{"id":1916,"date":"2020-03-12T08:43:51","date_gmt":"2020-03-12T13:43:51","guid":{"rendered":"https:\/\/cert.pa\/?p=1916"},"modified":"2020-03-12T08:43:51","modified_gmt":"2020-03-12T13:43:51","slug":"csirt-panama-aviso-2020-03-12-microsoft-libera-actualizaciones-que-corrige-115-fallas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1916","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-03-12 Microsoft libera actualizaciones que corrige 115 fallas"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-03-12 Microsoft libera actualizaciones que corrige 115 fallas<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: Marzo 12, 2020<br>\n\u00daltima revisi\u00f3n: Marzo 11, 2020<br>\nhttps:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Mar<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based)<br>\nChakraCore<br>\nInternet Explorer<br>\nMicrosoft Exchange Server<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nAzure DevOps<br>\nWindows Defender<br>\nVisual Studio<br>\nOpen Source Software<br>\nAzure<br>\nMicrosoft Dynamics<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft libera sus actualizaciones que corrigen 115 fallas en su sistema operativo. Estas actualizaciones corresponden al mes de Febrero del 2020.<\/p>\n\n\n\n<p>II. Impacto<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0902\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0902<\/a><\/td><td>Service Fabric Elevation of Privilege<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0758\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0758<\/a><\/td><td>Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0815\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0815<\/a><\/td><td>Azure DevOps Server and Team Foundation Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0700\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0700<\/a><\/td><td>Azure DevOps Server Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0824\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0824<\/a><\/td><td>Internet Explorer Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0768\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0768<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0905\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0905<\/a><\/td><td>Dynamics Business Central Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0816\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0816<\/a><\/td><td>Microsoft Edge Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0903\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0903<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0774\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0774<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0788\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0788<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0791\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0791<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0690\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0690<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0853\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0853<\/a><\/td><td>Windows Imaging Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0877\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0877<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0882\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0882<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0883\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0883<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0881\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0881<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0880\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0880<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0887\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0887<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0898\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0898<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0885\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0885<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0850\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0850<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0852\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0852<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0892\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0892<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0851\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0851<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0855\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0855<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0795\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0795<\/a><\/td><td>Microsoft SharePoint Reflective XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0891\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0891<\/a><\/td><td>Microsoft SharePoint Reflective XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0893\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0893<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0894\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0894<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0830\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0830<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0829\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0829<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0813\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0813<\/a><\/td><td>Scripting Engine Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0826\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0826<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0827\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0827<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0825\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0825<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0831\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0831<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0847\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0847<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0811\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0811<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0828\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0828<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0848\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0848<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0823\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0823<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0832\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0832<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0812\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0812<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0833\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0833<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0897\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0897<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0896\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0896<\/a><\/td><td>Windows Hard Link Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0871\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0871<\/a><\/td><td>Windows Network Connections Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0874\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0874<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0876<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0775\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0775<\/a><\/td><td>Windows Error Reporting Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0879\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0879<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0793\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0793<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0776\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0776<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0869\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0869<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0861<\/a><\/td><td>Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0863<\/a><\/td><td>Connected User Experiences and Telemetry Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0860\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0860<\/a><\/td><td>Windows ActiveX Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0857\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0857<\/a><\/td><td>Windows Search Indexer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0858\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0858<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0865<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0866\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0866<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0864\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0864<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0820\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0820<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0819\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0819<\/a><\/td><td>Windows Device Setup Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0804<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0779\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0779<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0802\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0802<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0803<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0778\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0778<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0809\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0809<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0810\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0810<\/a><\/td><td>Diagnostic Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0807\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0807<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0808\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0808<\/a><\/td><td>Provisioning Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0797\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0797<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0785\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0785<\/a><\/td><td>Windows User Profile Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0786\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0786<\/a><\/td><td>Windows Tile Object Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0787\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0787<\/a><\/td><td>Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0783\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0783<\/a><\/td><td>Windows UPnP Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0800\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0800<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0801\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0801<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0781\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0781<\/a><\/td><td>Windows UPnP Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0780\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0780<\/a><\/td><td>Windows Network List Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0777\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0777<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0772\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0772<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0849\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0849<\/a><\/td><td>Windows Hard Link Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0845\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0845<\/a><\/td><td>Windows Network Connections Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0684\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0684<\/a><\/td><td>LNK Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0769\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0769<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0771\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0771<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0841\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0841<\/a><\/td><td>Windows Hard Link Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0840\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0840<\/a><\/td><td>Windows Hard Link Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0806\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0806<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0843\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0843<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0844\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0844<\/a><\/td><td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0842\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0842<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0872\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0872<\/a><\/td><td>Remote Code Execution Vulnerability in Application Inspector<\/td><td>Important<\/td><\/tr><tr><td>Other<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0765\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0765<\/a><\/td><td>Remote Desktop Connection Manager Information Disclosure Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0789\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0789<\/a><\/td><td>Visual Studio Extension Installer Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0884\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0884<\/a><\/td><td>Microsoft Visual Studio Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0763\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0763<\/a><\/td><td>Windows Defender Security Center Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0762\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0762<\/a><\/td><td>Windows Defender Security Center Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0854\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0854<\/a><\/td><td>Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows IIS<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0645\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0645<\/a><\/td><td>Microsoft IIS Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0814\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0814<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0773\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0773<\/a><\/td><td>Windows ActiveX Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0770\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0770<\/a><\/td><td>Windows ActiveX Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0822\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0822<\/a><\/td><td>Windows Language Pack Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0859\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0859<\/a><\/td><td>Windows Modules Installer Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0868\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0868<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0798\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0798<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0867\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0867<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0834\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0834<\/a><\/td><td>Windows ALPC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0799\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0799<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nSe recomienda actualizar el sistema operativo utilizando Windows Update.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-03-12 Microsoft libera actualizaciones que corrige 115 fallas Gravedad: Alta Fecha de publicaci\u00f3n: Marzo 12, 2020 \u00daltima revisi\u00f3n: Marzo 11, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Mar Sistemas Afectados: Microsoft Windows Microsoft Edge (EdgeHTML-based) Microsoft Edge (Chromium-based)&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,110,9,98,94],"class_list":["post-1916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-boletines-de-seguridad","tag-microsoft","tag-patch-tuesday","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1916"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1916\/revisions"}],"predecessor-version":[{"id":1917,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1916\/revisions\/1917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}