{"id":2620,"date":"2021-03-10T14:47:46","date_gmt":"2021-03-10T19:47:46","guid":{"rendered":"https:\/\/cert.pa\/?p=2620"},"modified":"2021-03-10T14:47:46","modified_gmt":"2021-03-10T19:47:46","slug":"csirt-panama-aviso-2021-mar-10-actualizaciones-de-microsoft-corrigen-82-fallas-y-2-dia-zero","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2620","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-mar-10 Actualizaciones de Microsoft corrigen 82 fallas y 2 dia-zero."},"content":{"rendered":"\n<p><br> Gravedad: Alta<br> Fecha de publicaci\u00f3n: marzo 10, 2021<br> \u00daltima revisi\u00f3n: marzo 10, 2021<br> https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Mar<\/p>\n\n\n\n<p>Sistemas Afectados:<br>\nApplication Virtualization<br>\nAzure<br>\nAzure DevOps<br>\nAzure Sphere<br>\nInternet Explorer<br>\nMicrosoft ActiveX<br>\nMicrosoft Exchange Server<br>\nMicrosoft Edge (Chromium-based)<br>\nMicrosoft Graphics Component<br>\nMicrosoft Office<br>\nMicrosoft Office Excel<br>\nMicrosoft Office PowerPoint<br>\nMicrosoft Office SharePoint<br>\nMicrosoft Office Visio<br>\nMicrosoft Windows Codecs Library<br>\nPower BI<br>\nRole: DNS Server<br>\nRole: Hyper-V<br>\nVisual Studio<br>\nVisual Studio Code<br>\nWindows Admin Center<br>\nWindows Container Execution Agent<br>\nWindows DirectX<br>\nWindows Error Reporting<br>\nWindows Event Tracing<br>\nWindows Extensible Firmware Interface<br>\nWindows Folder Redirection<br>\nWindows Installer<br>\nWindows Media<br>\nWindows Overlay Filter<br>\nWindows Print Spooler Components<br>\nWindows Projected File System Filter Driver<br>\nWindows Registry<br>\nWindows Remote Access API<br>\nWindows Storage Spaces Controller<br>\nWindows Update Assistant<br>\nWindows Update Stack<br>\nWindows UPnP Device Host<br>\nWindows User Profile Service<br>\nWindows WalletService<br>\nWindows Win32K<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nMicrosoft ha publicado actualizaciones de seguridad para solucionar varias vulnerabilidades que afectan a productos de Microsoft. <\/p>\n\n\n\n<p>II. Detalle<br>\nCon la actualizaci\u00f3n de hoy, Microsoft ha corregido 82 vulnerabilidades, 10 clasificadas como cr\u00edticas y 72 como importantes. <\/p>\n\n\n\n<table class=\"wp-block-table\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Application Virtualization<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26890\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26890<\/a><\/td><td>Application Virtualization Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27075\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27075<\/a><\/td><td>Azure Virtual Machine Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27074<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Sphere<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27080\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27080<\/a><\/td><td>Azure Sphere Unsigned Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27085\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27085<\/a><\/td><td>Internet Explorer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26411\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26411<\/a><\/td><td>Internet Explorer Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft ActiveX<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26869\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26869<\/a><\/td><td>Windows ActiveX Installer Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21173\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21173<\/a><\/td><td>Chromium CVE-2021-21173: Side-channel information leakage in Network Internals<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21172<\/a><\/td><td>Chromium CVE-2021-21172: Insufficient policy enforcement in File System API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21169<\/a><\/td><td>Chromium CVE-2021-21169: Out of bounds memory access in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21170<\/a><\/td><td>Chromium CVE-2021-21170: Incorrect security UI in Loader<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21171\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21171<\/a><\/td><td>Chromium CVE-2021-21171: Incorrect security UI in TabStrip and Navigation<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21175\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21175<\/a><\/td><td>Chromium CVE-2021-21175: Inappropriate implementation in Site isolation<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21176<\/a><\/td><td>Chromium CVE-2021-21176: Inappropriate implementation in full screen mode<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21177<\/a><\/td><td>Chromium CVE-2021-21177: Insufficient policy enforcement in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21174\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21174<\/a><\/td><td>Chromium CVE-2021-21174: Inappropriate implementation in Referrer<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21178<\/a><\/td><td>Chromium CVE-2021-21178 : Inappropriate implementation in Compositing<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21161\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21161<\/a><\/td><td>Chromium CVE-2021-21161: Heap buffer overflow in TabStrip<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21162\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21162<\/a><\/td><td>Chromium CVE-2021-21162: Use after free in WebRTC<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21160\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21160<\/a><\/td><td>Chromium CVE-2021-21160: Heap buffer overflow in WebAudio<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-27844\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-27844<\/a><\/td><td>Chromium CVE-2020-27844: Heap buffer overflow in OpenJPEG<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21159\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21159<\/a><\/td><td>Chromium CVE-2021-21159: Heap buffer overflow in TabStrip<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21163\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21163<\/a><\/td><td>Chromium CVE-2021-21163: Insufficient data validation in Reader Mode<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21167<\/a><\/td><td>Chromium CVE-2021-21167: Use after free in bookmarks<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21168\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21168<\/a><\/td><td>Chromium CVE-2021-21168: Insufficient policy enforcement in appcache<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21166\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21166<\/a><\/td><td>Chromium CVE-2021-21166: Object lifecycle issue in audio<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21164\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21164<\/a><\/td><td>Chromium CVE-2021-21164: Insufficient data validation in Chrome for iOS<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21165\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21165<\/a><\/td><td>Chromium CVE-2021-21165: Object lifecycle issue in audio<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21189\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21189<\/a><\/td><td>Chromium CVE-2021-21189: Insufficient policy enforcement in payments<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21181<\/a><\/td><td>Chromium CVE-2021-21181: Side-channel information leakage in autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21186\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21186<\/a><\/td><td>Chromium CVE-2021-21186: Insufficient policy enforcement in QR scanning<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21190\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21190<\/a><\/td><td>Chromium CVE-2021-21190 : Uninitialized Use in PDFium<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21183\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21183<\/a><\/td><td>Chromium CVE-2021-21183: Inappropriate implementation in performance APIs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21185\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21185<\/a><\/td><td>Chromium CVE-2021-21185: Insufficient policy enforcement in extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21187\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21187<\/a><\/td><td>Chromium CVE-2021-21187: Insufficient data validation in URL formatting<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21182\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21182<\/a><\/td><td>Chromium CVE-2021-21182: Insufficient policy enforcement in navigations<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21180\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21180<\/a><\/td><td>Chromium CVE-2021-21180: Use after free in tab search<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21184\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21184<\/a><\/td><td>Chromium CVE-2021-21184: Inappropriate implementation in performance APIs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21179<\/a><\/td><td>Chromium CVE-2021-21179: Use after free in Network Internals<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge on Chromium<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21188\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21188<\/a><\/td><td>Chromium CVE-2021-21188: Use after free in Blink<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26412\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26412<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27065\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27065<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27078\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27078<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26854\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26854<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26857\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26857<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26855\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26855<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26858\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26858<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26863\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26863<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27077\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27077<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26861\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26861<\/a><\/td><td>Windows Graphics Component Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26876\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26876<\/a><\/td><td>OpenType Font Parsing Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26875\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26875<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26868\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26868<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24108\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24108<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27058\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27058<\/a><\/td><td>Microsoft Office ClickToRun Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27059\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27059<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27053\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27053<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27054\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27054<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27057\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27057<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office PowerPoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27056\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27056<\/a><\/td><td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27052\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27052<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24104\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24104<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27076\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27076<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27055\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27055<\/a><\/td><td>Microsoft Visio Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27050\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27050<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27049\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27049<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26884\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26884<\/a><\/td><td>Windows Media Photo Codec Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27051\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27051<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27062\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27062<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24110\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24110<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24089\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24089<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27061\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27061<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27048\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27048<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27047\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27047<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26902\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26902<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Power BI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26859\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26859<\/a><\/td><td>Microsoft Power BI Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27063\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27063<\/a><\/td><td>Windows DNS Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26893\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26893<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26897\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26897<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26894\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26894<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26895\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26895<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26896\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26896<\/a><\/td><td>Windows DNS Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26877\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26877<\/a><\/td><td>Windows DNS Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26867\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26867<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Role: Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26879\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26879<\/a><\/td><td>Windows NAT Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27084\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27084<\/a><\/td><td>Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-21300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-21300<\/a><\/td><td>Git for Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27060\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27060<\/a><\/td><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27081\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27081<\/a><\/td><td>Visual Studio Code ESLint Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27083\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27083<\/a><\/td><td>Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27082\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27082<\/a><\/td><td>Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Admin Center<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27066\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27066<\/a><\/td><td>Windows Admin Center Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Execution Agent<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26891\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26891<\/a><\/td><td>Windows Container Execution Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Execution Agent<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26865<\/a><\/td><td>Windows Container Execution Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24095\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24095<\/a><\/td><td>DirectX Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Error Reporting<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24090\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24090<\/a><\/td><td>Windows Error Reporting Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-24107\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-24107<\/a><\/td><td>Windows Event Tracing Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26872\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26872<\/a><\/td><td>Windows Event Tracing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26901\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26901<\/a><\/td><td>Windows Event Tracing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26898\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26898<\/a><\/td><td>Windows Event Tracing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Extensible Firmware Interface<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26892\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26892<\/a><\/td><td>Windows Extensible Firmware Interface Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Folder Redirection<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26887\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26887<\/a><\/td><td>Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26862\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26862<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26881\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26881<\/a><\/td><td>Microsoft Windows Media Foundation Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Overlay Filter<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26874\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26874<\/a><\/td><td>Windows Overlay Filter Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Overlay Filter<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26860\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26860<\/a><\/td><td>Windows App-V Overlay Filter Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1640\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1640<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26878\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26878<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26870\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26870<\/a><\/td><td>Windows Projected File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Registry<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26864\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26864<\/a><\/td><td>Windows Virtual Registry Provider Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Access API<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26882\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26882<\/a><\/td><td>Remote Access API Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Spaces Controller<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26880\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26880<\/a><\/td><td>Storage Spaces Controller Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Assistant<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27070<\/a><\/td><td>Windows 10 Update Assistant Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1729\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1729<\/a><\/td><td>Windows Update Stack Setup Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26889\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26889<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26866\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26866<\/a><\/td><td>Windows Update Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows UPnP Device Host<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26899<\/a><\/td><td>Windows UPnP Device Host Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows User Profile Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26873\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26873<\/a><\/td><td>Windows User Profile Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows User Profile Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26886\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26886<\/a><\/td><td>User Profile Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26871\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26871<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26885\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26885<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26900\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26900<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>\nActualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Alta Fecha de publicaci\u00f3n: marzo 10, 2021 \u00daltima revisi\u00f3n: marzo 10, 2021 https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Mar Sistemas Afectados: Application Virtualization Azure Azure DevOps Azure Sphere Internet Explorer Microsoft ActiveX Microsoft Exchange Server Microsoft Edge (Chromium-based) Microsoft Graphics&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,110,98,94],"class_list":["post-2620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-boletines-de-seguridad","tag-patch-tuesday","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2620"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2620\/revisions"}],"predecessor-version":[{"id":2621,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2620\/revisions\/2621"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}