Filtered by vendor Google
Subscribe
Total
13012 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-1079 | 3 Apple, Google, Linux | 3 Macos, Web Designer, Linux Kernel | 2025-07-29 | N/A | 7.8 HIGH |
Client RCE on macOS and Linux via improper symbolic link resolution in Google Web Designer's preview feature | |||||
CVE-2024-22004 | 1 Google | 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more | 2025-07-24 | N/A | 10.0 CRITICAL |
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application | |||||
CVE-2024-47038 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.8 HIGH |
In dhd_prot_flowrings_pool_release of dhd_msgbuf.c, there is a possible outcof bounds write due to a missing bounds check. This could lead to localcescalation of privilege with no additional execution privileges needed. Usercinteraction is not needed for exploitation. | |||||
CVE-2024-47039 | 1 Google | 1 Android | 2025-07-24 | N/A | 5.5 MEDIUM |
In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-47040 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.8 HIGH |
There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-32915 | 1 Google | 1 Android | 2025-07-24 | N/A | 4.3 MEDIUM |
In CellInfoListParserV2::FillCellInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | |||||
CVE-2024-32916 | 1 Google | 1 Android | 2025-07-24 | N/A | 5.9 MEDIUM |
In fvp_freq_histogram_init of fvp.c, there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-32917 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.1 HIGH |
In pl330_dma_from_peri_start() of fp_spi_dma.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-22013 | 1 Google | 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more | 2025-07-24 | N/A | 5.3 MEDIUM |
U-Boot environment is read from unauthenticated partition. | |||||
CVE-2024-44097 | 1 Google | 8 Nest Cam \(indoor\, Wired\), Nest Cam \(indoor\, Wired\) Firmware, Nest Cam \(outdoor Or Indoor\, Battery\) and 5 more | 2025-07-24 | N/A | 9.8 CRITICAL |
According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server." | |||||
CVE-2024-32914 | 1 Google | 1 Android | 2025-07-24 | N/A | 5.5 MEDIUM |
In tpu_get_int_state of tpu.c, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2023-48426 | 1 Google | 8 Chromecast Firmware, Chromecast Ga00439, Chromecast Ga3a00403a14 and 5 more | 2025-07-24 | N/A | 10.0 CRITICAL |
u-boot bug that allows for u-boot shell and interrupt over UART | |||||
CVE-2024-44098 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.4 HIGH |
In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-47013 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.8 HIGH |
In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible arbitrary write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-47014 | 1 Google | 1 Android | 2025-07-24 | N/A | 8.8 HIGH |
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292. | |||||
CVE-2024-47015 | 1 Google | 1 Android | 2025-07-24 | N/A | 5.5 MEDIUM |
In ProtocolMiscHwConfigChangeAdapter::GetData() of protocolmiscadapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | |||||
CVE-2024-47016 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.8 HIGH |
there is a possible privilege escalation due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2024-47030 | 1 Google | 1 Android | 2025-07-24 | N/A | 5.1 MEDIUM |
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ACPM component, A-315191818. | |||||
CVE-2024-47031 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.4 HIGH |
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-329163861. | |||||
CVE-2024-11624 | 1 Google | 1 Android | 2025-07-24 | N/A | 7.8 HIGH |
there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |