Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities

Posted on November 3, 2025November 3, 2025 By CWS

Google has launched Chrome 142 to the steady channel with patches for 20 vulnerabilities, together with seven high-, eight medium-, and 5 low-severity flaws.

4 of the high-severity bugs addressed on this Chrome launch have an effect on the browser’s V8 JavaScript and WebAssembly engine. Google paid $100,000 in bug bounty rewards for 2 of them.

Tracked as CVE-2025-12428, the primary is a sort confusion subject in V8 that earned Man Yue Mo of GitHub Safety Lab $50,000. An analogous reward was handed out to Aorui Zhang, who reported CVE-2025-12429, an inappropriate implementation defect within the JavaScript engine.

As ordinary, the web large has not shared technical particulars on the newly resolved vulnerabilities. Nevertheless, based mostly on the reward quantities handed out for these two bugs, it’s potential that they could possibly be exploited for distant code execution (RCE).

Google says it paid a $10,000 reward for a high-severity object lifecycle subject in Media, and $4,000 for a high-severity inappropriate implementation flaw in Extensions.

Nevertheless, no rewards had been handed out for 3 high-severity V8 defects that had been found by Google’s Large Sleep AI agent, which was launched by Google DeepMind and Undertaking Zero in November 2024.

Chrome 142 resolved medium-severity vulnerabilities in Storage, Omnibox, Extensions, PageInfo, Ozone, App-Sure Encryption, and V8, and low-severity flaws in Autofill, WebXR, Fullscreen UI, Extensions, and SplitView.

Google says it paid $130,000 in whole for the bugs fastened with the discharge of Chrome 142. Whereas no bounties might be awarded for 5 points, the corporate has but to reveal the quantities to be handed out for 2 defects.Commercial. Scroll to proceed studying.

The corporate makes no point out of any of those vulnerabilities being exploited within the wild.

The most recent Chrome iteration is now rolling out as model 142.0.7444.59 for Linux, variations 142.0.7444.59/60 for Home windows, and model 142.0.7444.60 for macOS.

Associated: Chrome to Flip HTTPS on by Default for Public Websites

Associated: Chrome Zero-Day Exploitation Linked to Hacking Staff Spyware and adware

Associated: Chrome 141 and Firefox 143 Patches Repair Excessive-Severity Vulnerabilities

Associated: Chrome 140 Replace Patches Sixth Zero-Day of 2025

Security Week News Tags:Chrome, Google, Pays, Rewards, Vulnerabilities

Post navigation

Previous Post: Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
Next Post: New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic

Related Posts

Ivanti, Fortinet, Splunk Release Security Updates Security Week News
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks Security Week News
Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up Security Week News
Hackers Target Casino Operator Boyd Gaming Security Week News
New Vulnerabilities Expose Millions of Brother Printers to Hacking Security Week News
US Deportation Airline GlobalX Confirms Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News