Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Posted on November 18, 2025November 18, 2025 By CWS

Nov 18, 2025Ravie LakshmananBrowser Safety / Vulnerability
Google on Monday launched safety updates for its Chrome browser to deal with two safety flaws, together with one which has come below energetic exploitation within the wild.
The vulnerability in query is CVE-2025-13223 (CVSS rating: 8.8), a sort confusion vulnerability within the V8 JavaScript and WebAssembly engine that might be exploited to attain arbitrary code execution or program crashes.
“Kind Confusion in V8 in Google Chrome previous to 142.0.7444.175 allowed a distant attacker to probably exploit heap corruption through a crafted HTML web page,” in accordance with an outline of the flaw within the NIST Nationwide Vulnerability Database (NVD).
Clément Lecigne of Google’s Menace Evaluation Group (TAG) has been credited with discovering and reporting the flaw on November 12, 2025. Google has not shared any particulars on who’s behind the assaults, who might have been focused, or the dimensions of such efforts.
Nonetheless, the tech large acknowledged that an “exploit for CVE-2025-13223 exists within the wild.”

With the newest replace, Google has addressed seven zero-day flaws in Chrome which were both actively exploited or demonstrated as a proof-of-concept (PoC) for the reason that begin of the 12 months. The record consists of CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, CVE-2025-6558, and CVE-2025-10585.
CVE-2025-13223 can also be the third actively exploited kind confusion bug found in V8 this 12 months after CVE-2025-6554 and CVE-2025-10585.
Additionally patched by Google as a part of this patch is one other kind confusion vulnerability in V8 (CVE-2025-13224, CVSS rating: 8.8) that was flagged by its synthetic intelligence (AI) agent Huge Sleep.
To safeguard in opposition to potential threats, it is suggested to replace their Chrome browser to variations 142.0.7444.175/.176 for Home windows, 142.0.7444.176 for Apple macOS, and 142.0.7444.175 for Linux. To ensure the newest updates are put in, customers can navigate to Extra > Assist > About Google Chrome and choose Relaunch.
Customers of different Chromium-based browsers, akin to Microsoft Edge, Courageous, Opera, and Vivaldi, are additionally suggested to use the fixes as and once they grow to be out there.

The Hacker News Tags:Actively, Chrome, Exploited, Fix, Google, Issues, Security, Vulnerability, ZeroDay

Post navigation

Previous Post: IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands
Next Post: Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups

Related Posts

5 Critical Questions For Adopting an AI Security Solution The Hacker News
Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
Your First and Last Line of Defense The Hacker News
DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks The Hacker News
Step Into the Password Graveyard… If You Dare (and Join the Live Session) The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Palo Alto Networks to Acquire Observability Platform Chronosphere in $3.35 Billion Deal
  • How to Solve Alert Overload in Your SOC
  • Amazon Details Iran’s Cyber-Enabled Kinetic Attacks Linking Digital Spying to Physical Strikes
  • Secure.com Raises $4.5 Million for Agentic Security
  • Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News