{"id":20455,"date":"2024-08-07T13:11:48","date_gmt":"2024-08-07T16:11:48","guid":{"rendered":"https:\/\/ostec.blog\/?p=20455"},"modified":"2024-08-07T13:11:48","modified_gmt":"2024-08-07T16:11:48","slug":"cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/","title":{"rendered":"CVE-2024-30103: Vulnerabilidad  en el Microsoft Outlook"},"content":{"rendered":"<p>CVE-2024-30103 es una vulnerabilidad de Microsoft Outlook que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). Este fallo tiene una caracter\u00edstica diferente: que su ejecuci\u00f3n no depende de ninguna interacci\u00f3n del usuario, es decir, basta con ver un correo electr\u00f3nico malicioso para que se produzca el ataque.<\/p>\n<h2>Detalles de la vulnerabilidad<\/h2>\n<p>Esta vulnerabilidad permite a los atacantes ejecutar un c\u00f3digo arbitrario en el sistema de la v\u00edctima mediante el env\u00edo de un correo electr\u00f3nico con una carga maliciosa. CVE-2024-30103 la clasifica como un exploit <strong>\u00abzero-click\u00bb<\/strong>, lo que significa que el usuario no necesita hacer clic ni abrir archivos adjuntos; solo con previsualizar el correo electr\u00f3nico en Outlook se activa el exploit. <\/p>\n<p>La vulnerabilidad recibi\u00f3 una puntuaci\u00f3n<a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS <\/a>de 8.8, indicando una severidad alta.  <\/p>\n<h2>Impacto y expltaci\u00f3n de la CVE-2024-30103<\/h2>\n<p>Si se explota la CVE-2024-30103, los atacantes obtienen el control total del sistema afectado. Esto podr\u00eda dar lugar al robo de datos, la instalaci\u00f3n de malwares y  compromiso de la red. Aunque hasta ahora, no hay pruebas de que esta vulnerabilidad est\u00e9 siendo explotada activamente, la gravedad del fallo exige atenci\u00f3n inmediata.<\/p>\n<h2>Medidas de mitigaci\u00f3n<\/h2>\n<p>Microsoft ya ha publicado parches para corregir esta vulnerabilidad. Es importante que todos los usuarios y organizaciones actualicen sus instalaciones de Outlook para proteger sus sistemas. Las actualizaciones necesarias pueden encontrarse en <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30103\">Microsoft Security Response Center<\/a>. Adem\u00e1s, se recomienda que los administradores de TI revisen y apliquen pol\u00edticas de seguridad adicionales para evitar futuros exploits. <\/p>\n<p>CVE-2024-30103 pone de manifiesto las dificultades que sigue planteando la protecci\u00f3n de programas inform\u00e1ticos de uso generalizado, como Microsoft Outlook. La naturaleza zero-click de esta vulnerabilidad subraya la importancia de mantener los sistemas actualizados en todo momento y refuerza la necesidad de unas pr\u00e1cticas de ciberseguridad s\u00f3lidas. Todos los usuarios y administradores de TI deber\u00edan dar prioridad a la aplicaci\u00f3n de los parches proporcionados por Microsoft para garantizar la seguridad de sus entornos digitales.<\/p>\n<p>Para m\u00e1s informaci\u00f3n y actualizaciones sobre la CVE-2024-30103, consulte la National Vulnerability Database y Microsoft Security Response Center\u200b\u200b. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2024-30103 es una vulnerabilidad de Microsoft Outlook que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). Este fallo tiene una caracter\u00edstica diferente: que su ejecuci\u00f3n no depende de ninguna interacci\u00f3n del usuario, es decir, basta con ver un correo electr\u00f3nico malicioso para que se produzca el ataque. Detalles de la vulnerabilidad Esta vulnerabilidad permite a los [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":20453,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778,1869],"class_list":["post-20455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es","tag-microsoft-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-30103 es una vulnerabilidad de Microsoft Outlook que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). Este fallo tiene una caracter\u00edstica diferente: que su ejecuci\u00f3n no depende de ninguna interacci\u00f3n del usuario, es decir, basta con ver un correo electr\u00f3nico malicioso para que se produzca el ataque. Detalles de la vulnerabilidad Esta vulnerabilidad permite a los [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-07T16:11:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook\",\"datePublished\":\"2024-08-07T16:11:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\"},\"wordCount\":368,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg\",\"keywords\":[\"cve\",\"Microsoft\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\",\"name\":\"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg\",\"datePublished\":\"2024-08-07T16:11:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg\",\"width\":928,\"height\":534,\"caption\":\"e-mail aberto em notebook: CVE-2024-30103\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados","og_description":"CVE-2024-30103 es una vulnerabilidad de Microsoft Outlook que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). Este fallo tiene una caracter\u00edstica diferente: que su ejecuci\u00f3n no depende de ninguna interacci\u00f3n del usuario, es decir, basta con ver un correo electr\u00f3nico malicioso para que se produzca el ataque. Detalles de la vulnerabilidad Esta vulnerabilidad permite a los [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2024-08-07T16:11:48+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook","datePublished":"2024-08-07T16:11:48+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/"},"wordCount":368,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg","keywords":["cve","Microsoft"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/","name":"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg","datePublished":"2024-08-07T16:11:48+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/07\/CVE-2024-30103.jpg","width":928,"height":534,"caption":"e-mail aberto em notebook: CVE-2024-30103"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-30103-vulnerabilidad-en-el-microsoft-outlook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-30103: Vulnerabilidad en el Microsoft Outlook"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=20455"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/20453"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=20455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=20455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=20455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}