{"id":1273,"date":"2018-09-13T09:44:37","date_gmt":"2018-09-13T14:44:37","guid":{"rendered":"https:\/\/cert.pa\/?p=1273"},"modified":"2018-09-13T09:44:37","modified_gmt":"2018-09-13T14:44:37","slug":"csirt-panama-aviso-2018-sep-13-microsoft-libera-actualizaciones-para-62-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1273","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-sep-13 Microsoft libera actualizaciones para 62 Vulnerabilidades."},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-sep-13 Microsoft libera actualizaciones para 62 Vulnerabilidades.<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Septiembre 13, 2018<br \/>\n\u00daltima revisi\u00f3n: Septiembre 12, 2018<br \/>\nhttps:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx<\/p>\n<p>Sistemas Afectados:<br \/>\n.NET Core<br \/>\n.NET Framework<br \/>\nAdobe Flash Player<br \/>\nAzure<br \/>\nDevice Guard<br \/>\nInternet Explorer<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft Identity Services<br \/>\nMicrosoft JET Database Engine<br \/>\nMicrosoft Office<br \/>\nMicrosoft Scripting Engine<br \/>\nMicrosoft Windows<br \/>\nMicrosoft XML Core Services<br \/>\nWindows Hyper-V<br \/>\nWindows Kernel<br \/>\nWindows Media<br \/>\nWindows Shell<br \/>\nWindows SMB Server<br \/>\nWindows Subsystem for Linux<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha lanzado actualizaciones para 62 vulnerabilidades que afectan a m\u00faltiples productos.<\/p>\n<p>II. Impacto<\/p>\n<table style=\"margin-top:5; width:100%\">\n<tbody>\n<tr>\n<th style=\"width: 495px;\">Tag<\/th>\n<th style=\"width: 278px;\">CVE ID<\/th>\n<th style=\"width: 852px;\">CVE Title<\/th>\n<\/tr>\n<tr>\n<td style=\"width:495px\">.NET Core<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8409\">CVE-2018-8409<\/a><\/td>\n<td style=\"width:852px\">System.IO.Pipelines Denial of Service<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">.NET Framework<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8421\">CVE-2018-8421<\/a><\/td>\n<td style=\"width:852px\">.NET Framework Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Adobe Flash Player<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180023\">ADV180023<\/a><\/td>\n<td style=\"width:852px\">September 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Azure<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8479\">CVE-2018-8479<\/a><\/td>\n<td style=\"width:852px\">Azure IoT SDK Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Device Guard<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8449\">CVE-2018-8449<\/a><\/td>\n<td style=\"width:852px\">Device Guard Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Internet Explorer<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8470\">CVE-2018-8470<\/a><\/td>\n<td style=\"width:852px\">Internet Explorer Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Internet Explorer<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8447\">CVE-2018-8447<\/a><\/td>\n<td style=\"width:852px\">Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Internet Explorer<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8461\">CVE-2018-8461<\/a><\/td>\n<td style=\"width:852px\">Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Edge<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8366\">CVE-2018-8366<\/a><\/td>\n<td style=\"width:852px\">Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Edge<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8469\">CVE-2018-8469<\/a><\/td>\n<td style=\"width:852px\">Microsoft Edge Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Edge<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8463\">CVE-2018-8463<\/a><\/td>\n<td style=\"width:852px\">Microsoft Edge Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Edge<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8425\">CVE-2018-8425<\/a><\/td>\n<td style=\"width:852px\">Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Edge<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8464\">CVE-2018-8464<\/a><\/td>\n<td style=\"width:852px\">Microsoft Edge PDF Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Graphics Component<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8332\">CVE-2018-8332<\/a><\/td>\n<td style=\"width:852px\">Win32k Graphics Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Graphics Component<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8475\">CVE-2018-8475<\/a><\/td>\n<td style=\"width:852px\">Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Graphics Component<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8462\">CVE-2018-8462<\/a><\/td>\n<td style=\"width:852px\">DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Graphics Component<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8424\">CVE-2018-8424<\/a><\/td>\n<td style=\"width:852px\">Windows GDI Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Graphics Component<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8433\">CVE-2018-8433<\/a><\/td>\n<td style=\"width:852px\">Microsoft Graphics Component Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Identity Services<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8269\">CVE-2018-8269<\/a><\/td>\n<td style=\"width:852px\">OData Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft JET Database Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8392\">CVE-2018-8392<\/a><\/td>\n<td style=\"width:852px\">Microsoft JET Database Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft JET Database Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8393\">CVE-2018-8393<\/a><\/td>\n<td style=\"width:852px\">Microsoft JET Database Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8428\">CVE-2018-8428<\/a><\/td>\n<td style=\"width:852px\">Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8426\">CVE-2018-8426<\/a><\/td>\n<td style=\"width:852px\">Microsoft Office SharePoint XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8429\">CVE-2018-8429<\/a><\/td>\n<td style=\"width:852px\">Microsoft Excel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8431\">CVE-2018-8431<\/a><\/td>\n<td style=\"width:852px\">Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8430\">CVE-2018-8430<\/a><\/td>\n<td style=\"width:852px\">Word PDF Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8474\">CVE-2018-8474<\/a><\/td>\n<td style=\"width:852px\">Lync for Mac 2011 Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Office<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8331\">CVE-2018-8331<\/a><\/td>\n<td style=\"width:852px\">Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8457\">CVE-2018-8457<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8459\">CVE-2018-8459<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8465\">CVE-2018-8465<\/a><\/td>\n<td style=\"width:852px\">Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8456\">CVE-2018-8456<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8367\">CVE-2018-8367<\/a><\/td>\n<td style=\"width:852px\">Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8391\">CVE-2018-8391<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8452\">CVE-2018-8452<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8315\">CVE-2018-8315<\/a><\/td>\n<td style=\"width:852px\">Microsoft Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8354\">CVE-2018-8354<\/a><\/td>\n<td style=\"width:852px\">Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8466\">CVE-2018-8466<\/a><\/td>\n<td style=\"width:852px\">Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Scripting Engine<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8467\">CVE-2018-8467<\/a><\/td>\n<td style=\"width:852px\">Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Windows<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8438\">CVE-2018-8438<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Windows<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8271\">CVE-2018-8271<\/a><\/td>\n<td style=\"width:852px\">Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Windows<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180022\">ADV180022<\/a><\/td>\n<td style=\"width:852px\">Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Windows<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8440\">CVE-2018-8440<\/a><\/td>\n<td style=\"width:852px\">Windows ALPC Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft Windows<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8410\">CVE-2018-8410<\/a><\/td>\n<td style=\"width:852px\">Windows Registry Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Microsoft XML Core Services<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8420\">CVE-2018-8420<\/a><\/td>\n<td style=\"width:852px\">MS XML Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0965\">CVE-2018-0965<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8435\">CVE-2018-8435<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8436\">CVE-2018-8436<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8439\">CVE-2018-8439<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8437\">CVE-2018-8437<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Hyper-V<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8434\">CVE-2018-8434<\/a><\/td>\n<td style=\"width:852px\">Windows Hyper-V Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8336\">CVE-2018-8336<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8446\">CVE-2018-8446<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8443\">CVE-2018-8443<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8445\">CVE-2018-8445<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8455\">CVE-2018-8455<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Kernel<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8442\">CVE-2018-8442<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Media<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8419\">CVE-2018-8419<\/a><\/td>\n<td style=\"width:852px\">Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Shell<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8468\">CVE-2018-8468<\/a><\/td>\n<td style=\"width:852px\">Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows SMB Server<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8444\">CVE-2018-8444<\/a><\/td>\n<td style=\"width:852px\">Windows SMB Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows SMB Server<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8335\">CVE-2018-8335<\/a><\/td>\n<td style=\"width:852px\">Windows SMB Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Subsystem for Linux<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8441\">CVE-2018-8441<\/a><\/td>\n<td style=\"width:852px\">Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td style=\"width:495px\">Windows Subsystem for Linux<\/td>\n<td style=\"width:278px\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8337\">CVE-2018-8337<\/a><\/td>\n<td style=\"width:852px\">Windows Subsystem for Linux Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-sep-13 Microsoft libera actualizaciones para 62 Vulnerabilidades. Gravedad: Alta Fecha de publicaci\u00f3n: Septiembre 13, 2018 \u00daltima revisi\u00f3n: Septiembre 12, 2018 https:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx Sistemas Afectados: .NET Core .NET Framework Adobe Flash Player Azure Device&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,78,27,43,8,72,44,36,74,49,21,9,73,64,80,68,45,94],"class_list":["post-1273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe","tag-adobe-flash-player","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-bolentin","tag-boletin","tag-boletines","tag-ciberseguridad","tag-internet-explorer","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1273"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1273\/revisions"}],"predecessor-version":[{"id":1274,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1273\/revisions\/1274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}