27
0
19
7
Vulnerability Timeline
27 vulnerabilities discovered over time for Android
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-20425 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to write data outside the intended memory boundaries, potentially giving them greater control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have gained System privileges. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20424 | 4.4 | This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without proper checks, potentially exposing private data. The attacker does not need any user interaction to exploit this flaw, making it a significant risk if they have already gained access to the system. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20416 | 7.2 | This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially letting them take control of the device. The attacker does not need any user interaction to exploit this flaw, but they must already have system privileges to start with. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2022-20338 | 3.3 | This vulnerability allows an attacker to create a specially crafted URI that can bypass normal checks, potentially leading to unauthorized access to certain system resources. It affects Android versions 11 and 12, and can be exploited without needing any special permissions or user interaction. | googleandroid | Exploit Available | over 3 years agoAug 12, 2022 |
| CVE-2021-0642 | 5.5 | This vulnerability allows an attacker to access a trackable identifier from a user's device without needing special permissions, which could lead to unauthorized access to personal information. However, the attacker must convince the user to interact with the app to exploit this weakness. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0641 | 5.5 | This vulnerability allows an attacker to access unique identifiers from the device, potentially exposing sensitive information without needing any special permissions or user interaction. It affects several versions of Android, meaning that many devices could be at risk if they haven't been updated. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0584 | 5.5 | This vulnerability allows an attacker to access sensitive information stored on an Android device without needing any special permissions or user interaction. It occurs due to a flaw in how the system checks input data, affecting multiple versions of Android from 8.1 to 11. | googleandroid | Theoretical | over 4 years agoAug 17, 2021 |
About Google Android Security
This page provides comprehensive security vulnerability tracking for Google Android. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Android updated to the latest version
- • Subscribe to security advisories from Google
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately