Protecting Privacy Build Trust

Protecting Privacy Build Trust
  • Contact Us

CyberSecurity

on June 3, 2025 at 8:50 pm — Chromium: CVE-2025-5419 Out of bounds read and write in V8 

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information. Google is aware that an exploit for CVE-2025-5419 exists in the wild. 

on June 3, 2025 at 8:50 pm — Chromium: CVE-2025-5419 Out of bounds read and write in V8  Read More »

on May 29, 2025 at 6:55 pm — Chromium: CVE-2025-5065 Inappropriate implementation in FileSystemAccess API 

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information. 

on May 29, 2025 at 6:55 pm — Chromium: CVE-2025-5065 Inappropriate implementation in FileSystemAccess API  Read More »

on May 29, 2025 at 6:55 pm — Chromium: CVE-2025-5067 Inappropriate implementation in Tab Strip 

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202[SS9.1]5) for more information. 

on May 29, 2025 at 6:55 pm — Chromium: CVE-2025-5067 Inappropriate implementation in Tab Strip  Read More »

on May 15, 2025 at 7:00 am — CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability 

In the Security Updates table, added all supported editions of Windows Server 2008 and Windows Server 2008 R2 as they are affected by this vulnerability. Customers running these versions of Windows Server please note that to be protected from this vulnerability you need to install the out-of-band updates as follows: * Windows Server 2008 R2:

on May 15, 2025 at 7:00 am — CVE-2025-32709 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability  Read More »