{"id":27894,"date":"2021-09-27T16:34:00","date_gmt":"2021-09-27T14:34:00","guid":{"rendered":"https:\/\/perseus.de\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/"},"modified":"2026-03-31T07:32:46","modified_gmt":"2026-03-31T05:32:46","slug":"la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/","title":{"rendered":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27894\" class=\"elementor elementor-27894 elementor-22959\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27805\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>27.09.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Debido a una vulnerabilidad de seguridad, tanto Google Chrome como Microsoft Edge podr\u00edan convertirse en blanco de ciberataques. Llegamos al fondo de lo que ocurri\u00f3 exactamente y de c\u00f3mo puedes protegerte mejor de ello. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En una publicaci\u00f3n del 24 de septiembre de 2021, desarrolladores de Chrome de Google Project Zero se\u00f1alaron una vulnerabilidad de seguridad (CVE-2021-37973 \u00abalto\u00bb) y posibles ataques resultantes. Las vulnerabilidades se encuentran en la interfaz de programaci\u00f3n de aplicaciones (API) de Portals. Dado que pertenece a Chromium \u2013 la variante de c\u00f3digo abierto del navegador \u2013 tambi\u00e9n se ven afectados los navegadores basados en esta variante de otros fabricantes: por ejemplo, Microsoft Edge, el navegador web del fabricante de Windows Microsoft.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfCu\u00e1les son los peligros para mi empresa?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vulnerabilidad puede ser utilizada remotamente por atacantes para acceder a informaci\u00f3n, extraer c\u00f3digo arbitrario del programa, realizar ataques de denegaci\u00f3n de servicio e instalar malware. Tambi\u00e9n advierte de otros ataques no especificados. No se requieren privilegios espec\u00edficos para que los atacantes puedan explotar la vulnerabilidad. Solo requiere la interacci\u00f3n de los usuarios, por ejemplo, el clic de un enlace.   <\/p><p>Seg\u00fan la Oficina Federal Alemana para la Seguridad de la Informaci\u00f3n (BSI), Google ya ha cerrado varias vulnerabilidades en Chrome.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Lo que puedes hacer \u2013 Perseo recomienda:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Las versiones obsoletas de los navegadores suponen un enorme riesgo de seguridad y una puerta de entrada para los hackers criminales. Recomendamos que realices regularmente la comprobaci\u00f3n del navegador Perseus desde nuestra caja de herramientas. Esto te permitir\u00e1 saber si el navegador de tu empresa est\u00e1 actualizado.  <\/li><li>Cierra la vulnerabilidad instalando las actualizaciones de seguridad proporcionadas por los fabricantes.<br>Si tienes m\u00e1s preguntas, el equipo de expertos de Perseus estar\u00e1 encantado de ayudarte.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>27.09.2021 La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora Debido a una vulnerabilidad de seguridad, tanto Google Chrome como Microsoft Edge podr\u00edan convertirse en blanco de ciberataques. Llegamos al fondo de lo que ocurri\u00f3 exactamente y de c\u00f3mo puedes protegerte mejor de ello. \u00bfQu\u00e9 ha pasado? En una publicaci\u00f3n del [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-27894","post","type-post","status-publish","format-standard","hentry","category-advertencia-de-peligro"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"27.09.2021 La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora Debido a una vulnerabilidad de seguridad, tanto Google Chrome como Microsoft Edge podr\u00edan convertirse en blanco de ciberataques. Llegamos al fondo de lo que ocurri\u00f3 exactamente y de c\u00f3mo puedes protegerte mejor de ello. \u00bfQu\u00e9 ha pasado? En una publicaci\u00f3n del [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-27T14:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora\",\"datePublished\":\"2021-09-27T14:34:00+00:00\",\"dateModified\":\"2026-03-31T05:32:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/\"},\"wordCount\":326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Advertencia de peligro\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/\",\"name\":\"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-09-27T14:34:00+00:00\",\"dateModified\":\"2026-03-31T05:32:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/","og_locale":"es_ES","og_type":"article","og_title":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies","og_description":"27.09.2021 La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora Debido a una vulnerabilidad de seguridad, tanto Google Chrome como Microsoft Edge podr\u00edan convertirse en blanco de ciberataques. Llegamos al fondo de lo que ocurri\u00f3 exactamente y de c\u00f3mo puedes protegerte mejor de ello. \u00bfQu\u00e9 ha pasado? En una publicaci\u00f3n del [&hellip;]","og_url":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/","og_site_name":"Perseus Technologies","article_published_time":"2021-09-27T14:34:00+00:00","article_modified_time":"2026-03-31T05:32:46+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora","datePublished":"2021-09-27T14:34:00+00:00","dateModified":"2026-03-31T05:32:46+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/"},"wordCount":326,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Advertencia de peligro"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/","url":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/","name":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-09-27T14:34:00+00:00","dateModified":"2026-03-31T05:32:46+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/la-vulnerabilidad-hace-que-google-chrome-y-microsoft-edge-sean-vulnerables-arreglalo-ahora\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"La vulnerabilidad hace que Google Chrome y Microsoft Edge sean vulnerables: arr\u00e9glalo ahora"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27894"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27894\/revisions"}],"predecessor-version":[{"id":27895,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27894\/revisions\/27895"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}