{"id":2418,"date":"2020-11-11T08:54:00","date_gmt":"2020-11-11T13:54:00","guid":{"rendered":"https:\/\/cert.pa\/?p=2418"},"modified":"2020-11-11T08:54:00","modified_gmt":"2020-11-11T13:54:00","slug":"csirt-panama-aviso-2020-11-11-actualizaciones-de-microsoft-corriguen-17-fallas-criticas","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2418","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-11-11 Actualizaciones de Microsoft corriguen 17 fallas criticas."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2020-11-11 Actualizaciones de Microsoft corriguen 17 fallas criticas.<br>\nGravedad: Alta<br>\nFecha de publicaci\u00f3n: noviembre 11, 2020<br>\n\u00daltima revisi\u00f3n: noviembre 10, 2020<br>\nhttps:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2020-Nov<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nMicrosoft Windows<br>\nMicrosoft Office and Microsoft Office Services and Web Apps<br>\nInternet Explorer<br>\nMicrosoft Edge (EdgeHTML-based)<br>\nMicrosoft Edge (Chromium-based)<br>\nChakraCore<br>\nMicrosoft Exchange Server<br>\nMicrosoft Dynamics<br>\nMicrosoft Windows Codecs Library<br>\nAzure Sphere<br>\nWindows Defender<br>\nMicrosoft Teams<br>\nAzure SDK<br>\nAzure DevOps<br>\nVisual Studio<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nCon el lanzamiento de las actualizaciones de seguridad de noviembre de 2020, Microsoft lanz\u00f3 correcciones para 112 vulnerabilidades en los productos de Microsoft. <br>\nDe estas vulnerabilidades, 17 se clasifican como cr\u00edticas, 93 como importantes, 1 como importan y 2 como moderadas.<\/p>\n\n\n\n<p>II. Problemas Conocidos<\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure DevOps<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1325\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-1325<\/a><\/td><td>Azure DevOps Server and Team Foundation Services Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16985\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16985<\/a><\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16986\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16986<\/a><\/td><td>Azure Sphere Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16987\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16987<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16984\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16984<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16981\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16981<\/a><\/td><td>Azure Sphere Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16982\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16982<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16983\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16983<\/a><\/td><td>Azure Sphere Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16988\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16988<\/a><\/td><td>Azure Sphere Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16993\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16993<\/a><\/td><td>Azure Sphere Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16994\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16994<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16970\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16970<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16992\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16992<\/a><\/td><td>Azure Sphere Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16989\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16989<\/a><\/td><td>Azure Sphere Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16990\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16990<\/a><\/td><td>Azure Sphere Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16991\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16991<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17088\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17088<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Browsers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17058\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17058<\/a><\/td><td>Microsoft Browser Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17005\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17005<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17018\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17018<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17021\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17021<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17006\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17006<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17083\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17083<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17085\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17085<\/a><\/td><td>Microsoft Exchange Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17084\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17084<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16998\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16998<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17029\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17029<\/a><\/td><td>Windows Canonical Display Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17004\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17004<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17038\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17038<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17068\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17068<\/a><\/td><td>Windows GDI+ Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17065\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17065<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17064\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17064<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17066\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17066<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17019\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17019<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17067\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17067<\/a><\/td><td>Microsoft Excel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17062\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17062<\/a><\/td><td>Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17063\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17063<\/a><\/td><td>Microsoft Office Online Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17020\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17020<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17016\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17016<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16979\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16979<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17015\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17015<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17017\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17017<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17061\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17061<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17060\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17060<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17048\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17048<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17053\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17053<\/a><\/td><td>Internet Explorer Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17052\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17052<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17054\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17054<\/a><\/td><td>Chakra Scripting Engine Memory Corruption Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Teams<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17091\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17091<\/a><\/td><td>Microsoft Teams Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17032\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17032<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17033\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17033<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17026\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17026<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17031\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17031<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17027\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17027<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17030\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17030<\/a><\/td><td>Windows MSCTF Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17028\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17028<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17044\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17044<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17045\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17045<\/a><\/td><td>Windows KernelStream Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17046\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17046<\/a><\/td><td>Windows Error Reporting Denial of Service Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17043\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17043<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17042\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17042<\/a><\/td><td>Windows Print Spooler Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17041\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17041<\/a><\/td><td>Windows Print Configuration Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17034\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17034<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17049\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17049<\/a><\/td><td>Kerberos Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17051\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17051<\/a><\/td><td>Windows Network File System Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17040\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17040<\/a><\/td><td>Windows Hyper-V Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17047\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17047<\/a><\/td><td>Windows Network File System Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17036\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17036<\/a><\/td><td>Windows Function Discovery SSDP Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17000\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17000<\/a><\/td><td>Remote Desktop Protocol Client Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1599\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-1599<\/a><\/td><td>Windows Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16997\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16997<\/a><\/td><td>Remote Desktop Protocol Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17001\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17001<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17057\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17057<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17056\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17056<\/a><\/td><td>Windows Network File System Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17055\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17055<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17010\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17010<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17007\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17007<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17014\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17014<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17025\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17025<\/a><\/td><td>Windows Remote Access Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17024\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17024<\/a><\/td><td>Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17013\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17013<\/a><\/td><td>Win32k Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17011\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17011<\/a><\/td><td>Windows Port Class Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17012\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17012<\/a><\/td><td>Windows Bind Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17106\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17106<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17101\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17101<\/a><\/td><td>HEIF Image Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17105\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17105<\/a><\/td><td>AV1 Video Extension Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17102\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17102<\/a><\/td><td>WebP Image Extensions Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17082\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17082<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17086\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17086<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17081\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17081<\/a><\/td><td>Microsoft Raw Image Extension Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17079\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17079<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17078\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17078<\/a><\/td><td>Raw Image Extension Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17107\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17107<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17110\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17110<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17113\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17113<\/a><\/td><td>Windows Camera Codec Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17108\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17108<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17109\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17109<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17104\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17104<\/a><\/td><td>Visual Studio Code JSHint Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17100\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17100<\/a><\/td><td>Visual Studio Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17090\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17090<\/a><\/td><td>Microsoft Defender for Endpoint Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17035\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17035<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17087\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17087<\/a><\/td><td>Windows Kernel Local Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NDIS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17069\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17069<\/a><\/td><td>Windows NDIS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17074\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17074<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17073\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17073<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17071\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17071<\/a><\/td><td>Windows Delivery Optimization Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17075\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17075<\/a><\/td><td>Windows USO Core Worker Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17070\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17070<\/a><\/td><td>Windows Update Medic Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17077\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17077<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17076\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17076<\/a><\/td><td>Windows Update Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16999\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-16999<\/a><\/td><td>Windows WalletService Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17037\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-17037<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2020-11-11 Actualizaciones de Microsoft corriguen 17 fallas criticas. Gravedad: Alta Fecha de publicaci\u00f3n: noviembre 11, 2020 \u00daltima revisi\u00f3n: noviembre 10, 2020 https:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2020-Nov Sistemas Afectados: Microsoft Windows Microsoft Office and Microsoft Office Services&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,9,98,45,94],"class_list":["post-2418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-patch-tuesday","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2418"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2418\/revisions"}],"predecessor-version":[{"id":2419,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2418\/revisions\/2419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}