Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network.
History

Wed, 09 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft edge Chromium
CPEs cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft edge Chromium

Fri, 04 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 00:45:00 +0000

Type Values Removed Values Added
Description Use after free in Microsoft Edge (Chromium-based) allows an authorized attacker to execute code over a network.
Title Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2025-04-04T00:00:15.107Z

Updated: 2025-06-04T17:53:33.339Z

Reserved: 2025-03-11T18:19:40.249Z

Link: CVE-2025-29815

cve-icon Vulnrichment

Updated: 2025-04-04T13:13:47.056Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-04T01:15:39.487

Modified: 2025-07-09T16:52:30.983

Link: CVE-2025-29815

cve-icon Redhat

No data.