{"id":11853,"date":"2024-08-15T09:28:18","date_gmt":"2024-08-15T07:28:18","guid":{"rendered":"https:\/\/irg-net.com\/?p=11853"},"modified":"2024-08-15T11:28:19","modified_gmt":"2024-08-15T09:28:19","slug":"hackers-exploit-vmware-vulnerability-that-give","status":"publish","type":"post","link":"https:\/\/irg-net.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/","title":{"rendered":"Hackers Exploit VMware Vulnerability that give&#8230;"},"content":{"rendered":"<p>Hackers #Exploit #VMware Vulnerability that give Hypervisor Admin #Security<\/p>\n<p><a href='https:\/\/dy.si\/ud6715' target='_blank' rel=\"noopener\"><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320'><\/a><\/p>\n<h4><a href='https:\/\/dy.si\/ud6715' style='text-decoration: none' target='_blank' rel=\"noopener\">Hackers Exploit VMware Vulnerability that give&#8230;<\/a><\/h4>\n<p>You might have come across the above concern one that was published here. Since the day VMware vSphere was made available, ESX Admins user group if created in Active Directory will be given admin rights to ESXi when [&#8230;]<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.broadcom.com' target='_blank' rel=\"noopener\">Broadcom Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers #Exploit #VMware Vulnerability that give Hypervisor Admin #Security Hackers Exploit VMware Vulnerability that give&#8230; You might have come across the above concern one that was published here. Since the day VMware vSphere was made available, ESX Admins user group if created in Active Directory will be given admin rights to ESXi when [&#8230;] Broadcom [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11853","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Exploit VMware Vulnerability that give... - irgNET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Exploit VMware Vulnerability that give... - irgNET\" \/>\n<meta property=\"og:description\" content=\"Hackers #Exploit #VMware Vulnerability that give Hypervisor Admin #Security Hackers Exploit VMware Vulnerability that give&#8230; You might have come across the above concern one that was published here. Since the day VMware vSphere was made available, ESX Admins user group if created in Active Directory will be given admin rights to ESXi when [&#8230;] Broadcom [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/\" \/>\n<meta property=\"og:site_name\" content=\"irgNET\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-15T07:28:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-15T09:28:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320\" \/>\n<meta name=\"author\" content=\"vExpert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@irg_net\" \/>\n<meta name=\"twitter:site\" content=\"@irg_net\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vExpert\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/\"},\"author\":{\"name\":\"vExpert\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\"},\"headline\":\"Hackers Exploit VMware Vulnerability that give&#8230;\",\"datePublished\":\"2024-08-15T07:28:18+00:00\",\"dateModified\":\"2024-08-15T09:28:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/\"},\"wordCount\":63,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\\\/?size=Box320\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/\",\"name\":\"Hackers Exploit VMware Vulnerability that give... - irgNET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\\\/?size=Box320\",\"datePublished\":\"2024-08-15T07:28:18+00:00\",\"dateModified\":\"2024-08-15T09:28:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\\\/?size=Box320\",\"contentUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\\\/?size=Box320\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/hackers-exploit-vmware-vulnerability-that-give\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Exploit VMware Vulnerability that give&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"name\":\"irgNET\",\"description\":\"a virtual Knowledge Base\",\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\",\"name\":\"irg-NET\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"width\":2048,\"height\":2048,\"caption\":\"irg-NET\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/irg_net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/h-cemre-g\u00fcnay-2b61601b4\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC8GknhO5YMAkAoVxppu6aaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\",\"name\":\"vExpert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"caption\":\"vExpert\"},\"sameAs\":[\"https:\\\/\\\/irg-net.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Exploit VMware Vulnerability that give... - irgNET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Exploit VMware Vulnerability that give... - irgNET","og_description":"Hackers #Exploit #VMware Vulnerability that give Hypervisor Admin #Security Hackers Exploit VMware Vulnerability that give&#8230; You might have come across the above concern one that was published here. Since the day VMware vSphere was made available, ESX Admins user group if created in Active Directory will be given admin rights to ESXi when [&#8230;] Broadcom [&hellip;]","og_url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/","og_site_name":"irgNET","article_published_time":"2024-08-15T07:28:18+00:00","article_modified_time":"2024-08-15T09:28:19+00:00","og_image":[{"url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320","type":"","width":"","height":""}],"author":"vExpert","twitter_card":"summary_large_image","twitter_creator":"@irg_net","twitter_site":"@irg_net","twitter_misc":{"Written by":"vExpert"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#article","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/"},"author":{"name":"vExpert","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35"},"headline":"Hackers Exploit VMware Vulnerability that give&#8230;","datePublished":"2024-08-15T07:28:18+00:00","dateModified":"2024-08-15T09:28:19+00:00","mainEntityOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/"},"wordCount":63,"commentCount":0,"publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320","articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/","name":"Hackers Exploit VMware Vulnerability that give... - irgNET","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#primaryimage"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320","datePublished":"2024-08-15T07:28:18+00:00","dateModified":"2024-08-15T09:28:19+00:00","breadcrumb":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#primaryimage","url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320","contentUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/c8cdd7db-c38a-4e94-ad05-ee49d7f1f257\/?size=Box320"},{"@type":"BreadcrumbList","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/hackers-exploit-vmware-vulnerability-that-give\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Exploit VMware Vulnerability that give&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","name":"irgNET","description":"a virtual Knowledge Base","publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization","name":"irg-NET","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","contentUrl":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","width":2048,"height":2048,"caption":"irg-NET"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/irg_net","https:\/\/www.linkedin.com\/in\/h-cemre-g\u00fcnay-2b61601b4\/","https:\/\/www.youtube.com\/channel\/UC8GknhO5YMAkAoVxppu6aaQ"]},{"@type":"Person","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35","name":"vExpert","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","caption":"vExpert"},"sameAs":["https:\/\/irg-net.com"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/11853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/comments?post=11853"}],"version-history":[{"count":1,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/11853\/revisions"}],"predecessor-version":[{"id":11854,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/11853\/revisions\/11854"}],"wp:attachment":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/media?parent=11853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/categories?post=11853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/tags?post=11853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}