{"id":1095,"date":"2017-11-16T08:33:15","date_gmt":"2017-11-16T13:33:15","guid":{"rendered":"https:\/\/cert.pa\/?p=1095"},"modified":"2017-11-16T09:10:41","modified_gmt":"2017-11-16T14:10:41","slug":"1095","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1095","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2017-10-11 Microsoft libera actualizaciones para 53 vulnerabilidades"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-10-11 Microsoft libera actualizaciones para 53 vulnerabilidades<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Noviembre 16, 2017<br \/>\nFecha de modificaci\u00f3n: Noviembre 15, 2017<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<br \/>\nSistemas Afectados:<br \/>\nASP.NET Core<br \/>\n.NET Framework<br \/>\nAdobe Flash Player<br \/>\nASP .NET<br \/>\nASP.NET<br \/>\nDevice Guard<br \/>\nInternet Explorer<br \/>\nMicrosoft Browsers<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft Office<br \/>\nMicrosoft Scripting Engine<br \/>\nMicrosoft Windows Search Component<br \/>\nWindows Kernel<br \/>\nWindows Kernel-Mode Drivers<br \/>\nWindows Media Player<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha liberado actualizaciones que cubren 53 vulnerabilidades.<\/p>\n<p>II. Impacto<br \/>\nEstas correcciones o parches estan detalladas en la tabla a continuacion<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>ASP.NET Core<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11883\" rel=\"nofollow\">CVE-2017-11883<\/a><\/td>\n<td>ASP.NET Core Denial Of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11770\" rel=\"nofollow\">CVE-2017-11770<\/a><\/td>\n<td>.NET CORE Denial Of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170019\" rel=\"nofollow\">ADV170019<\/a><\/td>\n<td>November 2017 Flash Security Updates<\/td>\n<\/tr>\n<tr>\n<td>ASP .NET<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8700\" rel=\"nofollow\">CVE-2017-8700<\/a><\/td>\n<td>ASP.NET Core Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>ASP.NET<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11879\" rel=\"nofollow\">CVE-2017-11879<\/a><\/td>\n<td>ASP.NET Core Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11830\" rel=\"nofollow\">CVE-2017-11830<\/a><\/td>\n<td>Device Guard Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11856\" rel=\"nofollow\">CVE-2017-11856<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11855\" rel=\"nofollow\">CVE-2017-11855<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11848\" rel=\"nofollow\">CVE-2017-11848<\/a><\/td>\n<td>Internet Explorer Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11827\" rel=\"nofollow\">CVE-2017-11827<\/a><\/td>\n<td>Microsoft Browser Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11845\" rel=\"nofollow\">CVE-2017-11845<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11874\" rel=\"nofollow\">CVE-2017-11874<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11872\" rel=\"nofollow\">CVE-2017-11872<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11863\" rel=\"nofollow\">CVE-2017-11863<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11833\" rel=\"nofollow\">CVE-2017-11833<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11803\" rel=\"nofollow\">CVE-2017-11803<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11844\" rel=\"nofollow\">CVE-2017-11844<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11835\" rel=\"nofollow\">CVE-2017-11835<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11832\" rel=\"nofollow\">CVE-2017-11832<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11851\" rel=\"nofollow\">CVE-2017-11851<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11852\" rel=\"nofollow\">CVE-2017-11852<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11850\" rel=\"nofollow\">CVE-2017-11850<\/a><\/td>\n<td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11882\" rel=\"nofollow\">CVE-2017-11882<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170020\" rel=\"nofollow\">ADV170020<\/a><\/td>\n<td>Microsoft Office Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11854\" rel=\"nofollow\">CVE-2017-11854<\/a><\/td>\n<td>Microsoft Word Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11884\" rel=\"nofollow\">CVE-2017-11884<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11878\" rel=\"nofollow\">CVE-2017-11878<\/a><\/td>\n<td>Microsoft Excel Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11876\" rel=\"nofollow\">CVE-2017-11876<\/a><\/td>\n<td>Microsoft Project Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11877\" rel=\"nofollow\">CVE-2017-11877<\/a><\/td>\n<td>Microsoft Excel Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11862\" rel=\"nofollow\">CVE-2017-11862<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11858\" rel=\"nofollow\">CVE-2017-11858<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11846\" rel=\"nofollow\">CVE-2017-11846<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11869\" rel=\"nofollow\">CVE-2017-11869<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11866\" rel=\"nofollow\">CVE-2017-11866<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11837\" rel=\"nofollow\">CVE-2017-11837<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11839\" rel=\"nofollow\">CVE-2017-11839<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11861\" rel=\"nofollow\">CVE-2017-11861<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11841\" rel=\"nofollow\">CVE-2017-11841<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11873\" rel=\"nofollow\">CVE-2017-11873<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11834\" rel=\"nofollow\">CVE-2017-11834<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11791\" rel=\"nofollow\">CVE-2017-11791<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11871\" rel=\"nofollow\">CVE-2017-11871<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11870\" rel=\"nofollow\">CVE-2017-11870<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11840\" rel=\"nofollow\">CVE-2017-11840<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11843\" rel=\"nofollow\">CVE-2017-11843<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11836\" rel=\"nofollow\">CVE-2017-11836<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11838\" rel=\"nofollow\">CVE-2017-11838<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11788\" rel=\"nofollow\">CVE-2017-11788<\/a><\/td>\n<td>Windows Search Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11880\" rel=\"nofollow\">CVE-2017-11880<\/a><\/td>\n<td>Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11831\" rel=\"nofollow\">CVE-2017-11831<\/a><\/td>\n<td>Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11847\" rel=\"nofollow\">CVE-2017-11847<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11853\" rel=\"nofollow\">CVE-2017-11853<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11849\" rel=\"nofollow\">CVE-2017-11849<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel-Mode Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11842\" rel=\"nofollow\">CVE-2017-11842<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Media Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11768\" rel=\"nofollow\">CVE-2017-11768<\/a><\/td>\n<td>Windows Media Player Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar Windows utilizando la herramienta de Windows update o WSUS para Windows server.<br \/>\nhttps:\/\/www.microsoft.com\/en-us\/security\/pc-security\/malware-removal.aspx<br \/>\nInstale los parches tan pronto como est\u00e9n disponibles.<br \/>\nEjecute todo el software con los menos privilegios requeridos mientras se mantiene la funcionalidad.<br \/>\nPara mas referencias seguir el siguiente enlace https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2017-10-11 Microsoft libera actualizaciones para 53 vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Noviembre 16, 2017 Fecha de modificaci\u00f3n: Noviembre 15, 2017 \u00daltima revisi\u00f3n: Revisi\u00f3n A. https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance Sistemas Afectados: ASP.NET Core .NET Framework&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,44,36,74,49,21,9,73,64,80,68,45,94],"class_list":["post-1095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-bolentin","tag-boletin","tag-boletines","tag-ciberseguridad","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1095"}],"version-history":[{"count":5,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1095\/revisions"}],"predecessor-version":[{"id":1100,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1095\/revisions\/1100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}