{"id":1300,"date":"2018-11-15T09:31:24","date_gmt":"2018-11-15T14:31:24","guid":{"rendered":"https:\/\/cert.pa\/?p=1300"},"modified":"2018-11-15T09:31:24","modified_gmt":"2018-11-15T14:31:24","slug":"csirt-panama-aviso-2018-nov-15-microsoft-libera-actualizaciones-para-60-vulnerabilidades","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1300","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-nov-15 Microsoft libera actualizaciones para 60 Vulnerabilidades"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-nov-15 Microsoft libera actualizaciones para 60 Vulnerabilidades.<\/p>\n<p>Gravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Noviembre 15, 2018<br \/>\n\u00daltima revisi\u00f3n: Noviembre 14, 2018<br \/>\nhttps:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx<\/p>\n<p>Sistemas Afectados:<br \/>\n.NET Core<br \/>\nActive Directory<br \/>\nAdobe Flash Player<br \/>\nAzure<br \/>\nBitLocker<br \/>\nInternet Explorer<br \/>\nMicrosoft Drivers<br \/>\nMicrosoft Dynamics<br \/>\nMicrosoft Edge<br \/>\nMicrosoft Exchange Server<br \/>\nMicrosoft Graphics Component<br \/>\nMicrosoft JScript<br \/>\nMicrosoft Office<br \/>\nMicrosoft Office SharePoint<br \/>\nMicrosoft PowerShell<br \/>\nMicrosoft RPC<br \/>\nMicrosoft Scripting Engine<br \/>\nMicrosoft Windows<br \/>\nMicrosoft Windows Search Component<br \/>\nServicing Stack Updates<br \/>\nSkype for Business and Microsoft Lync<br \/>\nTeam Foundation Server<br \/>\nWindows Audio Service<br \/>\nWindows Kernel<\/p>\n<p>I. Descripci\u00f3n<br \/>\nMicrosoft ha lanzado actualizaciones para 60 vulnerabilidades que afectan a m\u00faltiples componentes.<\/p>\n<p>II. Impacto<\/p>\n<table>\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>.NET Core<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8416\">CVE-2018-8416<\/a><\/td>\n<td>.NET Core Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Active Directory<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8547\">CVE-2018-8547<\/a><\/td>\n<td>Active Directory Federation Services XSS Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180025\">ADV180025<\/a><\/td>\n<td>November 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Azure<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8600\">CVE-2018-8600<\/a><\/td>\n<td>Azure App Service Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>BitLocker<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8566\">CVE-2018-8566<\/a><\/td>\n<td>BitLocker Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8570\">CVE-2018-8570<\/a><\/td>\n<td>Internet Explorer Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Drivers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8471\">CVE-2018-8471<\/a><\/td>\n<td>Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8605\">CVE-2018-8605<\/a><\/td>\n<td>Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8607\">CVE-2018-8607<\/a><\/td>\n<td>Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8606\">CVE-2018-8606<\/a><\/td>\n<td>Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8609\">CVE-2018-8609<\/a><\/td>\n<td>Microsoft Dynamics 365 (on-premises) version 8 Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Dynamics<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8608\">CVE-2018-8608<\/a><\/td>\n<td>Microsoft Dynamics 365 (on-premises) version 8 Cross Site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8564\">CVE-2018-8564<\/a><\/td>\n<td>Microsoft Edge Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8545\">CVE-2018-8545<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8567\">CVE-2018-8567<\/a><\/td>\n<td>Microsoft Edge Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8581\">CVE-2018-8581<\/a><\/td>\n<td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8565\">CVE-2018-8565<\/a><\/td>\n<td>Win32k Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8485\">CVE-2018-8485<\/a><\/td>\n<td>DirectX Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8562\">CVE-2018-8562<\/a><\/td>\n<td>Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8553\">CVE-2018-8553<\/a><\/td>\n<td>Microsoft Graphics Components Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8561\">CVE-2018-8561<\/a><\/td>\n<td>DirectX Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8554\">CVE-2018-8554<\/a><\/td>\n<td>DirectX Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Graphics Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8563\">CVE-2018-8563<\/a><\/td>\n<td>DirectX Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft JScript<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8417\">CVE-2018-8417<\/a><\/td>\n<td>Microsoft JScript Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8579\">CVE-2018-8579<\/a><\/td>\n<td>Microsoft Outlook Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8577\">CVE-2018-8577<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8575\">CVE-2018-8575<\/a><\/td>\n<td>Microsoft Project Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8576\">CVE-2018-8576<\/a><\/td>\n<td>Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8522\">CVE-2018-8522<\/a><\/td>\n<td>Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8524\">CVE-2018-8524<\/a><\/td>\n<td>Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8539\">CVE-2018-8539<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8558\">CVE-2018-8558<\/a><\/td>\n<td>Microsoft Outlook Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8573\">CVE-2018-8573<\/a><\/td>\n<td>Microsoft Word Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8574\">CVE-2018-8574<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8582\">CVE-2018-8582<\/a><\/td>\n<td>Microsoft Outlook Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8578\">CVE-2018-8578<\/a><\/td>\n<td>Microsoft SharePoint Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8572\">CVE-2018-8572<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office SharePoint<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8568\">CVE-2018-8568<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft PowerShell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8256\">CVE-2018-8256<\/a><\/td>\n<td>Microsoft PowerShell Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft PowerShell<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8415\">CVE-2018-8415<\/a><\/td>\n<td>Microsoft PowerShell Tampering Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft RPC<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8407\">CVE-2018-8407<\/a><\/td>\n<td>MSRPC Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8557\">CVE-2018-8557<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8552\">CVE-2018-8552<\/a><\/td>\n<td>Windows Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8551\">CVE-2018-8551<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8556\">CVE-2018-8556<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8555\">CVE-2018-8555<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8541\">CVE-2018-8541<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8542\">CVE-2018-8542<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8588\">CVE-2018-8588<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8544\">CVE-2018-8544<\/a><\/td>\n<td>Windows VBScript Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8543\">CVE-2018-8543<\/a><\/td>\n<td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8592\">CVE-2018-8592<\/a><\/td>\n<td>Windows Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180028\">ADV180028<\/a><\/td>\n<td>Guidance for configuring BitLocker to enforce software encryption<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8476\">CVE-2018-8476<\/a><\/td>\n<td>Windows Deployment Services TFTP Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8584\">CVE-2018-8584<\/a><\/td>\n<td>Windows ALPC Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8550\">CVE-2018-8550<\/a><\/td>\n<td>Windows COM Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8549\">CVE-2018-8549<\/a><\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows Search Component<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8450\">CVE-2018-8450<\/a><\/td>\n<td>Windows Search Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Servicing Stack Updates<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\">ADV990001<\/a><\/td>\n<td>Latest Servicing Stack Updates<\/td>\n<\/tr>\n<tr>\n<td>Skype for Business and Microsoft Lync<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8546\">CVE-2018-8546<\/a><\/td>\n<td>Microsoft Skype for Business Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Team Foundation Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8602\">CVE-2018-8602<\/a><\/td>\n<td>Team Foundation Server Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Audio Service<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8454\">CVE-2018-8454<\/a><\/td>\n<td>Windows Audio Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8589\">CVE-2018-8589<\/a><\/td>\n<td>Windows Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8408\">CVE-2018-8408<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-nov-15 Microsoft libera actualizaciones para 60 Vulnerabilidades. Gravedad: Alta Fecha de publicaci\u00f3n: Noviembre 15, 2018 \u00daltima revisi\u00f3n: Noviembre 14, 2018 https:\/\/technet.microsoft.com\/en-us\/security\/bulletins.aspx Sistemas Afectados: .NET Core Active Directory Adobe Flash Player Azure BitLocker&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,78,27,43,8,72,74,9,73,64,80,68,45,94],"class_list":["post-1300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe","tag-adobe-flash-player","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-boletines","tag-microsoft","tag-parches","tag-seguridad","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1300"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1300\/revisions"}],"predecessor-version":[{"id":1302,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1300\/revisions\/1302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}