{"id":5830,"date":"2020-05-13T02:36:12","date_gmt":"2020-05-13T01:36:12","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5830"},"modified":"2022-06-10T18:20:16","modified_gmt":"2022-06-10T17:20:16","slug":"may-2020-patch-tuesday-update-111-cve-numbers-addressed","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed","title":{"rendered":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed"},"content":{"rendered":"<p>This month\u2019s Patch Tuesday release contains 111 total CVE numbers addressed, with 16 of them listed as \u201cCritical.\u201d Unlike the past few months, there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft. The \u201cCritical\u201d vulnerabilities this month affect Windows operating systems, browsers, SharePoint, and Visual Studio Code.<\/p>\n<h3><b>Operating systems<\/b><\/h3>\n<p>There are five operating system vulnerabilities marked \u201cCritical\u201d this month. Let\u2019s start off with\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1153\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1153<\/a>, since it has a listing of \u201cExploitation More Likely\u201d on older operating systems. This is a\u00a0<b>Graphics Component Remote Code Execution Vulnerability<\/b>\u00a0where a user would have to open a specially crafted file. This would allow the attacker to execute code on the system. For current versions of Windows 10, it is listed as \u201cExploitation Less Likely,\u201d but for Windows 7, 8.1, and Windows Server 2008 and 2012 it has an \u201cExploitation More Likely\u201d rating.<\/p>\n<p>Next up is a\u00a0<b>Windows Media Foundation Memory Corruption Vulnerability<\/b>,\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1028\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1028<\/a>. This vulnerability would require a user to open a crafted document or visit a malicious webpage and would grant the attacker full rights to the system. It affects all versions of Windows 10, as well as Server 2016 up to 2019, including Core versions.<\/p>\n<p>Here is an area we have not seen a vulnerability in for some time\u2014<b>Microsoft Color Management Remote Code Execution Vulnerability\u00a0<\/b>is marked with\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1117\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1117<\/a>. The vulnerability is in how ICM32.dll handles memory. Opening a malicious website would allow the attacker to gain the same rights as the logged-on user, so accounts that do not have administrative rights would be less affected, according to Microsoft.<\/p>\n<p>Finally, we have a pair of\u00a0<b>Media Foundation Memory Corruption<\/b>\u00a0vulnerabilities. Both are rated as \u201cExploitation Less Likely\u201d and require a user to open a malicious document or visit a malicious webpage.\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1126\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1126<\/a>\u00a0affects Windows 10 and Server 2016\/2019, while\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1136\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1136<\/a>\u00a0affects those operating systems, plus Windows 7, 8.1, and Server 2008\/R2 and 2012\/R2<\/p>\n<h3><b>Browsers<\/b><\/h3>\n<p>There are six \u201cCritical\u201d vulnerabilities in browsers, with some of the usual suspects from many of the last Patch Tuesdays as well.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1062\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1062<\/a>\u00a0is an\u00a0<b>Internet Explorer Memory Corruption Vulnerability\u00a0<\/b>that Microsoft lists as \u201cExploitation More Likely.\u201d It requires the users to visit a malicious website or can be served from a malicious advertisement on a legitimate website. It gives the attacker the same rights as the logged-on user. This affects all IE 11 installations, and IE9 on Server 2008<\/p>\n<p>The\u00a0<b>VBScript Remote Code Execution Vulnerability\u00a0<\/b>found in Internet Explorer 11 would be exploited by a user visiting a malicious website, or through an ActiveX control in an Office document. It is listed as\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1093\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1093<\/a><\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1037\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1037<\/a>, affects the Edge-HTML version of Microsoft Edge, and is listed as \u201cExploitation Less Likely.\u201d<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1056\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1056<\/a>\u00a0is a\u00a0<b>Microsoft Edge Elevation of Privilege Vulnerability\u00a0<\/b>that would allow an attacker to elevate privilege across domains if it were exploited by a user visiting a malicious website and is found in Edge-HTML versions of Microsoft Edge.<\/p>\n<p>Another Edge-HTML\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1064\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerability<\/a>\u00a0is the\u00a0<b>Scripting Engine Memory Corruption Vulnerability,\u00a0<\/b>but this one would require the user to be tricked into editing a specially crafted file, which is unlikely for most users.<\/p>\n<p>The\u00a0<b>Scripting Engine Memory Corruption Vulnerability\u00a0<\/b>from\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1065\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1065<\/a>\u00a0would grant the attacker the same rights as the user. This is also in the Edge-HTML version of Microsoft Edge.<\/p>\n<h3><b>Other applications<\/b><\/h3>\n<p>There were four \u201cCritical\u201d vulnerabilities patched for\u00a0<b>SharePoint<\/b>\u00a0this month, affecting slightly different versions, depending on the vulnerability. They are all remote code execution vulnerabilities.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1023\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1023<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1024\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1024<\/a>\u00a0are both Found in SharePoint Enterprise Server 2016, Foundation 2013 SP1, and SharePoint Server 2019. They would require a user who has access to SharePoint to upload a specially crafted application package to the vulnerable server. They are listed as \u201cExploitation Less Likely.\u201d\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1102\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1102<\/a>\u00a0has the same description, but only affects the 2016 and 2019 versions of SharePoint.<\/p>\n<p>The last\u00a0<b>SharePoint<\/b>\u00a0vulnerability requires a bad actor to create and invoke a specially crafted page on a SharePoint server. It is listed as\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1069\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1069<\/a>\u00a0and is rated as \u201cExploitation Less Likely.\u201d<\/p>\n<p>The final \u201cCritical\u201d is a\u00a0<b>Visual Studio Code Python Extension Remote Code Execution Vulnerability\u00a0<\/b>listed as\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1192\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1192<\/a>. It would require a user to open a specially crafted file in Visual Studio Code with the Python extension installed.<\/p>\n<h3><b>Other notable vulnerabilities<\/b><\/h3>\n<p>Microsoft also released fixes for vulnerabilities in PowerBI Report Server and Microsoft Dynamics this month, but they are labeled as \u201cImportant.\u201d<\/p>\n<p>It should be noted that Microsoft also released some \u201cout of band\u201d patches on April 21 for\u00a0<b>Office<\/b>,\u00a0<b>3D Viewer<\/b>, and\u00a0<b>Paint 3D<\/b>\u00a0products. They are covered in<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200004\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0ADV200004<\/a>\u00a0and reference the Autodesk FBX Library, and how it handles 3D content.<\/p>\n<h3><b>Summary<\/b><\/h3>\n<p>With no 0-days or emergencies at time of writing, taking an approach of first patching user-facing devices such as workstations and then servers in your next maintenance\/downtime window is recommended. Then turn focus to SharePoint and Office components. As always, you may note that many of these vulnerabilities reference malicious websites and files that are often delivered through emails. Endpoint protection, web protection, and email protection are the other pillars of a layered security approach that will help mitigate risk until the patches can be approved and deployed.<\/p>\n<p>On another note, there are 26 vulnerabilities fixed this month that apply to devices under an ESU agreement. So, if you are still running Windows 7 and Server 2008, it is recommended that you either purchase an extended security update agreement or make plans to move to a supported operating system.<\/p>\n<p><em>Let\u2019s stay safe out there!<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5830","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able<\/title>\n<meta name=\"description\" content=\"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able\" \/>\n<meta property=\"og:description\" content=\"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-13T01:36:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:20:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed\",\"datePublished\":\"2020-05-13T02:36:12+01:00\",\"dateModified\":\"2022-06-10T17:20:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\"},\"wordCount\":931,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\",\"name\":\"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-05-13T02:36:12+01:00\",\"dateModified\":\"2022-06-10T17:20:16+00:00\",\"description\":\"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","description":"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed","og_locale":"es_ES","og_type":"article","og_title":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","og_description":"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.","og_url":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-13T01:36:12+00:00","article_modified_time":"2022-06-10T17:20:16+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Gill Langston","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed","datePublished":"2020-05-13T02:36:12+01:00","dateModified":"2022-06-10T17:20:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed"},"wordCount":931,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed","url":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed","name":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-05-13T02:36:12+01:00","dateModified":"2022-06-10T17:20:16+00:00","description":"This month\u2019s Patch Tuesday release addresses 111 CVE numbers, with 16 listed as \u201cCritical,\u201d this month there are no vulnerabilities listed as \u201cExploit Detected\u201d by Microsoft.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/may-2020-patch-tuesday-update-111-cve-numbers-addressed#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"May 2020 Patch Tuesday Update: 111 CVE Numbers Addressed"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5830"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5830\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}