{"id":5909,"date":"2017-01-20T06:00:00","date_gmt":"2017-01-20T14:00:00","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/20\/news-91\/"},"modified":"2017-01-20T06:00:00","modified_gmt":"2017-01-20T14:00:00","slug":"news-91","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/20\/news-91\/","title":{"rendered":"TippingPoint Threat Intelligence and Zero-Day Coverage \u2013 Week of January 16, 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>I thought I was going to start a riot earlier this week. The Major League Baseball Hall of Fame was set to announce their 2017 class and my favorite player of all time was on the ballet again. His career statistics are those that many professional baseball players dream of (449 home runs and .540 slugging percentage, to name a few), but the accusation of using performance enhancing drugs (even though he NEVER failed any drug tests in his entire career) plagued his chances of being voted in for the last seven years. But finally, Jeff Bagwell is in the 2017 Hall of Fame.<\/p>\n<p>Jeff Bagwell played for the Houston Astros for 15 years as a first baseman. He would have played longer, but a degenerative shoulder ended his career earlier than expected. What I loved about Bagwell was his work ethic. He, along with Craig Biggio (who is also in the Hall of Fame), were the leaders of the team and approached every game the same way: if you could play through pain or discomfort without risking further injury, everyone was expected to take one for team and do their part. So, what does Jeff Bagwell have to do with security? Nothing really. But in honor of his unrelenting work ethic, I\u2019d like to give a shout out to the TippingPoint Customer Support Team. They do whatever it takes for our customers to make sure they have what they need to protect their networks. They are a great team and I\u2019m honored to call them my colleagues.<\/p>\n<p><strong>Pwn2Own Returns for 2017 to Celebrate 10 Years of Exploits<\/strong><\/p>\n<p>In nine weeks, Pwn2Own 2017 returns to CanSecWest to celebrate 10 years of exploits. To celebrate 10 years of Pwn2Own, the Zero Day Initiative will be offering more than $1,000,000 across five different categories to see the latest research and again crown a Master of Pwn. It\u2019s more money and more categories than ever before, and we can\u2019t wait to see the research that comes to claim the prizes. Get all the details, including the complete rules of the contest, <a href=\"http:\/\/blog.trendmicro.com\/pwn2own-returns-for-2017-to-celebrate-10-years-of-exploits\/\">here<\/a>. And don\u2019t forget to follow the Zero Day Initiative on <a href=\"https:\/\/twitter.com\/thezdi\">Twitter<\/a> for all the latest updates!<strong>\u00a0<\/strong><\/p>\n<p><strong>Trend Micro TippingPoint\u00ae Named a Leader in 2017 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS)<\/strong><\/p>\n<p>Trend Micro TippingPoint has been named a Leader in the Gartner 2017 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). With improvements in both Completeness of Vision and Ability to Execute from previous years, we believe that placement in the Leaders\u2019 quadrant illustrates the positive progress we\u2019ve made since the acquisition of TippingPoint in March 2016 from Hewlett Packard Enterprise. <a href=\"http:\/\/blog.trendmicro.com\/trend-micro-tippingpoint-named-a-leader-in-2017-gartner-magic-quadrant-for-intrusion-detection-and-prevention-systems-idps\/\">Learn more<\/a>.<\/p>\n<p><strong>Adobe Updates<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine (DV) package includes coverage for the Adobe Security Bulletins released earlier this month. The following table maps Digital Vaccine filters to the Adobe Security Bulletins. Filters designated with an asterisk (*) shipped prior to this week\u2019s package, providing zero-day protection for our customers:<\/p>\n<div class=\"lightTable\">\n<table width=\"936\">\n<tbody>\n<tr>\n<td width=\"140\"><strong>Bulletin #<\/strong><\/td>\n<td width=\"186\"><strong>CVE #<\/strong><\/td>\n<td width=\"222\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"374\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2939<\/td>\n<td width=\"222\">26624<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2941<\/td>\n<td width=\"222\">*26340<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2946<\/td>\n<td width=\"222\">*25832, *25833<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2947<\/td>\n<td width=\"222\">26565<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2948<\/td>\n<td width=\"222\">26626<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2949<\/td>\n<td width=\"222\">*25815, *25816, *25817, *25819, *25820, *25821, *25822, *25823 *25827, *25828, *25830, *25834 *25835, *25836, *25837, *25838<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2950<\/td>\n<td width=\"222\">*25809<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2951<\/td>\n<td width=\"222\">*25811<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2955<\/td>\n<td width=\"222\">26566<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2956<\/td>\n<td width=\"222\">26567<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2957<\/td>\n<td width=\"222\">26567<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2958<\/td>\n<td width=\"222\">26566<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2959<\/td>\n<td width=\"222\">*26489<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2960<\/td>\n<td width=\"222\">26512<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2961<\/td>\n<td width=\"222\">26518<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2962<\/td>\n<td width=\"222\">26622<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2963<\/td>\n<td width=\"222\">26621<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2964<\/td>\n<td width=\"222\">26538<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2965<\/td>\n<td width=\"222\">26536<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2966<\/td>\n<td width=\"222\">26561<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-01<\/td>\n<td width=\"186\">CVE-2017-2967<\/td>\n<td width=\"222\">26562<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2926<\/td>\n<td width=\"222\">26548<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2927<\/td>\n<td width=\"222\">26547<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2928<\/td>\n<td width=\"222\">26559<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2930<\/td>\n<td width=\"222\">26560<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2931<\/td>\n<td width=\"222\">26550<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2932<\/td>\n<td width=\"222\">26551<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2933<\/td>\n<td width=\"222\">26555<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2934<\/td>\n<td width=\"222\">26558<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2935<\/td>\n<td width=\"222\">26563<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2936<\/td>\n<td width=\"222\">26568<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">APSB17-02<\/td>\n<td width=\"186\">CVE-2017-2937<\/td>\n<td width=\"222\">26569<\/td>\n<td width=\"374\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>Microsoft Patch Tuesday Update<\/strong><\/p>\n<p>This week\u2019s Digital Vaccine (DV) package includes additional coverage for the Microsoft Security Bulletins released earlier this month. The following table maps Digital Vaccine filters to the Microsoft Security Bulletins.<\/p>\n<div class=\"lightTable\">\n<table width=\"896\">\n<tbody>\n<tr>\n<td width=\"140\"><strong>Bulletin #<\/strong><\/td>\n<td width=\"183\"><strong>CVE #<\/strong><\/td>\n<td width=\"221\"><strong>Digital Vaccine Filter #<\/strong><\/td>\n<td width=\"337\"><strong>Status<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">MS16-129<\/td>\n<td width=\"183\">CVE-2017-7202<\/td>\n<td width=\"221\">26476<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">MS16-144<\/td>\n<td width=\"183\">CVE-2017-7202<\/td>\n<td width=\"221\">26476<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<tr>\n<td width=\"140\">MS17-004<\/td>\n<td width=\"183\">CVE-2017-0004<\/td>\n<td width=\"221\">25914, 26554<\/td>\n<td width=\"337\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p><strong>Zero Day Initiative Team Members Speaking at REcon Brussels 2017<\/strong><\/p>\n<p>RECon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. The conference will be held for the first time in Brussels, Belgium. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques. The Zero Day Initiative will be represented with two speaking slots during the conference that\u2019s being held on January 27-29, 2017:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Transforming Open Source to Open Access in Closed Applications (Brian Gorenc, Jasiel Spelman, Abdul-Aziz Hariri)<\/li>\n<li>A Little Less Conversation, A Little More ActionScript (WanderingGlitch)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>For more information on the conference, visit <a href=\"https:\/\/recon.cx\/2017\/brussels\/\">https:\/\/recon.cx\/2017\/brussels\/.<\/a><\/p>\n<p><strong>Zero-Day Filters<\/strong><\/p>\n<p>There are 28 new zero-day filters covering five vendors in this week\u2019s Digital Vaccine (DV) package. A number of existing filters in this week\u2019s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and\/or optimize performance. You can browse the list of <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/published\/\">published advisories<\/a> and <a href=\"http:\/\/www.zerodayinitiative.com\/advisories\/upcoming\/\">upcoming advisories<\/a> on the <a href=\"http:\/\/www.zerodayinitiative.com\/\">Zero Day Initiative<\/a> website.<\/p>\n<p><strong><em>Adobe (14)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26510: ZDI-CAN-4202: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>26512: HTTP: Adobe Reader DC ImageConversion JPEG Parsing Information Disclosure Vulnerability (ZDI-17-024)<\/li>\n<li>26518: HTTP: Acrobat Reader DC XFA Field Font Size Use-After-Free Vulnerability (ZDI-17-025)<\/li>\n<li>26519: ZDI-CAN-4210: Zero Day Initiative Vulnerability (Adobe Flash)<\/li>\n<li>26521: ZDI-CAN-4212: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>26534: ZDI-CAN-4305: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)<\/li>\n<li>26535: ZDI-CAN-4306: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>26536: HTTP: Adobe Acrobat Pro DC ImageConversion TIFF Parsing Memory Corruption Vulnerability (ZDI-17-010)<\/li>\n<li>26537: ZDI-CAN-4310: Zero Day Initiative Vulnerability (Adobe Reader DC)<\/li>\n<li>26538: HTTP: Adobe Acrobat Pro DC ImageConversion JPEG Information Disclosure Vulnerability (ZDI-17-014)<\/li>\n<li>26561: HTTP: Adobe Acrobat Reader DC TIFF Memory Corruption Vulnerability (ZDI-17-030)<\/li>\n<li>26562: HTTP: Adobe Reader DC XFA template Out-of-Bounds Read Vulnerability (ZDI-17-031)<\/li>\n<li>26621: HTTP: Adobe Acrobat Pro DC ImageConversion TIFF Information Disclosure Vulnerability (ZDI-17-027)<\/li>\n<li>26622: HTTP: Adobe Reader DC XSLT lang Type Confusion Vulnerability (ZDI-17-026)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Hewlett Packard Enterprise (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26404: HTTP: Hewlett Packard Enterprise Network Automation RPCServlet Insecure Deserialization (ZDI-16-616)<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Microsoft (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26476: HTTP: Microsoft Edge JavaScript reverse Buffer Overflow Vulnerability (ZDI-16-593)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Novell (1)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26540: HTTP: Novell NetIQ Sentinel SentinelContext Authentication Bypass Vulnerability (ZDI-16-406)<strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Trend Micro (11)<\/em><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>26506: ZDI-CAN-4137: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26507: ZDI-CAN-4138: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26509: ZDI-CAN-4141: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26511: ZDI-CAN-4142: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26513: ZDI-CAN-4143: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26514: ZDI-CAN-4144: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26515: ZDI-CAN-4145: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26516: ZDI-CAN-4146: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)<\/li>\n<li>26520: ZDI-CAN-4300,4303: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA)<\/li>\n<li>26531: ZDI-CAN-4301,4302: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA)<\/li>\n<li>26533: ZDI-CAN-4304: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA)<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Missed Last Week\u2019s News?<\/strong><\/p>\n<p>Catch up on last week\u2019s news in my <a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-january-9-2017\/\">weekly recap<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/tippingpoint-threat-intelligence-zero-day-coverage-week-january-16-2017\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"205\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03-300x205.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2016\/06\/Security_News_Icon_300x205_03-125x85.jpg 125w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>I thought I was going to start a riot earlier this week. The Major League Baseball Hall of Fame was set to announce their 2017 class and my favorite player of all time was on the ballet again. His career statistics are those that many professional baseball players dream of (449 home runs and .540&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10384,714,10415],"class_list":["post-5909","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-network","tag-security","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=5909"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5909\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=5909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=5909"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=5909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}