Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chrome 143 Patches High-Severity Vulnerabilities

Posted on December 3, 2025December 3, 2025 By CWS

Google on Tuesday promoted Chrome 143 to the secure channel with patches for 13 vulnerabilities reported by exterior researchers.

The recent spherical of Chrome patches resolves 4 high-severity flaws, together with a kind confusion difficulty within the V8 JavaScript and WebAssembly engine, tracked as CVE-2025-13630.

The remaining high-severity defects embrace inappropriate implementation bugs in Google Updater (CVE-2025-13631) and DevTools (CVE-2025-13632), and a use-after-free flaw in Digital Credentials (CVE-2025-13633).

Google says that it handed out $11,000 for the V8 vulnerability, and $3,000 for the Google Updater bug.

The brand new Chrome patches deal with three medium-severity safety holes: an inappropriate implementation flaw in Downloads, a nasty solid bug in Loader, and a race situation in V8.

The remaining six vulnerabilities addressed with the discharge of Chrome 143 are low-severity flaws.

They embrace 5 inappropriate implementation defects in Downloads, Break up View, WebRTC, and Passwords, and a use-after-free difficulty in Media Stream.

Google says it paid $18,000 in bug bounty rewards for 4 of the vulnerabilities, however has but to reveal the quantities for six extra points.Commercial. Scroll to proceed studying.

The web large makes no point out of any of those safety defects being exploited within the wild.

The newest Chrome iteration is now rolling out as model 143.0.7499.40 for Linux and variations 143.0.7499.40/41 for Home windows and macOS.

On Tuesday, the Chrome patches had been additionally rolled out for Android, in Chrome model 143.0.7499.52, and Chrome for iOS was up to date to model 143.0.7499.92.

Moreover, Google introduced that the browser’s Prolonged Steady channel has been up to date to model 142.0.7499.226 for Home windows and macOS.

Customers are suggested to use the brand new Chrome patches as quickly as doable, as Chrome vulnerabilities are sometimes well-liked targets for menace actors.

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Associated: Android Zero-Days Patched in December 2025 Safety Replace

Associated: Fluent Bit Vulnerabilities Expose Cloud Providers to Takeover

Associated: SonicWall Patches Excessive-Severity Flaws in Firewalls, E mail Safety Equipment

Security Week News Tags:Chrome, HighSeverity, Patches, Vulnerabilities

Post navigation

Previous Post: Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
Next Post: BPFDoor and Symbiote Rootkits Attacking Linux Systems Exploiting eBPF Filters

Related Posts

Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior Security Week News
PromptLock Only PoC, but AI-Powered Ransomware Is Real Security Week News
Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Akira Ransomware Group Made $244 Million in Ransom Proceeds Security Week News
Passkey Login Bypassed via WebAuthn Process Manipulation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark