{"id":1515,"date":"2019-10-11T15:12:28","date_gmt":"2019-10-11T20:12:28","guid":{"rendered":"https:\/\/cert.pa\/?p=1515"},"modified":"2019-10-11T15:12:28","modified_gmt":"2019-10-11T20:12:28","slug":"csirt-panama-aviso-2019-10-11-microsoft-libera-sus-actualizaciones-de-seguridad-para-octubre","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1515","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2019-10-11 Microsoft Libera sus actualizaciones de seguridad para Octubre"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2019-10-11 Microsoft Libera sus actualizaciones de seguridad para Octubre<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Octubre 11, 2019<br>\n\u00daltima revisi\u00f3n: Agosto 10, 2019<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/28ef0a64-489c-e911-a994-000d3a33c573<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nInternet Explorer<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nChakraCore<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nSQL Server Management Studio<br>\nOpen Source Software<br>\nMicrosoft Dynamics 365<br>\nWindows Update Assistant<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft public\u00f3 las siguientes actualizaciones de seguridad correspondientes este mes.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1372<\/a><\/td><td>Azure App Service Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1371<\/a><\/td><td>Internet Explorer Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0608\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-0608<\/a><\/td><td>Microsoft Browser Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1357\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1357<\/a><\/td><td>Microsoft Browser Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Devices<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1314\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1314<\/a><\/td><td>Windows 10 Mobile Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1375\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1375<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1356\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1356<\/a><\/td><td>Microsoft Edge based on Edge HTML Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1361\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1361<\/a><\/td><td>Microsoft Graphics Components Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1362\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1362<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1364\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1364<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1363\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1363<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1358\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1358<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1359<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1331<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1327\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1327<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1330\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1330<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1329\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1329<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1328\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1328<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1070<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1366<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1060\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1060<\/a><\/td><td>MS XML Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1307\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1307<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1308\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1308<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1335\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1335<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1239\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1239<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1238<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1325\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1325<\/a><\/td><td>Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1340\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1340<\/a><\/td><td>Microsoft Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1338<\/a><\/td><td>Windows NTLM Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1339\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1339<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1316\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1316<\/a><\/td><td>Microsoft Windows Setup Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1342\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1342<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1311\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1311<\/a><\/td><td>Windows Imaging API Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1344<\/a><\/td><td>Windows Code Integrity Module Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1347\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1347<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1315\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1315<\/a><\/td><td>Windows Error Reporting Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1346\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1346<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1317\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1317<\/a><\/td><td>Microsoft Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1321\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1321<\/a><\/td><td>Microsoft Windows CloudStore Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1322\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1322<\/a><\/td><td>Microsoft Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1341\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1341<\/a><\/td><td>Windows Power Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1319\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1319<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1318\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1318<\/a><\/td><td>Microsoft Windows Transport Layer Security Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1320\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1320<\/a><\/td><td>Microsoft Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1369<\/a><\/td><td>Open Enclave SDK Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Secure Boot<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1368<\/a><\/td><td>Windows Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Servicing Stack Updates<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\" rel=\"noreferrer noopener\" target=\"_blank\">ADV990001<\/a><\/td><td>Latest Servicing Stack Updates<\/td><td>Critical<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1376<\/a><\/td><td>SQL Server Management Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1313\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1313<\/a><\/td><td>SQL Server Management Studio Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1230\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1230<\/a><\/td><td>Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows IIS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1365\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1365<\/a><\/td><td>Microsoft IIS Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1343\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1343<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1334\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1334<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1345\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1345<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1166\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1166<\/a><\/td><td>Windows NTLM Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1326\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1326<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1333<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1323\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1323<\/a><\/td><td>Microsoft Windows Update Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1337\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1337<\/a><\/td><td>Windows Update Client Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2019-1336<\/a><\/td><td>Microsoft Windows Update Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Windows Update<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2019-10-11 Microsoft Libera sus actualizaciones de seguridad para Octubre Gravedad: Alta Fecha de publicaci\u00f3n: Octubre 11, 2019 \u00daltima revisi\u00f3n: Agosto 10, 2019 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/28ef0a64-489c-e911-a994-000d3a33c573 Sistemas Afectados: Microsoft Windows Internet Explorer Microsoft Edge (EdgeHTML-based)&#8230;<\/p>\n","protected":false},"author":4,"featured_media":414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[8,72,9],"class_list":["post-1515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos","tag-avisos-de-seguridad","tag-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1515"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1515\/revisions"}],"predecessor-version":[{"id":1516,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1515\/revisions\/1516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}