Chromium: CVE-2025-3069 Inappropriate implementation in Extensions
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3069
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3069
Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3070
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3070
Chromium: CVE-2025-3071 Inappropriate implementation in Navigations
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3071
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3071
Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3072
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3072
Chromium: CVE-2025-3074 Inappropriate implementation in Downloads
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3074
This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3074
CVE-2025-25001 Microsoft Edge for iOS Spoofing Vulnerability
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25001
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25001
CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
CVE-2025-29810 Active Directory Domain Services Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810
CVE-2025-29809 Windows Kerberos Security Feature Bypass Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809
CVE-2025-27738 Windows Resilient File System (ReFS) Information Disclosure Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738
CVE-2025-27737 Windows Security Zone Mapping Security Feature Bypass Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737
CVE-2025-27735 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735
CVE-2025-27733 NTFS Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733
CVE-2025-27727 Windows Installer Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727
CVE-2025-27491 Windows Hyper-V Remote Code Execution Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491
CVE-2025-27489 Azure Local Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27489
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27489
CVE-2025-27487 Remote Desktop Client Remote Code Execution Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487
CVE-2025-27483 NTFS Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483
CVE-2025-27481 Windows Telephony Service Remote Code Execution Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481
CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484
CVE-2025-27469 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469
The security updates for Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems are now available. See the Security Updates table for more information.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469