{"id":33293,"date":"2025-06-12T03:20:12","date_gmt":"2025-06-12T03:20:12","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=32112"},"modified":"2026-04-13T08:43:02","modified_gmt":"2026-04-13T08:43:02","slug":"microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/","title":{"rendered":"Microsoft&#8217;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used products such as Windows, Microsoft Office, Azure, and Microsoft Visual Studio, including high-risk vulnerability types such as privilege escalation and remote code execution.<\/p>\n\n\n\n<p>Of the vulnerabilities fixed in Microsoft&#8217;s monthly update this month, 11 were critical and 58 were important in severity. These include 1 vulnerability that has been detected for wild exploitation:<\/p>\n\n\n\n<p>WEBDAV Remote Code Execution Vulnerability (CVE-2025-33053)<\/p>\n\n\n\n<p>Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.<\/p>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jun\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jun<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Vulnerabilities<\/h2>\n\n\n\n<p>Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:<\/p>\n\n\n\n<p><strong>Windows Schannel Remote Code Execution Vulnerability (CVE-2025-29828):<\/strong><\/p>\n\n\n\n<p>Windows Schannel has a remote code execution vulnerability. Due to a memory leak in the Windows Encryption Service, an unauthenticated attacker could execute arbitrary code by sending a large number of malicious sharded ClientHello messages to the target server connected to TLS. CVSS score 8.1.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/zh-cn\/vulnerability\/CVE-2025-29828\">https:\/\/msrc.microsoft.com\/update-guide\/zh-cn\/vulnerability\/CVE-2025-29828<\/a><\/p>\n\n\n\n<p><strong>Microsoft Word Remote Code Execution Vulnerability (CVE-2025-32717):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Microsoft Word has a remote code execution vulnerability. Due to a heap-based buffer overflow vulnerability in Microsoft Office Word, an unauthenticated attacker can craft malicious RTF files that trick users into opening or previewing panes, thereby executing arbitrary code in the user&#8217;s context. CVSS score 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32717\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32717<\/a><\/p>\n\n\n\n<p><strong>Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability (CVE-2025-33053):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Web Distributed Authoring and Versioning (WEBDAV). Because WebDAV mishandles file paths in links, an unauthenticated attacker can externally control the file name or path in WebDAV to trick users into clicking on a specially crafted link and executing arbitrary code. CVSS score 8.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33053\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33053<\/a><\/p>\n\n\n\n<p><strong>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability (CVE-2025-33064):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in the Windows Routing and Remote Access Service (RRAS). Due to a heap-based buffer overflow vulnerability in Windows Routing and Remote Access Services (RRAS), an unauthenticated remote attacker can execute code locally. CVSS score 8.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33064\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33064<\/a><\/p>\n\n\n\n<p><strong>Power Automate Privilege Escalation Vulnerability (CVE-2025-47966):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Power Automate has a privilege escalation vulnerability. Due to the leakage of sensitive information in Power Automate, attackers can obtain this sensitive information and achieve privilege escalation. CVSS score 9.8.<\/p>\n\n\n\n<p><strong>Official announcement link:<\/strong><strong><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47966\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47966<\/a><\/p>\n\n\n\n<p><strong>Microsoft Word Remote Code Execution Vulnerability (CVE-2025-47957):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Microsoft Word has a remote code execution vulnerability. Due to a &#8220;use after release&#8221; problem in Microsoft Office Word, an unauthenticated attacker can execute code locally. CVSS score 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47957\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47957<\/a><\/p>\n\n\n\n<p><strong>Windows Netlogon Privilege Escalation Vulnerability (CVE-2025-33070):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Windows Netlogon has a privilege escalation vulnerability. Because uninitialized resources are used in Windows Netlogon, an attacker can gain domain administrator privileges by sending a specially crafted authentication request to the domain controller. CVSS score 8.1.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33070\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33070<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p>The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Vulnerability Number<\/strong><strong><\/strong><\/td><td><strong>Affected product versions<\/strong><strong><\/strong><\/td><\/tr><tr><td>CVE-2025-29828<\/td><td>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 11 Version 22H2 for x64-based Systems <br>Windows 11 Version 22H2 for ARM64-based Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022<\/td><\/tr><tr><td>CVE-2025-32717<\/td><td>Microsoft 365 Apps for Enterprise for 64-bit Systems<br>Microsoft 365 Apps for Enterprise for 32-bit Systems<\/td><\/tr><tr><td>CVE-2025-33053 <br>CVE-2025-33064<\/td><td>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 11 Version 22H2 for x64-based Systems <br>Windows 11 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 <br>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) <br>Windows Server 2008 for x64-based Systems Service Pack 2 <br>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) <br>Windows Server 2008 for 32-bit Systems Service Pack 2 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems<br>Windows 10 Version 1607 for 32-bit Systems <br>Windows 10 for x64-based Systems <br>Windows 10 for 32-bit Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems<\/td><\/tr><tr><td>CVE-2025-47966<\/td><td>Power Automate for Desktop<\/td><\/tr><tr><td>CVE-2025-47957<\/td><td>Microsoft Office LTSC 2024 for 64-bit editions <br>Microsoft Office LTSC 2024 for 32-bit editions <br>Microsoft Office LTSC 2021 for 32-bit editions <br>Microsoft Office LTSC 2021 for 64-bit editions <br>Microsoft 365 Apps for Enterprise for 64-bit Systems <br>Microsoft 365 Apps for Enterprise for 32-bit Systems<\/td><\/tr><tr><td>CVE-2025-33070<\/td><td>Windows Server 2012 R2 (Server Core installation) <br>Windows Server 2012 R2 <br>Windows Server 2012 (Server Core installation) <br>Windows Server 2012 <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) <br>Windows Server 2008 R2 for x64-based Systems Service Pack 1 <br>Windows Server 2016 (Server Core installation) <br>Windows Server 2016 <br>Windows 10 Version 1607 for x64-based Systems <br>Windows 10 Version 1607 for 32-bit Systems <br>Windows 10 for x64-based Systems <br>Windows 10 for 32-bit Systems <br>Windows Server 2025 <br>Windows 11 Version 24H2 for x64-based Systems <br>Windows 11 Version 24H2 for ARM64-based Systems <br>Windows Server 2022, 23H2 Edition (Server Core installation) <br>Windows 11 Version 23H2 for x64-based Systems <br>Windows 11 Version 23H2 for ARM64-based Systems <br>Windows Server 2025 (Server Core installation) <br>Windows 10 Version 22H2 for 32-bit Systems <br>Windows 10 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 22H2 for x64-based Systems <br>Windows 11 Version 22H2 for x64-based Systems <br>Windows 11 Version 22H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for x64-based Systems <br>Windows 10 Version 21H2 for ARM64-based Systems <br>Windows 10 Version 21H2 for 32-bit Systems <br>Windows Server 2022 (Server Core installation) <br>Windows Server 2022 <br>Windows Server 2019 (Server Core installation) <br>Windows Server 2019 <br>Windows 10 Version 1809 for x64-based Systems <br>Windows 10 Version 1809 for 32-bit Systems<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p>At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jun\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jun<\/a><\/p>\n\n\n\n<p>Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.<\/p>\n\n\n\n<p>Right-click the Windows icon, select &#8220;Settings (N)&#8221;, select &#8220;Update and Security&#8221;-&#8220;Windows Update&#8221;, view the prompt information on this page, or click &#8220;View Update History&#8221; to view the historical update status.<\/p>\n\n\n\n<p>For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the &#8220;Microsoft Update Catalog&#8221; website to download the independent program package and install it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>Affected products<\/strong><\/th><th><strong>CVE No.<\/strong><\/th><th><strong>Vulnerability Title<\/strong><\/th><th><strong>Severity<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Windows<\/td><td>CVE-2025-29828<\/td><td>Windows Schannel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32710<\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47162<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47953<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33071<\/td><td>Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Dynamics<\/td><td>CVE-2025-47966<\/td><td>Power Automate Privilege Escalation Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-32717<\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33070<\/td><td>Windows Netlogon Privilege Escalation Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47164<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47167<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47172<\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47957<\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32712<\/td><td>Win32k privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32713<\/td><td>Windows Common Log File System Driver Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32714<\/td><td>Windows Installer Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32715<\/td><td>Remote Desktop Protocol Client information disclosure vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32716<\/td><td>Windows Media Permission Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32718<\/td><td>Windows SMB Client Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32719<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32720<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32721<\/td><td>Windows Recovery Driver Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32722<\/td><td>Windows Storage Port Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32724<\/td><td>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33058<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33059<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33060<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33061<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33062<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33063<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33064<\/td><td>Windows Routing and Remote Access Service (RRAS) Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33065<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33066<\/td><td>Windows Routing and Remote Access Service (RRAS) Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33067<\/td><td>Windows Task Scheduler Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33075<\/td><td>Windows Installer Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-47160<\/td><td>Windows Shortcut Files security feature bypass vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-47955<\/td><td>Windows Remote Access Connection Manager Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-47956<\/td><td>Windows Security App Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SDK<\/td><td>CVE-2025-47962<\/td><td>Windows SDK Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-47969<\/td><td>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-24068<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-24069<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-24065<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-32725<\/td><td>DHCP Server Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33050<\/td><td>DHCP Server Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33052<\/td><td>Windows DWM Core Library Information Disclosure&nbsp; Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33053<\/td><td>Web Distributed Authoring and Versioning (WEBDAV) remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33055<\/td><td>Windows Storage Management Provider Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33056<\/td><td>Windows Local Security Authority (LSA) Denial of Service<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33057<\/td><td>Windows Local Security Authority (LSA) Denial of Service<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33068<\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33069<\/td><td>Windows App Control for Business security feature bypass vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-33073<\/td><td>Windows SMB Client Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47163<\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47165<\/td><td>Microsoft Excel remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47166<\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47168<\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47169<\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47170<\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47171<\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47173<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47174<\/td><td>Microsoft Excel remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47175<\/td><td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47176<\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-3052<\/td><td>Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Visual Studio<\/td><td>CVE-2025-47959<\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-47968<\/td><td>Microsoft AutoUpdate (MAU) Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td>CVE-2025-47977<\/td><td>Nuance Digital Engagement Platform Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.<\/p>\n\n\n\n<p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world\u2019s top ten telecommunications companies.<\/p>\n\n\n\n<p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used products such as Windows, Microsoft Office, Azure, and Microsoft Visual Studio, including high-risk vulnerability types such as privilege escalation and remote code execution. Of the vulnerabilities fixed in Microsoft&#8217;s monthly update this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28664,"comment_status":"open","ping_status":"open","sticky":false,"template":"post-templates\/single-layout-8.php","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[984,518,523],"class_list":["post-33293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-cve-2025-33053","tag-microsoft-security","tag-microsoft-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft&#039;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft&#039;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-12T03:20:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T08:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Microsoft&#039;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Microsoft&#8217;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products\",\"datePublished\":\"2025-06-12T03:20:12+00:00\",\"dateModified\":\"2026-04-13T08:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"wordCount\":2274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"keywords\":[\"CVE-2025-33053\",\"Microsoft Security\",\"Microsoft Vulnerabilities\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"name\":\"Microsoft's Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"datePublished\":\"2025-06-12T03:20:12+00:00\",\"dateModified\":\"2026-04-13T08:43:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"width\":169,\"height\":107,\"caption\":\"Critical alert icon with shield symbol.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft&#8217;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft's Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/","og_locale":"pt_BR","og_type":"article","og_title":"Microsoft's Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","og_description":"Overview On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used","og_url":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/","og_site_name":"NSFOCUS","article_published_time":"2025-06-12T03:20:12+00:00","article_modified_time":"2026-04-13T08:43:02+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Microsoft's Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","twitter_description":"Overview On June 11, NSFOCUS CERT detected that Microsoft released a security update patch for June, fixing 67 security issues involving widely used","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Microsoft&#8217;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products","datePublished":"2025-06-12T03:20:12+00:00","dateModified":"2026-04-13T08:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/"},"wordCount":2274,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","keywords":["CVE-2025-33053","Microsoft Security","Microsoft Vulnerabilities"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/","url":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/","name":"Microsoft's Security Update in June of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","datePublished":"2025-06-12T03:20:12+00:00","dateModified":"2026-04-13T08:43:02+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","width":169,"height":107,"caption":"Critical alert icon with shield symbol."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/microsofts-security-update-in-june-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft&#8217;s Security Update in June of High-Risk Vulnerability Notice for Multiple Products"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=33293"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33293\/revisions"}],"predecessor-version":[{"id":35516,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/33293\/revisions\/35516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/28664"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=33293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=33293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=33293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}