Filtered by vendor Google
Subscriptions
Total
12982 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-47040 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-32915 | 1 Google | 1 Android | 2025-07-24 | 4.3 Medium |
In CellInfoListParserV2::FillCellInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | ||||
CVE-2024-32916 | 1 Google | 1 Android | 2025-07-24 | 5.9 Medium |
In fvp_freq_histogram_init of fvp.c, there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-32917 | 1 Google | 1 Android | 2025-07-24 | 7.1 High |
In pl330_dma_from_peri_start() of fp_spi_dma.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-22013 | 1 Google | 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more | 2025-07-24 | 5.3 Medium |
U-Boot environment is read from unauthenticated partition. | ||||
CVE-2024-44097 | 1 Google | 12 Nest Cam \(indoor\, Wired\), Nest Cam \(indoor\, Wired\) Firmware, Nest Cam \(outdoor Or Indoor\, Battery\) and 9 more | 2025-07-24 | 9.8 Critical |
According to the researcher: "The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server." | ||||
CVE-2024-32914 | 1 Google | 1 Android | 2025-07-24 | 5.5 Medium |
In tpu_get_int_state of tpu.c, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2023-48426 | 1 Google | 9 Chromecast, Chromecast Firmware, Chromecast Ga00439 and 6 more | 2025-07-24 | 10 Critical |
u-boot bug that allows for u-boot shell and interrupt over UART | ||||
CVE-2024-44098 | 1 Google | 2 Android, Pixel | 2025-07-24 | 7.4 High |
In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-47013 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible arbitrary write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-47014 | 1 Google | 1 Android | 2025-07-24 | 8.8 High |
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292. | ||||
CVE-2024-47015 | 1 Google | 1 Android | 2025-07-24 | 5.5 Medium |
In ProtocolMiscHwConfigChangeAdapter::GetData() of protocolmiscadapter.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | ||||
CVE-2024-47016 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
there is a possible privilege escalation due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-47030 | 1 Google | 2 Android, Pixel | 2025-07-24 | 5.1 Medium |
Android before 2024-10-05 on Google Pixel devices allows information disclosure in the ACPM component, A-315191818. | ||||
CVE-2024-47031 | 1 Google | 2 Android, Pixel | 2025-07-24 | 7.4 High |
Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-329163861. | ||||
CVE-2024-11624 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-47032 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-53833 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
In prepare_response_locked of lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-53834 | 1 Google | 1 Android | 2025-07-24 | 7.5 High |
In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | ||||
CVE-2024-53835 | 1 Google | 1 Android | 2025-07-24 | 7.8 High |
there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |