{"id":54309,"date":"2024-04-17T16:05:18","date_gmt":"2024-04-17T20:05:18","guid":{"rendered":"https:\/\/sdtimes.com\/?p=54309"},"modified":"2024-04-17T15:59:25","modified_gmt":"2024-04-17T19:59:25","slug":"report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/","title":{"rendered":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is compared to around 75% for JavaScript services, 64% for Python, and 50% for .NET. The average for all languages studied was 47%<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company found that Java services are also more likely to be actively exploited compared to other languages. Fifty-five percent have suffered from this, compared to a 7% average for other languages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Datadog believes this may be due to the fact that there are many prevalent vulnerabilities in popular Java libraries, such as Tomcat, Spring Framework, Apache Struts, Log4j, and ActiveMQ.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThe hypothesis is reinforced when we examine where these vulnerabilities typically originate. In <\/span><span style=\"font-weight: 400;\">Java, 63 percent of high and critical vulnerabilities derive from indirect dependencies\u2014 <\/span><span style=\"font-weight: 400;\">i.e., third-party libraries that have been indirectly packaged with the application. These <\/span><span style=\"font-weight: 400;\">vulnerabilities are typically more challenging to identify, as the additional libraries in which they <\/span><span style=\"font-weight: 400;\">appear are often introduced into an application unknowingly,\u201d Datadog wrote in the report.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company says this serves as a reminder that developers need to consider the full dependency tree when scanning for application vulnerabilities, not just the direct dependencies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second major finding of the report is that the largest number of exploitation attempts is done by automated security scanners, but that most of those attacks aren\u2019t harmful and are just a source of noise for companies trying to defend against attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Only 0.0065 percent of attacks performed by automated security scanners actually triggered vulnerabilities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Given the prevalence of these attacks but their harmlessness, Datadog believes this underscores the need for a good system for prioritizing alerts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the report, over 4,000 high and 1,000 critical vulnerabilities were discovered by the CVE project last year. However, <\/span><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa015\/5905457\"><span style=\"font-weight: 400;\">research published<\/span><\/a><span style=\"font-weight: 400;\"> in the Journal of Cybersecurity in 2020 found that only 5 percent of vulnerabilities are ever actually exploited.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cGiven these numbers, it&#8217;s easy to see why practitioners are overwhelmed with the amount of <\/span><span style=\"font-weight: 400;\">vulnerabilities they face, and why they need prioritization frameworks to help them focus on <\/span><span style=\"font-weight: 400;\">what matters,\u201d Datadog wrote.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Datadog found that organizations who have made efforts to address their critical vulnerabilities have success in removing them. Sixty-three percent of organizations that had a critical CVE at one point no longer have any, and 30% have seen the number of critical vulnerabilities reduced by half.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company recommends that organizations prioritize vulnerabilities based on if the impacted service is publicly exposed, the vulnerability is running in production, or there is publicly available code for the exploit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWhile other vulnerabilities might still carry risk, they should likely be addressed only after issues that meet these three criteria,\u201d Datadog wrote.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other interesting findings in Datadog\u2019s report are that lightweight container images lead to fewer vulnerabilities, adoption of infrastructure as code is high, manual cloud deployments are still widespread, and usage of short-lived credentials in CI\/CD pipelines is still low. <\/span><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.\u00a0 This is compared to around 75% for JavaScript services, 64% for Python, and 50% for .NET. The average for all languages studied was 47% The company found that Java services are also  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":752,"featured_media":54310,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[5788,8749,167,45,16101,3342],"coauthors":[11687],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times<\/title>\n<meta name=\"description\" content=\"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times\" \/>\n<meta property=\"og:description\" content=\"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-17T20:05:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-17T19:59:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenna Barron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Barron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\"},\"author\":{\"name\":\"Jenna Barron\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\"},\"headline\":\"Report: Java is the language that\u2019s most prone to third-party vulnerabilities\",\"datePublished\":\"2024-04-17T20:05:18+00:00\",\"dateModified\":\"2024-04-17T19:59:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\"},\"wordCount\":492,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg\",\"keywords\":[\"Datadog\",\"DevSecOps\",\"Java\",\"security\",\"Supply Chain Security\",\"vulnerabilities\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\",\"url\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\",\"name\":\"Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg\",\"datePublished\":\"2024-04-17T20:05:18+00:00\",\"dateModified\":\"2024-04-17T19:59:25+00:00\",\"description\":\"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report: Java is the language that\u2019s most prone to third-party vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786\",\"name\":\"Jenna Barron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g\",\"caption\":\"Jenna Barron\"},\"description\":\"Jenna Barron is News Editor of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/jennifer-sargent\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times","description":"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times","og_description":"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.","og_url":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-04-17T20:05:18+00:00","article_modified_time":"2024-04-17T19:59:25+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg","type":"image\/jpeg"}],"author":"Jenna Barron","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"Jenna Barron","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/"},"author":{"name":"Jenna Barron","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786"},"headline":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities","datePublished":"2024-04-17T20:05:18+00:00","dateModified":"2024-04-17T19:59:25+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/"},"wordCount":492,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg","keywords":["Datadog","DevSecOps","Java","security","Supply Chain Security","vulnerabilities"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/","url":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/","name":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg","datePublished":"2024-04-17T20:05:18+00:00","dateModified":"2024-04-17T19:59:25+00:00","description":"According to Datadog\u2019s State of DevSecOps 2024 report, 90% of Java services have at least one or more critical or higher severity vulnerabilities.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/04\/pexels-travis-saylor-271738-951408.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/security\/report-java-is-the-language-thats-most-prone-to-third-party-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"Report: Java is the language that\u2019s most prone to third-party vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/f2524e55ae19da07ea3613577da9f786","name":"Jenna Barron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/b4be3423b187642936e62f121111345e","url":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b128943929626cdcafccbac86bd306f9?s=96&d=mm&r=g","caption":"Jenna Barron"},"description":"Jenna Barron is News Editor of SD Times.","url":"https:\/\/sdtimes.com\/author\/jennifer-sargent\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54309"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/752"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=54309"}],"version-history":[{"count":1,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54309\/revisions"}],"predecessor-version":[{"id":54311,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/54309\/revisions\/54311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/54310"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=54309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=54309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=54309"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=54309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}