Search Results (13219 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2024-5274 2 Fedoraproject, Google 2 Fedora, Chrome 2025-07-30 8.3 High
Type Confusion in V8 in Google Chrome prior to 125.0.6422.112 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
CVE-2024-32896 1 Google 1 Android 2025-07-30 8.1 High
there is a possible way to bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
CVE-2024-7965 2 Google, Microsoft 2 Chrome, Edge Chromium 2025-07-30 8.8 High
Inappropriate implementation in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-7971 2 Google, Microsoft 2 Chrome, Edge 2025-07-30 9.6 Critical
Type confusion in V8 in Google Chrome prior to 128.0.6613.84 allowed a remote attacker to exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2025-2783 2 Google, Microsoft 2 Chrome, Windows 2025-07-30 8.3 High
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
CVE-2025-6554 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2025-07-30 8.1 High
Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
CVE-2025-6558 1 Google 1 Chrome 2025-07-30 8.8 High
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
CVE-2024-11395 4 Apple, Google, Linux and 1 more 4 Macos, Chrome, Linux Kernel and 1 more 2025-07-29 8.8 High
Type Confusion in V8 in Google Chrome prior to 131.0.6778.85 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-10604 1 Google 1 Fuchsia 2025-07-29 5.3 Medium
Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances
CVE-2024-10603 1 Google 1 Gvisor 2025-07-29 5.3 Medium
Weaknesses in the generation of TCP/UDP source ports and some other header values in Google's gVisor allowed them to be predicted by an external attacker in some circumstances.
CVE-2025-8275 2 Bsc, Google 2 Peru Cocktails App, Android 2025-07-29 5.3 Medium
A vulnerability, which was classified as problematic, has been found in bsc Peru Cocktails App 1.0.0 on Android. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component bsc.devy.peru_cocktails. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
CVE-2025-1079 3 Apple, Google, Linux 3 Macos, Web Designer, Linux Kernel 2025-07-29 7.8 High
Client RCE on macOS and Linux via improper symbolic link resolution in Google Web Designer's preview feature
CVE-2024-22004 2 Google, Linux 7 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 4 more 2025-07-24 10 Critical
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application
CVE-2024-47038 1 Google 1 Android 2025-07-24 7.8 High
In dhd_prot_flowrings_pool_release of dhd_msgbuf.c, there is a possible outcof bounds write due to a missing bounds check. This could lead to localcescalation of privilege with no additional execution privileges needed. Usercinteraction is not needed for exploitation.
CVE-2024-47039 1 Google 1 Android 2025-07-24 5.5 Medium
In isSlotMarkedSuccessful of BootControl.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local  information disclosure with no additional execution privileges needed. User  interaction is not needed for exploitation.
CVE-2024-47040 1 Google 1 Android 2025-07-24 7.8 High
There is a possible UAF due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-32915 1 Google 1 Android 2025-07-24 4.3 Medium
In CellInfoListParserV2::FillCellInfo() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
CVE-2024-32916 1 Google 1 Android 2025-07-24 5.9 Medium
In fvp_freq_histogram_init of fvp.c, there is a possible Information Disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-32917 1 Google 1 Android 2025-07-24 7.1 High
In pl330_dma_from_peri_start() of fp_spi_dma.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVE-2024-22013 1 Google 6 Nest Wifi Point, Nest Wifi Point Firmware, Nest Wifi Pro and 3 more 2025-07-24 5.3 Medium
U-Boot environment is read from unauthenticated partition.