{"id":320,"date":"2018-08-10T23:52:38","date_gmt":"2018-08-10T22:52:38","guid":{"rendered":"https:\/\/blog.dtc.ninja\/wp\/?p=320"},"modified":"2018-08-10T23:52:38","modified_gmt":"2018-08-10T22:52:38","slug":"new-oracle-vulnerability-cvss-9-9","status":"publish","type":"post","link":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/","title":{"rendered":"New Oracle Vulnerability &#8211; CVSS 9.9"},"content":{"rendered":"<p>Well there&#8217;s something I wasn&#8217;t expecting to see&#8230; into my inbox I received notification of a new Oracle vulnerability, and it\u00c2\u00a0looks like a big one.<!--more--><\/p>\n<h2>CVE-2018-3110<\/h2>\n<p>This new vulnerability, announced by Oracle <a href=\"http:\/\/www.oracle.com\/technetwork\/security-advisory\/alert-cve-2018-3110-5032149.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>, indicates a new vulnerability with &#8220;<em>a CVSS v3 base score of 9.9, and can result in complete compromise of the Oracle Database and shell access to the underlying server<\/em>&#8220;.<\/p>\n<h1>Versions Impacted<\/h1>\n<p>This new vulnerability affects the following versions of Oracle&#8217;s Database product:<\/p>\n<ul>\n<li>11.2.0.4<\/li>\n<li>12.1.0.2<\/li>\n<li>12.2.0.1<\/li>\n<li>18<\/li>\n<\/ul>\n<h1>Devil is in the detail<\/h1>\n<p>As always, the devil would seem to be in the detail. \u00c2\u00a0While multiple versions are indicated, the scope of impact varies by platform:<\/p>\n<ul>\n<li><strong>Windows<\/strong>\n<ul>\n<li>Oracle DB versions\u00c2\u00a011.2.0.4 and 12.2.0.1<\/li>\n<li>Oracle DB version 12.1.0.2 is also affected however patches\u00c2\u00a0were made available in the July 2018 CPU<\/li>\n<\/ul>\n<\/li>\n<li><strong>Linux + Unix<\/strong>\n<ul>\n<li>Oracle DB versions 11.2.0.4, 12.1.0.2, 12.2.0.1 however patches were made available in the July 2018 CPU<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Interestingly, version 18 is also impacted &#8211; a release that was originally only available on the<a href=\"https:\/\/blogs.oracle.com\/database\/oracle-database-18c-:-now-available-on-the-oracle-cloud-and-oracle-engineered-systems\" target=\"_blank\" rel=\"noopener noreferrer\"> Oracle Cloud or Oracle Engineered Systems<\/a>\u00c2\u00a0however from\u00c2\u00a0end July 2018 was made available for Linux.<\/p>\n<h1>Comment on Risk<\/h1>\n<p>Oracle does note that the vulnerability can\u00c2\u00a0<strong>not<\/strong> be exploited over the network without authentication &#8211; ie. user credentials are required<\/p>\n<p>This vulnerability is only for server installs, not for client only installs.<\/p>\n<h1>Action<\/h1>\n<p>Given the nature of this vulnerability, Oracle is recommending that all customers take urgent action, following the guidance <a href=\"http:\/\/www.oracle.com\/technetwork\/security-advisory\/alert-cve-2018-3110-5032149.html\" target=\"_blank\" rel=\"noopener noreferrer\">on their advisory<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Well there&#8217;s something I wasn&#8217;t expecting to see&#8230; into my inbox I received notification of a new Oracle vulnerability, and it\u00c2\u00a0looks like a big one.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[23],"tags":[117,115,114,116,27,81],"class_list":["post-320","post","type-post","status-publish","format-standard","hentry","category-security","tag-cve","tag-database","tag-oracle","tag-oracledb","tag-security","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos<\/title>\n<meta name=\"description\" content=\"Well there&#039;s something I wasn&#039;t expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos\" \/>\n<meta property=\"og:description\" content=\"Well there&#039;s something I wasn&#039;t expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/\" \/>\n<meta property=\"og:site_name\" content=\"Digging Through Chaos\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-10T22:52:38+00:00\" \/>\n<meta name=\"author\" content=\"barnesa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andrewbarnes666\" \/>\n<meta name=\"twitter:site\" content=\"@andrewbarnes666\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"barnesa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/\"},\"author\":{\"name\":\"barnesa\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/#\\\/schema\\\/person\\\/28671f6a276e93878c5c6078f5598b99\"},\"headline\":\"New Oracle Vulnerability &#8211; CVSS 9.9\",\"datePublished\":\"2018-08-10T22:52:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/\"},\"wordCount\":231,\"commentCount\":0,\"keywords\":[\"CVE\",\"database\",\"oracle\",\"oracledb\",\"security\",\"Vulnerability\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/\",\"url\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/\",\"name\":\"New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/#website\"},\"datePublished\":\"2018-08-10T22:52:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/#\\\/schema\\\/person\\\/28671f6a276e93878c5c6078f5598b99\"},\"description\":\"Well there's something I wasn't expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/2018\\\/08\\\/10\\\/new-oracle-vulnerability-cvss-9-9\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Oracle Vulnerability &#8211; CVSS 9.9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/#website\",\"url\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/\",\"name\":\"Digging Through Chaos\",\"description\":\"One Geek&#039;s journey through barely controlled Chaos\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.dtc.ninja\\\/wp\\\/#\\\/schema\\\/person\\\/28671f6a276e93878c5c6078f5598b99\",\"name\":\"barnesa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g\",\"caption\":\"barnesa\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos","description":"Well there's something I wasn't expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/","og_locale":"en_US","og_type":"article","og_title":"New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos","og_description":"Well there's something I wasn't expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.","og_url":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/","og_site_name":"Digging Through Chaos","article_published_time":"2018-08-10T22:52:38+00:00","author":"barnesa","twitter_card":"summary_large_image","twitter_creator":"@andrewbarnes666","twitter_site":"@andrewbarnes666","twitter_misc":{"Written by":"barnesa","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/#article","isPartOf":{"@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/"},"author":{"name":"barnesa","@id":"https:\/\/blog.dtc.ninja\/wp\/#\/schema\/person\/28671f6a276e93878c5c6078f5598b99"},"headline":"New Oracle Vulnerability &#8211; CVSS 9.9","datePublished":"2018-08-10T22:52:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/"},"wordCount":231,"commentCount":0,"keywords":["CVE","database","oracle","oracledb","security","Vulnerability"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/","url":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/","name":"New Oracle Vulnerability - CVSS 9.9 - Digging Through Chaos","isPartOf":{"@id":"https:\/\/blog.dtc.ninja\/wp\/#website"},"datePublished":"2018-08-10T22:52:38+00:00","author":{"@id":"https:\/\/blog.dtc.ninja\/wp\/#\/schema\/person\/28671f6a276e93878c5c6078f5598b99"},"description":"Well there's something I wasn't expecting to see... into my inbox I received notification of a new Oracle vulnerability, and it looks like a big one.","breadcrumb":{"@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.dtc.ninja\/wp\/2018\/08\/10\/new-oracle-vulnerability-cvss-9-9\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.dtc.ninja\/wp\/"},{"@type":"ListItem","position":2,"name":"New Oracle Vulnerability &#8211; CVSS 9.9"}]},{"@type":"WebSite","@id":"https:\/\/blog.dtc.ninja\/wp\/#website","url":"https:\/\/blog.dtc.ninja\/wp\/","name":"Digging Through Chaos","description":"One Geek&#039;s journey through barely controlled Chaos","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.dtc.ninja\/wp\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.dtc.ninja\/wp\/#\/schema\/person\/28671f6a276e93878c5c6078f5598b99","name":"barnesa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9959dbb2f296be6a198a91b8e9b6b4628adfa31c5bf138814a1aa35f4183874?s=96&d=mm&r=g","caption":"barnesa"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9551p-5a","jetpack-related-posts":[{"id":2971,"url":"https:\/\/blog.dtc.ninja\/wp\/2022\/11\/01\/openssl-security-advisories-cve-2022-3602-and-cve-2022-3786\/","url_meta":{"origin":320,"position":0},"title":"OpenSSL Security Advisories &#8211; CVE-2022-3602 and CVE-2022-3786","author":"barnesa","date":"November 1, 2022","format":false,"excerpt":"OpenSSL have just published 2 HIGH security advisories \u2014 previously pre-announced as a single CRITICAL advisory The update patches a buffer overrun vulnerability that happens during the certificate verification. The certificated needs to contain a malicious Punycode encoded name, and the vulnerability is only triggered AFTER the certificate chain is\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/blog.dtc.ninja\/wp\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":373,"url":"https:\/\/blog.dtc.ninja\/wp\/2019\/11\/04\/bluekeep-exploit\/","url_meta":{"origin":320,"position":1},"title":"BlueKeep Exploit","author":"barnesa","date":"November 4, 2019","format":false,"excerpt":"Remember that Remote Desktop Services\u00c2\u00a0vulnerability\u00c2\u00a0from May this year (2019)? ... well, now BlueKeep has an active exploit! It's not new! In May 2019, Microsoft twice warned users to implement a new security patch to address a vulnerability\u00c2\u00a0in\u00c2\u00a0its\u00c2\u00a0Remote\u00c2\u00a0Desktop\u00c2\u00a0Services (CVE-2019-0708).\u00c2\u00a0 With a CVSS score of 9.8, this vulnerability affects un-patched versions of\u2026","rel":"","context":"In &quot;Malware&quot;","block_context":{"text":"Malware","link":"https:\/\/blog.dtc.ninja\/wp\/category\/malware\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":384,"url":"https:\/\/blog.dtc.ninja\/wp\/2019\/11\/13\/cve-2019-11135-speculate-unexpected\/","url_meta":{"origin":320,"position":2},"title":"CVE-2019-11135 &#8211; Speculate the Unexpected","author":"barnesa","date":"November 13, 2019","format":false,"excerpt":"As some of you are no-doubt already aware, today a new speculative execution vulnerability was announced; speculate the unexpected FYI there is a new speculative execution vulnerability announced.\u00c2\u00a0 Rated 6.5 (Medium) by Intel, CVE-2019-11135\u00c2\u00a0vulnerability \"Transactional Synchronization Extensions (Intel\u00c2\u00ae TSX) Asynchronous Abort\" describes how \"malicious application software executed by an authenticated\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/blog.dtc.ninja\/wp\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":150,"url":"https:\/\/blog.dtc.ninja\/wp\/2017\/10\/16\/wpa2-wifi-security-compromised\/","url_meta":{"origin":320,"position":3},"title":"KRACK &#8211; WPA2 WiFi Security Compromise","author":"barnesa","date":"October 16, 2017","format":false,"excerpt":"In what has been a tightly guarded message to manufacturers of WiFi Access Points, it has now been revealed that the long-trusted WPA2 security protocol has been compromised. Proof of Concept Compromise The Proof of Concept (PoC) exploit has been nick-named\u00c2\u00a0\"KRACK\" - short for \"Key Reinstallation AttaCKs\" by the security\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/blog.dtc.ninja\/wp\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":184,"url":"https:\/\/blog.dtc.ninja\/wp\/2017\/11\/30\/nov-2017-intel-security-vulnerabilities\/","url_meta":{"origin":320,"position":4},"title":"Nov 2017 &#8211; Intel Security Vulnerabilities","author":"barnesa","date":"November 30, 2017","format":false,"excerpt":"In recent days, Intel has announced a new set of vulnerabilities that could potentially impact certain PCs, servers, and IoT platforms. Specifically, they have found issues with systems using certain firmware.\u00c2\u00a0 This is documented in the following advisory -\u00c2\u00a0Intel-SA-00086 -\u00c2\u00a0https:\/\/security-center.intel.com\/advisory.aspx?intelid=intel-sa-00086 Firmware at risk Intel have advised that systems using one\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/blog.dtc.ninja\/wp\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":205,"url":"https:\/\/blog.dtc.ninja\/wp\/2018\/01\/27\/meltdown-spectre\/","url_meta":{"origin":320,"position":5},"title":"2018 brings &#8230; Meltdown and Spectre!","author":"barnesa","date":"January 27, 2018","format":false,"excerpt":"So, 2018\u00c2\u00a0has really kicked off with a bang! \u00c2\u00a0If you use a computer, tablet, phone, etc (hint, if you think you're not then how are you reading this page ;-) )... then you really need to be aware of one of the latest vulnerabilities ... and, I would argue, one\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/blog.dtc.ninja\/wp\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/posts\/320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":0,"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.dtc.ninja\/wp\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}