{"id":3365,"date":"2023-05-12T08:53:16","date_gmt":"2023-05-12T13:53:16","guid":{"rendered":"https:\/\/cert.pa\/?p=3365"},"modified":"2023-05-12T08:53:16","modified_gmt":"2023-05-12T13:53:16","slug":"csirt-panama-aviso-2023-may-11-actualizaciones-de-seguridad-de-microsoft-para-mayo","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3365","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2023-may-11 Actualizaciones de seguridad de Microsoft para Mayo."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2023-may-11 Actualizaciones de seguridad de Microsoft para Mayo.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: mayo 12, 2023<br>\u00daltima revisi\u00f3n: agosto 11, 2023<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-May<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Microsoft Teams<br>Windows SMB<br>Microsoft Graphics Component<br>Windows NTLM<br>Windows NFS Portmapper<br>Windows Win32K<br>Windows Secure Socket Tunneling Protocol (SSTP)<br>Windows Installer<br>Remote Desktop Client<br>Windows Secure Boot<br>Windows NFS Portmapper<br>Reliable Multicast Transport Driver (RMCAST)<br>Windows Network File System<br>Windows Remote Procedure Call Runtime<br>Reliable Multicast Transport Driver (RMCAST)<br>Microsoft Bluetooth Driver<br>Windows iSCSI Target Service<br>Windows Backup Engine<br>Microsoft Bluetooth Driver<br>Microsoft Bluetooth Driver<br>Windows Kernel<br>Microsoft Office SharePoint<br>Microsoft Office Excel<br>Microsoft Office SharePoint<br>Microsoft Office SharePoint<br>Windows Secure Boot<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows RDP Client<br>Windows MSHTML Platform<br>Windows OLE<br>Microsoft Office Access<br>Microsoft Office Word<br>Windows Win32K<br>Visual Studio Code<br>Microsoft Windows Codecs Library<br>Microsoft Windows Codecs Library<br>SysInternals<br>Microsoft Office<br>Microsoft Edge (Chromium-based)<br>Microsoft Edge (Chromium-based)<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de mayo.<br>Este conjunto de actualizaciones remedia 40 CVEs.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24947\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24947<\/a><\/td><td>Windows Bluetooth Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24948\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24948<\/a><\/td><td>Windows Bluetooth Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24944\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24944<\/a><\/td><td>Windows Bluetooth Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29354\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29354<\/a><\/td><td>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2468\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2468<\/a><\/td><td>Chromium: CVE-2023-2468 Inappropriate implementation in PictureInPicture<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2459\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2459<\/a><\/td><td>Chromium: CVE-2023-2459 Inappropriate implementation in Prompts<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29350\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29350<\/a><\/td><td>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2467\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2467<\/a><\/td><td>Chromium: CVE-2023-2467 Inappropriate implementation in Prompts<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2463\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2463<\/a><\/td><td>Chromium: CVE-2023-2463 Inappropriate implementation in Full Screen Mode<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2462\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2462<\/a><\/td><td>Chromium: CVE-2023-2462 Inappropriate implementation in Prompts<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2460\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2460<\/a><\/td><td>Chromium: CVE-2023-2460 Insufficient validation of untrusted input in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2465\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2465<\/a><\/td><td>Chromium: CVE-2023-2465 Inappropriate implementation in CORS<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2466\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2466<\/a><\/td><td>Chromium: CVE-2023-2466 Inappropriate implementation in Prompts<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-2464\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-2464<\/a><\/td><td>Chromium: CVE-2023-2464 Inappropriate implementation in PictureInPicture<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24899\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24899<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29344<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29333<\/a><\/td><td>Microsoft Access Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24953\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24953<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24955\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24955<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24954<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24950\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24950<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29335\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29335<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Teams<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24881\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24881<\/a><\/td><td>Microsoft Teams Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29340\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29340<\/a><\/td><td>AV1 Video Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29341\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29341<\/a><\/td><td>AV1 Video Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24905\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24905<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SysInternals<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29343\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29343<\/a><\/td><td>SysInternals Sysmon for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29338<\/a><\/td><td>Visual Studio Code Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Backup Engine<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24946\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24946<\/a><\/td><td>Windows Backup Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24904\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24904<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows iSCSI Target Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24945\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24945<\/a><\/td><td>Windows iSCSI Target Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24949\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24949<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-28283<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows MSHTML Platform<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29324\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29324<\/a><\/td><td>Windows MSHTML Platform Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24941\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24941<\/a><\/td><td>Windows Network File System Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows NFS Portmapper<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24901\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24901<\/a><\/td><td>Windows NFS Portmapper Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NFS Portmapper<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24939\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24939<\/a><\/td><td>Server for NFS Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24900\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24900<\/a><\/td><td>Windows NTLM Security Support Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29325\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29325<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows PGM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24940\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24940<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PGM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24943\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24943<\/a><\/td><td>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows RDP Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28290\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-28290<\/a><\/td><td>Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24942\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24942<\/a><\/td><td>Remote Procedure Call Runtime Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-28251\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-28251<\/a><\/td><td>Windows Driver Revocation List Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24932<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Socket Tunneling Protocol (SSTP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24903\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24903<\/a><\/td><td>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24898\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24898<\/a><\/td><td>Windows SMB Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-29336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-29336<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24902\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-24902<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2023-may-11 Actualizaciones de seguridad de Microsoft para Mayo.Gravedad: AltaFecha de publicaci\u00f3n: mayo 12, 2023\u00daltima revisi\u00f3n: agosto 11, 2023https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2023-May Sistemas Afectados:Microsoft TeamsWindows SMBMicrosoft Graphics ComponentWindows NTLMWindows NFS PortmapperWindows Win32KWindows Secure Socket Tunneling Protocol&#8230;<\/p>\n","protected":false},"author":4,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,72,9,73,80,68,45,94],"class_list":["post-3365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3365"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3365\/revisions"}],"predecessor-version":[{"id":3366,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3365\/revisions\/3366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}