{"id":26747,"date":"2016-01-28T14:21:56","date_gmt":"2016-01-28T14:21:56","guid":{"rendered":"https:\/\/udsenterprise.com\/detecting-vulnerabilities-open-source-tools\/"},"modified":"2023-09-21T12:55:54","modified_gmt":"2023-09-21T12:55:54","slug":"detecting-vulnerabilities-open-source-tools","status":"publish","type":"post","link":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/","title":{"rendered":"Detecting vulnerabilities with Open Source tools"},"content":{"rendered":"<p>&#8211;<strong>OpenVAS<\/strong>: This scanner is daily updated with new vulnerability tests. <\/p>\n<p>&#8211;<strong>Nexpose Community<\/strong>: It makes more than 163.000 network checks. It doesn&#8217;t include web application scanner but it is automatically updated.<\/p>\n<p>&#8211;<strong>Metasploit Framework<\/strong>: It validates vulnerabilities found by Nexpose and identifies the more dangerous ones in order to fix them first. <\/p>\n<p>&#8211;<strong>Retina CS Community<\/strong>: It simplifies and centralized vulnerability management and patching. It includes automated vulnerability assessment for servers, workstations, mobile devices, applications&#8230;<\/p>\n<p>&#8211;<strong>Burp Suite Free Edition<\/strong>: It provides all the tools to perform full security analysis for web applications.<\/p>\n<p>&#8211;<strong>Nikto<\/strong>: It performs tests against web servers to check files and programs. It also looks for outdated versions or versions with specific problems.<\/p>\n<p>&#8211;<strong>OWASP Zed Attack Proxy (ZAP)<\/strong>: Integrated tool to find vulnerabilities affecting web applications.<\/p>\n<p>&#8211;<strong>Clair<\/strong>: Service specialized in container analysis.<\/p>\n<p>&#8211;<strong>Moloch<\/strong>: It storages and indexes and network traffic in PCAP standard format, providing quick access. <\/p>\n<p>&#8211;<strong>Powerfuzzer<\/strong>: Automatic and customizable web fuzzer that identifies cross site scripting (XSS); injections (SQL, LDAP, code, commands, CRLF and XPATH); and HTTP 500 statuses.<\/p>\n<p>More info about these tools at <a href=\"http:\/\/www.esecurityplanet.com\/open-source-security\/slideshows\/10-open-source-vulnerability-assessment-tools.html\" target=\"_blank\" rel=\"noopener nofollow\">eSecurity Planet<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New <strong>vulnerabilities<\/strong> emerge every day, threatening enterprise <strong>information security<\/strong>. In order to avoid data and devices getting infected, it is important to find them out early so they can be fixed as soon as possible.<\/p>\n<p>There are <strong>Open Source tools<\/strong> which can help to identify vulnerabilities, such as web servers and applications scanners, analysis tools, fuzzers&#8230; Below you can find a useful selection: <\/p>\n","protected":false},"author":2,"featured_media":13333,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[985,931,926],"tags":[986,934,928],"class_list":["post-26747","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hot-news","category-open-source","category-security","tag-hot-news","tag-open-source","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Detecting vulnerabilities with Open Source tools<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting vulnerabilities with Open Source tools\" \/>\n<meta property=\"og:description\" content=\"New vulnerabilities emerge every day, threatening enterprise information security. In order to avoid data and devices getting infected, it is important to find them out early so they can be fixed as soon as possible.There are Open Source tools which can help to identify vulnerabilities, such as web servers and applications scanners, analysis tools, fuzzers... Below you can find a useful selection:\" \/>\n<meta property=\"og:site_name\" content=\"UDS Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-28T14:21:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T12:55:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"67\" \/>\n\t<meta property=\"og:image:height\" content=\"4\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"UDS Enterprise Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:site\" content=\"@VirtualCable_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UDS Enterprise Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/\"},\"author\":{\"name\":\"UDS Enterprise Team\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\"},\"headline\":\"Detecting vulnerabilities with Open Source tools\",\"datePublished\":\"2016-01-28T14:21:56+00:00\",\"dateModified\":\"2023-09-21T12:55:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/\"},\"wordCount\":182,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/open-source-security-assessment-tools.gif\",\"keywords\":[\"Hot news\",\"Open source\",\"Security\"],\"articleSection\":[\"Hot news\",\"Open source\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/\",\"name\":\"Detecting vulnerabilities with Open Source tools\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/open-source-security-assessment-tools.gif\",\"datePublished\":\"2016-01-28T14:21:56+00:00\",\"dateModified\":\"2023-09-21T12:55:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#primaryimage\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/open-source-security-assessment-tools.gif\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/open-source-security-assessment-tools.gif\",\"width\":400,\"height\":222},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/detecting-vulnerabilities-open-source-tools\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hot news\",\"item\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/category\\\/hot-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Detecting vulnerabilities with Open Source tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"name\":\"UDS Enterprise\",\"description\":\"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.\",\"publisher\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\"},\"alternateName\":\"UDS Enterprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#organization\",\"name\":\"UDS Enterprise\",\"alternateName\":\"UDS Enterprise\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"contentUrl\":\"https:\\\/\\\/udsenterprise.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/img-logotipo-top-00-udsenterprise.jpg\",\"width\":300,\"height\":202,\"caption\":\"UDS Enterprise\"},\"image\":{\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/VirtualCable_\",\"https:\\\/\\\/es.linkedin.com\\\/company\\\/virtualcable\",\"https:\\\/\\\/www.youtube.com\\\/@UDSEnterprise\"],\"description\":\"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/udsenterprise.com\\\/en\\\/#\\\/schema\\\/person\\\/83f63ed09241332cf10f8f6e7bbdd920\",\"name\":\"UDS Enterprise Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g\",\"caption\":\"UDS Enterprise Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Detecting vulnerabilities with Open Source tools","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/","og_locale":"en_US","og_type":"article","og_title":"Detecting vulnerabilities with Open Source tools","og_description":"New vulnerabilities emerge every day, threatening enterprise information security. In order to avoid data and devices getting infected, it is important to find them out early so they can be fixed as soon as possible.There are Open Source tools which can help to identify vulnerabilities, such as web servers and applications scanners, analysis tools, fuzzers... Below you can find a useful selection:","og_site_name":"UDS Enterprise","article_published_time":"2016-01-28T14:21:56+00:00","article_modified_time":"2023-09-21T12:55:54+00:00","og_image":[{"width":67,"height":4,"url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","type":"image\/gif"}],"author":"UDS Enterprise Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","twitter_creator":"@VirtualCable_","twitter_site":"@VirtualCable_","twitter_misc":{"Written by":"UDS Enterprise Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#article","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/"},"author":{"name":"UDS Enterprise Team","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920"},"headline":"Detecting vulnerabilities with Open Source tools","datePublished":"2016-01-28T14:21:56+00:00","dateModified":"2023-09-21T12:55:54+00:00","mainEntityOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/"},"wordCount":182,"commentCount":0,"publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/open-source-security-assessment-tools.gif","keywords":["Hot news","Open source","Security"],"articleSection":["Hot news","Open source","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/","url":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/","name":"Detecting vulnerabilities with Open Source tools","isPartOf":{"@id":"https:\/\/udsenterprise.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#primaryimage"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/open-source-security-assessment-tools.gif","datePublished":"2016-01-28T14:21:56+00:00","dateModified":"2023-09-21T12:55:54+00:00","breadcrumb":{"@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#primaryimage","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/open-source-security-assessment-tools.gif","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/07\/open-source-security-assessment-tools.gif","width":400,"height":222},{"@type":"BreadcrumbList","@id":"https:\/\/udsenterprise.com\/en\/detecting-vulnerabilities-open-source-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/udsenterprise.com\/en\/"},{"@type":"ListItem","position":2,"name":"Hot news","item":"https:\/\/udsenterprise.com\/en\/category\/hot-news\/"},{"@type":"ListItem","position":3,"name":"Detecting vulnerabilities with Open Source tools"}]},{"@type":"WebSite","@id":"https:\/\/udsenterprise.com\/en\/#website","url":"https:\/\/udsenterprise.com\/en\/","name":"UDS Enterprise","description":"UDS Enterprise es una soluci\u00f3n segura y flexible para virtualizaci\u00f3n de escritorios y acceso remoto, compatible con Windows, Linux y macOS.","publisher":{"@id":"https:\/\/udsenterprise.com\/en\/#organization"},"alternateName":"UDS Enterprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/udsenterprise.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/udsenterprise.com\/en\/#organization","name":"UDS Enterprise","alternateName":"UDS Enterprise","url":"https:\/\/udsenterprise.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","contentUrl":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2023\/05\/img-logotipo-top-00-udsenterprise.jpg","width":300,"height":202,"caption":"UDS Enterprise"},"image":{"@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VirtualCable_","https:\/\/es.linkedin.com\/company\/virtualcable","https:\/\/www.youtube.com\/@UDSEnterprise"],"description":"Virtual Cable es una empresa espa\u00f1ola especializada en soluciones de virtualizaci\u00f3n del puesto de trabajo. Su producto estrella, UDS Enterprise, es un broker de conexiones multiplataforma que permite la administraci\u00f3n y despliegue de escritorios virtuales Windows y Linux, la virtualizaci\u00f3n de aplicaciones y el acceso remoto a equipos f\u00edsicos con sistemas operativos Windows, Linux y macOS"},{"@type":"Person","@id":"https:\/\/udsenterprise.com\/en\/#\/schema\/person\/83f63ed09241332cf10f8f6e7bbdd920","name":"UDS Enterprise Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b415c61bc26d023da7c12ea873f9088732accd901f13dd03e6db59c6232a06a9?s=96&d=mm&r=g","caption":"UDS Enterprise Team"}}]}},"_links":{"self":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26747","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/comments?post=26747"}],"version-history":[{"count":1,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26747\/revisions"}],"predecessor-version":[{"id":28976,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/posts\/26747\/revisions\/28976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media\/13333"}],"wp:attachment":[{"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/media?parent=26747"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/categories?post=26747"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/udsenterprise.com\/en\/wp-json\/wp\/v2\/tags?post=26747"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}