The old saying, keep your friends close and your enemies closer. Re-apply that to keep your security close, but the hackers closer. That is what Google has done. Google has given then $14,000 in rewards for discovering critical and high-risk vulnerabilities affecting its Chrome web browser. This process of paying people to discover browser vulnerabilities has been ongoing now for several months.
Google issued patches for 16 documented vulnerabilities. The current Chrome version is 8.0.552.237 and the patches affect this and previous versions. Indeed, one researcher, Sergey Glazunov, found a critical bug and he received over $3100 for the discovery.
Here is a breakdown of the discovered risks.
[$1000]  Medium Risk: Uninitialized pointer in the browser triggered by rogue extension.
 Medium Risk: Browser crash in extensions notification handling
- [$1337]  High Risk: Bad pointer handling in node iteration.
-  High Crashes when printing multi-page PDFs.
- [$1000]  High Risk: Stale pointer with CSS + canvas.
- [$500]  High Risk: Stale pointer with CSS + cursors.
-  High Risk: Use after free in PDF page handling.
- [$1000]  High Risk: Stack corruption after PDF out-of-memory condition.
- [$1000]  High Bad memory access with mismatched video frame sizes.
- [$500]  High Risk: Stale pointer with SVG use element.
- [$1000]  High Risk: Vorbis decoder buffer overflows.
- [$1000]  High Risk: Buffer overflow in PDF shading.
- [$1000]  High Risk: Bad cast in anchor handling. .
- [$1000]  High Risk: Bad cast in video handling
- [$1000]  High Risk: Stale rendering node after DOM node removal.
[$3133.7]  Critical: Stale pointer in speech handling.
For all users, the question is, are the vulnerabilities fixed? Google quietly ships updates using the browser’s silent/automatic update mechanism. This keeps updates current without the need for user intervention (or approval).