Search Results (13606 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-38208 2 Google, Microsoft 2 Android, Edge 2025-07-10 6.1 Medium
Microsoft Edge for Android Spoofing Vulnerability
CVE-2025-20693 4 Google, Linuxfoundation, Mediatek and 1 more 26 Android, Yocto, Mt2737 and 23 more 2025-07-09 6.5 Medium
In wlan STA driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09812521; Issue ID: MSV-3421.
CVE-2023-3735 1 Google 1 Chrome 2025-07-09 4.3 Medium
Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
CVE-2025-1566 1 Google 1 Chrome Os 2025-07-08 7.5 High
DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions.
CVE-2025-1568 1 Google 1 Chrome Os 2025-07-08 8.8 High
Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 16063.87.0 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config.
CVE-2022-23278 4 Apple, Google, Linux and 1 more 11 Macos, Android, Linux Kernel and 8 more 2025-07-08 5.9 Medium
Microsoft Defender for Endpoint Spoofing Vulnerability
CVE-2018-9372 1 Google 1 Android 2025-07-03 7.8 High
In cmd_flash_mmc_sparse_img of dl_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege in the bootloader with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2018-9409 1 Google 1 Android 2025-07-03 7.8 High
In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2018-9375 1 Google 1 Android 2025-07-03 7.8 High
In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2023-4358 3 Debian, Fedoraproject, Google 3 Debian Linux, Fedora, Chrome 2025-07-03 8.8 High
Use after free in DNS in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-43077 1 Google 1 Android 2025-07-03 7.8 High
In DevmemValidateFlags of devicemem_server.c , there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-43762 1 Google 1 Android 2025-07-03 7.8 High
In multiple locations, there is a possible way to avoid unbinding of a service from the system due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-43764 1 Google 1 Android 2025-07-03 7.8 High
In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to partially bypass lock screen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2025-6179 1 Google 1 Chrome Os 2025-07-02 9.8 Critical
Permissions Bypass in Extension Management in Google ChromeOS 16181.27.0 on managed Chrome devices allows a local attacker to disable extensions and access Developer Mode, including loading additional extensions via exploiting vulnerabilities using the ExtHang3r and ExtPrint3r tools.
CVE-2023-4428 3 Debian, Fedoraproject, Google 3 Debian Linux, Fedora, Chrome 2025-07-01 8.1 High
Out of bounds memory access in CSS in Google Chrome prior to 116.0.5845.110 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
CVE-2024-34732 1 Google 1 Android 2025-06-27 8.4 High
In RGXMMUCacheInvalidate of rgxmem.c, there is a possible arbitrary code execution due to a race condition. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-34733 1 Google 1 Android 2025-06-27 8.4 High
In DevmemXIntMapPages of devicemem_server.c, there is a possible arbitrary code execution due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-34748 1 Google 1 Android 2025-06-27 8.4 High
In _DevmemXReservationPageAddress of devicemem_server.c, there is a possible use-after-free due to improper casting. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-40649 1 Google 1 Android 2025-06-27 8.4 High
In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-40651 1 Google 1 Android 2025-06-27 8.4 High
In TBD of TBD, there is a possible use-after-free due to a logic error in the code. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.