{"id":2009,"date":"2020-04-15T12:44:53","date_gmt":"2020-04-15T17:44:53","guid":{"rendered":"https:\/\/cert.pa\/?p=2009"},"modified":"2020-04-15T12:45:59","modified_gmt":"2020-04-15T17:45:59","slug":"csirt-panama-aviso-2020-04-15-actualizaciones-de-microsoft-corriguen-3-dia-cero-y-15-fallas-criticas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2009","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-04-15 Actualizaciones de Microsoft corrigen 3 vulnerabilidades de tipo d\u00eda cero y 15 fallas criticas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-04-15 Actualizaciones de Microsoft corrigen 3 vulnerabilidades de tipo d\u00eda cero y 15 fallas criticas.<br> Gravedad: Alta<br> Fecha de publicaci\u00f3n: abril 15, 2020<br> \u00daltima revisi\u00f3n: abril 14, 2020<br> https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Apr<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based)<br>\nChakraCore<br>\nInternet Explorer<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nWindows Defender<br>\nVisual Studio<br>\nMicrosoft Dynamics<br>\nMicrosoft Apps for Android<br>\nMicrosoft Apps for Mac<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft lanz\u00f3 correcciones para 113 vulnerabilidades en los productos de Microsoft. <br>De estas vulnerabilidades, 15 se clasifican como cr\u00edticas, 93 como importantes, 3 como moderadas y 2 como bajas.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Android App<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0943\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0943<\/a><\/td><td>Microsoft YourPhone Application for Android Authentication Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Apps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1019\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1019<\/a><\/td><td>Microsoft RMS Sharing App for Mac Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1050\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1050<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1018\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1018<\/a><\/td><td>Microsoft Dynamics Business Central\/NAV Information Disclosure<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1049\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1049<\/a><\/td><td>Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1022\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1022<\/a><\/td><td>Dynamics Business Central Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0952\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0952<\/a><\/td><td>Windows GDI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0938<\/a><\/td><td>Adobe Font Manager Library Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0687\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0687<\/a><\/td><td>Microsoft Graphics Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0987\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0987<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1004\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1004<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1005\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1005<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0958\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0958<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0907\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0907<\/a><\/td><td>Microsoft Graphics Components Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0982\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0982<\/a><\/td><td>Microsoft Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0964\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0964<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1020\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1020<\/a><\/td><td>Adobe Font Manager Library Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0784\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0784<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0995\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0995<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0999\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0999<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0988\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0988<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0992\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0992<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0994\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0994<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0953\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0953<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0889\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0889<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0959\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0959<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0960\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0960<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft JET Database Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1008\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1008<\/a><\/td><td>Jet Database Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0979\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0979<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0980\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0980<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0984\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0984<\/a><\/td><td>Microsoft (MAU) Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0760\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0760<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0991\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0991<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0961\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0961<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0931\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0931<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0906\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0906<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0935\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0935<\/a><\/td><td>OneDrive for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0927\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0927<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0923\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0923<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0925\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0925<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0924\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0924<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0932\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0932<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0930\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0930<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0933\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0933<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0920\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0920<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0929\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0929<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0971\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0971<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0975\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0975<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0978\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0978<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0977\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0977<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0976\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0976<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0974\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0974<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0973\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0973<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0972\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0972<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0954<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0926\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0926<\/a><\/td><td>Microsoft Office SharePoint XSS Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0968\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0968<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0966\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0966<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0895\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0895<\/a><\/td><td>Windows VBScript Engine Remote Code Execution Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0969\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0969<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0970\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0970<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0967\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0967<\/a><\/td><td>VBScript Remote Code Execution Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0942\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0942<\/a><\/td><td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0965\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0965<\/a><\/td><td>Microsoft Windows Codecs Library Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0940<\/a><\/td><td>Windows Push Notification Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0934\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0934<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1029\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1029<\/a><\/td><td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1011\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1011<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1094\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1094<\/a><\/td><td>Windows Work Folder Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1016\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1016<\/a><\/td><td>Windows Push Notification Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0794\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0794<\/a><\/td><td>Windows Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1017\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1017<\/a><\/td><td>Windows Push Notification Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0944\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0944<\/a><\/td><td>Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1006\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1006<\/a><\/td><td>Windows Push Notification Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1009\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1009<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0981\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0981<\/a><\/td><td>Windows Token Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1001\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1001<\/a><\/td><td>Windows Push Notification Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0993\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0993<\/a><\/td><td>Windows DNS Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1026\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1026<\/a><\/td><td>MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0919\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0919<\/a><\/td><td>Microsoft Remote Desktop App for Mac Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0899<\/a><\/td><td>Microsoft Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0900\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0900<\/a><\/td><td>Visual Studio Extension Installer Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1002\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1002<\/a><\/td><td>Microsoft Defender Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0835\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0835<\/a><\/td><td>Windows Defender Antimalware Platform Hard Link Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0918\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0918<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0910\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0910<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0917\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0917<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0699\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0699<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1027\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1027<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1003\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1003<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0955<\/a><\/td><td>Windows Kernel Information Disclosure in CPU Memory Access<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1015\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1015<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1000\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1000<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1007\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1007<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0957<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0936<\/a><\/td><td>Windows Scheduled Task Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0956<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0962\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0962<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0821\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0821<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0913\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0913<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0888\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0888<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0948\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0948<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0937\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0937<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0949\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0949<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0939<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0950\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0950<\/a><\/td><td>Media Foundation Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0946<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0947\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0947<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0945\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0945<\/a><\/td><td>Media Foundation Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0996\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0996<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1014\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-1014<\/a><\/td><td>Microsoft Windows Update Client Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0983\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0983<\/a><\/td><td>Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0985\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-0985<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-04-15 Actualizaciones de Microsoft corrigen 3 vulnerabilidades de tipo d\u00eda cero y 15 fallas criticas. Gravedad: Alta Fecha de publicaci\u00f3n: abril 15, 2020 \u00daltima revisi\u00f3n: abril 14, 2020 https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/2020-Apr Sistemas Afectados: Microsoft&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,110,9,73,45,94],"class_list":["post-2009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-boletines-de-seguridad","tag-microsoft","tag-parches","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2009"}],"version-history":[{"count":3,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2009\/revisions"}],"predecessor-version":[{"id":2012,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2009\/revisions\/2012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}