Google Vulnerabilities

Comprehensive security vulnerability database for Google products

Last updated: Mar 2, 2026
Total CVEs

19

Critical

0

With Exploits

21

Last 30 Days

7

Severity Distribution

Critical0
0%
High9
47%
Medium19
100%
Low1
5%
DescriptionVendor / ProductExploit Status
CVE-2026-204454.4

This vulnerability allows an attacker with system privileges to crash the Android device, leading to a local denial of service. The attacker does not need any user interaction to exploit this issue, but they must already have gained system-level access.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204446.7

This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this issue, but they must already have System privileges to take advantage of it.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204436.7

This vulnerability allows an attacker with System privileges on an Android device to escalate their access and potentially gain control over more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges to take advantage of it.

googleandroid
Theoretical
about 1 month agoMar 2, 2026
CVE-2026-204424.4

This vulnerability allows an attacker with system privileges on an Android device to crash the system, causing a denial of service. The attacker does not need any user interaction to exploit this flaw, but they must already have gained elevated privileges on the device.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204416.7

This vulnerability allows an attacker with System privileges on an Android device to potentially gain higher access levels, which could let them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges to take advantage of it.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204406.7

This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204394.4

An attacker with system privileges can cause a crash in the Android operating system, leading to a denial of service that disrupts device functionality. This vulnerability can be exploited without any user interaction, making it particularly concerning for devices already compromised by an attacker.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204386.4

This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially enabling them to take control of the device. The attack can happen without any user interaction, but the attacker must already have system privileges to exploit it.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204374.4

This vulnerability allows an attacker with system privileges to crash the device, causing a denial of service without needing any user interaction. However, the attacker must already have gained elevated system access to exploit this issue.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204294.4

This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without permission. The attacker does not need any user interaction to exploit this flaw, making it a serious risk for devices that have already been compromised.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204286.7

This vulnerability allows an attacker with System privileges on an Android device to potentially gain higher access rights, enabling them to control more of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System-level access.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204276.7

This vulnerability allows an attacker with System privileges on an Android device to gain higher access levels, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this weakness, making it a serious concern for devices already compromised.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204266.7

This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, making it a serious risk if they have already compromised the device.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204256.7

This vulnerability allows an attacker with System privileges on an Android device to write data outside the intended memory boundaries, potentially giving them greater control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have gained System privileges.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-204244.4

This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without proper checks, potentially exposing private data. The attacker does not need any user interaction to exploit this flaw, making it a significant risk if they have already gained access to the system.

googleandroid
Exploit Available
about 1 month agoMar 2, 2026
CVE-2021-06425.5

This vulnerability allows an attacker to access a trackable identifier from a user's device without needing special permissions, which could lead to unauthorized access to personal information. However, the attacker must convince the user to interact with the app to exploit this weakness.

googleandroid
Exploit Available
over 4 years agoAug 17, 2021
CVE-2021-06415.5

This vulnerability allows an attacker to access unique identifiers from the device, potentially exposing sensitive information without needing any special permissions or user interaction. It affects several versions of Android, meaning that many devices could be at risk if they haven't been updated.

googleandroid
Exploit Available
over 4 years agoAug 17, 2021
CVE-2021-05845.5

This vulnerability allows an attacker to access sensitive information stored on an Android device without needing any special permissions or user interaction. It occurs due to a flaw in how the system checks input data, affecting multiple versions of Android from 8.1 to 11.

googleandroid
Theoretical
over 4 years agoAug 17, 2021
CVE-2013-66626.5

This vulnerability allows an attacker to potentially intercept and decrypt secure communications in Google Chrome by exploiting the way the browser caches TLS sessions before checking if the website's certificate is valid. For this to work, the attacker needs to be able to trick the browser into using a cached session, which could happen on compromised networks or through malicious websites.

googlechrome
Exploit Available
almost 9 years agoApr 13, 2017

About Google Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Google products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.