{"id":556,"date":"2013-02-14T16:44:28","date_gmt":"2013-02-14T15:44:28","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=556"},"modified":"2013-02-14T16:44:28","modified_gmt":"2013-02-14T15:44:28","slug":"parches-de-microsoft-febrero-de-2013","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2013\/parches-de-microsoft-febrero-de-2013\/","title":{"rendered":"Parches de Microsoft Febrero de 2013"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"CENTER\"><span style=\"color: #000000;\">El segundo martes de <\/span><span style=\"color: #000000;\">Febrero<\/span><span style=\"color: #000000;\">de 201<\/span><span style=\"color: #000000;\">3<\/span><span style=\"color: #000000;\">, Microsoft public\u00f3 <\/span><span style=\"color: #000000;\">12<\/span><span style=\"color: #000000;\"> nuevos boletines de seguridad de los cuales <\/span><span style=\"color: #000000;\">5<\/span><span style=\"color: #000000;\"> ha<\/span><span style=\"color: #000000;\">n<\/span><span style=\"color: #000000;\"> sido catalogado<\/span><span style=\"color: #000000;\">s<\/span><span style=\"color: #000000;\"> como \u201cCr\u00edtico\u201d <\/span><span style=\"color: #000000;\">y <\/span><span style=\"color: #000000;\">7<\/span><span style=\"color: #000000;\"> como \u201cImportante\u201d<\/span><span style=\"color: #000000;\">.<\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/span><\/span><\/span><\/p>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Los <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">12<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"> boletines del mes de <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Febrero<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"> de 201<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">3<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"> son los siguientes:<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>3<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>9<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtico<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><br \/>\n<\/span><\/strong><strong><span style=\"font-size: small;\">Actualizaci\u00f3n de seguridad acumulativa para Internet Explorer<\/span><\/strong><strong><span style=\"font-size: small;\"><br \/>\n<\/span><\/strong><strong><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-009\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/a><\/strong><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>10<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtico<\/b><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en el lenguaje de marcado vectorial podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-010\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>3<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>11<\/b><\/span><strong><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtico<\/b><\/span><\/span><\/strong><span style=\"font-size: small;\"><b>)<\/b><\/span><span style=\"font-size: small;\"><br \/>\n<\/span><span style=\"font-size: small;\">Una vulnerabilidad en la descompresi\u00f3n de medios podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo<\/span><span style=\"font-size: small;\"><br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-011\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>3<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>12<\/b><\/span><strong><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtico<\/b><\/span><\/span><\/strong><span style=\"font-size: small;\"><b>)<\/b><\/span><span style=\"font-size: small;\"><br \/>\n<\/span><span style=\"font-size: small;\">Vulnerabilidades en Microsoft Exchange Server podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo<\/span><span style=\"font-size: small;\"><br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-012\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>3<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>13<\/b><\/span><strong><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><span style=\"font-size: small;\"><b>)<\/b><\/span><span style=\"font-size: small;\"><br \/>\n<\/span><span style=\"font-size: small;\">Vulnerabilidades en el an\u00e1lisis de FAST Search Server 2010 for SharePoint podr\u00edan permitir la ejecuci\u00f3n remota de c\u00f3digo<\/span><span style=\"font-size: small;\"><br \/>\n<a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-013\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>14<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en el servidor NFS podr\u00eda permitir la denegaci\u00f3n de servicio<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-014\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>15<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en .NET Framework podr\u00eda permitir la elevaci\u00f3n de privilegios<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-015\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>16<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Vulnerabilidades en el controlador modo kernel de Windows podr\u00edan permitir la elevaci\u00f3n de privilegios<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-016\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>17<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Vulnerabilidades del kernel de Windows podr\u00edan permitir la elevaci\u00f3n de privilegios<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-017\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>18<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en TCP\/IP podr\u00eda permitir la denegaci\u00f3n de servicio<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-018\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>19<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><span style=\"color: #ff950e;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en el subsistema de tiempo de ejecuci\u00f3n de cliente-servidor (CSRSS) de Windows podr\u00eda permitir la elevaci\u00f3n de privilegios<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-019\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>3<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>20<\/b><\/span><\/span><strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b> (Severidad: <\/b><\/span><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtico<\/b><\/span><\/span><\/strong><span style=\"color: #000000;\"><span style=\"font-size: small;\"><b>)<\/b><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Una vulnerabilidad en la automatizaci\u00f3n OLE podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"><br \/>\n<\/span><\/span><a href=\"http:\/\/technet.microsoft.com\/es-es\/security\/bulletin\/ms13-020\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/span><\/a><span style=\"color: #000000;\"><span style=\"font-size: small;\"><\/p>\n<p><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"LEFT\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">Recomendamos el uso de <\/span><a href=\"http:\/\/update.microsoft.com\/\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><i><span style=\"text-decoration: underline;\">Windows Update<\/span><\/i><\/span><\/span><\/a><span style=\"font-size: small;\"> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<br \/>\n<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"LEFT\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Puede acceder a <i>Windows Update a tr<\/i>av\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/p>\n<p><span style=\"text-decoration: underline;\"><b>Nota<\/b><\/span><b>:<\/b>Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<br \/>\n<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"LEFT\">\n<p align=\"LEFT\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><b>SATINFO<\/b><\/span><\/span><span style=\"font-size: small;\"><b>, <\/b><\/span><span style=\"font-size: small;\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/b><\/span><span style=\"font-size: small;\"><b> 1<\/b><\/span><span style=\"font-size: small;\"><b>4<\/b><\/span><span style=\"font-size: small;\"><b> de <\/b><\/span><span style=\"font-size: small;\"><b>Febrero<\/b><\/span><span style=\"font-size: small;\"><b>de 201<\/b><\/span><span style=\"font-size: small;\"><b>3<\/b><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Febrerode 2013, Microsoft public\u00f3 12 nuevos boletines de seguridad de los cuales 5 han sido catalogados como \u201cCr\u00edtico\u201d y 7 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a <a href='https:\/\/www.satinfo.es\/noticies\/2013\/parches-de-microsoft-febrero-de-2013\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[320,891,892],"tags":[333,32,219,334,335,336,337,338,339,340,341,342,343,344],"class_list":["post-556","post","type-post","status-publish","format-standard","hentry","category-320","category-otros","category-todos","tag-boletines","tag-microsoft","tag-ms12-020","tag-ms13-009","tag-ms13-010","tag-ms13-011","tag-ms13-012","tag-ms13-013","tag-ms13-014","tag-ms13-015","tag-ms13-016","tag-ms13-017","tag-ms13-018","tag-ms13-019","category-320-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/556\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}