Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Pays $100,000 in Rewards for Two Chrome Vulnerabilities

Posted on November 3, 2025November 3, 2025 By CWS

Google has launched Chrome 142 to the steady channel with patches for 20 vulnerabilities, together with seven high-, eight medium-, and 5 low-severity flaws.

4 of the high-severity bugs addressed on this Chrome launch have an effect on the browser’s V8 JavaScript and WebAssembly engine. Google paid $100,000 in bug bounty rewards for 2 of them.

Tracked as CVE-2025-12428, the primary is a sort confusion subject in V8 that earned Man Yue Mo of GitHub Safety Lab $50,000. An analogous reward was handed out to Aorui Zhang, who reported CVE-2025-12429, an inappropriate implementation defect within the JavaScript engine.

As ordinary, the web large has not shared technical particulars on the newly resolved vulnerabilities. Nevertheless, based mostly on the reward quantities handed out for these two bugs, it’s potential that they could possibly be exploited for distant code execution (RCE).

Google says it paid a $10,000 reward for a high-severity object lifecycle subject in Media, and $4,000 for a high-severity inappropriate implementation flaw in Extensions.

Nevertheless, no rewards had been handed out for 3 high-severity V8 defects that had been found by Google’s Large Sleep AI agent, which was launched by Google DeepMind and Undertaking Zero in November 2024.

Chrome 142 resolved medium-severity vulnerabilities in Storage, Omnibox, Extensions, PageInfo, Ozone, App-Sure Encryption, and V8, and low-severity flaws in Autofill, WebXR, Fullscreen UI, Extensions, and SplitView.

Google says it paid $130,000 in whole for the bugs fastened with the discharge of Chrome 142. Whereas no bounties might be awarded for 5 points, the corporate has but to reveal the quantities to be handed out for 2 defects.Commercial. Scroll to proceed studying.

The corporate makes no point out of any of those vulnerabilities being exploited within the wild.

The most recent Chrome iteration is now rolling out as model 142.0.7444.59 for Linux, variations 142.0.7444.59/60 for Home windows, and model 142.0.7444.60 for macOS.

Associated: Chrome to Flip HTTPS on by Default for Public Websites

Associated: Chrome Zero-Day Exploitation Linked to Hacking Staff Spyware and adware

Associated: Chrome 141 and Firefox 143 Patches Repair Excessive-Severity Vulnerabilities

Associated: Chrome 140 Replace Patches Sixth Zero-Day of 2025

Security Week News Tags:Chrome, Google, Pays, Rewards, Vulnerabilities

Post navigation

Previous Post: Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
Next Post: New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic

Related Posts

Developer Who Hacked Former Employer’s Systems Sentenced to Prison Security Week News
AirMDR Raises $15.5 Million for MDR Solution Security Week News
Chrome 137 Update Patches High-Severity Vulnerabilities Security Week News
Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device Security Week News
Marlboro-Chesterfield Pathology Data Breach Impacts 235,000 People Security Week News
Microsoft Patches ‘ToolShell’ Zero-Days Exploited to Hack SharePoint Servers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How Software Development Teams Can Securely and Ethically Deploy AI Tools
  • CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
  • New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
  • Conti Group Member Responsible for Deploying Ransomware Extradited to USA
  • Claude AI APIs Can Be Abused for Data Exfiltration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How Software Development Teams Can Securely and Ethically Deploy AI Tools
  • CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
  • New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
  • Conti Group Member Responsible for Deploying Ransomware Extradited to USA
  • Claude AI APIs Can Be Abused for Data Exfiltration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News