{"id":1394,"date":"2019-05-15T09:12:22","date_gmt":"2019-05-15T14:12:22","guid":{"rendered":"https:\/\/cert.pa\/?p=1394"},"modified":"2019-05-15T09:12:22","modified_gmt":"2019-05-15T14:12:22","slug":"csirt-panama-aviso-2019-05-15-microsoft-publica-79-actualizaciones-de-seguridad","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1394","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2019-05-15 Microsoft publica 79 actualizaciones de seguridad"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2019-05-15 Microsoft publica 79 actualizaciones de seguridad<br>  Gravedad: Alta<br>  Fecha de publicaci\u00f3n: Marzo 15, 2019<br>  \u00daltima revisi\u00f3n: Marzo 14, 2019<br>  https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/e5989c8b-7046-e911-a98e-000d3a33a34d<\/p>\n\n\n\n<p><br> Sistemas Afectados:<br> Adobe Flash Player<br> Microsoft Windows<br> Internet Explorer<br> Microsoft Edge<br> Microsoft Office and Microsoft Office Services and Web Apps<br> Team Foundation Server<br> Visual Studio<br> Azure DevOps Server<br> SQL Server<br> .NET Framework<br> .NET Core<br> ASP.NET Core<br> ChakraCore<br> Online Services<br> Azure<br> NuGet<br> Skype for Android<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nEl paquete de actualizaciones para este mes cubre los siguientes puntos:<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0982\">CVE-2019-0982<\/a><\/td><td>ASP.NET Core Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0981\">CVE-2019-0981<\/a><\/td><td>.Net Framework and .Net Core Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Core<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0980\">CVE-2019-0980<\/a><\/td><td>.Net Framework and .Net Core Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0864\">CVE-2019-0864<\/a><\/td><td>.NET Framework Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET Framework<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0820\">CVE-2019-0820<\/a><\/td><td>.NET Framework and .NET Core Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Adobe Flash Player<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190012\">ADV190012<\/a><\/td><td>May 2019 Adobe Flash Security Update<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1000\">CVE-2019-1000<\/a><\/td><td>Microsoft Azure AD Connect Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0929\">CVE-2019-0929<\/a><\/td><td>Internet Explorer Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0995\">CVE-2019-0995<\/a><\/td><td>Internet Explorer Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0930\">CVE-2019-0930<\/a><\/td><td>Internet Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0921\">CVE-2019-0921<\/a><\/td><td>Internet Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Kerberos<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0734\">CVE-2019-0734<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0940\">CVE-2019-0940<\/a><\/td><td>Microsoft Browser Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1008\">CVE-2019-1008<\/a><\/td><td>Microsoft Dynamics On-Premise Security Feature Bypass<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0938\">CVE-2019-0938<\/a><\/td><td>Microsoft Edge Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0926\">CVE-2019-0926<\/a><\/td><td>Microsoft Edge Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0892\">CVE-2019-0892<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0961\">CVE-2019-0961<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0758\">CVE-2019-0758<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0903\">CVE-2019-0903<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0882\">CVE-2019-0882<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0898\">CVE-2019-0898<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0895\">CVE-2019-0895<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0897\">CVE-2019-0897<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0889\">CVE-2019-0889<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0890\">CVE-2019-0890<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0891\">CVE-2019-0891<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0896\">CVE-2019-0896<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0893\">CVE-2019-0893<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0894\">CVE-2019-0894<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0901\">CVE-2019-0901<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0899\">CVE-2019-0899<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0900\">CVE-2019-0900<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0902\">CVE-2019-0902<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0947\">CVE-2019-0947<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0953\">CVE-2019-0953<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0945\">CVE-2019-0945<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0946\">CVE-2019-0946<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0957\">CVE-2019-0957<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0956\">CVE-2019-0956<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0949\">CVE-2019-0949<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0950\">CVE-2019-0950<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0952\">CVE-2019-0952<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0951\">CVE-2019-0951<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0963\">CVE-2019-0963<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0958\">CVE-2019-0958<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0924\">CVE-2019-0924<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0923\">CVE-2019-0923<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0927\">CVE-2019-0927<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0922\">CVE-2019-0922<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0884\">CVE-2019-0884<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0933\">CVE-2019-0933<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0925\">CVE-2019-0925<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0937\">CVE-2019-0937<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0918\">CVE-2019-0918<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0913\">CVE-2019-0913<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0912\">CVE-2019-0912<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0911\">CVE-2019-0911<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0914\">CVE-2019-0914<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0917\">CVE-2019-0917<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0916\">CVE-2019-0916<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0915\">CVE-2019-0915<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0733\">CVE-2019-0733<\/a><\/td><td>Windows Defender Application Control Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0936\">CVE-2019-0936<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0886\">CVE-2019-0886<\/a><\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0863\">CVE-2019-0863<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0942\">CVE-2019-0942<\/a><\/td><td>Unified Write Filter Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV190013\">ADV190013<\/a><\/td><td>Microsoft Guidance to mitigate Microarchitectural Data Sampling vulnerabilities<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0931\">CVE-2019-0931<\/a><\/td><td>Windows Storage Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0885\">CVE-2019-0885<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>NuGet<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0976\">CVE-2019-0976<\/a><\/td><td>NuGet Package Manager Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Servicing Stack Updates<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\">ADV990001<\/a><\/td><td>Latest Servicing Stack Updates<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Skype for Android<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0932\">CVE-2019-0932<\/a><\/td><td>Skype for Android Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0819\">CVE-2019-0819<\/a><\/td><td>Microsoft SQL Server Analysis Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Team Foundation Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0971\">CVE-2019-0971<\/a><\/td><td>Azure DevOps Server and Team Foundation Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Team Foundation Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0979\">CVE-2019-0979<\/a><\/td><td>Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Team Foundation Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0872\">CVE-2019-0872<\/a><\/td><td>Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0725\">CVE-2019-0725<\/a><\/td><td>Windows DHCP Server Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0727\">CVE-2019-0727<\/a><\/td><td>Diagnostic Hub Standard Collector, Visual Studio Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0881\">CVE-2019-0881<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NDIS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0707\">CVE-2019-0707<\/a><\/td><td>Windows NDIS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0708\">CVE-2019-0708<\/a><\/td><td>Remote Desktop Services&nbsp;Remote Code Execution Vulnerabilit<\/td><td><strong>Critical<\/strong><\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>II. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nSe recomienda actualizar los equipos utilizando windows update.<\/p>\n\n\n\n<p>III. Informaci\u00f3n de contacto<br>\n CSIRT PANAMA<br>\n Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\n E-Mail: info@cert.pa<br>\n Phone: +507 520-CERT (2378)<br>\n Web: https:\/\/cert.pa<br>\n Twitter: @CSIRTPanama<br>\n Facebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\n Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2019-05-15 Microsoft publica 79 actualizaciones de seguridad Gravedad: Alta Fecha de publicaci\u00f3n: Marzo 15, 2019 \u00daltima revisi\u00f3n: Marzo 14, 2019 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/e5989c8b-7046-e911-a98e-000d3a33a34d Sistemas Afectados: Adobe Flash Player Microsoft Windows Internet Explorer Microsoft Edge&#8230;<\/p>\n","protected":false},"author":5,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,27,72,9,73,45,94],"class_list":["post-1394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-adobe-flash-player","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1394"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":1396,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1394\/revisions\/1396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}