Google Vulnerabilities

Comprehensive security vulnerability database for Google products

Last updated: Mar 2, 2026
Total CVEs

29

Critical

0

With Exploits

21

Last 30 Days

7

Severity Distribution

Critical0
0%
High9
31%
Medium19
66%
Low1
3%
DescriptionVendor / ProductExploit Status
CVE-2026-204266.7

This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, making it a serious risk if they have already compromised the device.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204256.7

This vulnerability allows an attacker with System privileges on an Android device to write data outside the intended memory boundaries, potentially giving them greater control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have gained System privileges.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204244.4

This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without proper checks, potentially exposing private data. The attacker does not need any user interaction to exploit this flaw, making it a significant risk if they have already gained access to the system.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204167.2

This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially letting them take control of the device. The attacker does not need any user interaction to exploit this flaw, but they must already have system privileges to start with.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2022-203383.3

This vulnerability allows an attacker to create a specially crafted URI that can bypass normal checks, potentially leading to unauthorized access to certain system resources. It affects Android versions 11 and 12, and can be exploited without needing any special permissions or user interaction.

googleandroid
Exploit Available
over 3 years agoAug 12, 2022
CVE-2021-06425.5

This vulnerability allows an attacker to access a trackable identifier from a user's device without needing special permissions, which could lead to unauthorized access to personal information. However, the attacker must convince the user to interact with the app to exploit this weakness.

googleandroid
Exploit Available
over 4 years agoAug 17, 2021
CVE-2021-06415.5

This vulnerability allows an attacker to access unique identifiers from the device, potentially exposing sensitive information without needing any special permissions or user interaction. It affects several versions of Android, meaning that many devices could be at risk if they haven't been updated.

googleandroid
Exploit Available
over 4 years agoAug 17, 2021
CVE-2021-05845.5

This vulnerability allows an attacker to access sensitive information stored on an Android device without needing any special permissions or user interaction. It occurs due to a flaw in how the system checks input data, affecting multiple versions of Android from 8.1 to 11.

googleandroid
Theoretical
over 4 years agoAug 17, 2021
CVE-2013-66626.5

This vulnerability allows an attacker to potentially intercept and decrypt secure communications in Google Chrome by exploiting the way the browser caches TLS sessions before checking if the website's certificate is valid. For this to work, the attacker needs to be able to trick the browser into using a cached session, which could happen on compromised networks or through malicious websites.

googlechrome
Exploit Available
almost 9 years agoApr 13, 2017
Showing 21 to 29 of 29 results

About Google Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Google products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.