{"id":1180,"date":"2018-04-12T08:21:03","date_gmt":"2018-04-12T13:21:03","guid":{"rendered":"https:\/\/cert.pa\/?p=1180"},"modified":"2018-04-12T15:39:55","modified_gmt":"2018-04-12T20:39:55","slug":"csirt-panama-aviso-2018-04-12-microsoft-libera-actualizaciones-para-66-bugs","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1180","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-04-12 Microsoft libera actualizaciones para 66 bugs"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-04-12 Microsoft libera actualizaciones para 66 bugs<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Abril 12, 2018<br \/>\n\u00daltima revisi\u00f3n: Abril 11, 2018<br \/>\nhttps:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx<\/p>\n<p>Sistemas Afectados:<br \/>\nAdobe Flash Player<br \/>\nMicrosoft XML Core Services<br \/>\nWindows DirectShow<br \/>\nWindows DVD Maker<br \/>\nActive Directory Federation Services<br \/>\nWindows Kernel-Mode Drivers<br \/>\nWindows Kernel<br \/>\nWindows IIS<br \/>\nMicrosoft Exchange Server<br \/>\nMicrosoft Office<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Uniscribe<br \/>\nMicrosoft Windows SMB Server<br \/>\nMicrosoft Windows PDF Library<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha lanzado actualizaciones para 66 bugs que afectan a m\u00faltiples productos. <\/p>\n<p>II. Impacto<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180007\" rel=\"nofollow\">ADV180007<\/a><\/td>\n<td>April 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0870\" rel=\"nofollow\">CVE-2018-0870<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1018\" rel=\"nofollow\">CVE-2018-1018<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0997\" rel=\"nofollow\">CVE-2018-0997<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0991\" rel=\"nofollow\">CVE-2018-0991<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1020\" rel=\"nofollow\">CVE-2018-1020<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1023\" rel=\"nofollow\">CVE-2018-1023<\/a><\/td>\n<td>Microsoft Browser Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Devices<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8117\" rel=\"nofollow\">CVE-2018-8117<\/a><\/td>\n<td>Microsoft Wireless Keyboard 850 Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0892\" rel=\"nofollow\">CVE-2018-0892<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0998\" rel=\"nofollow\">CVE-2018-0998<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1009\" rel=\"nofollow\">CVE-2018-1009<\/a><\/td>\n<td>Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1016\" rel=\"nofollow\">CVE-2018-1016<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1012\" rel=\"nofollow\">CVE-2018-1012<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1010\" rel=\"nofollow\">CVE-2018-1010<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1015\" rel=\"nofollow\">CVE-2018-1015<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1013\" rel=\"nofollow\">CVE-2018-1013<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft JET Database Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1003\" rel=\"nofollow\">CVE-2018-1003<\/a><\/td>\n<td>Microsoft JET Database Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Malware Protection Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0986\" rel=\"nofollow\">CVE-2018-0986<\/a><\/td>\n<td>Microsoft Malware Protection Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1028\" rel=\"nofollow\">CVE-2018-1028<\/a><\/td>\n<td>Unknown<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1026\" rel=\"nofollow\">CVE-2018-1026<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1027\" rel=\"nofollow\">CVE-2018-1027<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1029\" rel=\"nofollow\">CVE-2018-1029<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1005\" rel=\"nofollow\">CVE-2018-1005<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1034\" rel=\"nofollow\">CVE-2018-1034<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1030\" rel=\"nofollow\">CVE-2018-1030<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0950\" rel=\"nofollow\">CVE-2018-0950<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0920\" rel=\"nofollow\">CVE-2018-0920<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1007\" rel=\"nofollow\">CVE-2018-1007<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1011\" rel=\"nofollow\">CVE-2018-1011<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1032\" rel=\"nofollow\">CVE-2018-1032<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1014\" rel=\"nofollow\">CVE-2018-1014<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0981\" rel=\"nofollow\">CVE-2018-0981<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0979\" rel=\"nofollow\">CVE-2018-0979<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1019\" rel=\"nofollow\">CVE-2018-1019<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0980\" rel=\"nofollow\">CVE-2018-0980<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0993\" rel=\"nofollow\">CVE-2018-0993<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0994\" rel=\"nofollow\">CVE-2018-0994<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0990\" rel=\"nofollow\">CVE-2018-0990<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0987\" rel=\"nofollow\">CVE-2018-0987<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0988\" rel=\"nofollow\">CVE-2018-0988<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0995\" rel=\"nofollow\">CVE-2018-0995<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1001\" rel=\"nofollow\">CVE-2018-1001<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1004\" rel=\"nofollow\">CVE-2018-1004<\/a><\/td>\n<td>Windows VBScript Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0989\" rel=\"nofollow\">CVE-2018-0989<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1000\" rel=\"nofollow\">CVE-2018-1000<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0996\" rel=\"nofollow\">CVE-2018-0996<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0890\" rel=\"nofollow\">CVE-2018-0890<\/a><\/td>\n<td>Active Directory Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0966\" rel=\"nofollow\">CVE-2018-0966<\/a><\/td>\n<td>Device Guard Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0967\" rel=\"nofollow\">CVE-2018-0967<\/a><\/td>\n<td>Windows SNMP Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0963\" rel=\"nofollow\">CVE-2018-0963<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0887\" rel=\"nofollow\">CVE-2018-0887<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8116\" rel=\"nofollow\">CVE-2018-8116<\/a><\/td>\n<td>Microsoft Graphics Component Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1037\" rel=\"nofollow\">CVE-2018-1037<\/a><\/td>\n<td>Microsoft Visual Studio Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0964\" rel=\"nofollow\">CVE-2018-0964<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Hyper-V<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0957\" rel=\"nofollow\">CVE-2018-0957<\/a><\/td>\n<td>Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows IIS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0956\" rel=\"nofollow\">CVE-2018-0956<\/a><\/td>\n<td>HTTP.sys Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1008\" rel=\"nofollow\">CVE-2018-1008<\/a><\/td>\n<td>OpenType Font Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0960\" rel=\"nofollow\">CVE-2018-0960<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0973\" rel=\"nofollow\">CVE-2018-0973<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0972\" rel=\"nofollow\">CVE-2018-0972<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0975\" rel=\"nofollow\">CVE-2018-0975<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0974\" rel=\"nofollow\">CVE-2018-0974<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0971\" rel=\"nofollow\">CVE-2018-0971<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0969\" rel=\"nofollow\">CVE-2018-0969<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0968\" rel=\"nofollow\">CVE-2018-0968<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0970\" rel=\"nofollow\">CVE-2018-0970<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows RDP<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0976\" rel=\"nofollow\">CVE-2018-0976<\/a><\/td>\n<td>Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos.<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-04-12 Microsoft libera actualizaciones para 66 bugs Gravedad: Alta Fecha de publicaci\u00f3n: Abril 12, 2018 \u00daltima revisi\u00f3n: Abril 11, 2018 https:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx Sistemas Afectados: Adobe Flash Player Microsoft XML Core Services Windows DirectShow&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,27,72,74,9,73,68],"class_list":["post-1180","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe-flash-player","tag-avisos-de-seguridad","tag-boletines","tag-microsoft","tag-parches","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1180"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1180\/revisions"}],"predecessor-version":[{"id":1185,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1180\/revisions\/1185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}