Google Vulnerabilities
Comprehensive security vulnerability database for Google products
19
0
21
7
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-20445 | 4.4 | This vulnerability allows an attacker with system privileges to crash the Android device, leading to a local denial of service. The attacker does not need any user interaction to exploit this issue, but they must already have gained system-level access. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20444 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this issue, but they must already have System privileges to take advantage of it. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20443 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to escalate their access and potentially gain control over more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges to take advantage of it. | googleandroid | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2026-20442 | 4.4 | This vulnerability allows an attacker with system privileges on an Android device to crash the system, causing a denial of service. The attacker does not need any user interaction to exploit this flaw, but they must already have gained elevated privileges on the device. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20441 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to potentially gain higher access levels, which could let them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges to take advantage of it. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20440 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System privileges. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20439 | 4.4 | An attacker with system privileges can cause a crash in the Android operating system, leading to a denial of service that disrupts device functionality. This vulnerability can be exploited without any user interaction, making it particularly concerning for devices already compromised by an attacker. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20438 | 6.4 | This vulnerability allows an attacker with system-level access on an Android device to gain higher privileges, potentially enabling them to take control of the device. The attack can happen without any user interaction, but the attacker must already have system privileges to exploit it. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20437 | 4.4 | This vulnerability allows an attacker with system privileges to crash the device, causing a denial of service without needing any user interaction. However, the attacker must already have gained elevated system access to exploit this issue. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20429 | 4.4 | This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without permission. The attacker does not need any user interaction to exploit this flaw, making it a serious risk for devices that have already been compromised. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20428 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to potentially gain higher access rights, enabling them to control more of the system. The attacker does not need any user interaction to exploit this flaw, but they must already have System-level access. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20427 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to gain higher access levels, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this weakness, making it a serious concern for devices already compromised. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20426 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to gain even higher access, potentially letting them control more sensitive parts of the system. The attacker does not need any user interaction to exploit this flaw, making it a serious risk if they have already compromised the device. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20425 | 6.7 | This vulnerability allows an attacker with System privileges on an Android device to write data outside the intended memory boundaries, potentially giving them greater control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have gained System privileges. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20424 | 4.4 | This vulnerability allows an attacker with system privileges on an Android device to read sensitive information from memory without proper checks, potentially exposing private data. The attacker does not need any user interaction to exploit this flaw, making it a significant risk if they have already gained access to the system. | googleandroid | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2021-0642 | 5.5 | This vulnerability allows an attacker to access a trackable identifier from a user's device without needing special permissions, which could lead to unauthorized access to personal information. However, the attacker must convince the user to interact with the app to exploit this weakness. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0641 | 5.5 | This vulnerability allows an attacker to access unique identifiers from the device, potentially exposing sensitive information without needing any special permissions or user interaction. It affects several versions of Android, meaning that many devices could be at risk if they haven't been updated. | googleandroid | Exploit Available | over 4 years agoAug 17, 2021 |
| CVE-2021-0584 | 5.5 | This vulnerability allows an attacker to access sensitive information stored on an Android device without needing any special permissions or user interaction. It occurs due to a flaw in how the system checks input data, affecting multiple versions of Android from 8.1 to 11. | googleandroid | Theoretical | over 4 years agoAug 17, 2021 |
| CVE-2013-6662 | 6.5 | This vulnerability allows an attacker to potentially intercept and decrypt secure communications in Google Chrome by exploiting the way the browser caches TLS sessions before checking if the website's certificate is valid. For this to work, the attacker needs to be able to trick the browser into using a cached session, which could happen on compromised networks or through malicious websites. | googlechrome | Exploit Available | almost 9 years agoApr 13, 2017 |
About Google Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Google products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.