{"id":1239,"date":"2018-07-11T14:16:57","date_gmt":"2018-07-11T19:16:57","guid":{"rendered":"https:\/\/cert.pa\/?p=1239"},"modified":"2018-07-11T14:18:40","modified_gmt":"2018-07-11T19:18:40","slug":"csirt-panama-aviso-2018-07-11-microsoft-publica-53-actualizaciones-de-seguridad-de-julio-2018","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1239","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 53 actualizaciones de seguridad de julio 2018"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 53 actualizaciones de seguridad de julio 2018<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Julio 11, 2018<br \/>\n\u00daltima revisi\u00f3n: Julio 11, 2018<br \/>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/7d4489d6-573f-e811-a96f-000d3a33c573<\/p>\n<p>Sistemas Afectados:<br \/>\nAdobe Flash Player<br \/>\n.NET Framework<br \/>\nActive Directory<br \/>\nASP.NET<br \/>\nDevice Guard<br \/>\nInternet Explorer<br \/>\nMicrosoft Devices<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Office<br \/>\nMicrosoft PowerShell<br \/>\nMicrosoft Scripting Engine<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Windows DNS<br \/>\nMicrosoft WordPad<br \/>\nSkype for Business and Microsoft Lync<br \/>\nVisual Studio<br \/>\nWindows Kernel<br \/>\nWindows Shell<\/p>\n<p>I. Descripci\u00f3n<\/p>\n<p>La versi\u00f3n de seguridad de julio consiste en actualizaciones de seguridad para los siguientes software:<\/p>\n<table id=\"tableOfContents\" style=\"width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180017\" rel=\"nofollow\">ADV180017<\/a><\/td>\n<td>July 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8284\" rel=\"nofollow\">CVE-2018-8284<\/a><\/td>\n<td>.NET Framework Remote Code Injection Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8260\" rel=\"nofollow\">CVE-2018-8260<\/a><\/td>\n<td>.NET Framework Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8202\" rel=\"nofollow\">CVE-2018-8202<\/a><\/td>\n<td>.NET Framework Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8356\" rel=\"nofollow\">CVE-2018-8356<\/a><\/td>\n<td>.NET Framework Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Active Directory<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8326\" rel=\"nofollow\">CVE-2018-8326<\/a><\/td>\n<td>Open Source Customization for Active Directory Federation Services XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>ASP.NET<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8171\" rel=\"nofollow\">CVE-2018-8171<\/a><\/td>\n<td>ASP.NET Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8222\" rel=\"nofollow\">CVE-2018-8222<\/a><\/td>\n<td>Device Guard Code Integrity Policy Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0949\" rel=\"nofollow\">CVE-2018-0949<\/a><\/td>\n<td>Internet Explorer Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Devices<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8306\" rel=\"nofollow\">CVE-2018-8306<\/a><\/td>\n<td>Microsoft Wireless Display Adapter Command Injection Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8289\" rel=\"nofollow\">CVE-2018-8289<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8301\" rel=\"nofollow\">CVE-2018-8301<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8325\" rel=\"nofollow\">CVE-2018-8325<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8324\" rel=\"nofollow\">CVE-2018-8324<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8297\" rel=\"nofollow\">CVE-2018-8297<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8274\" rel=\"nofollow\">CVE-2018-8274<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8278\" rel=\"nofollow\">CVE-2018-8278<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8262\" rel=\"nofollow\">CVE-2018-8262<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8281\" rel=\"nofollow\">CVE-2018-8281<\/a><\/td>\n<td>Microsoft Office Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8323\" rel=\"nofollow\">CVE-2018-8323<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8300\" rel=\"nofollow\">CVE-2018-8300<\/a><\/td>\n<td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8312\" rel=\"nofollow\">CVE-2018-8312<\/a><\/td>\n<td>Microsoft Access Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8299\" rel=\"nofollow\">CVE-2018-8299<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8310\" rel=\"nofollow\">CVE-2018-8310<\/a><\/td>\n<td>Microsoft Office Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft PowerShell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8327\" rel=\"nofollow\">CVE-2018-8327<\/a><\/td>\n<td>PowerShell Editor Services Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8294\" rel=\"nofollow\">CVE-2018-8294<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8280\" rel=\"nofollow\">CVE-2018-8280<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8242\" rel=\"nofollow\">CVE-2018-8242<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8125\" rel=\"nofollow\">CVE-2018-8125<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8298\" rel=\"nofollow\">CVE-2018-8298<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8287\" rel=\"nofollow\">CVE-2018-8287<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8288\" rel=\"nofollow\">CVE-2018-8288<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8290\" rel=\"nofollow\">CVE-2018-8290<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8279\" rel=\"nofollow\">CVE-2018-8279<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8283\" rel=\"nofollow\">CVE-2018-8283<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8286\" rel=\"nofollow\">CVE-2018-8286<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8275\" rel=\"nofollow\">CVE-2018-8275<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8296\" rel=\"nofollow\">CVE-2018-8296<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8291\" rel=\"nofollow\">CVE-2018-8291<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8276\" rel=\"nofollow\">CVE-2018-8276<\/a><\/td>\n<td>Scripting Engine Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8308\" rel=\"nofollow\">CVE-2018-8308<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8309\" rel=\"nofollow\">CVE-2018-8309<\/a><\/td>\n<td>Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8305\" rel=\"nofollow\">CVE-2018-8305<\/a><\/td>\n<td>Windows Mail Client Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8206\" rel=\"nofollow\">CVE-2018-8206<\/a><\/td>\n<td>Windows FTP Server Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8319\" rel=\"nofollow\">CVE-2018-8319<\/a><\/td>\n<td>MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8313\" rel=\"nofollow\">CVE-2018-8313<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows DNS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8304\" rel=\"nofollow\">CVE-2018-8304<\/a><\/td>\n<td>Windows DNSAPI Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft WordPad<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8307\" rel=\"nofollow\">CVE-2018-8307<\/a><\/td>\n<td>WordPad Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Skype for Business and Microsoft Lync<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8238\" rel=\"nofollow\">CVE-2018-8238<\/a><\/td>\n<td>Skype for Business and Lync Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Skype for Business and Microsoft Lync<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8311\" rel=\"nofollow\">CVE-2018-8311<\/a><\/td>\n<td>Remote Code Execution Vulnerability in Skype For Business and Lync<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8172\" rel=\"nofollow\">CVE-2018-8172<\/a><\/td>\n<td>Visual Studio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Visual Studio<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8232\" rel=\"nofollow\">CVE-2018-8232<\/a><\/td>\n<td>Microsoft Macro Assembler Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8282\" rel=\"nofollow\">CVE-2018-8282<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8314\" rel=\"nofollow\">CVE-2018-8314<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n<p>III. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 53 actualizaciones de seguridad de julio 2018 Gravedad: Alta Fecha de publicaci\u00f3n: Julio 11, 2018 \u00daltima revisi\u00f3n: Julio 11, 2018 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/7d4489d6-573f-e811-a96f-000d3a33c573 Sistemas Afectados: Adobe Flash Player .NET Framework Active&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,27,43,8,72,44,36,74,49,21,9,73,64,80,68,45,94],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe-flash-player","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-bolentin","tag-boletin","tag-boletines","tag-ciberseguridad","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1239"}],"version-history":[{"count":4,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1239\/revisions"}],"predecessor-version":[{"id":1243,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1239\/revisions\/1243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}