

Multiple IBM Products Vulnerabilities
April 3, 2025
Multiple Apple Products Vulnerabilities
April 3, 2025
Multiple IBM Products Vulnerabilities
April 3, 2025
Multiple Apple Products Vulnerabilities
April 3, 2025Severity
Medium
Analysis Summary
CVE-2025-3074 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Downloads. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2025-3073 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Autofill. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2025-3072 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Custom Tabs. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2025-3071 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by inappropriate implementation in Navigations. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
CVE-2025-3070 CVSS:6.5
Google Chrome could allow a remote attacker to bypass security restrictions, caused by insufficient validation of untrusted input in Extensions. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to bypass security restrictions.
Impact
- Security Bypass
Indicators of Compromise
CVE
CVE-2025-3074
CVE-2025-3073
CVE-2025-3072
CVE-2025-3071
CVE-2025-3070
Affected Vendors
Affected Products
- Google Chrome - 135.0
Remediation
Upgrade to the latest version of Google Chrome, available from the Google Chrome Releases Website.