Vulnerabilities (CVE)

Filtered by vendor Google Subscribe
Total 12830 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-5847 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Use after free in PDFium in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
CVE-2024-5835 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Heap buffer overflow in Tab Groups in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5842 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Use after free in Browser UI in Google Chrome prior to 126.0.6478.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-5834 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Inappropriate implementation in Dawn in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
CVE-2024-6101 1 Google 1 Chrome 2024-07-03 N/A 8.8 HIGH
Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5833 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5838 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Type Confusion in V8 in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
CVE-2024-5843 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 6.5 MEDIUM
Inappropriate implementation in Downloads in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to obfuscate security UI via a malicious file. (Chromium security severity: Medium)
CVE-2024-3837 1 Google 1 Chrome 2024-07-03 N/A 8.8 HIGH
Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3834 1 Google 1 Chrome 2024-07-03 N/A 8.8 HIGH
Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3839 1 Google 1 Chrome 2024-07-03 N/A 6.5 MEDIUM
Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-20006 4 Google, Mediatek, Openwrt and 1 more 8 Android, Mt2713, Mt6781 and 5 more 2024-07-03 N/A 6.7 MEDIUM
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148.
CVE-2024-20016 2 Google, Mediatek 35 Android, Mt6735, Mt6737 and 32 more 2024-07-03 N/A 4.4 MEDIUM
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation Patch ID: ALPS07835901; Issue ID: ALPS07835901.
CVE-2024-20015 2 Google, Mediatek 40 Android, Mt6739, Mt6753 and 37 more 2024-07-03 N/A 7.8 HIGH
In telephony, there is a possible escalation of privilege due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08441419; Issue ID: ALPS08441419.
CVE-2024-0518 2 Fedoraproject, Google 2 Fedora, Chrome 2024-07-03 N/A 8.8 HIGH
Type confusion in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2023-21267 1 Google 1 Android 2024-07-03 N/A 5.5 MEDIUM
In multiple functions of KeyguardViewMediator.java, there is a possible way to bypass lockdown mode with screen pinning due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-20938 1 Google 1 Android 2024-07-03 N/A 7.8 HIGH
In binder_transaction_buffer_release of binder.c, there is a possible use after free due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-257685302References: Upstream kernel
CVE-2024-34599 2 Google, Samsung 2 Android, Tips 2024-07-02 N/A 3.3 LOW
Improper input validation in Tips prior to version 6.2.9.4 in Android 14 allows local attacker to send broadcast with Tips' privilege.
CVE-2024-21382 2 Google, Microsoft 2 Android, Edge Chromium 2024-06-11 N/A 4.3 MEDIUM
Microsoft Edge for Android Information Disclosure Vulnerability
CVE-2021-22566 1 Google 1 Fuchsia 2024-05-29 7.5 HIGH 9.8 CRITICAL
An incorrect setting of UXN bits within mmu_flags_to_s1_pte_attr lead to privileged executable pages being mapped as executable from an unprivileged context. This can be leveraged by an attacker to bypass executability restrictions of kernel-mode pages from user-mode. An incorrect setting of PXN bits within mmu_flags_to_s1_pte_attr lead to unprivileged executable pages being mapped as executable from a privileged context. This can be leveraged by an attacker to bypass executability restrictions of user-mode pages from kernel-mode. Typically this allows a potential attacker to circumvent a mitigation, making exploitation of potential kernel-mode vulnerabilities easier. We recommend updating kernel beyond commit 7d731b4e9599088ac3073956933559da7bca6a00 and rebuilding.