{"id":19196,"date":"2022-05-31T10:45:17","date_gmt":"2022-05-31T18:45:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12929\/"},"modified":"2022-05-31T10:45:17","modified_gmt":"2022-05-31T18:45:17","slug":"news-12929","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12929\/","title":{"rendered":"You Need to Update iOS, Chrome, Windows, and Zoom ASAP"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6294c342754d8027a158d446\/master\/pass\/security-critical-update.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kate O&#8217;Flaherty| Date: Tue, 31 May 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/kate-oflaherty\">Kate O&#x27;Flaherty<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">May has been<\/span> another busy month of security updates, with Google\u2019s Chrome browser and Android operating system, Zoom, and Apple\u2019s iOS releasing patches to fix serious vulnerabilities.<\/p>\n<p class=\"paywall\">Meanwhile, things have not run smoothly for Microsoft, which was forced to issue an out-of-band update after a disastrous Patch Tuesday during the month. And Cisco, Nvidia, Zoom, and VMWare all issued patches for pressing flaws.<\/p>\n<p class=\"paywall\">Here\u2019s what you need to know.<\/p>\n<p class=\"paywall\">With Apple due to announce iOS 16 at its <a data-offer-url=\"https:\/\/developer.apple.com\/wwdc22\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/developer.apple.com\/wwdc22\/&quot;}\" href=\"https:\/\/developer.apple.com\/wwdc22\/\" rel=\"nofollow noopener\" target=\"_blank\">Worldwide Developers Conference<\/a> in June, the iPhone maker released probably its last major iOS 15-point update in May. It came with new features, but iOS and iPadOS 15.5 also fixed 34 security vulnerabilities, some of which are serious.<\/p>\n<p class=\"paywall\">Security issues fixed in iOS 15.5 include flaws in the Kernel, as well as in the WebKit browser engine, according to Apple\u2019s <a data-offer-url=\"https:\/\/support.apple.com\/en-us\/HT213258\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-us\/HT213258&quot;}\" href=\"https:\/\/support.apple.com\/en-us\/HT213258\" rel=\"nofollow noopener\" target=\"_blank\">support page<\/a>. Thankfully, none of the issued patches in iOS and iPad 15.5 are being used in attacks, according to the company, but that doesn\u2019t mean they won\u2019t be if you don\u2019t update now.<\/p>\n<p class=\"paywall\">Meanwhile, users of <a data-offer-url=\"https:\/\/support.apple.com\/en-gb\/HT213256\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-gb\/HT213256&quot;}\" href=\"https:\/\/support.apple.com\/en-gb\/HT213256\" rel=\"nofollow noopener\" target=\"_blank\">macOS<\/a>, <a data-offer-url=\"https:\/\/support.apple.com\/en-gb\/HT213254\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-gb\/HT213254&quot;}\" href=\"https:\/\/support.apple.com\/en-gb\/HT213254\" rel=\"nofollow noopener\" target=\"_blank\">tvOS<\/a>, and the <a data-offer-url=\"https:\/\/support.apple.com\/en-gb\/HT213253\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-gb\/HT213253&quot;}\" href=\"https:\/\/support.apple.com\/en-gb\/HT213253\" rel=\"nofollow noopener\" target=\"_blank\">Apple Watch<\/a> should update their devices ASAP, as Apple also issued an emergency update to patch an issue it believes is already being used in attacks. The flaw in <a data-offer-url=\"https:\/\/developer.apple.com\/av-foundation\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/developer.apple.com\/av-foundation\/&quot;}\" href=\"https:\/\/developer.apple.com\/av-foundation\/\" rel=\"nofollow noopener\" target=\"_blank\">Apple AVD<\/a>, labeled CVE-2022-22675, could allow an app to execute code with Kernel privileges. Issues in the Kernel are as bad as it gets, so it\u2019s worth checking and updating your devices right away.<\/p>\n<p class=\"paywall\">Microsoft\u2019s May Patch Tuesday was something of a disaster for the diligent businesses that installed it straight away.<\/p>\n<p class=\"paywall\">On May 10, the firm issued <a data-offer-url=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/05\/12\/critical-security-alert-for-microsoft-windows-10-server-users-attacks-underway\/?sh=4baf3fee526e\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/05\/12\/critical-security-alert-for-microsoft-windows-10-server-users-attacks-underway\/?sh=4baf3fee526e&quot;}\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2022\/05\/12\/critical-security-alert-for-microsoft-windows-10-server-users-attacks-underway\/?sh=4baf3fee526e\" rel=\"nofollow noopener\" target=\"_blank\">security updates<\/a> to fix <a data-offer-url=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/msrc.microsoft.com\/update-guide\/en-us&quot;}\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\" rel=\"nofollow noopener\" target=\"_blank\">75 vulnerabilities<\/a>, eight labeled as serious and three that were being exploited by attackers. The issues fixed in May\u2019s Patch Tuesday were important, but there were soon problems for some Microsoft users, who <a data-offer-url=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-may-windows-updates-cause-ad-authentication-failures\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-may-windows-updates-cause-ad-authentication-failures\/&quot;}\" href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-may-windows-updates-cause-ad-authentication-failures\/\" rel=\"nofollow noopener\" target=\"_blank\">reported<\/a> authentication failures after installing the latest updates. It impacted people using the client and server Windows platforms and systems running all Windows versions, including Windows 11 and Windows Server 2022.<\/p>\n<p class=\"paywall\">In a bid to fix the problem, the firm was forced to issue an out-of-band update for Windows 10, Windows 11, and Windows Server 2008, 2012, 2016, 2019, and 2022 on May 20. The update won\u2019t install automatically\u2014you need to download it from Microsoft\u2019s <a data-offer-url=\"https:\/\/www.catalog.update.microsoft.com\/Home.aspx\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.catalog.update.microsoft.com\/Home.aspx&quot;}\" href=\"https:\/\/www.catalog.update.microsoft.com\/Home.aspx\" rel=\"nofollow noopener\" target=\"_blank\">update catalog<\/a>.<\/p>\n<p class=\"paywall\">In early May, Mozilla released <a data-offer-url=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-16\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-16\/&quot;}\" href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-16\/\" rel=\"nofollow noopener\" target=\"_blank\">Firefox 100<\/a>, including nine security fixes for its Firefox browser, of which seven were rated as high severity. But later in May, ethical hackers at the <a data-offer-url=\"https:\/\/www.zerodayinitiative.com\/blog\/2022\/5\/18\/pwn2own-vancouver-2022-the-results\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.zerodayinitiative.com\/blog\/2022\/5\/18\/pwn2own-vancouver-2022-the-results&quot;}\" href=\"https:\/\/www.zerodayinitiative.com\/blog\/2022\/5\/18\/pwn2own-vancouver-2022-the-results\" rel=\"nofollow noopener\" target=\"_blank\">Pwn20wn<\/a> competition in Vancouver were able to demonstrate how attackers could execute JavaScript code on devices running the latest Mozilla software. Mozilla <a data-offer-url=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-19\/#CVE-2022-1529\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-19\/#CVE-2022-1529&quot;}\" href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2022-19\/#CVE-2022-1529\" rel=\"nofollow noopener\" target=\"_blank\">fixed<\/a> the issues in another updateFirefox 100.0.2, Firefox ESR 91.9.1, Firefox for Android 100.3, and Thunderbird 91.9.1. Click those update buttons.<\/p>\n<p class=\"paywall\">May\u2019s Android security update is a big one, patching 36 vulnerabilities, including an issue already being exploited by attackers. This <a data-offer-url=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog&quot;}\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" rel=\"nofollow noopener\" target=\"_blank\">exploited<\/a> flaw is a privilege escalation bug in the Linux Kernel known as \u201c<a data-offer-url=\"https:\/\/dirtypipe.cm4all.com\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/dirtypipe.cm4all.com\/&quot;}\" href=\"https:\/\/dirtypipe.cm4all.com\/\" rel=\"nofollow noopener\" target=\"_blank\">The Dirty Pipe<\/a>.\u201d<\/p>\n<p class=\"paywall\">The flaw, which impacts newer Android devices running Android 12 and later, was disclosed by Google in February, but it has taken a while to reach devices.<\/p>\n<p class=\"paywall\">Other Android security fixes in May include 15 high-severity and one critical-severity vulnerability in Qualcomm components, two denial-of-service flaws in the Android System, and three high-severity issues in MediaTek components.<\/p>\n<p class=\"paywall\">Google Pixel and Samsung users, in particular, should look out for the May update, as <a data-offer-url=\"https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-05-01\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-05-01&quot;}\" href=\"https:\/\/source.android.com\/security\/bulletin\/pixel\/2022-05-01\" rel=\"nofollow noopener\" target=\"_blank\">additional vulnerabilities<\/a> have been fixed on <a data-offer-url=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/security.samsungmobile.com\/securityUpdate.smsb&quot;}\" href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" rel=\"nofollow noopener\" target=\"_blank\">these devices<\/a>. The update has so far reached Android devices, <a data-offer-url=\"https:\/\/www.xda-developers.com\/may-2022-security-patches-samsung-devices\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.xda-developers.com\/may-2022-security-patches-samsung-devices\/&quot;}\" href=\"https:\/\/www.xda-developers.com\/may-2022-security-patches-samsung-devices\/\" rel=\"nofollow noopener\" target=\"_blank\">including<\/a> the Samsung Galaxy S22, Galaxy S22+, and Galaxy S22 Ultra, as well as the Galaxy Tab S8 series, the Galaxy Watch 4 series, and the Galaxy S21 series.<\/p>\n<p class=\"paywall\">Another month, another major Google <a data-offer-url=\"https:\/\/chromereleases.googleblog.com\/2022\/05\/stable-channel-update-for-desktop_24.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/chromereleases.googleblog.com\/2022\/05\/stable-channel-update-for-desktop_24.html&quot;}\" href=\"https:\/\/chromereleases.googleblog.com\/2022\/05\/stable-channel-update-for-desktop_24.html\" rel=\"nofollow noopener\" target=\"_blank\">Chrome security update<\/a>, this time for 32 issues, of which one is rated as critical and eight are deemed high severity. The critical issue, CVE-2022-1853, impacts the IndexedDB feature, while the high-rated flaws affect areas that include DevTools, UI foundations, and the user education function.<\/p>\n<p class=\"paywall\">None of the flaws fixed in Chrome 102 have been exploited, Google says. This is in contrast to <a href=\"https:\/\/www.wired.co.uk\/article\/ios-android-chrome-updates-april-2022\">April<\/a>, when the company issue emergency updates to fix several already exploited vulnerabilities in its Chromium-based browser.<\/p>\n<p class=\"paywall\">Earlier in May, Google released 13 fixes in Chrome v101.0.4951.61 for Android, with eight of these rated as having a high-severity impact.<\/p>\n<p class=\"paywall\">Cisco has fixed <a data-offer-url=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-NFVIS-MUL-7DySRX9#details\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-NFVIS-MUL-7DySRX9#details&quot;}\" href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-NFVIS-MUL-7DySRX9#details\" rel=\"nofollow noopener\" target=\"_blank\">multiple vulnerabilities<\/a> in Cisco Enterprise NFV Infrastructure Software that could allow an attacker to escape from the guest virtual machine to the host machine, inject commands that execute at the\u00a0root\u00a0level, or leak system data from the host to the virtual machine.<\/p>\n<p class=\"paywall\">It goes without saying that these high-severity issues\u2014tracked as CVE-2022-20777, CVE-2022-20779, and CVE-2022-20780\u2014are serious, so it\u2019s a good idea to update as soon as possible.<\/p>\n<p class=\"paywall\">Chip manufacturer Nvidia issued a <a data-offer-url=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5353#security-updates-for-nvidia-gpu-display-driver\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5353#security-updates-for-nvidia-gpu-display-driver&quot;}\" href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5353#security-updates-for-nvidia-gpu-display-driver\" rel=\"nofollow noopener\" target=\"_blank\">security update<\/a> in mid-May for its Nvidia GPU display driver to fix flaws that could allow denial of service, information disclosure, or data tampering. The list of 10 vulnerabilities includes issues in the Kernel mode layer on Windows and Linux devices. The updates themselves can be found on Nvidia\u2019s <a data-offer-url=\"https:\/\/www.nvidia.com\/Download\/index.aspx\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nvidia.com\/Download\/index.aspx&quot;}\" href=\"https:\/\/www.nvidia.com\/Download\/index.aspx\" rel=\"nofollow noopener\" target=\"_blank\">downloads website<\/a>.<\/p>\n<p class=\"paywall\">Video conferencing app <a data-offer-url=\"https:\/\/explore.zoom.us\/en\/trust\/security\/security-bulletin\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/explore.zoom.us\/en\/trust\/security\/security-bulletin\/&quot;}\" href=\"https:\/\/explore.zoom.us\/en\/trust\/security\/security-bulletin\/\" rel=\"nofollow noopener\" target=\"_blank\">Zoom<\/a> has released version 5.10.0 to fix an <a data-offer-url=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22787\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22787&quot;}\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22787\" rel=\"nofollow noopener\" target=\"_blank\">issue<\/a> found by security researchers at Google\u2019s Project Zero in February. The flaw in messaging protocol XMPP doesn\u2019t require any interaction from the user in order to execute the attack. \u201cUser interaction is not required for a successful attack. The only ability an attacker needs is to be able to send messages to the victim over Zoom chat over XMPP protocol,\u201d says security researcher Ivan Fratric, who <a data-offer-url=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=2254\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=2254&quot;}\" href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=2254\" rel=\"nofollow noopener\" target=\"_blank\">describes<\/a> how the attacker can force the victim client to connect to a malicious server, resulting in arbitrary code execution.<\/p>\n<p class=\"paywall\">Cloud provider VMWare has released <a data-offer-url=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0014.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0014.html&quot;}\" href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0014.html\" rel=\"nofollow noopener\" target=\"_blank\">patches<\/a> to fix multiple issues, including a privilege escalation vulnerability (CVE-2022-22973) and an authentication bypass flaw (CVE-2022-22972), the latter of which it says must be applied immediately as \u201cthe ramifications are serious.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/ios-chrome-android-windows-update-may-2022\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6294c342754d8027a158d446\/master\/pass\/security-critical-update.jpg\"\/><\/p>\n<p><strong>Credit to Author: Kate O&#8217;Flaherty| Date: Tue, 31 May 2022 11:00:00 +0000<\/strong><\/p>\n<p>Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two \u201cserious\u201d flaws.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21382,21466],"class_list":["post-19196","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-privacy","tag-security-security-advice"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19196"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19196\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19196"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}