{"id":1260,"date":"2018-08-17T09:07:32","date_gmt":"2018-08-17T14:07:32","guid":{"rendered":"https:\/\/cert.pa\/?p=1260"},"modified":"2018-08-17T09:07:39","modified_gmt":"2018-08-17T14:07:39","slug":"1260","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1260","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 60 actualizaciones de seguridad de Agosto 2018"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 60 actualizaciones de seguridad de Agosto 2018<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Agosto 17, 2018<br \/>\n\u00daltima revisi\u00f3n: Agosto 15, 2018<br \/>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/ecb26425-583f-e811-a96f-000d3a33c573<\/p>\n<p>Sistemas Afectados:<br \/>\nInternet Explorer<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Office and Microsoft Office Services and Web Apps<br \/>\nChakraCore<br \/>\nAdobe Flash Player<br \/>\n.NET Framework<br \/>\nMicrosoft Exchange Server<br \/>\nMicrosoft SQL Server<br \/>\nVisual Studio<\/p>\n<p>I. Descripci\u00f3n<\/p>\n<p>La versi\u00f3n de seguridad de Agosto consiste en actualizaciones de seguridad para los siguientes componentes:<\/p>\n<table id=\"tableOfContents\" style=\"margin-top:5; width:100%\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">ADV180018<\/a><\/td>\n<td>Microsoft Guidance to mitigate L1TF variant<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180020\">ADV180020<\/a><\/td>\n<td>August 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180021\">ADV180021<\/a><\/td>\n<td>Microsoft Office Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>.NET Framework<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8360\">CVE-2018-8360<\/a><\/td>\n<td>.NET Framework Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200\">CVE-2018-8200<\/a><\/td>\n<td>Device Guard Code Integrity Policy Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8204\">CVE-2018-8204<\/a><\/td>\n<td>Device Guard Code Integrity Policy Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8316\">CVE-2018-8316<\/a><\/td>\n<td>Internet Explorer Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8351\">CVE-2018-8351<\/a><\/td>\n<td>Microsoft Browser Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8403\">CVE-2018-8403<\/a><\/td>\n<td>Microsoft Browser Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8357\">CVE-2018-8357<\/a><\/td>\n<td>Microsoft Browser Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8388\">CVE-2018-8388<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8377\">CVE-2018-8377<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8383\">CVE-2018-8383<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8387\">CVE-2018-8387<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8370\">CVE-2018-8370<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8358\">CVE-2018-8358<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8374\">CVE-2018-8374<\/a><\/td>\n<td>Microsoft Exchange Server Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8302\">CVE-2018-8302<\/a><\/td>\n<td>Microsoft Exchange Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8397\">CVE-2018-8397<\/a><\/td>\n<td>GDI+ Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8400\">CVE-2018-8400<\/a><\/td>\n<td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8398\">CVE-2018-8398<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8406\">CVE-2018-8406<\/a><\/td>\n<td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8405\">CVE-2018-8405<\/a><\/td>\n<td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8401\">CVE-2018-8401<\/a><\/td>\n<td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8344\">CVE-2018-8344<\/a><\/td>\n<td>Microsoft Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8396\">CVE-2018-8396<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8394\">CVE-2018-8394<\/a><\/td>\n<td>Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8375\">CVE-2018-8375<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8376\">CVE-2018-8376<\/a><\/td>\n<td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8379\">CVE-2018-8379<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8378\">CVE-2018-8378<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8382\">CVE-2018-8382<\/a><\/td>\n<td>Microsoft Excel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8412\">CVE-2018-8412<\/a><\/td>\n<td>Microsoft (MAU) Office Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8389\">CVE-2018-8389<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8385\">CVE-2018-8385<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8355\">CVE-2018-8355<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8371\">CVE-2018-8371<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8372\">CVE-2018-8372<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8353\">CVE-2018-8353<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8373\">CVE-2018-8373<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8380\">CVE-2018-8380<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8390\">CVE-2018-8390<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8381\">CVE-2018-8381<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8266\">CVE-2018-8266<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8359\">CVE-2018-8359<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8384\">CVE-2018-8384<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8346\">CVE-2018-8346<\/a><\/td>\n<td>LNK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8345\">CVE-2018-8345<\/a><\/td>\n<td>LNK Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows PDF<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8350\">CVE-2018-8350<\/a><\/td>\n<td>Windows PDF Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>SQL Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8273\">CVE-2018-8273<\/a><\/td>\n<td>Microsoft SQL Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Authentication Methods<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8340\">CVE-2018-8340<\/a><\/td>\n<td>AD FS Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows COM<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8349\">CVE-2018-8349<\/a><\/td>\n<td>Microsoft COM for Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Diagnostic Hub<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0952\">CVE-2018-0952<\/a><\/td>\n<td>Diagnostic Hub Standard Collector Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Installer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8339\">CVE-2018-8339<\/a><\/td>\n<td>Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8341\">CVE-2018-8341<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8404\">CVE-2018-8404<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8347\">CVE-2018-8347<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8348\">CVE-2018-8348<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8399\">CVE-2018-8399<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows NDIS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8343\">CVE-2018-8343<\/a><\/td>\n<td>Windows NDIS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows RNDIS<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8342\">CVE-2018-8342<\/a><\/td>\n<td>Windows NDIS Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8414\">CVE-2018-8414<\/a><\/td>\n<td>Windows Shell Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Shell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8253\">CVE-2018-8253<\/a><\/td>\n<td>Microsoft Cortana Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n<p>III. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-07-11 Microsoft publica 60 actualizaciones de seguridad de Agosto 2018 Gravedad: Alta Fecha de publicaci\u00f3n: Agosto 17, 2018 \u00daltima revisi\u00f3n: Agosto 15, 2018 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/ecb26425-583f-e811-a96f-000d3a33c573 Sistemas Afectados: Internet Explorer Microsoft Edge Microsoft Windows&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,78,27,23,43,8,72,44,36,74,49,21,9,73,64,80,68,45,94],"class_list":["post-1260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe","tag-adobe-flash-player","tag-adobe-reader","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-bolentin","tag-boletin","tag-boletines","tag-ciberseguridad","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1260"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1260\/revisions"}],"predecessor-version":[{"id":1263,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1260\/revisions\/1263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}