpm/google/lib/tracepoint/cpm_fwtp_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36911 | Jan 15, 2026 |
In key-based pairing, there is a possible ID due to a logic error in the codeIn key-based pairing, there is a possible ID due to a logic error in the code. This could lead to remote (proximal/adjacent) information disclosure of user's conversations and location with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2026-0897 | Jan 15, 2026 |
Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platformsAllocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape. |
|
| CVE-2026-0628 | Jan 06, 2026 |
Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High) |
|
| CVE-2025-13427 | Dec 18, 2025 |
Auth Bypass in Google Cloud Dialogflow CX Messenger via init paramsAn authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthenticated users to interact with restricted chat agents, gaining access to the agents' knowledge and the ability to trigger their intents, by manipulating initialization parameters or crafting specific API requests. All versions after August 20th, 2025 have been updated to protect from this vulnerability. No user action is required for this. |
|
| CVE-2025-47382 | Dec 18, 2025 |
Bootloader memory corruption via invalid firmware load (CVE-2025-47382)Memory corruption while loading an invalid firmware in boot loader. |
|
| CVE-2025-47372 | Dec 18, 2025 |
Memory Corruption in ELF Parser: Oversized Size AbuseMemory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication. |
|
| CVE-2025-47323 | Dec 18, 2025 |
Memory Corruption in GPR Packet Routing (CVE-2025-47323)Memory corruption while routing GPR packets between user and root when handling large data packet. |
|
| CVE-2025-47319 | Dec 18, 2025 |
Info Disclosure via Android TA-to-TA APIs Exposed to HLOSInformation disclosure while exposing internal TA-to-TA communication APIs to HLOS |
|
| CVE-2025-14766 | Dec 16, 2025 |
V8 OOB Read/Write in Google Chrome <143.0.7499.147Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2025-14765 | Dec 16, 2025 |
Google Chrome WebGPU UAF in v143.0.7499.147Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2025-14373 | Dec 12, 2025 |
Chrome Android <143.0.7499.110 Domain Spoof via Toolbar (Chromium)Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium) |
|
| CVE-2025-14372 | Dec 12, 2025 |
UAF in Chrome Password Manager <143.0.7499.110 sandbox escapeUse after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) |
|
| CVE-2025-14174 | Dec 12, 2025 |
Out-of-Bounds in ANGLE, Google Chrome <143.0.7499.110, MacOut of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2025-36938 | Dec 11, 2025 |
U-Boot append_uint32_le Fault Injection Physical PrivEsc without InteractionIn U-Boot of append_uint32_le(), there is a possible fault injection due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36937 | Dec 11, 2025 |
CVE-2025-36937: OOB write in AudioDecoder::HandleProduceRequest (RCE)In AudioDecoder::HandleProduceRequest of audio_decoder.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36936 | Dec 11, 2025 |
Tachyon Server: OOB Write via Int Overflow in GetTachyonCommandIn GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36935 | Dec 11, 2025 |
Trusty OS Shared Mem SMCall Uninitialized Data Mem Corruption Priv EscIn trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible memory corruption due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36934 | Dec 11, 2025 |
Local Priv Escalation via UAF in BigO Worker Thread (Google Video)In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36932 | Dec 11, 2025 |
Local Priv Esc via Memory Overwrite in Google Tracepoint IPCIn tracepoint_msg_handler of cpm/google/lib/tracepoint/tracepoint_ipc.c, there is a possible memory overwrite due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36931 | Dec 11, 2025 |
LPE via OOB Write in gxp_buffer.hIn GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36930 | Dec 11, 2025 |
Local PrivEsc via OOB write in gxp_buffer.h GetHostAddressIn GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36929 | Dec 11, 2025 |
Local Info Leak in gxp_fence_manager via AreFencesRegisteredIn AreFencesRegistered of gxp_fence_manager.cc, there is a possible information leak due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36928 | Dec 11, 2025 |
Out-of-bounds write in gxp_buffer.h leads to LPEIn GetHostAddress of gxp_buffer.h, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36927 | Dec 11, 2025 |
OOB Write in GetTachyonCommand Enables Local Priv EscalationIn GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36925 | Dec 11, 2025 |
Out-of-bounds write in libaoc_waves local privilege escalationIn WAVES_send_data_to_dsp of libaoc_waves.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36924 | Dec 11, 2025 |
Out-of-Bounds Write in ss_LcsManagement.c Enables Priv EscalationIn ss_DecodeLcsAssistDataReqMsg(void) of ss_LcsManagement.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36923 | Dec 11, 2025 |
Out-of-Bounds Heap Write in NrmmDecoder::DecodeSORTransparentContext (EoP)In NrmmDecoder::DecodeSORTransparentContext of cn_NrmmDecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36922 | Dec 11, 2025 |
Unprivileged Kernel UAF in bigo_iommu.c Enables Priv EscalationIn bigo_map of bigo_iommu.c, there is a possible information disclosure due to a use after free. This could lead to local escalation of privilege in the OS Kernel level with System execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36921 | Dec 11, 2025 |
Local Info Disclosure via OOB Read in ProtocolPsUnthrottleApn() BasebandIn ProtocolPsUnthrottleApn() of protocolpsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. |
|
| CVE-2025-36919 | Dec 11, 2025 |
AOCC Double Free in aoc_channel_dev.c Enables Local Priv EscalationIn aocc_read of aoc_channel_dev.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36918 | Dec 11, 2025 |
Local Priv Esc via OOB Read in aoc_service_read_message (CVE-2025-36918)In aoc_service_read_message of aoc_ipc_core.c, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36917 | Dec 11, 2025 |
Remote DoS in up_L2commonPdcpSecurity.cpp (SwDcpItg)In SwDcpItg of up_L2commonPdcpSecurity.cpp, there is a possible denial of service due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36916 | Dec 11, 2025 |
Local Priv Esc via Double-Fetch Race in gxp_main_actor.ccIn PrepareWorkloadBuffers of gxp_main_actor.cc, there is a possible double fetch due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36912 | Dec 11, 2025 |
Remote DOS via Logic Error in Cellular ModemIn cellular modem, there is a possible denial of service due to a logic error in the code. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-36889 | Dec 11, 2025 |
Android: CameraActivity Permission Bypass leads to Local Info DisclosureIn onCreateTasks of CameraActivity.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
|
| CVE-2025-12952 | Dec 10, 2025 |
Dialogflow CX Privilege Escalation via Webhook Agent TokenA privilege escalation vulnerability exists in Google Cloud's Dialogflow CX. Dialogflow agent developers with Webhook editor permission are able to configure Webhooks using Dialogflow service agent access token authentication. This allows the attacker to escalate their privileges from agent-level to project-level, granting them unauthorized access to manage resources in services associated with the project, leading to unexpected costs and resource depletion for the producer project. A fix was applied on the server side to protect from this vulnerability in February 2025. No customer action is required. |
|
| CVE-2025-9571 | Dec 10, 2025 |
RCE in Google Cloud Data Fusion AppFabric (>=6.11.1)A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+ Users must immediately upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases . |
|
| CVE-2025-13428 | Dec 09, 2025 |
RCE via Custom Integration Upload in SecOps SOAR <=6.3.63A vulnerability exists in the SecOps SOAR server. The custom integrations feature allowed an authenticated user with an "IDE role" to achieve Remote Code Execution (RCE) in the server. The flaw stemmed from weak validation of uploaded Python package code. An attacker could upload a package containing a malicious setup.py file, which would execute on the server during the installation process, leading to potential server compromise. No customer action is required. All customers have been automatically upgraded to the fixed version: 6.3.64 or higher. |