Google Vulnerabilities
Comprehensive security vulnerability database for Google products
29
0
21
7
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-20426 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, making it a serious risk if they have already compromised the device. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20425 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to write data outside the intended memory boundaries, potentially giving them greater control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have gained System privileges. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20424 | 4.4 | This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without proper checks, potentially exposing private data. The attacker does not need any user interaction to exploit this flaw, making it a significant risk if they have already gained access to the system. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20416 | 7.2 | This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially letting them take control of the device. The attacker does not need any user interaction to exploit this flaw, but they must already have system privileges to start with. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2022-20338 | 3.3 | This vulnerability allows an attacker to create a specially crafted URI that can bypass normal checks, potentially leading to unauthorized access to certain system resources. It affects Android versions 11 and 12, and can be exploited without needing any special permissions or user interaction. | googleandroid | Exploit Available | over 3 years agoAug 12, 2022 |
| CVE-2021-0642 | 5.5 | This vulnerability allows an attacker to access a trackable identifier from a user's device without needing special permissions, which could lead to unauthorized access to personal information. However, the attacker must convince the user to interact with the app to exploit this weakness. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0641 | 5.5 | This vulnerability allows an attacker to access unique identifiers from the device, potentially exposing sensitive information without needing any special permissions or user interaction. It affects several versions of Android, meaning that many devices could be at risk if they haven't been updated. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0584 | 5.5 | This vulnerability allows an attacker to access sensitive information stored on an Android device without needing any special permissions or user interaction. It occurs due to a flaw in how the system checks input data, affecting multiple versions of Android from 8.1 to 11. | googleandroid | Theoretical | over 4 years agoAug 17, 2021 |
| CVE-2013-6662 | 6.5 | This vulnerability allows an attacker to potentially intercept and decrypt secure communications in Google Chrome by exploiting the way the browser caches TLS sessions before checking if the website's certificate is valid. For this to work, the attacker needs to be able to trick the browser into using a cached session, which could happen on compromised networks or through malicious websites. | googlechrome | Exploit Available | almost 9 years agoApr 13, 2017 |
About Google Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Google products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.