{"id":198570,"date":"2017-12-12T20:07:00","date_gmt":"2017-12-12T19:07:00","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=198570"},"modified":"2023-05-27T00:00:41","modified_gmt":"2023-05-26T22:00:41","slug":"microsoft-patchday-summary-12-dezember-2017","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2017\/12\/12\/microsoft-patchday-summary-12-dezember-2017\/","title":{"rendered":"Microsoft Patchday Summary 12. Dezember 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>[English]Microsoft hat am 12. Dezember 2017 eine Reihe Sicherheits-Updates f\u00fcr Windows und andere Produkte freigegeben. Nachfolgend findet sich eine kurze \u00dcbersicht.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/efca2f6224394eb886f0cf4012436506\" alt=\"\" width=\"1\" height=\"1\" \/>Details zu diesen Sicherheits-Updates finden sich im Microsoft <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">Security TechCenter<\/a>. Zudem werde ich die Updates in separaten Blog-Beitr\u00e4gen dokumentieren.<\/p>\n<h2>Critical Security Updates<\/h2>\n<p>Internet Explorer 9<br \/>\nInternet Explorer 11<br \/>\nMicrosoft Edge<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 for Itanium-Based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows 7 for 32-bit Systems Service Pack 1<br \/>\nWindows 7 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core<br \/>\ninstallation)<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1511 for 32-bit Systems<br \/>\nWindows 10 Version 1511 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1703 for 32-bit Systems<br \/>\nWindows 10 Version 1703 for x64-based Systems<br \/>\nWindows 10 Version 1709 for 32-bit Systems<br \/>\nWindows 10 Version 1709 for x64-based Systems<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016 (Server Core installation)<br \/>\nWindows Server, version 1709 (Server Core Installation)<br \/>\nAdobe Flash Player<br \/>\nChakraCore<\/p>\n<h2>Important Security Updates<\/h2>\n<p>Microsoft Exchange Server 2013 Cumulative Update 17<br \/>\nMicrosoft Exchange Server 2013 Cumulative Update 18<br \/>\nMicrosoft Exchange Server 2016 Cumulative Update 6<br \/>\nMicrosoft Exchange Server 2016 Cumulative Update 7<br \/>\nMicrosoft Office 2010 Service Pack 2 (32-bit editions)<br \/>\nMicrosoft Office 2010 Service Pack 2 (64-bit editions)<br \/>\nMicrosoft Office 2013 RT Service Pack 1<br \/>\nMicrosoft Office 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Office 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Office 2016 (32-bit edition)<br \/>\nMicrosoft Office 2016 (64-bit edition)<br \/>\nMicrosoft Office 2016 for Mac<br \/>\nMicrosoft SharePoint Enterprise Server 2016<br \/>\nMicrosoft Word 2007 Service Pack 3<br \/>\nMicrosoft Word 2010 Service Pack 2 (32-bit editions)<br \/>\nMicrosoft Word 2010 Service Pack 2 (64-bit editions)<br \/>\nMicrosoft Word 2013 RT Service Pack 1<br \/>\nMicrosoft Word 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Word 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Word 2016 (32-bit edition)<br \/>\nMicrosoft Word 2016 (64-bit edition)<\/p>\n<h2>Moderate Security Updates<\/h2>\n<p>Internet Explorer 10<\/p>\n<p>Hier noch die Liste (siehe auch <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-december-patch-tuesday-fixes-34-security-issues\/\" target=\"_blank\" rel=\"noopener\">hier<\/a>) aller 34 Sicherheitsl\u00fccken, die geschlossen wurden. Details folgen in separaten Artikeln.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV170021\" target=\"_blank\" rel=\"nofollow noopener\">ADV170021<\/a><\/td>\n<td>Microsoft Office Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170022\" target=\"_blank\" rel=\"nofollow noopener\">ADV170022<\/a><\/td>\n<td>December 2017 Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170023\" target=\"_blank\" rel=\"nofollow noopener\">ADV170023<\/a><\/td>\n<td>Microsoft Exchange Defense in Depth Update<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11899\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11899<\/a><\/td>\n<td>Microsoft Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV170007CVE-2017-11888\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11888<\/a><\/td>\n<td>Microsoft Edge Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Exchange Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11932\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11932<\/a><\/td>\n<td>Microsoft Exchange Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Malware Protection Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200304223952\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11940\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11940<\/a><\/td>\n<td>Microsoft Malware Protection Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Malware Protection Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200113205345\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11937\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11937<\/a><\/td>\n<td>Microsoft Malware Protection Engine Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134813\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11939\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11939<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134834\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11936\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11936<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134831\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11935\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11935<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11934\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11934<\/a><\/td>\n<td>Microsoft PowerPoint Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134833\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11886\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11886<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11905\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11905<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11907\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11907<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11916\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11916<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11894\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11894<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2017-11887<\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11919\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11919<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134936\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11903\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11903<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-8743CVE-2017-11901\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11901<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134953\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11908\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11908<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11906\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11906<\/a><\/td>\n<td>Scripting Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134833\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11890\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11890<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227134814\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11889\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11889<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2017-11895<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200510071603\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2017-11893\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11893<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11909\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11909<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11914\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11914<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200509205557\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2017-11918\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11918<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11930\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11930<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11913\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11913<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11910\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11910<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2017-11911<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11912\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11912<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2017-11885\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11885<\/a><\/td>\n<td>Windows RRAS Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-11927\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2017-11927<\/a><\/td>\n<td>Microsoft Windows Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong>Adobe Flash Player 28.0.0.126<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/01\/windows-10-v1709-update-kb4051963-nadeldrucker-fix\/\">Windows 10 V1709: Update KB4051963 (Nadeldrucker-Fix)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/01\/windows10-updates-kb4054022-kb4055237-kb4052342\/\">Windows 10: Updates KB4054022, KB4055237, KB4052342<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/06\/microsoft-office-patchday-5-dezember-2017\/\">Microsoft Office Patchday (5. Dezember 2017)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/12\/microsoft-patchday-summary-12-dezember-2017\/\">Microsoft Patchday Summary 12. Dezember 2017<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/13\/patchday-windows-10-updates-12-dezember-2017\/\">Patchday: Windows 10-Updates 12. Dezember 2017<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/13\/patchday-office-sicherheitsupdates-12-dezember-2017\/\">Patchday: Office Sicherheitsupdates (12. Dezember 2017)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/12\/13\/weitere-updates-zum-microsoft-dezember-2017-patchday\/\">Weitere Updates zum Microsoft Dezember 2017-Patchday<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2017\/12\/16\/windows10-v1709-zuverlssigkeits-update-kb4058043\/\" rel=\"bookmark\">Windows 10 V1709: Zuverl\u00e4ssigkeitsupdate KB4058043<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat am 12. Dezember 2017 eine Reihe Sicherheits-Updates f\u00fcr Windows und andere Produkte freigegeben. Nachfolgend findet sich eine kurze \u00dcbersicht.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,426,185,3694,2557],"tags":[4322,4328,4315,3288],"class_list":["post-198570","post","type-post","status-publish","format-standard","hentry","category-office","category-sicherheit","category-update","category-windows-10","category-windows-server","tag-office","tag-sicherheit","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/198570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=198570"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/198570\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=198570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=198570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=198570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}