Kategorie: Allgemein

Chromium: CVE-2025-3071 Inappropriate implementation in Navigations

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3069 Inappropriate implementation in Extensions

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3068 Inappropriate implementation in Intents

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3074 Inappropriate implementation in Downloads

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Chromium: CVE-2025-3073 Inappropriate implementation in Autofill

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024 ) for more information.

Softwareentwicklung: Jenkins-Plug-ins speichern API-Schlüssel im Klartext

Es sind wichtige Sicherheitsupdates für diverse Jenkins-Plug-ins wie AsakusaSatellite und Simple Queue erscheinen. Einige Patches lassen noch auf sich warten.

AMD Ryzen: Schwachstellen in AI-Software bedrohen Sicherheit

AMDs neuere Prozessoren haben KI-Coprozessoren, Ryzen AI. Die Software und Treiber dazu reißen Sicherheitslücken auf.

Schwachstellen gefährden PCs mit Trend Micro Apex Central, Deep Security Agent

Sicherheitsupdates schließen mehrere Lücken in Trend Micro Apex Central und Deep Security Agent unter Windows.