{"id":1156,"date":"2018-02-19T08:41:26","date_gmt":"2018-02-19T13:41:26","guid":{"rendered":"https:\/\/cert.pa\/?p=1156"},"modified":"2018-02-19T08:42:19","modified_gmt":"2018-02-19T13:42:19","slug":"csirt-panama-aviso-2018-02-19-microsoft-libera-actualizaciones-para-50-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1156","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-02-19 Microsoft libera actualizaciones para 50 vulnerabilidades"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-02-19 Microsoft libera actualizaciones para 50 vulnerabilidades<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Febrero 19, 2018<br \/>\nFecha de modificaci\u00f3n: Febrero 13, 2018<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n Browsers.<br \/>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<br \/>\nSistemas Afectados:<br \/>\nSide-Channel<br \/>\nAdobe Flash Player<br \/>\nCommon Log File System Driver<br \/>\nDevice Guard<br \/>\nGraphic Fonts<br \/>\nInternet Explorer<br \/>\nMicrosoft Browsers<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Office<br \/>\nMicrosoft Scripting Engine<br \/>\nMicrosoft Windows<br \/>\nWindows Kernel<br \/>\nWindows SMB Server<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha liberado actualizaciones que cubren 50 vulnerabilidades.<\/p>\n<p>II. Impacto<br \/>\nEstas correcciones o parches estan detalladas en la tabla a continuacion<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Side-Channel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" rel=\"nofollow\">ADV180002<\/a><\/td>\n<td>Guidance to mitigate speculative execution side-channel vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180004\" rel=\"nofollow\">ADV180004<\/a><\/td>\n<td>February 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0844\" rel=\"nofollow\">CVE-2018-0844<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0846\" rel=\"nofollow\">CVE-2018-0846<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0827\" rel=\"nofollow\">CVE-2018-0827<\/a><\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0855\" rel=\"nofollow\">CVE-2018-0855<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0755\" rel=\"nofollow\">CVE-2018-0755<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0760\" rel=\"nofollow\">CVE-2018-0760<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0761\" rel=\"nofollow\">CVE-2018-0761<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0866\" rel=\"nofollow\">CVE-2018-0866<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0840\" rel=\"nofollow\">CVE-2018-0840<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0839\" rel=\"nofollow\">CVE-2018-0839<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0771\" rel=\"nofollow\">CVE-2018-0771<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0763\" rel=\"nofollow\">CVE-2018-0763<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0869\" rel=\"nofollow\">CVE-2018-0869<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0864\" rel=\"nofollow\">CVE-2018-0864<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0852\" rel=\"nofollow\">CVE-2018-0852<\/a><\/td>\n<td>Microsoft Outlook Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0851\" rel=\"nofollow\">CVE-2018-0851<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0850\" rel=\"nofollow\">CVE-2018-0850<\/a><\/td>\n<td>Microsoft Outlook Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0853\" rel=\"nofollow\">CVE-2018-0853<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0841\" rel=\"nofollow\">CVE-2018-0841<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0859\" rel=\"nofollow\">CVE-2018-0859<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0860\" rel=\"nofollow\">CVE-2018-0860<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0861\" rel=\"nofollow\">CVE-2018-0861<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0858\" rel=\"nofollow\">CVE-2018-0858<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0836\" rel=\"nofollow\">CVE-2018-0836<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0835\" rel=\"nofollow\">CVE-2018-0835<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0837\" rel=\"nofollow\">CVE-2018-0837<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0838\" rel=\"nofollow\">CVE-2018-0838<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0856\" rel=\"nofollow\">CVE-2018-0856<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0857\" rel=\"nofollow\">CVE-2018-0857<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0834\" rel=\"nofollow\">CVE-2018-0834<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0822\" rel=\"nofollow\">CVE-2018-0822<\/a><\/td>\n<td>Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0823\" rel=\"nofollow\">CVE-2018-0823<\/a><\/td>\n<td>Named Pipe File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0825\" rel=\"nofollow\">CVE-2018-0825<\/a><\/td>\n<td>StructuredQuery Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0828\" rel=\"nofollow\">CVE-2018-0828<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0826\" rel=\"nofollow\">CVE-2018-0826<\/a><\/td>\n<td>Windows Storage Services Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0821\" rel=\"nofollow\">CVE-2018-0821<\/a><\/td>\n<td>Windows AppContainer Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0847\" rel=\"nofollow\">CVE-2018-0847<\/a><\/td>\n<td>Windows Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0820\" rel=\"nofollow\">CVE-2018-0820<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0831\" rel=\"nofollow\">CVE-2018-0831<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0832\" rel=\"nofollow\">CVE-2018-0832<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0830\" rel=\"nofollow\">CVE-2018-0830<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0829\" rel=\"nofollow\">CVE-2018-0829<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0757\" rel=\"nofollow\">CVE-2018-0757<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0742\" rel=\"nofollow\">CVE-2018-0742<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0756\" rel=\"nofollow\">CVE-2018-0756<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0809\" rel=\"nofollow\">CVE-2018-0809<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0810\" rel=\"nofollow\">CVE-2018-0810<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0843\" rel=\"nofollow\">CVE-2018-0843<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0842\" rel=\"nofollow\">CVE-2018-0842<\/a><\/td>\n<td>Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0833\" rel=\"nofollow\">CVE-2018-0833<\/a><\/td>\n<td>Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar Windows utilizando la herramienta de Windows update o WSUS para Windows server.<br \/>\nhttps:\/\/www.microsoft.com\/en-us\/security\/pc-security\/malware-removal.aspx<br \/>\nInstale los parches tan pronto como est\u00e9n disponibles.<br \/>\nEjecute todo el software con los menos privilegios requeridos mientras se mantiene la funcionalidad.<br \/>\nPara mas referencias seguir el siguiente enlace https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-02-19 Microsoft libera actualizaciones para 50 vulnerabilidades Gravedad: Alta Fecha de publicaci\u00f3n: Febrero 19, 2018 Fecha de modificaci\u00f3n: Febrero 13, 2018 \u00daltima revisi\u00f3n: Revisi\u00f3n Browsers. https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance Sistemas Afectados: Side-Channel Adobe Flash Player&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,21,9,73,64,80,68,45,94],"class_list":["post-1156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1156"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1156\/revisions"}],"predecessor-version":[{"id":1158,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1156\/revisions\/1158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}