Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code

Posted on August 13, 2025August 13, 2025 By CWS

Google Chrome has launched a vital safety replace addressing six vulnerabilities that might doubtlessly allow arbitrary code execution on affected techniques. 

The steady channel replace to model 139.0.7258.127/.128 for Home windows and Mac, and 139.0.7258.127 for Linux, incorporates patches for a number of high-severity safety flaws that pose important dangers to consumer knowledge and system integrity.

Key Takeaways1. Chrome fixes six vulnerabilities, together with three that allow code execution.2. Impacts V8 engine and graphics – permits malicious code execution.3. Replace Chrome now by way of Settings > About Chrome.

Excessive-Severity Vulnerabilities Addressed

The safety replace targets three high-severity vulnerabilities that might result in arbitrary code execution. 

CVE-2025-8879 represents a heap buffer overflow vulnerability within the libaom library, which handles video encoding and decoding operations. 

One of these vulnerability permits attackers to jot down knowledge past allotted reminiscence boundaries, doubtlessly overwriting vital system data.

CVE-2025-8880 addresses a race situation in Google’s V8 JavaScript engine, reported by safety researcher Seunghyun Lee. 

Race circumstances happen when a number of processes try to entry shared sources concurrently, creating unpredictable habits that attackers can exploit. 

The third high-severity flaw, CVE-2025-8901, entails an out-of-bounds write vulnerability in ANGLE (Nearly Native Graphics Layer Engine), which interprets OpenGL ES API calls to hardware-supported APIs.

Chrome’s safety workforce utilized a number of superior detection methodologies to determine these vulnerabilities, together with AddressSanitizer for detecting reminiscence corruption bugs, MemorySanitizer for uninitialized reminiscence reads, and UndefinedBehaviorSanitizer for catching undefined habits in C/C++ code. 

The replace additionally incorporates Management Circulation Integrity mechanisms and findings from libFuzzer and AFL (American Fuzzy Lop) testing frameworks.

Medium- Severity Vulnerabilities Addressed

Further medium-severity vulnerabilities had been additionally patched, together with CVE-2025-8881, which addresses inappropriate implementation within the File Picker element, and CVE-2025-8882, a use-after-free vulnerability within the Aura windowing system. 

Use-after-free vulnerabilities happen when packages proceed to make use of reminiscence after it has been freed, resulting in potential code execution alternatives.

CVE IDTitleSeverityCVE-2025-8879Heap buffer overflow in libaomHighCVE-2025-8880Race in V8HighCVE-2025-8901Out of bounds write in ANGLEHighCVE-2025-8881Inappropriate implementation in File PickerMediumCVE-2025-8882Use after free in AuraMedium

Mitigations

These vulnerabilities collectively current critical safety dangers, as heap buffer overflows and race circumstances in core browser parts may be exploited to execute malicious code with browser privileges. 

The automated rollout will happen over the approaching days and weeks, however customers ought to manually replace Chrome by means of Settings > About Chrome.

System directors ought to prioritize this replace deployment, notably in enterprise environments the place browsers course of delicate knowledge. 

The Chrome workforce’s collaboration with exterior safety researchers, together with nameless contributors and Google’s Huge Sleep mission, demonstrates the continuing effort to determine and remediate safety vulnerabilities earlier than they attain steady launch channels.

Increase your SOC and assist your workforce shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Arbitrary, Attackers, Chrome, Code, Execute, HighSeverity, Multiple, Vulnerabilities

Post navigation

Previous Post: Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
Next Post: ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities

Related Posts

Here’s How to Solve It  Here’s How to Solve It  Cyber Security News
French Officials Raid X for Alleged Cybercrime Activities French Officials Raid X for Alleged Cybercrime Activities Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News
APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins Cyber Security News
Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Critical Apple 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome Security Flaw Allowed Extension Exploits
  • Chrome’s Gemini Flaw Risks User Privacy with Remote Access
  • Google Enhances Chrome Security with Quantum-Safe Certificates
  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome Security Flaw Allowed Extension Exploits
  • Chrome’s Gemini Flaw Risks User Privacy with Remote Access
  • Google Enhances Chrome Security with Quantum-Safe Certificates
  • Critical Windows Vulnerability Exploit Released
  • AWS Enhances Security Hub with Cross-Domain Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News