Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

Posted on June 3, 2025June 3, 2025 By CWS

Jun 03, 2025Ravie LakshmananBrowser Safety / Vulnerability
Google on Monday launched out-of-band fixes to handle three safety points in its Chrome browser, together with one which it stated has come below energetic exploitation within the wild.
The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds learn and write vulnerability within the V8 JavaScript and WebAssembly engine.
“Out of bounds learn and write in V8 in Google Chrome previous to 137.0.7151.68 allowed a distant attacker to doubtlessly exploit heap corruption by way of a crafted HTML web page,” reads the outline of the bug on the NIST’s Nationwide Vulnerability Database (NVD).
Google credited Clement Lecigne and Benoît Sevens of Google Menace Evaluation Group (TAG) with discovering and reporting the flaw on Could 27, 2025. It additionally famous that the difficulty was addressed the following day by pushing out a configuration change to the Secure model of the browser throughout all platforms.

As is customary, the advisory is gentle on particulars relating to the character of the assaults leveraging the vulnerability or the id of the menace actors perpetrating them. That is accomplished so to make sure that a majority of customers are up to date with a repair and to forestall different dangerous actors from becoming a member of the exploitation bandwagon.
“Google is conscious that an exploit for CVE-2025-5419 exists within the wild,” the tech big acknowledged.
CVE-2025-5419 is the second actively exploited zero-day to be patched by Google this 12 months after CVE-2025-2783 (CVSS rating: 8.3), which was recognized by Kaspersky as being weaponized in assaults focusing on organizations in Russia.
Customers are advisable to improve to Chrome model 137.0.7151.68/.69 for Home windows and macOS, and model 137.0.7151.68 for Linux to safeguard towards potential threats. Customers of Chromium-based browsers corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi are additionally suggested to use the fixes as and after they turn out to be obtainable.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Chrome, Emergency, Exploited, Google, Issues, OutofBand, Patch, ZeroDay

Post navigation

Previous Post: SentinelOne Global Service Outage Root Cause Revealed
Next Post: Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

Related Posts

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads The Hacker News
Are Forgotten AD Service Accounts Leaving You at Risk? The Hacker News
Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets The Hacker News
Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News