{"id":52303,"date":"2023-03-15T01:11:59","date_gmt":"2023-03-15T01:11:59","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/"},"modified":"2023-03-15T01:14:21","modified_gmt":"2023-03-15T01:14:21","slug":"microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/","title":{"rendered":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<\/p>\n<div id=\"body\">\n<p><span class=\"label\">Patch Tuesday<\/span> Microsoft&#8217;s March Patch Tuesday consists of new fixes for 74 bugs, two of that are already being actively exploited, and 9 which are rated crucial. Let&#8217;s begin with the 2 that miscreants discovered earlier than Redmond issued a repair.<\/p>\n<p>First up: prioritize patching <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23397\">CVE-2023-23397<\/a>, a privilege elevation bug in Microsoft Outlook that obtained a 9.8 out of 10 CVSS ranking. Whereas particulars of the opening have not been publicly disclosed, it has already been exploited within the wild, and Microsoft lists its assault complexity as &#8220;low.&#8221;<\/p>\n<p>Redmond is sufficiently anxious about this one to have <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/blog\/2023\/03\/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability\/\">published<\/a> a information to the bug, and supplied documentation and a script to find out if your small business has been focused by criminals attempting to use this vulnerability. In different phrases: it is severe.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n        <noscript><br \/>\n            <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt=\"\"\/><br \/>\n            <\/a><br \/>\n        <\/noscript>\n    <\/div>\n<p>The CVE permits a distant, unauthenticated attacker to entry a sufferer&#8217;s Internet-NTLMv2 hash by sending a tailor-made electronic mail to a compromised system, then use the hash to authenticate the attacker.\u00a0<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\">\n                <noscript><br \/>\n                    <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                        <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                    <\/a><br \/>\n                <\/noscript>\n            <\/div>\n<\/p><\/div>\n<p>&#8220;The attacker may exploit this vulnerability by sending a specifically crafted electronic mail which triggers routinely when it&#8217;s retrieved and processed by the Outlook consumer,&#8221; Microsoft defined. &#8220;This might result in exploitation BEFORE the e-mail is seen within the Preview Pane.&#8221;<\/p>\n<p>Whereas Microsoft would not present any particulars about what sort of nefarious deeds attackers are doing after exploiting the bug \u2014 or how widespread assaults are \u2014 Zero Day Initiative&#8217;s Dustin Childs <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.zerodayinitiative.com\/blog\/2023\/3\/14\/the-march-2023-security-update-review\">advises<\/a>: &#8220;undoubtedly check and deploy this repair shortly.&#8221;<\/p>\n<h3 class=\"crosshead\">One more MotW bypass bug<\/h3>\n<p>The second bug beneath lively exploit is publicly identified, and associated to the same vulnerability, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-44698\">CVE-2022-44698<\/a>, that Microsoft <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/12\/14\/microsoft_december_patch_tuesday\/\" rel=\"noopener\">fixed<\/a> in December 2022.<\/p>\n<p>This new vulnerability, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24880\">CVE-2023-24880<\/a> is a Home windows SmartScreen safety characteristic bypass bug, and permits attackers to create malicious recordsdata that may bypass Mark-of-the-Internet safety features.\u00a0Whereas it is solely rated 5.4\/10, it is already being exploited by crooks demanding ransom funds. Bear in mind, pricey reader: CVSS is just a quantity and doesn&#8217;t point out real-world dangers.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>Google&#8217;s Menace Evaluation Group (TAG) noticed this challenge first and stated it is getting used to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2023\/03\/14\/windows_ransomware_zero_day\/\" rel=\"noopener\">deliver Magniber ransomware<\/a>. The TAG crew has documented greater than 100,000 downloads to this point, principally in Europe, so though this vulnerability solely obtained a 5.4 CVSS, until you need to cope with encrypted methods and extortion, patch now.<\/p>\n<h3 class=\"crosshead\">One crucial CVE down, eight to go<\/h3>\n<p>Of the opposite critical-rated vulnerabilities: we might counsel patching <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23392\">CVE-2023-23392<\/a>, a 9.8 CVSS-rated HTTP protocol stack distant code execution (RCE) bug, subsequent. It impacts Home windows 11 and Home windows Server 2022.<\/p>\n<p>A distant, unauthenticated attacker may exploit this vulnerability by sending a specifically crafted packet to a focused server that makes use of the HTTP Protocol Stack (http.sys), in line with Microsoft. The miscreant may then execute code at SYSTEM degree with none consumer interplay.<\/p>\n<p>&#8220;That mixture makes this bug wormable \u2014 at the least by way of methods that meet the goal necessities,&#8221; Childs famous.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23415\">CVE-2023-23415<\/a> is one other crucial, 9.8-rated RCE bug that, in line with Childs, can also be probably wormable. It is the results of a flaw within the\u00a0 Web Management Message Protocol (ICMP).\u00a0<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\">\n            <noscript><br \/>\n                <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"><br \/>\n                    <img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/patches&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZBEbXgFLLMizls9nljUwXgAAAFU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt=\"\"\/><br \/>\n                <\/a><br \/>\n            <\/noscript>\n        <\/div>\n<p>&#8220;An attacker may ship a low-level protocol error containing a fragmented IP packet inside one other ICMP packet in its header to the goal machine,&#8221; Microsoft defined. &#8220;To set off the susceptible code path, an utility on the goal have to be sure to a uncooked socket.&#8221;<\/p>\n<p>Of the remaining crucial CVEs, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-21708\">CVE-2023-21708<\/a>, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23404\">CVE-2023-23404<\/a> and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23416\">CVE-2023-23416<\/a> may lead to distant code execution.\u00a0<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-23411\">CVE-2023-23411<\/a> is a denial-of-service vulnerability in Home windows Hyper-V hypervisor, which Microsoft says may &#8220;have an effect on the performance of the Hyper-V host.&#8221;<\/p>\n<p>The ultimate two crucial bugs, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1017\">CVE-2023-1017<\/a> and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-1018\">CVE-2023-1018<\/a>, are a pair of out-of-bounds-read and out-of-bounds-write flaws in Trusted Platform Module 2.0&#8217;s reference implementation code that are actually being mounted in Microsoft merchandise.\u00a0<\/p>\n<h3 class=\"crosshead\">Fortinet bug used to assault govt networks<\/h3>\n<p>Additionally this month, Fortinet <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.fortiguard.com\/psirt-monthly-advisory\/march-2023-vulnerability-advisories\">released fixes<\/a> for 15 flaws. Of these <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41328\">CVE-2022-41328<\/a> is a path transversal vulnerability in FortiOS and has been exploited to focus on authorities companies and enormous organizations.<\/p>\n<p>&#8220;A improper limitation of a pathname to a restricted listing vulnerability (&#8216;path traversal&#8217;) [CWE-22] in FortiOS might permit a privileged attacker to learn and write arbitrary recordsdata through crafted CLI instructions,&#8221; Fortinet stated in a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-369\">security advisory<\/a> issued earlier this month.<\/p>\n<p>Days later, Fortinet issued an <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.fortinet.com\/blog\/psirt-blogs\/fg-ir-22-369-psirt-analysis\">analysis<\/a> that states miscreants have been utilizing the flaw in an try to assault massive organizations and steal their information, and trigger OS or file corruption.\u00a0<\/p>\n<p>&#8220;The complexity of the exploit suggests a complicated actor and that it&#8217;s extremely focused at governmental or government-related targets,&#8221; the evaluation stated.<\/p>\n<h3 class=\"crosshead\">Adobe fixes 105 bugs<\/h3>\n<p>Adobe&#8217;s month-to-month patch occasion included fixes for 105 vulnerabilities throughout its Photoshop, Expertise Supervisor, Dimension, Commerce, Substance 3D Stager, Cloud Desktop Software and Illustrator merchandise.\u00a0<\/p>\n<p>The software program maker says it isn&#8217;t conscious of any of those safety points being exploited within the wild.<\/p>\n<p>Adobe&#8217;s <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/dimension\/apsb23-20.html\">Dimension<\/a> 3D rendering and design device scored essentially the most (58) CVEs, with exploitation presumably inflicting reminiscence leak and arbitrary code execution.<\/p>\n<p>The replace for <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb23-18.html\">Experience Manager<\/a> fixes 18 bugs that would lead to arbitrary code execution, privilege escalation and safety characteristic bypass.\u00a0<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/substance3d_stager\/apsb23-22.html\">Substance 3D Stager<\/a> patch addresses 16 vulnerabilities, once more potential vectors for arbitrary code execution and reminiscence leak points.<\/p>\n<p>Updates for <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/photoshop\/apsb23-23.html\">Photoshop<\/a> (one CVE) and <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/illustrator\/apsb23-19.html\">Illustrator<\/a> (5 CVEs) additionally plug holes that would result in \u2013 you guessed it \u2013 distant code execution.\u00a0<\/p>\n<p>Lastly, a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb23-25.html\">Cold Fusion<\/a> replace fixes three bugs, together with a crucial code execution vulnerability, and a patch for <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/helpx.adobe.com\/security\/products\/creative-cloud\/apsb23-21.html\">Creative Cloud<\/a> fixes one crucial code execution bug.<\/p>\n<h3 class=\"crosshead\">SAP points 21 patches<\/h3>\n<p>SAP <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&amp;rc=10\">released<\/a> 21 new and up to date safety patches, together with two 9.9-rated bugs.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-25616\">CVE-2023-25616<\/a> is a code injection vulnerability in SAP Enterprise Objects Enterprise Intelligence Platform that would permit an attacker to inject arbitrary code.\u00a0<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-23857\">CVE-2023-23857<\/a> is an improper entry management bug in SAP NetWeaver AS for Java model 7.50.<\/p>\n<p>One other SAP repair addresses the 9.0-rated <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-25617\">CVE-2023-25617<\/a>. Whereas that is much less harmful than different SAP patches this month, &#8220;that does not imply it is much less crucial,&#8221; in line with Thomas Fritsch, SAP safety researcher at Onapsis.\u00a0<\/p>\n<p>&#8220;The decrease CSS ranking is because of the truth that a profitable exploit requires interplay with one other consumer,&#8221; Fritsch <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/onapsis.com\/blog\/sap-patch-day-march-2023\">wrote<\/a>.<\/p>\n<p>The patch fixes an OS command execution vulnerability in SAP&#8217;s Enterprise Objects Adaptive Job Server. If exploited, it may permit execution of arbitrary OS instructions over the community.<\/p>\n<h3 class=\"crosshead\">Android fixes no-touch RCE<\/h3>\n<p>Google&#8217;s Android Safety Bulletin <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2023-03-01#2023-03-05-security-patch-level-vulnerability-details\">addressed<\/a> 60 flaws this month together with two crucial RCE bugs within the System part: CVE-2023-20951 and CVE-2023-20954.<\/p>\n<p>&#8220;Essentially the most extreme of those points is a crucial safety vulnerability within the System part that would result in distant code execution with no further execution privileges wanted,&#8221; Android&#8217;s infosec bulletin warned. &#8220;Person interplay will not be wanted for exploitation.&#8221;<\/p>\n<h3 class=\"crosshead\">Chrome crushes 40 flaws<\/h3>\n<p>And eventually, Google <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/chromereleases.googleblog.com\/2023\/03\/stable-channel-update-for-desktop.html\">fixed<\/a> 40 flaws in its Chrome net browser, essentially the most extreme of which may permit for arbitrary code execution within the context of the consumer.\u00a0<\/p>\n<p>Relying on the privileges related to the consumer an attacker may then set up packages; view, change, or delete information; or create new accounts with full consumer rights,&#8221; in line with the <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.cisecurity.org\/advisory\/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2023-027\">Center for Internet Security<\/a>. &#8220;Customers whose accounts are configured to have fewer consumer rights on the system may very well be much less impacted than those that function with administrative consumer rights.&#8221; \u00ae<\/p>\n<\/p><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/03\/14\/microsoft_patch_tuesday\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Patch Tuesday Microsoft&#8217;s March Patch Tuesday consists of new fixes for 74 bugs, two of that are already being actively exploited, and 9 which are&#8230;<\/p>\n","protected":false},"author":1,"featured_media":52304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-52303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-15T01:11:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-15T01:14:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"691\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register\",\"datePublished\":\"2023-03-15T01:11:59+00:00\",\"dateModified\":\"2023-03-15T01:14:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/\"},\"wordCount\":1257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/patch_shutterstock.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/\",\"name\":\"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/patch_shutterstock.jpg\",\"datePublished\":\"2023-03-15T01:11:59+00:00\",\"dateModified\":\"2023-03-15T01:14:21+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/patch_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/patch_shutterstock.jpg\",\"width\":1000,\"height\":691},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/03\\\/15\\\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-03-15T01:11:59+00:00","article_modified_time":"2023-03-15T01:14:21+00:00","og_image":[{"width":1000,"height":691,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register","datePublished":"2023-03-15T01:11:59+00:00","dateModified":"2023-03-15T01:14:21+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/"},"wordCount":1257,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/","name":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg","datePublished":"2023-03-15T01:11:59+00:00","dateModified":"2023-03-15T01:14:21+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/03\/patch_shutterstock.jpg","width":1000,"height":691},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/03\/15\/microsoft-and-fortinet-fix-bugs-under-active-exploit-the-register\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft and Fortinet fix bugs under active exploit \u2022 The Register"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/52303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=52303"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/52303\/revisions"}],"predecessor-version":[{"id":52305,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/52303\/revisions\/52305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/52304"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=52303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=52303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=52303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}