Google this week released a security-themed Chrome browser makeover with patches 28 documented vulnerabilities, some serious enough to lead to code execution attacks.
The new browser refresh is now rolling out to Windows, Mac and Linux users as Chrome 100.0.4896.60.
Nine of the security defects identified by external researchers are rated high-severity. Use-after-free was the most common type of vulnerability among the issues reported externally, followed by inappropriate implementation.
[ READ: Google Attempts to Explain Surge in Chrome Zero-Day Exploits ]
Google said it paid out $52,000 in bug bounty rewards to the reporting researchers, but the final amount could be much higher, as the company has yet to determine the rewards to be handed out for half of the externally reported vulnerabilities.
The highest bug bounty reward was handed out to Wei Yuan of MoyunSec VLab for a medium severity use-after-free flaw in Shopping Cart.
Chrome 100 arrives less than a week after Google issued an emergency fix to address a zero-day vulnerability in the V8 JavaScript engine. There have been only two documented zero-days in Chrome this year.
Related: Federal Agencies Instructed to Patch New Chrome Zero-Day
Related: Google Issues Emergency Fix for Chrome Zero-Day
Related: North Korea Gov Hackers Caught Sharing Chrome Zero-Day

More from Ionut Arghire
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- Critical QNAP Vulnerability Leads to Code Injection
- GitHub Revokes Code Signing Certificates Following Cyberattack
- Vulnerabilities in OpenEMR Healthcare Software Expose Patient Data
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
