{"id":1348,"date":"2019-02-14T08:34:48","date_gmt":"2019-02-14T13:34:48","guid":{"rendered":"https:\/\/cert.pa\/?p=1348"},"modified":"2019-02-14T08:34:48","modified_gmt":"2019-02-14T13:34:48","slug":"csirt-panama-aviso-2019-02-13-microsoft-publica-70-actualizaciones-de-seguridad","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1348","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2019-02-13 Microsoft publica 70 actualizaciones de seguridad"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2019-02-13 Microsoft publica 70 actualizaciones de seguridad<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Febrero 14, 2019<br>\n\u00daltima revisi\u00f3n: Febrero 13, 2019<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/51503ac5-e6d2-e811-a983-000d3a33c573<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nAdobe Flash Player<br>\nInternet Explorer<br>\nMicrosoft Edge<br>\nMicrosoft Windows<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nChakraCore<br>\n.NET Framework<br>\nMicrosoft Exchange Server<br>\nMicrosoft Visual Studio<br>\nAzure IoT SDK<br>\nMicrosoft Dynamics<br>\nTeam Foundation Server<br>\nVisual Studio Code<\/p>\n\n\n\n<p>I. Descripci\u00f3n<\/p>\n\n\n\n<p>La versi\u00f3n de seguridad de Febrero consiste en actualizaciones de seguridad para los siguientes software:<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>CVE Title<\/th><th>CVE ID<\/th><th>Severity<\/th><\/tr><tr><td>Latest Servicing Stack Updates<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noreferrer noopener\">ADV990001<\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>February 2019 Adobe Flash Security Update<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190003\" target=\"_blank\" rel=\"noreferrer noopener\">ADV190003<\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>February 2019 Oracle Outside In Library Security Update<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190004\" target=\"_blank\" rel=\"noreferrer noopener\">ADV190004<\/a><\/td><td>Desconocido<\/td><\/tr><tr><td>Guidance to mitigate unconstrained delegation vulnerabilities<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190006%20\" rel=\"noreferrer noopener\" target=\"_blank\">ADV190006 <\/a><\/td><td>N\/A<\/td><\/tr><tr><td>Guidance for &#8220;PrivExchange&#8221; Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV1900067\" rel=\"noreferrer noopener\" target=\"_blank\">ADV190007<\/a><\/td><td>N\/A<\/td><\/tr><tr><td>Microsoft Office Security Feature Bypass Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0540%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0540 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0590%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0590 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0591%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0591 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0593%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0593 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0594%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0594 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0595%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0595 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0596%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0596 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0597%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0597 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0598%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0598 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0599%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0599 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>HID Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0600%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0600 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>HID Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0601%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0601 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0602%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0602 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0604%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0604 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0605%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0605 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Internet Explorer Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0606%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0606 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0607%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0607 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0610%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0610 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>.NET Framework and Visual Studio Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0613%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0613 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0615%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0615 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0616%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0616 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>GDI+ Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0618%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0618 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0619%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0619 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Kernel Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0621%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0621 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Win32k Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0623%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0623 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0625%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0625 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows DHCP Server Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0626%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0626 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Windows Security Feature Bypass Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0627%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0627 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Win32k Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0628%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0628 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows SMB Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0630%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0630 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Security Feature Bypass Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0631%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0631 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Security Feature Bypass Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0632%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0632 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows SMB Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0633%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0633 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Edge Memory Corruption Vulnerability<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0633\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0634<\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0635%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0635 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Information Disclosure Vulnerability<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0636\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-0636<\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Defender Firewall Security Feature Bypass Vulnerability<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0637\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-0637<\/a><\/td><td>Importante<\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0640%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0640 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Microsoft Edge Security Feature Bypass Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0641%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0641 <\/a><\/td><td>Moderada<\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0642%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0642 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Microsoft Edge Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0643%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0643 <\/a><\/td><td>Moderada<\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"http:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0644\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-0644<\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Microsoft Edge Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0645%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0645 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0648%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0648 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Scripting Engine Elevation of Privileged Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0649%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0649 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Edge Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0650%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0650 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0651%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0651 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0652%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0652 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Microsoft Browser Spoofing Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0654%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0654 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0655%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0655 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0656%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0656 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>.NET Framework and Visual Studio Spoofing Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0657%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0657 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Scripting Engine Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0658%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0658 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Storage Service Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0659%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0659 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0660%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0660 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Windows Kernel Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0661%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0661 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>GDI+ Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0662%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0662 <\/a><\/td><td><strong>Critica<\/strong><\/td><\/tr><tr><td>Windows GDI Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0664%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0664 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0668%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0668 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0669%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0669 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0670%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0670 <\/a><\/td><td>Moderada<\/td><\/tr><tr><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0671%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0671 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0672%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0672 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0673%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0673 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0674%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0674 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0675%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0675 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Internet Explorer Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0676%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0676 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0686%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0686 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Microsoft Exchange Server Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0724%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0724 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0728%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0728 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Azure IoT Java SDK Elevation of Privilege Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0729%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0729 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Azure IoT Java SDK Information Disclosure Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0741%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0741 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Team Foundation Server Cross-site Scripting Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0742%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0742 <\/a><\/td><td>Importante<\/td><\/tr><tr><td>Team Foundation Server Cross-site Scripting Vulnerability<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0743%20\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0743 <\/a><\/td><td>Importante<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n\n\n\n<p>Se recomienda actualizar los equipos utilizando windows update.<\/p>\n\n\n\n<p>III. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2019-02-13 Microsoft publica 70 actualizaciones de seguridad Gravedad: Alta Fecha de publicaci\u00f3n: Febrero 14, 2019 \u00daltima revisi\u00f3n: Febrero 13, 2019 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/51503ac5-e6d2-e811-a983-000d3a33c573 Sistemas Afectados: Adobe Flash Player Internet Explorer Microsoft Edge Microsoft Windows&#8230;<\/p>\n","protected":false},"author":4,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,9,73,45,94],"class_list":["post-1348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1348"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1348\/revisions"}],"predecessor-version":[{"id":1351,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1348\/revisions\/1351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}