{"id":5004,"date":"2026-03-12T10:45:57","date_gmt":"2026-03-12T15:45:57","guid":{"rendered":"https:\/\/cert.pa\/?p=5004"},"modified":"2026-03-12T10:46:01","modified_gmt":"2026-03-12T15:46:01","slug":"csirt-panama-aviso-2026-mar-12-actualizaciones-de-seguridad-de-microsoft-para-marzo-2026","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=5004","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2026-Mar-12 Actualizaciones de seguridad de Microsoft para marzo 2026."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2026-Mar-12 Actualizaciones de seguridad de Microsoft para marzo 2026.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: marzo 12, 2026<br>\u00daltima revisi\u00f3n: marzo 12, 2026<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Mar<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET<br>Active Directory Domain Services<br>ASP.NET Core<br>Azure Arc<br>Azure Compute Gallery<br>Azure Entra ID<br>Azure IoT Explorer<br>Azure Linux Virtual Machines<br>Azure MCP Server<br>Azure Portal Windows Admin Center<br>Azure Windows Virtual Machine Agent<br>Broadcast DVR<br>Connected Devices Platform Service (Cdpsvc)<br>GitHub Repo: zero-shot-scfoundation<br>Mariner<br>Microsoft Authenticator<br>Microsoft Brokering File System<br>Microsoft Devices Pricing Program<br>Microsoft Edge (Chromium-based)<br>Microsoft Graphics Component<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office SharePoint<br>Microsoft Semantic Kernel Python SDK<br>Payment Orchestrator Service<br>Push Message Routing Service<br>Role: Windows Hyper-V<br>SQL Server<br>System Center Operations Manager<br>Windows Accessibility Infrastructure (ATBroker.exe)<br>Windows Ancillary Function Driver for WinSock<br>Windows App Installer<br>Windows Authentication Methods<br>Windows Bluetooth RFCOM Protocol Driver<br>Windows Device Association Service<br>Windows DWM Core Library<br>Windows Extensible File Allocation<br>Windows File Server<br>Windows GDI<br>Windows GDI+<br>Windows Kerberos<br>Windows Kernel<br>Windows MapUrlToZone<br>Windows Mobile Broadband<br>Windows NTFS<br>Windows Performance Counters<br>Windows Print Spooler Components<br>Windows Projected File System<br>Windows Resilient File System (ReFS)<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Shell Link Processing<br>Windows SMB Server<br>Windows System Image Manager<br>Windows Telephony Service<br>Windows Universal Disk Format File System Driver (UDFS)<br>Windows Win32K<br>Winlogon<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de marzo de 2026.<br>Este conjunto de actualizaciones remedia 79 fallas y 2 d\u00eda cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26131\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26131<\/a><\/td><td>.NET Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26127\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26127<\/a><\/td><td>.NET Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Domain Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25177<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET Core<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26130\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26130<\/a><\/td><td>ASP.NET Core Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Arc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26141\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26141<\/a><\/td><td>Hybrid Worker Extension (Arc-enabled Windows VMs) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Compute Gallery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23651\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23651<\/a><\/td><td>Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Compute Gallery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26124\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26124<\/a><\/td><td>Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Compute Gallery<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26122\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26122<\/a><\/td><td>Microsoft ACI Confidential Containers Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Azure Entra ID<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26148\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26148<\/a><\/td><td>Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure IoT Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26121\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26121<\/a><\/td><td>Azure IOT Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure IoT Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23662\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23662<\/a><\/td><td>Azure IoT Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure IoT Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23661\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23661<\/a><\/td><td>Azure IoT Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure IoT Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23664\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23664<\/a><\/td><td>Azure IoT Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Linux Virtual Machines<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23665\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23665<\/a><\/td><td>Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure MCP Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26118\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26118<\/a><\/td><td>Azure MCP Server Tools Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Portal Windows Admin Center<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23660\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23660<\/a><\/td><td>Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Windows Virtual Machine Agent<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26117\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26117<\/a><\/td><td>Arc Enabled Servers &#8211; Azure Connected Machine Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Broadcast DVR<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23667\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23667<\/a><\/td><td>Broadcast DVR Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Connected Devices Platform Service (Cdpsvc)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24292\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24292<\/a><\/td><td>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Repo: zero-shot-scfoundation<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23654\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23654<\/a><\/td><td>GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23235\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23235<\/a><\/td><td>f2fs: fix out-of-bounds access in sysfs attribute read\/write<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23234<\/a><\/td><td>f2fs: fix to avoid UAF in f2fs_write_end_io()<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3713\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3713<\/a><\/td><td>pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23237\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23237<\/a><\/td><td>platform\/x86: classmate-laptop: Add missing NULL pointer checks<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26017\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26017<\/a><\/td><td>CoreDNS ACL Bypass<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26018\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26018<\/a><\/td><td>CoreDNS Loop Detection Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-2297\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-2297<\/a><\/td><td>SourcelessFileLoader does not use io.open_code()<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0038\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0038<\/a><\/td><td>In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-27601\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-27601<\/a><\/td><td>Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23236\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23236<\/a><\/td><td>fbdev: smscufx: properly copy ioctl memory to kernelspace<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23865\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23865<\/a><\/td><td>An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR\/VVAR\/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2.<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-71238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-71238<\/a><\/td><td>scsi: qla2xxx: Fix bsg_done() causing double free<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3338<\/a><\/td><td>PKCS7_verify Signature Validation Bypass in AWS-LC<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23231\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23231<\/a><\/td><td>netfilter: nf_tables: fix use-after-free in nf_tables_addchain()<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3381<\/a><\/td><td>Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib<\/td><td>Critical<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0031\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0031<\/a><\/td><td>In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23238<\/a><\/td><td>romfs: check sb_set_blocksize() return value<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3494\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3494<\/a><\/td><td>MariaDB Server Audit Plugin Comment Handling Bypass<\/td><td>Moderate<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3336<\/a><\/td><td>PKCS7_verify Certificate Chain Validation Bypass in AWS-LC<\/td><td>Important<\/td><\/tr><tr><td>Mariner<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-0032\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-0032<\/a><\/td><td>In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Authenticator<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26123\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26123<\/a><\/td><td>Microsoft Authenticator Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Brokering File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25167<\/a><\/td><td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Devices Pricing Program<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21536\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21536<\/a><\/td><td>Microsoft Devices Pricing Program Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3544\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3544<\/a><\/td><td>Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3540\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3540<\/a><\/td><td>Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3536\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3536<\/a><\/td><td>Chromium: CVE-2026-3536 Integer overflow in ANGLE<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3538\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3538<\/a><\/td><td>Chromium: CVE-2026-3538 Integer overflow in Skia<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3545\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3545<\/a><\/td><td>Chromium: CVE-2026-3545 Insufficient data validation in Navigation<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3541\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3541<\/a><\/td><td>Chromium: CVE-2026-3541 Inappropriate implementation in CSS<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3543\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3543<\/a><\/td><td>Chromium: CVE-2026-3543 Inappropriate implementation in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3539\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3539<\/a><\/td><td>Chromium: CVE-2026-3539 Object lifecycle issue in DevTools<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-3542\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-3542<\/a><\/td><td>Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25169<\/a><\/td><td>Windows Graphics Component Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25180\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25180<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25168\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25168<\/a><\/td><td>Windows Graphics Component Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23668\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23668<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26110\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26110<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26113\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26113<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26134\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26134<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26144\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26144<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26109\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26109<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26108\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26108<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26107\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26107<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26112\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26112<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26105\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26105<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26114\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26114<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26106\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26106<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Semantic Kernel Python SDK<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26030\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26030<\/a><\/td><td>GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable<\/td><td>Important<\/td><\/tr><tr><td>Payment Orchestrator Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26125\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26125<\/a><\/td><td>Payment Orchestrator Service Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Push Message Routing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24282\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24282<\/a><\/td><td>Push message Routing Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25170<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-21262\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-21262<\/a><\/td><td>SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26116\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26116<\/a><\/td><td>SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26115\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26115<\/a><\/td><td>SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>System Center Operations Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-20967\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-20967<\/a><\/td><td>System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Accessibility Infrastructure (ATBroker.exe)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25186\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25186<\/a><\/td><td>Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Accessibility Infrastructure (ATBroker.exe)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24291\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24291<\/a><\/td><td>Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25179<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24293\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24293<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25176<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25178<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows App Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23656\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23656<\/a><\/td><td>Windows App Installer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Authentication Methods<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25171\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25171<\/a><\/td><td>Windows Authentication Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth RFCOM Protocol Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23671\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23671<\/a><\/td><td>Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Device Association Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24296\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24296<\/a><\/td><td>Windows Device Association Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Device Association Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24295\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24295<\/a><\/td><td>Windows Device Association Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25189\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25189<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Extensible File Allocation<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25174\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25174<\/a><\/td><td>Windows Extensible File Allocation Table Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24283<\/a><\/td><td>Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25190\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25190<\/a><\/td><td>GDI Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI+<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25181<\/a><\/td><td>GDI+ Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24297\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24297<\/a><\/td><td>Windows Kerberos Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26132\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26132<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24289\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24289<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24287\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24287<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23674\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23674<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24288\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24288<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25175\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25175<\/a><\/td><td>Windows NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Performance Counters<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25165\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25165<\/a><\/td><td>Performance Counters for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23669\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23669<\/a><\/td><td>Windows Print Spooler Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24290\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24290<\/a><\/td><td>Windows Projected File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23673\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23673<\/a><\/td><td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26111\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26111<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25173\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25173<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25172<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell Link Processing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25185\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25185<\/a><\/td><td>Windows Shell Link Processing Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-26128\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-26128<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24294\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24294<\/a><\/td><td>Windows SMB Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows System Image Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25166\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25166<\/a><\/td><td>Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25188\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25188<\/a><\/td><td>Windows Telephony Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Universal Disk Format File System Driver (UDFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-23672\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-23672<\/a><\/td><td>Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-24285\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-24285<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Winlogon<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-25187\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2026-25187<\/a><\/td><td>Winlogon Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2026-Mar-12 Actualizaciones de seguridad de Microsoft para marzo 2026.Gravedad: AltaFecha de publicaci\u00f3n: marzo 12, 2026\u00daltima revisi\u00f3n: marzo 12, 2026https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Mar Sistemas Afectados:.NETActive Directory Domain ServicesASP.NET CoreAzure ArcAzure Compute GalleryAzure Entra IDAzure IoT ExplorerAzure&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,68,45,94],"class_list":["post-5004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5004"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5004\/revisions"}],"predecessor-version":[{"id":5005,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5004\/revisions\/5005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}