{"id":2743,"date":"2021-06-10T09:29:54","date_gmt":"2021-06-10T14:29:54","guid":{"rendered":"https:\/\/cert.pa\/?p=2743"},"modified":"2021-06-10T09:30:20","modified_gmt":"2021-06-10T14:30:20","slug":"csirt-panama-aviso-2021-jun-10-actualizaciones-de-microsoft-corrigen-50-fallas-y-7-dia-cero","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2743","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-jun-10 Actualizaciones de Microsoft corrigen 50 fallas y 7 d\u00eda-cero"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2021-jun-10 Actualizaciones de Microsoft corrigen 50 fallas y7 d\u00eda-cero explotados.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: junio 10, 2021<br>\u00daltima revisi\u00f3n: junio 10, 2021<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Jun<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET Core &amp; Visual Studio<br>3D Viewer<br>Microsoft DWM Core Library<br>Microsoft Intune<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office Outlook<br>Microsoft Office SharePoint<br>Microsoft Scripting Engine<br>Microsoft Windows Codecs Library<br>Paint 3D<br>Role: Hyper-V<br>Visual Studio Code &#8211; Kubernetes Tools<br>Windows Bind Filter Driver<br>Windows Common Log File System Driver<br>Windows Cryptographic Services<br>Windows DCOM Server<br>Windows Defender<br>Windows Drivers<br>Windows Event Logging Service<br>Windows Filter Manager<br>Windows HTML Platform<br>Windows Installer<br>Windows Kerberos<br>Windows Kernel<br>Windows Kernel-Mode Drivers<br>Windows Network File System<br>Windows NTFS<br>Windows NTLM<br>Windows Print Spooler Components<br>Windows Remote Desktop<br>Windows TCP\/IP<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha publicado actualizaciones de seguridad para solucionar varias vulnerabilidades que afectan a productos de Microsoft.<\/p>\n\n\n\n<p>II. Detalle<br>Con la actualizaci\u00f3n de hoy, Microsoft ha corregido 50 vulnerabilidades y 7 catalogadas como de dia cero.<\/p>\n\n\n\n<figure id=\"tableOfContents\" class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Core &amp; Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31957\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31957<\/a><\/td><td>.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31942\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31942<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31943\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31943<\/a><\/td><td>3D Viewer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>3D Viewer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31944\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31944<\/a><\/td><td>3D Viewer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft DWM Core Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-33739\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-33739<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-33741\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-33741<\/a><\/td><td>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Intune<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31980\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31980<\/a><\/td><td>Microsoft Intune Management Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31940<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31941<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31939<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31949\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31949<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31964\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31964<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31963\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31963<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31950\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31950<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31948\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31948<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31966\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31966<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31965\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31965<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26420<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Scripting Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31959\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31959<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31967\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31967<\/a><\/td><td>VP9 Video Extensions Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Paint 3D<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31946<\/a><\/td><td>Paint 3D Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Paint 3D<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31983\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31983<\/a><\/td><td>Paint 3D Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Paint 3D<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31945\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31945<\/a><\/td><td>Paint 3D Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31977\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31977<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code &#8211; Kubernetes Tools<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31938\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31938<\/a><\/td><td>Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bind Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31960\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31960<\/a><\/td><td>Windows Bind Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31954<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31201\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31201<\/a><\/td><td>Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31199\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31199<\/a><\/td><td>Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DCOM Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26414<\/a><\/td><td>Windows DCOM Server Security Feature Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31978\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31978<\/a><\/td><td>Microsoft Defender Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31985\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31985<\/a><\/td><td>Microsoft Defender Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Drivers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31969\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31969<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Logging Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31972\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31972<\/a><\/td><td>Event Tracing for Windows Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Filter Manager<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31953\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31953<\/a><\/td><td>Windows Filter Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTML Platform<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31971\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31971<\/a><\/td><td>Windows HTML Platform Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31973\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31973<\/a><\/td><td>Windows GPSVC Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31962\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31962<\/a><\/td><td>Kerberos AppContainer Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31951\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31951<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31955<\/a><\/td><td>Windows Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31952\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31952<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MSHTML Platform<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-33742\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-33742<\/a><\/td><td>Windows MSHTML Platform Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Network File System<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31975\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31975<\/a><\/td><td>Server for NFS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network File System<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31974\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31974<\/a><\/td><td>Server for NFS Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network File System<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31976\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31976<\/a><\/td><td>Server for NFS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31956\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31956<\/a><\/td><td>Windows NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31958\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31958<\/a><\/td><td>Windows NTLM Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1675\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-1675<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31968\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31968<\/a><\/td><td>Windows Remote Desktop Services Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31970\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31970<\/a><\/td><td>Windows TCP\/IP Driver Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2021-jun-10 Actualizaciones de Microsoft corrigen 50 fallas y7 d\u00eda-cero explotados.Gravedad: AltaFecha de publicaci\u00f3n: junio 10, 2021\u00daltima revisi\u00f3n: junio 10, 2021https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2021-Jun Sistemas Afectados:.NET Core &amp; Visual Studio3D ViewerMicrosoft DWM Core LibraryMicrosoft IntuneMicrosoft OfficeMicrosoft&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,110,9,94],"class_list":["post-2743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-boletines-de-seguridad","tag-microsoft","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2743"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2743\/revisions"}],"predecessor-version":[{"id":2745,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2743\/revisions\/2745"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}