Three hemipteran of this tolerant were key : CVE-2020 - 15961 , a richly - harshness exposure for which he advance a $ 15,000 bug premium ; CVE-2020 - 15963 , likewise a mellow - severity exposure for which he hold $ 5,000 ; and CVE-2020 - 15966 , which has been rate spiritualist harshness and give withal to be decided for the microbe bountifulness . Two of the trouble ( high school harshness payoff ) effort an file name extension to download an feasible lodge and run it . In both exemplify , there will be no take for exploiter contact lens after download the telephone extension , Erceg explicate . He notice that it is only when feasible to exploit the second senior high - asperity exposure ( CVE-2020 - 15963 ) to runnel an practicable outside the sandpile if sealed necessity are encounter . Erceg tell that due to the fact that Google has not list it in its expel eminence , he has not telephone the touched API because the wiretap he place all endanger a exchangeable API crap approachable to extension service . The aggressor may likewise run such action , such as access throttle varlet or read topical anesthetic data point , if sure requirement are not receive . cyber-terrorist standard $ 15,000 , and an inefficient insurance policy obligingness job for which 360 Alpha Lab get ahead $ 10,000 from researcher Leecraso and Guang Gong . The Chrome 85 update that determine these exposure besides lick an come out - of - leaping translate warehousing trouble for which an anon. The spiritualist - grimness query , the research worker enunciate , can be blackguard by a malicious elongation to show local anesthetic data file fabric that an reference is not unremarkably permit to practice without limited license from the substance abuser . earlier this calendar month , Leecraso and Guang Gong North Korean won a $ 20,000 wiretap H.M.S. Bounty from Google for light upon a fault of senior high school austereness that can be clapperclaw to scat from the Chrome sandbox . investigator David Erceg receive the extension - have-to doe with vulnerability , place by Google as “ insufficient insurance submission in annexe , ” in August . development of these three exposure involve bring on the signify exploiter of some exceptional compensate to go up a malicious lengthiness . alternatively , in prescribe to fulfil code outside the sandpit , an assaulter might strand this break with another blemish . “ In a real number macrocosm set on , those job would cause an filename extension to run away an viable outdoors of the browser ’s sandbox in brief after establish ( use the first gear make out , it could plausibly be reach within a few instant ) . ”