{"id":1260,"date":"2015-05-14T18:07:07","date_gmt":"2015-05-14T16:07:07","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1260"},"modified":"2015-05-14T18:07:07","modified_gmt":"2015-05-14T16:07:07","slug":"parches-de-microsoft-mayo-de-2015","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2015\/parches-de-microsoft-mayo-de-2015\/","title":{"rendered":"Parches de Microsoft Mayo de 2015"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">El segundo martes de Mayo de 2015, Microsoft public\u00f3 13 nuevos boletines de seguridad, de los cuales 3 han sido catalogado como \u201cCr\u00edtico\u201d y 10 como \u201cImportante\u201d.<\/p>\n<p>Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos a futuros ataques.<\/p>\n<p><span style=\"color: #ff0000;\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Los <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">1<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">3<\/span><\/span> <span style=\"color: #000000;\"><span style=\"font-size: small;\">boletines del mes de <\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">Mayo<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"> de 201<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\">5<\/span><\/span><span style=\"color: #000000;\"><span style=\"font-size: small;\"> son los siguientes:<\/p>\n<p><\/span><\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>43<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad:<\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b> Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Cumulative Security Update for Internet Explorer<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-043\" target=\"_blank\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/a><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>44<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-044\" target=\"_blank\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/a><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>45<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff0000;\"><span style=\"font-size: small;\"><b>Cr\u00edtica<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Windows Journal Could Allow Remote Code Execution<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-045\" target=\"_blank\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/a><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>46<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in Microsoft Office Could Allow Remote Code Execution <\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-046\" target=\"_blank\"><span style=\"font-size: small;\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/span><\/a><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>47<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-047\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>48<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in .NET Framework Could Allow Elevation of Privilege<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-048\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<p><\/span><\/strong><\/span><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>49<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Silverlight Could Allow Elevation of Privilege <\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-049\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><span style=\"font-size: small;\"><b>5<\/b><\/span><span style=\"font-size: small;\"><b>-0<\/b><\/span><span style=\"font-size: small;\"><b>50<\/b><\/span><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Service Control Manager Could Allow Elevation of Privilege <\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-050\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>5<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>51<\/b><\/span><\/strong><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-051\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>5<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>52<\/b><\/span><\/strong><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Windows Kernel Could Allow Security Feature Bypass<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-052\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>5<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>53<\/b><\/span><\/strong><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-053\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>5<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>54<\/b><\/span><\/strong><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-054\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<\/li>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><b>Bolet\u00edn de seguridad de Microsoft MS1<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>5<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>-0<\/b><\/span><\/strong><strong><span style=\"font-size: small;\"><b>55<\/b><\/span><\/strong><b> <\/b><strong><span style=\"font-size: small;\"><b>(Severidad: <\/b><\/span><\/strong><strong><span style=\"color: #ff9966;\"><span style=\"font-size: small;\"><b>Importante<\/b><\/span><\/span><\/strong><strong><span style=\"font-size: small;\"><b>)<\/b><\/span><\/strong><\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: small;\">Vulnerability in Schannel Could Allow Information Disclosure<\/span><\/p>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><strong><span style=\"font-size: small;\"><a href=\"https:\/\/technet.microsoft.com\/es-es\/library\/security\/MS15-055\" target=\"_blank\">Bolet\u00edn T\u00e9cnico (IT Pro)<\/a><\/p>\n<p><\/span><\/strong><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"font-size: small;\">Recomendamos el uso de <\/span><a href=\"http:\/\/update.microsoft.com\/\" target=\"_blank\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><i><u>Windows Update<\/u><\/i><\/span><\/span><\/a><span style=\"font-size: small;\"> para mantener el equipo al d\u00eda con los \u00faltimos parches de seguridad:<br \/>\n<\/span><\/span><\/p>\n<ul>\n<li>\n<p class=\"western\" align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Puede acceder a <i>Windows Update a tr<\/i>av\u00e9s de su navegador MS Internet Explorer, men\u00fa Herramientas, pulsando clic sobre Windows Update.<\/p>\n<p><u><b>Nota<\/b><\/u><b>:<\/b> Para utilizar Windows Update, necesitar\u00e1 establecer una conexi\u00f3n a Internet.<br \/>\n<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b><br \/>\nSATINFO<\/b><\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>, <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>4<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b> de <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>Mayo<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>de 201<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>5<\/b><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El segundo martes de Mayo de 2015, Microsoft public\u00f3 13 nuevos boletines de seguridad, de los cuales 3 han sido catalogado como \u201cCr\u00edtico\u201d y 10 como \u201cImportante\u201d. Consideramos que estos boletines deben ser del conocimiento de nuestros asociados, para que apliquen los parches disponibles a la m\u00e1xima brevedad y de este modo evitar estar expuestos <a href='https:\/\/www.satinfo.es\/noticies\/2015\/parches-de-microsoft-mayo-de-2015\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[655,891,892],"tags":[31,32,724,725,726,727,728,729,730,731,732,733,734,735,736],"class_list":["post-1260","post","type-post","status-publish","format-standard","hentry","category-655","category-otros","category-todos","tag-boletines-de-seguridad","tag-microsoft","tag-ms15-043","tag-ms15-044","tag-ms15-045","tag-ms15-046","tag-ms15-047","tag-ms15-048","tag-ms15-049","tag-ms15-050","tag-ms15-051","tag-ms15-052","tag-ms15-053","tag-ms15-054","tag-ms15-055","category-655-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1260"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1260\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}