Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome 142 Update Patches High-Severity Flaws

Posted on November 7, 2025November 7, 2025 By CWS

Shortly after selling Chrome 142 to the steady channel, Google pushed out an replace to handle 5 vulnerabilities within the browser, together with three high-severity flaws.

The primary high-risk difficulty is CVE-2025-12725 (CVSS rating of 8.8), described as an out-of-bounds write bug in Chrome’s WebGPU graphics API, which delivers high-performance visuals by permitting web sites to work together with the system’s GPU.

Out-of-bounds defects are rooted in inadequate bounds checking, which permits attackers to write down knowledge outdoors of the meant reminiscence house, probably resulting in crashes or arbitrary code execution.

Based on SOCRadar, the rising use of browser-based AI and graphics workloads will increase the danger of the vulnerability’s exploitation.

The remaining two high-severity bugs resolved with the contemporary Chrome replace are inappropriate implementations within the Views framework and the V8 JavaScript engine, tracked as CVE-2025-12726 and CVE-2025-12727 (CVSS rating of 8.8).

The Views flaw exists as a result of UI object references are dealt with in an unsafe method, which might enable attackers to set off reminiscence corruption through crafted webpages or extensions. Profitable exploitation of the defect might additionally result in unintended entry to interface elements.

Vulnerabilities in Chrome’s V8 JavaScript and WebAssembly engine are standard targets for menace actors. Sort confusion and reminiscence corruption points in V8 are sometimes exploited for distant code execution.

The remaining two safety defects resolved with this Chrome 142 replace are medium-severity inappropriate implementations in Omnibox, tracked as CVE-2025-12728 and CVE-2025-12729.Commercial. Scroll to proceed studying.

Google makes no point out of any of those vulnerabilities being exploited within the wild. The most recent Chrome iteration is now rolling out as model 142.0.7444.134 for Linux, model 142.0.7444.135 for Mac, and variations 142.0.7444.134/.135 for Home windows.

“Browsers have quietly grow to be the one largest assault floor in practically each group. Most customers preserve dozens of tabs open all through the day, a lot of which stay lively within the background. Every of these pages can embrace scripts, advertisements, and dynamic parts that change or redirect with out discover, successfully making the browser a dwell goal surroundings,” Action1 CTO Gene Moody stated.

“Due to this, browser vulnerabilities are a steady threat as a result of exploits typically emerge and unfold quicker than conventional patch cycles can reply, which is why browser updates now launch extra regularly than virtually some other software program. In lots of instances, vital fixes arrive a number of instances every week,” Moody added.

Associated: Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities

Associated: Chrome to Flip HTTPS on by Default for Public Websites

Associated: Chrome Zero-Day Exploitation Linked to Hacking Staff Spy ware

Associated: Chrome 141 and Firefox 143 Patches Repair Excessive-Severity Vulnerabilities

Security Week News Tags:Chrome, Flaws, HighSeverity, Patches, Update

Post navigation

Previous Post: Enterprise Credentials at Risk – Same Old, Same Old?
Next Post: The Congressional Budget Office Was Hacked. It Says It Has Implemented New Security Measures

Related Posts

GitLab, Atlassian Patch High-Severity Vulnerabilities Security Week News
SesameOp Malware Abuses OpenAI API  Security Week News
Seemplicity Raises $50 Million for Exposure Management Platform Security Week News
Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing Security Week News
Dataminr to Acquire ThreatConnect for $290 Million Security Week News
1.4 Million Affected by Data Breach at Virginia Radiology Practice Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests
  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News