Skip to content

Softonic English

Just another Softonic Sites site

Tag: vulnerabilidad

A hacker discovers a vulnerability in NASA's systems and the organization ignores him the first time

A hacker known as 7h3h4ckv157 has once again drawn attention after discovering new vulnerabilities in NASA’s systems. This is the second time he has managed to detect security flaws in the space agency, following an initial report in 2022, where he used the Cross-Site Scripting (XSS) technique to exploit weaknesses in their website. Despite NASA’s recognized security, the hacker has shown that their systems are susceptible to attacks similar to those that can affect other organizations. The second time’s the charm XSS refers to a […]

A hacker discovers a vulnerability in NASA's systems and the organization ignores him the first time

A hacker known as 7h3h4ckv157 has once again drawn attention after discovering new vulnerabilities in NASA’s systems. This is the second time he has managed to detect security flaws in the space agency, following an initial report in 2022, where he used the Cross-Site Scripting (XSS) technique to exploit weaknesses in their website. Despite NASA’s well-known security, the hacker has shown that their systems are susceptible to attacks similar to those that can affect other organizations.

The second time is the charm

XSS refers to a type of attack that allows hackers to inject malicious code into users’ browsers, which can result in the theft of sensitive information, such as passwords. This attack occurs when the page does not properly handle the data entered by users. In his first foray, the hacker received neither recognition nor reward for his finding, which generated some discontent in the ethical hacking community.

Nevertheless, on this occasion, NASA has decided to acknowledge its work by sending a letter of thanks signed by Mike Witt, the agency’s information security officer. This action highlights the importance of recognition within the field of cybersecurity and reinforces the value of security research conducted by external individuals.

Despite the fact that the hacker has not revealed details about the newly identified vulnerability, this situation underscores the need for constant security reviews in critical systems such as those of NASA. The agency has chosen not to provide specific information about the type of vulnerability, indicating that it must ensure the flaw is completely resolved before making a public disclosure. Rumors suggest that it may offer more information on its blog in the future.

Avast Free Antivirus
Avast Free Antivirus DOWNLOAD
Author SoftonicPosted on September 4, 2025September 4, 2025Categories NewsTags agencia nacional, astronautas, ciberseguridad, Espacio, hacker, NASA, vulnerabilidad

Discover a vulnerability in the architecture of Chrome and Google rewards him with 250,000 dollars

Google has awarded a historic reward of $250,000 to the security researcher known as Micky for discovering a critical vulnerability in the architecture of the Chrome browser. This vulnerability made it easier for malicious websites to escape Chrome’s sandbox protection, allowing arbitrary code execution on victims’ systems. A historic reward The flaw was due to an error in Chrome’s Inter-Process Communication system, particularly within the IPCZ transport mechanism. According to the details provided, the error was in the Transport::Deserialize function, where the system did not properly validate the header.destination_type parameters before […]

Discover a vulnerability in the architecture of Chrome and Google rewards him with 250,000 dollars

Google has awarded a historic reward of $250,000 to the security researcher known as Micky for discovering a critical vulnerability in the architecture of the Chrome browser. This vulnerability made it easier for malicious websites to escape Chrome’s sandbox protection, allowing arbitrary code execution on victims’ systems.

A historic reward

The failure was due to an error in Chrome’s Inter-Process Communication system, particularly within the IPCZ transport mechanism. According to the details provided, the error was in the Transport::Deserialize function, where the system did not adequately validate the header.destination_type parameters before creating transport objects. This allowed a malicious rendering process to manipulate this parameter to impersonate a privileged broker process.

The required attack vector was a multi-step process in which a compromised renderer sent manipulative messages to take control of the browser process resources. The proof of concept of the exploit demonstrated the ability to bypass the sandbox by duplicating handles of privileged browser processes, which included full permissions to execute system commands.

The decision to grant such a high reward reflects not only the sophistication of the exploit but also Google’s commitment to incentivizing security research, especially in critical areas of its browser. The vulnerability was responsibly disclosed on April 22, 2025, and Google’s security team, led by Alex Gough, implemented fixes in May 2025. These included the removal of transitive trust from transports and the implementation of stricter validation of the reliability of endpoints within the IPCZ system.

This event underscores the importance of collaboration between security researchers and technology companies to maintain the integrity and security of digital platforms.

Google
Google DOWNLOAD
Author SoftonicPosted on August 18, 2025August 18, 2025Categories NewsTags Alex Gough, chrome, exploit, Google, vulnerabilidad

Microsoft fixes 111 vulnerabilities that exposed your computer to all kinds of threats

Microsoft has released updates to address a total of 111 vulnerabilities in its software portfolio, of which 16 have been classified as critical. Among these are significant flaws such as CVE-2025-53786, which affects hybrid implementations of Microsoft Exchange Server, and CVE-2025-53779, a privilege escalation vulnerability in Windows Kerberos that was publicly disclosed during the announcement. A solution so you don’t have to suffer from unforeseen issues The recently identified BadSuccessor vulnerability allows an attacker who already has access to certain attributes of Active Directory to compromise a domain, although it only affects 0.7% of […]

Microsoft fixes 111 vulnerabilities that exposed your computer to all kinds of threats

Microsoft has released updates to address a total of 111 vulnerabilities in its software portfolio, of which 16 have been classified as critical. Among these are significant flaws such as CVE-2025-53786, which affects hybrid implementations of Microsoft Exchange Server, and CVE-2025-53779, a privilege escalation vulnerability in Windows Kerberos that was publicly disclosed during the announcement.

A solution so you don’t have to suffer from unforeseen events

The BadSuccessor vulnerability, recently identified, allows an attacker who already has access to certain attributes of Active Directory to compromise a domain, although it only affects 0.7% of the domains in circulation. Experts point out that this flaw can enable an attacker, starting from limited administrative rights, to gain full control of the domain, using techniques such as Kerberoasting or Silver Ticket.

In addition, Microsoft has fixed four remote code execution vulnerabilities that allowed attackers to execute arbitrary commands and compromise systems without client intervention. The firm Check Point has revealed a flaw related to a Rust-based component of the Windows kernel that can cause system crashes and has warned that it could pose a significant risk for companies with large or remote templates.

A relevant aspect is the vulnerability CVE-2025-50154, which allows an attacker to extract NTLM hashes without user interaction, even on fully updated systems. This facilitates relay attacks and unauthorized access, raising concerns about security in corporate environments.

The updates not only address existing vulnerabilities, but also strengthen security measures in applications like Azure OpenAI and Microsoft 365 Copilot BizChat, which have already been mitigated without any action required from users.

Windows 11
Windows 11 DOWNLOAD
Author SoftonicPosted on August 13, 2025August 13, 2025Categories News, Windows softwareTags ciberseguridad, Copilot, ejecución remota, OpenAI, Seguridad, software, vulnerabilidad, Windows

Google Chrome receives a critical update without which you could lose control of your computer

Google has released a critical update for its Chrome browser that fixes several severe vulnerabilities, including one that could allow attackers to manipulate memory and execute arbitrary code on users’ systems. The latest version, Chrome 138.0.7204.183 for Linux and 138.0.7204.183/.184 for Windows and Mac, addresses these urgent security issues and all users are advised to update their browser immediately. Update your browser right now The most significant vulnerability in this update is CVE-2025-8292, a ‘use-after-free’ type flaw found in Chrome’s Media Stream component. This type of vulnerability of […]

Google Chrome receives a critical update without which you could lose control of your computer

Google has released a critical update for its Chrome browser that fixes several severe vulnerabilities, including one that could allow attackers to manipulate memory and execute arbitrary code on users’ systems. The latest version, Chrome 138.0.7204.183 for Linux and 138.0.7204.183/.184 for Windows and Mac, addresses these urgent security issues and all users are advised to update their browser immediately.

Update your browser right now

The most significant vulnerability in this update is CVE-2025-8292, a ‘use-after-free’ type flaw found in the Media Stream component of Chrome. This type of memory corruption vulnerability is particularly dangerous, as a remote attacker can exploit it through a malicious HTML page. If successful, the attacker could crash the browser or execute malicious code, which could result in the installation of unauthorized programs, theft or alteration of data, or the creation of new user accounts with full privileges.

The anonymous security researcher who discovered the vulnerability CVE-2025-8292 reported it to Google on June 19, 2025, and received a reward of $8,000 through the Chrome Vulnerability Reward Program. Google has restricted access to the full details of the bug to allow most users to apply the patch, a standard practice to prevent the active exploitation of vulnerabilities.

This update is part of a series of security patches for Chrome 138. Previously, in July, Google addressed other serious vulnerabilities, including CVE-2025-6558, a zero-day exploit that was actively being used in attacks. Throughout June and July, Chrome 138 has received multiple updates to fix various security flaws, including type confusion in the V8 JavaScript engine and other memory-related errors.

Google’s security teams are constantly working to discover and resolve vulnerabilities through internal audits and other security initiatives. Users can ensure that their browser is up to date by going to “Help” and then “About Google Chrome” in the browser menu.

Google Chrome
Google Chrome DOWNLOAD
Author SoftonicPosted on July 31, 2025July 31, 2025Categories News, Software>SecurityTags Google Chrome, Mac, Media Stream, parche, vulnerabilidad

A security problem in Windows could allow your computer to be hijacked

A critical vulnerability in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could allow attackers to execute arbitrary code on victim systems. This flaw affects multiple versions of Windows, posing a significant threat to organizations that rely on connections through the Remote Desktop Protocol (RDP). Although simple, it requires us to do our part Classified as a “relative path traversal” vulnerability and inadequate access control, CVE-2025-48817 has a CVSS score of 8.8, placing it in a high severity category. The attack vector is identified as low complexity and […]

A security problem in Windows could allow your computer to be hijacked

A critical vulnerability in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could allow attackers to execute arbitrary code on victims’ systems. This flaw affects multiple versions of Windows, posing a significant threat to organizations that rely on connections through the Remote Desktop Protocol (RDP).

Although simple, it requires us to do our part

Classified as a “relative path traversal” vulnerability and inadequate access control, CVE-2025-48817 has a CVSS score of 8.8, placing it in a high severity category. The attack vector is identified as low complexity and requires user interaction; no prior privileges are necessary for exploitation. However, the success of an attack depends on the victim connecting to a compromised remote desktop server.

The attack is carried out through a man-in-the-middle scenario, where malicious actors control the server. Once the victim establishes a connection with the compromised server, the vulnerability allows attackers to escape the intended directory restrictions and execute code remotely, which can seriously impact the confidentiality, integrity, and availability of the data.

Microsoft has released security updates to mitigate this vulnerability, recommending that organizations apply the patches KB5062553 and KB5062552 that cover a wide range of systems, from Windows Server 2008 to Windows 11. As no real-world exploitations have been reported, there is a critical window for organizations to remedy the situation before mass exploitation attempts occur.

Customers should be aware that this vulnerability represents an inversion of the traditional security model, where they normally trust their servers. Users and administrators are urged to update their systems and software to protect against this emerging threat.

Windows 11
Windows 11 DOWNLOAD
Author SoftonicPosted on July 9, 2025July 9, 2025Categories News, Software>SecurityTags Microsoft Remote Desktop Client, Seguridad, vulnerabilidad, Windows, Windows Defense, Windwos 11

Recent Posts

  • The Helldivers movie has a director who is known for being fast and furious
  • Batman’s most stubborn villain receives the first trailer for his imminent movie
  • Warner Bros. sets a release date for the sequel to La Llorona and the anticipated spin-off of Weapons
  • Dune: part three shows its first images
  • The first trailer for the new installment of the Evil Dead franchise is presented during CinemaCon

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • September 2006
  • August 2006
  • June 2006
  • May 2006
  • July 2001
  • January 2001
  • November 2000
  • September 2000
  • August 2000
  • July 2000
  • April 2000
  • March 2000

Categories

  • Affiliate post
  • Expert Review
  • Gaming
  • Guides
  • How to
  • Legacy how To
  • News
  • Noticias
  • Software>Security
  • Sponsored
  • Trucos y Consejos
  • Uncategorized
  • Windows software

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Softonic English Proudly powered by WordPress