{"id":83294,"date":"2024-12-01T17:29:40","date_gmt":"2024-12-01T16:29:40","guid":{"rendered":"https:\/\/matuile.com\/media\/?p=83294"},"modified":"2024-12-01T17:30:03","modified_gmt":"2024-12-01T16:30:03","slug":"zero-day-definition-informatique","status":"publish","type":"post","link":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/","title":{"rendered":"Zero-day : D\u00e9finition informatique"},"content":{"rendered":"<p style=\"font-size:16px;font-style:normal;font-weight:100\">Un <strong>zero-day<\/strong> fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un <strong><a href=\"https:\/\/matuile.com\/media\/logiciel-definition-informatique\/\">logiciel<\/a><\/strong> ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs ou des responsables de la s\u00e9curit\u00e9. Le terme \u00ab\u00a0<strong>zero-day<\/strong>\u00a0\u00bb signifie qu&rsquo;une faille a \u00e9t\u00e9 d\u00e9couverte mais qu\u2019aucune solution ou correction (patch) n\u2019a encore \u00e9t\u00e9 mise en place. En d&rsquo;autres termes, les responsables du logiciel n&rsquo;ont \u00ab\u00a0<strong>aucun jour<\/strong>\u00a0\u00bb pour se pr\u00e9parer \u00e0 une attaque exploitant cette faille, d&rsquo;o\u00f9 le terme \u00ab\u00a0<strong>zero-day<\/strong>\u00a0\u00bb (jour z\u00e9ro).<\/p><p style=\"font-size:16px;font-style:normal;font-weight:100\">Lorsqu&rsquo;une vuln\u00e9rabilit\u00e9 <strong>zero-day<\/strong> est d\u00e9couverte, elle peut \u00eatre exploit\u00e9e par des attaquants avant que le fabricant du logiciel n&rsquo;ait eu le temps de publier une <strong><a href=\"https:\/\/matuile.com\/media\/mise-a-jour\/\">mise \u00e0 jour<\/a><\/strong> ou un correctif pour la r\u00e9soudre. Cela en fait une menace tr\u00e8s s\u00e9rieuse car pendant cette p\u00e9riode, il n&rsquo;existe pas de protection contre l&rsquo;attaque.<\/p><p style=\"font-size:16px;font-style:normal;font-weight:100\">Les attaques <strong>zero-day<\/strong> sont souvent utilis\u00e9es par des cybercriminels ou des hackers pour infiltrer des syst\u00e8mes, voler des informations sensibles ou installer des malwares. Elles sont particuli\u00e8rement difficiles \u00e0 d\u00e9tecter par les syst\u00e8mes de s\u00e9curit\u00e9 traditionnels. Une fois qu&rsquo;une vuln\u00e9rabilit\u00e9 <strong>zero-day<\/strong> est exploit\u00e9e, elle peut avoir des cons\u00e9quences graves jusqu&rsquo;\u00e0 ce qu&rsquo;un patch soit publi\u00e9 et que les utilisateurs mettent \u00e0 jour leurs syst\u00e8mes.<\/p><p style=\"font-size:16px;font-style:normal;font-weight:100\">En r\u00e9sum\u00e9, les vuln\u00e9rabilit\u00e9s <strong>zero-day<\/strong> peuvent concerner tous types de logiciels, des <strong><a href=\"https:\/\/matuile.com\/media\/systeme-dexploitation\/\">syst\u00e8mes d&rsquo;exploitation<\/a><\/strong> aux <strong><a href=\"https:\/\/matuile.com\/media\/application\/\">applications<\/a><\/strong>. Elles sont un probl\u00e8me majeur en cybers\u00e9curit\u00e9 car elles peuvent rester non d\u00e9couvertes pendant des mois, voire des ann\u00e9es.<\/p><div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><p class=\"has-text-align-center\" style=\"font-size:19px;font-style:normal;font-weight:700\">Apprenez d\u00e9finition apr\u00e8s d\u00e9finition :<\/p><p class=\"has-text-align-center\" style=\"font-size:34px;font-style:normal;font-weight:100\"><strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-a\/\">A<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-b\/\">B<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-c\/\">C<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-d\/\">D<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-e\/\">E<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-f\/\">F<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-g\/\">G<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-h\/\">H<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-i\/\">I<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-j\/\">J<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-k\/\">K<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-l\/\">L<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-m\/\">M<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-n\/\">N<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-o\/\">O<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-p\/\">P<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-q\/\">Q<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-r\/\">R<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-s\/\">S<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-t\/\">T<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-u\/\">U<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-v\/\">V<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-w\/\">W<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-x\/\">X<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-y\/\">Y<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-z\/\">Z<\/a><\/strong><\/p><div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>","protected":false},"excerpt":{"rendered":"<p>Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs ou&#8230;<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[344],"tags":[],"class_list":{"0":"post-83294","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-dictionnaire-informatique"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-day : D\u00e9finition informatique - Matuile<\/title>\n<meta name=\"description\" content=\"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-day : D\u00e9finition informatique - Matuile\" \/>\n<meta property=\"og:description\" content=\"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Matuile\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-01T16:29:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-01T16:30:03+00:00\" \/>\n<meta name=\"author\" content=\"Lucas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/\"},\"author\":{\"name\":\"Lucas\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/person\\\/6df827225180b6f3870274908b543185\"},\"headline\":\"Zero-day : D\u00e9finition informatique\",\"datePublished\":\"2024-12-01T16:29:40+00:00\",\"dateModified\":\"2024-12-01T16:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/\"},\"wordCount\":260,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\"},\"articleSection\":[\"Dictionnaire informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/\",\"name\":\"Zero-day : D\u00e9finition informatique - Matuile\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#website\"},\"datePublished\":\"2024-12-01T16:29:40+00:00\",\"dateModified\":\"2024-12-01T16:30:03+00:00\",\"description\":\"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/zero-day-definition-informatique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide informatique\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/category\\\/guide-informatique\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dictionnaire informatique\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/category\\\/guide-informatique\\\/dictionnaire-informatique\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero-day : D\u00e9finition informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#website\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/\",\"name\":\"Matuile Blog\",\"description\":\"La solution \u00e0 votre urgence\",\"publisher\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\"},\"alternateName\":\"Matuile\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/matuile.com\\\/media\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\",\"name\":\"Matuile\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Matuile.png\",\"contentUrl\":\"https:\\\/\\\/matuile.com\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Matuile.png\",\"width\":700,\"height\":700,\"caption\":\"Matuile\"},\"image\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/person\\\/6df827225180b6f3870274908b543185\",\"name\":\"Lucas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"caption\":\"Lucas\"},\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/author\\\/lucas\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-day : D\u00e9finition informatique - Matuile","description":"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Zero-day : D\u00e9finition informatique - Matuile","og_description":"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...","og_url":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/","og_site_name":"Matuile","article_published_time":"2024-12-01T16:29:40+00:00","article_modified_time":"2024-12-01T16:30:03+00:00","author":"Lucas","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lucas","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/#article","isPartOf":{"@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/"},"author":{"name":"Lucas","@id":"https:\/\/matuile.com\/media\/#\/schema\/person\/6df827225180b6f3870274908b543185"},"headline":"Zero-day : D\u00e9finition informatique","datePublished":"2024-12-01T16:29:40+00:00","dateModified":"2024-12-01T16:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/"},"wordCount":260,"commentCount":0,"publisher":{"@id":"https:\/\/matuile.com\/media\/#organization"},"articleSection":["Dictionnaire informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/matuile.com\/media\/zero-day-definition-informatique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/","url":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/","name":"Zero-day : D\u00e9finition informatique - Matuile","isPartOf":{"@id":"https:\/\/matuile.com\/media\/#website"},"datePublished":"2024-12-01T16:29:40+00:00","dateModified":"2024-12-01T16:30:03+00:00","description":"Un zero-day fait r\u00e9f\u00e9rence \u00e0 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 dans un logiciel ou un syst\u00e8me informatique qui est inconnue des d\u00e9veloppeurs...","breadcrumb":{"@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/matuile.com\/media\/zero-day-definition-informatique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/matuile.com\/media\/zero-day-definition-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/matuile.com\/media\/"},{"@type":"ListItem","position":2,"name":"Guide informatique","item":"https:\/\/matuile.com\/media\/category\/guide-informatique\/"},{"@type":"ListItem","position":3,"name":"Dictionnaire informatique","item":"https:\/\/matuile.com\/media\/category\/guide-informatique\/dictionnaire-informatique\/"},{"@type":"ListItem","position":4,"name":"Zero-day : D\u00e9finition informatique"}]},{"@type":"WebSite","@id":"https:\/\/matuile.com\/media\/#website","url":"https:\/\/matuile.com\/media\/","name":"Matuile Blog","description":"La solution \u00e0 votre urgence","publisher":{"@id":"https:\/\/matuile.com\/media\/#organization"},"alternateName":"Matuile","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/matuile.com\/media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/matuile.com\/media\/#organization","name":"Matuile","url":"https:\/\/matuile.com\/media\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/matuile.com\/media\/#\/schema\/logo\/image\/","url":"https:\/\/matuile.com\/media\/wp-content\/uploads\/2023\/04\/Matuile.png","contentUrl":"https:\/\/matuile.com\/media\/wp-content\/uploads\/2023\/04\/Matuile.png","width":700,"height":700,"caption":"Matuile"},"image":{"@id":"https:\/\/matuile.com\/media\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/matuile.com\/media\/#\/schema\/person\/6df827225180b6f3870274908b543185","name":"Lucas","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","caption":"Lucas"},"url":"https:\/\/matuile.com\/media\/author\/lucas\/"}]}},"_links":{"self":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/83294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/comments?post=83294"}],"version-history":[{"count":2,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/83294\/revisions"}],"predecessor-version":[{"id":83655,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/83294\/revisions\/83655"}],"wp:attachment":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/media?parent=83294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/categories?post=83294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/tags?post=83294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}