Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution

Posted on July 30, 2025July 30, 2025 By CWS

Google has issued an pressing safety replace for its Chrome browser, patching a number of vulnerabilities, together with a high-severity vulnerability that might permit attackers to control reminiscence and execute arbitrary code on a person’s system.

The most recent model, Chrome 138.0.7204.183 for Linux and 138.0.7204.183/.184 for Home windows and Mac, addresses these vital safety points, and customers are strongly suggested to replace their browsers instantly.

Probably the most vital vulnerability mounted on this replace is recognized as CVE-2025-8292, a “use-after-free” vulnerability found in Chrome’s Media Stream part.

use-after-free Vulnerability Permits Code Execution

One of these reminiscence corruption vulnerability is especially harmful as a distant attacker can exploit it by a specifically crafted HTML web page.

If profitable, an attacker may probably crash the browser or execute malicious code, gaining unauthorized entry to the affected system. This might result in the set up of packages, theft or alteration of knowledge, or the creation of latest person accounts with full privileges.

An nameless safety researcher reported the CVE-2025-8292 vulnerability to Google on June 19, 2025, and was awarded $8,000 for his or her discovery by the Chrome Vulnerability Reward Program.

Google has restricted entry to the complete particulars of the bug to permit a majority of customers time to use the patch, a normal follow to forestall energetic exploitation.

This replace is a part of a collection of safety patches for Chrome model 138. Earlier in July, Google addressed different high-severity vulnerabilities, together with a zero-day exploit often called CVE-2025-6558, which was actively being utilized in assaults.

That vulnerability, a difficulty of incorrect enter validation within the ANGLE and GPU parts, additionally posed a major threat of sandbox escape.

All through June and July, Chrome 138 has obtained a number of updates to repair varied safety holes, together with sort confusion within the V8 JavaScript engine and different memory-related bugs.

Google’s safety groups repeatedly work to uncover and resolve vulnerabilities by inside audits, fuzzing, and different safety initiatives. The corporate depends on varied instruments like AddressSanitizer and MemorySanitizer to detect memory-related errors earlier than they are often exploited.

The rollout of the most recent Chrome model will proceed over the approaching days and weeks. Customers can guarantee their browser is up to date by navigating to “Assist” after which “About Google Chrome” of their browser menu.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Arbitrary, Chrome, Code, Execution, HighSeverity, Manipulation, Memory, Vulnerabilities

Post navigation

Previous Post: Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
Next Post: Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web

Related Posts

Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News
Tenable, Qualys, Workday Data Breaches and Security Updates Cyber Security News
Perplexity’s Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials
  • New Agent-Aware Cloaking Leverages OpenAI ChatGPT Atlas Browser to Deliver Fake Content
  • New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins
  • 700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News