Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

Posted on June 3, 2025June 3, 2025 By CWS

Jun 03, 2025Ravie LakshmananBrowser Safety / Vulnerability
Google on Monday launched out-of-band fixes to handle three safety points in its Chrome browser, together with one which it stated has come below energetic exploitation within the wild.
The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds learn and write vulnerability within the V8 JavaScript and WebAssembly engine.
“Out of bounds learn and write in V8 in Google Chrome previous to 137.0.7151.68 allowed a distant attacker to doubtlessly exploit heap corruption by way of a crafted HTML web page,” reads the outline of the bug on the NIST’s Nationwide Vulnerability Database (NVD).
Google credited Clement Lecigne and Benoît Sevens of Google Menace Evaluation Group (TAG) with discovering and reporting the flaw on Could 27, 2025. It additionally famous that the difficulty was addressed the following day by pushing out a configuration change to the Secure model of the browser throughout all platforms.

As is customary, the advisory is gentle on particulars relating to the character of the assaults leveraging the vulnerability or the id of the menace actors perpetrating them. That is accomplished so to make sure that a majority of customers are up to date with a repair and to forestall different dangerous actors from becoming a member of the exploitation bandwagon.
“Google is conscious that an exploit for CVE-2025-5419 exists within the wild,” the tech big acknowledged.
CVE-2025-5419 is the second actively exploited zero-day to be patched by Google this 12 months after CVE-2025-2783 (CVSS rating: 8.3), which was recognized by Kaspersky as being weaponized in assaults focusing on organizations in Russia.
Customers are advisable to improve to Chrome model 137.0.7151.68/.69 for Home windows and macOS, and model 137.0.7151.68 for Linux to safeguard towards potential threats. Customers of Chromium-based browsers corresponding to Microsoft Edge, Courageous, Opera, and Vivaldi are additionally suggested to use the fixes as and after they turn out to be obtainable.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actively, Chrome, Emergency, Exploited, Google, Issues, OutofBand, Patch, ZeroDay

Post navigation

Previous Post: SentinelOne Global Service Outage Root Cause Revealed
Next Post: Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code

Related Posts

Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion The Hacker News
Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally The Hacker News
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL The Hacker News
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks The Hacker News
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware The Hacker News
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure
  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Exposure Assessment Platforms Signal a Shift in Focus
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure
  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Exposure Assessment Platforms Signal a Shift in Focus
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark