{"id":2435,"date":"2018-01-12T16:51:34","date_gmt":"2018-01-12T16:51:34","guid":{"rendered":"https:\/\/newsite.inuvika.com\/?p=2435"},"modified":"2025-06-30T12:15:40","modified_gmt":"2025-06-30T16:15:40","slug":"avis-sur-lexploitation-de-meltdown-et-spectre","status":"publish","type":"post","link":"https:\/\/www.inuvika.com\/fr\/meltdown-and-spectre-exploit-advisory\/","title":{"rendered":"Avis sur l'exploitation de Meltdown et Spectre"},"content":{"rendered":"<p>Mise \u00e0 jour d'Inuvika concernant CVE-2017-5754, CVE-2017-5715 et CVE-2017-5753 (failles de s\u00e9curit\u00e9 Spectre et Meltdown).<\/p>\n<h2>Vue d'ensemble<\/h2>\n<p>R\u00e9cemment, de nouveaux probl\u00e8mes de s\u00e9curit\u00e9 ont \u00e9t\u00e9 identifi\u00e9s concernant les architectures de CPU bas\u00e9es sur Intel, AMD et ARM.<\/p>\n<p>Bien que la nature de ces probl\u00e8mes soit li\u00e9e au mat\u00e9riel, Inuvika continue d'examiner l'impact potentiel sur OVD Enterprise. Cette mise \u00e0 jour a pour but de conseiller nos clients et partenaires sur les mesures actuellement connues qui peuvent \u00eatre prises pour att\u00e9nuer les risques \u00e9ventuels.  Inuvika fournira des mises \u00e0 jour suppl\u00e9mentaires si des impacts directs sur OVD sont identifi\u00e9s.<\/p>\n<h3>Impact sur l'entreprise OVD<\/h3>\n<p>Inuvika estime que <a href=\"\/fr\/soutien\/#download\">actuellement pris en charge<\/a> versions d'OVD Enterprise ne sont pas <em>directement<\/em> touch\u00e9s par les probl\u00e8mes de s\u00e9curit\u00e9 connus.<\/p>\n<p>Cependant, les probl\u00e8mes de s\u00e9curit\u00e9 peuvent \u00eatre exploit\u00e9s \u00e0 la fois localement (c'est-\u00e0-dire au sein du m\u00eame syst\u00e8me d'exploitation) et \u00e0 travers la fronti\u00e8re de l'invit\u00e9 de la virtualisation.\u00a0 \u00a0<strong>Par cons\u00e9quent, le micrologiciel de l'unit\u00e9 centrale sous-jacente, l'hyperviseur, les syst\u00e8mes d'exploitation invit\u00e9s, les plateformes en nuage et d'autres composants tiers qui font partie d'un environnement OVD Enterprise peuvent n\u00e9cessiter des mises \u00e0 jour.\u00a0<\/strong><\/p>\n<h2>\u00c9tat connu des composants tiers<\/h2>\n<ul>\n<li>Microsoft a publi\u00e9 des correctifs pour les versions 2008 R2, 2012 R2 et 2016 du syst\u00e8me d'exploitation Windows Server. (R\u00e9f : <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\">https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution<\/a> )<\/li>\n<li>Des mises \u00e0 jour du noyau et du microcode du processeur ont \u00e9t\u00e9 mises \u00e0 disposition pour les syst\u00e8mes d'exploitation Ubuntu 16.04 LTS et Ubuntu 14.04 LTS.  (R\u00e9f : <a href=\"https:\/\/wiki.ubuntu.com\/SecurityTeam\/KnowledgeBase\/SpectreAndMeltdown\">https:\/\/wiki.ubuntu.com\/SecurityTeam\/KnowledgeBase\/SpectreAndMeltdown<\/a> )<\/li>\n<li>Des mises \u00e0 jour du noyau et du microcode du processeur ont \u00e9t\u00e9 mises \u00e0 disposition pour les syst\u00e8mes d'exploitation Red Hat Enterprise Linux 6 et 7. (R\u00e9f : <a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/speculativeexecution\">https:\/\/access.redhat.com\/security\/vulnerabilities\/speculativeexecution<\/a> )<\/li>\n<li>VMware a publi\u00e9 des correctifs pour vSphere ESXi.<\/li>\n<li>Les nuages de Google, Microsoft et Amazon ont \u00e9t\u00e9 pris en compte.  Pour plus d'informations, consultez les sites web des fournisseurs.<\/li>\n<li>Navigateur Mozilla Firefox. (R\u00e9f : <a href=\"https:\/\/blog.mozilla.org\/security\/2018\/01\/03\/mitigations-landing-new-class-timing-attack\/\">https:\/\/blog.mozilla.org\/security\/2018\/01\/03\/mitigations-landing-new-class-timing-attack\/<\/a> )<\/li>\n<li>Apple iOS, macOS et Safari. (R\u00e9f : <a href=\"https:\/\/support.apple.com\/en-us\/HT208394\">https:\/\/support.apple.com\/en-us\/HT208394<\/a> )<\/li>\n<li>Infrastructure de convergence Nutanix Hyper. (Se r\u00e9f\u00e9rer \u00e0 l'avis de s\u00e9curit\u00e9 #0007 dans le portail de support : <a href=\"https:\/\/portal.nutanix.com\/#\/page\/static\/securityAdvisories\">https:\/\/portal.nutanix.com\/#\/page\/static\/securityAdvisories<\/a> )<\/li>\n<li>Avis de s\u00e9curit\u00e9 d'Intel. (Ref : https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00088&amp;languageid=en-fr )<\/li>\n<\/ul>\n<h2>Recommandations actuelles pour les clients d'OVD Enterprise<\/h2>\n<ol>\n<li>Avant de commencer la mise \u00e0 jour, faites une pause et \u00e9laborez un plan d'ensemble.  \u00c9valuez chaque \u00e9l\u00e9ment de votre environnement OVD et identifiez les mesures \u00e0 prendre.  Inuvika vous recommande de donner la priorit\u00e9 aux \u00e9l\u00e9ments suivants :\n<ol style=\"list-style-type: lower-alpha;\">\n<li>Appareils d'hypervision et mat\u00e9riel serveur h\u00e9bergeant des OVD<\/li>\n<li>Syst\u00e8mes d'exploitation invit\u00e9s<\/li>\n<li>Syst\u00e8mes dorsaux (mat\u00e9riel des serveurs d'annuaire, de stockage et d'application, et leurs syst\u00e8mes d'exploitation)<\/li>\n<li>Applications r\u00e9sidant sur vos serveurs d'application<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li value=\"2\">Contactez les fournisseurs OEM de votre mat\u00e9riel ou de vos logiciels pour obtenir les informations les plus r\u00e9centes et les correctifs disponibles.<\/li>\n<\/ol>\n<ol>\n<li value=\"3\">Appliquez les correctifs recommand\u00e9s. Apr\u00e8s l'application d'un correctif, v\u00e9rifiez que le composant fonctionne comme pr\u00e9vu.<\/li>\n<\/ol>\n<ol>\n<li value=\"4\">En outre, les appareils clients, leurs syst\u00e8mes d'exploitation et les applications qui acc\u00e8dent \u00e0 votre environnement OVD peuvent n\u00e9cessiter des mises \u00e0 jour.  Nous vous recommandons de contacter l'\u00e9quipementier de votre appareil pour plus d'informations.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>Inuvika Update Regarding CVE-2017-5754, CVE-2017-5715 and CVE-2017-5753 (Spectre and Meltdown Security Flaws) Overview Recently, new security-related issues have been identified impacting Intel, AMD, and ARM-based CPU architectures. While the nature [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,67,66],"tags":[70,79],"class_list":["post-2435","post","type-post","status-publish","format-standard","hentry","category-news","category-ovd-enterprise","category-support","tag-announcements","tag-security"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meltdown and Spectre Exploit Advisory - Inuvika<\/title>\n<meta name=\"description\" content=\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inuvika.com\/fr\/avis-sur-lexploitation-de-meltdown-et-spectre\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meltdown and Spectre Exploit Advisory - Inuvika\" \/>\n<meta property=\"og:description\" content=\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inuvika.com\/fr\/avis-sur-lexploitation-de-meltdown-et-spectre\/\" \/>\n<meta property=\"og:site_name\" content=\"Inuvika\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inuvika\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-12T16:51:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T16:15:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"718\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"inuvika\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InuvikaInc\" \/>\n<meta name=\"twitter:site\" content=\"@InuvikaInc\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"},\"author\":{\"name\":\"inuvika\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/person\\\/3dce21cd04a407041a24be571b54137e\"},\"headline\":\"Meltdown and Spectre Exploit Advisory\",\"datePublished\":\"2018-01-12T16:51:34+00:00\",\"dateModified\":\"2025-06-30T16:15:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"},\"wordCount\":445,\"publisher\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\"},\"keywords\":[\"Announcements\",\"Security\"],\"articleSection\":[\"News\",\"OVD Enterprise\",\"Support\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\",\"name\":\"Meltdown and Spectre Exploit Advisory - Inuvika\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#website\"},\"datePublished\":\"2018-01-12T16:51:34+00:00\",\"dateModified\":\"2025-06-30T16:15:40+00:00\",\"description\":\"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/meltdown-and-spectre-exploit-advisory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inuvika.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meltdown and Spectre Exploit Advisory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#website\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/\",\"name\":\"inuvika.com\",\"description\":\"Apps + Desktops to any device!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inuvika.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#organization\",\"name\":\"Inuvika Inc\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.inuvika.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/inuvika-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.inuvika.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/inuvika-logo.png\",\"width\":718,\"height\":169,\"caption\":\"Inuvika Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/inuvika\\\/\",\"https:\\\/\\\/x.com\\\/InuvikaInc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/inuvika-inc-\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC4nWPydrDItH1KMWqfQw8aA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inuvika.com\\\/#\\\/schema\\\/person\\\/3dce21cd04a407041a24be571b54137e\",\"name\":\"inuvika\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g\",\"caption\":\"inuvika\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avis d'exploitation de Meltdown et Spectre - Inuvika","description":"Inuvika estime que les versions d'OVD Enterprise actuellement prises en charge ne sont pas directement affect\u00e9es par les probl\u00e8mes de s\u00e9curit\u00e9 connus.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inuvika.com\/fr\/avis-sur-lexploitation-de-meltdown-et-spectre\/","og_locale":"fr_FR","og_type":"article","og_title":"Meltdown and Spectre Exploit Advisory - Inuvika","og_description":"Inuvika believes that currently-supported versions of OVD Enterprise are not directly impacted by the known security issues.\u00a0","og_url":"https:\/\/www.inuvika.com\/fr\/avis-sur-lexploitation-de-meltdown-et-spectre\/","og_site_name":"Inuvika","article_publisher":"https:\/\/www.facebook.com\/inuvika\/","article_published_time":"2018-01-12T16:51:34+00:00","article_modified_time":"2025-06-30T16:15:40+00:00","og_image":[{"width":718,"height":169,"url":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.jpg","type":"image\/jpeg"}],"author":"inuvika","twitter_card":"summary_large_image","twitter_creator":"@InuvikaInc","twitter_site":"@InuvikaInc","twitter_misc":{"\u00c9crit par":false,"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#article","isPartOf":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"},"author":{"name":"inuvika","@id":"https:\/\/www.inuvika.com\/#\/schema\/person\/3dce21cd04a407041a24be571b54137e"},"headline":"Meltdown and Spectre Exploit Advisory","datePublished":"2018-01-12T16:51:34+00:00","dateModified":"2025-06-30T16:15:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"},"wordCount":445,"publisher":{"@id":"https:\/\/www.inuvika.com\/#organization"},"keywords":["Announcements","Security"],"articleSection":["News","OVD Enterprise","Support"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/","url":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/","name":"Avis d'exploitation de Meltdown et Spectre - Inuvika","isPartOf":{"@id":"https:\/\/www.inuvika.com\/#website"},"datePublished":"2018-01-12T16:51:34+00:00","dateModified":"2025-06-30T16:15:40+00:00","description":"Inuvika estime que les versions d'OVD Enterprise actuellement prises en charge ne sont pas directement affect\u00e9es par les probl\u00e8mes de s\u00e9curit\u00e9 connus.\u00a0","breadcrumb":{"@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inuvika.com\/meltdown-and-spectre-exploit-advisory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inuvika.com\/"},{"@type":"ListItem","position":2,"name":"Meltdown and Spectre Exploit Advisory"}]},{"@type":"WebSite","@id":"https:\/\/www.inuvika.com\/#website","url":"https:\/\/www.inuvika.com\/","name":"inuvika.com","description":"Apps + Desktops sur n'importe quel appareil !","publisher":{"@id":"https:\/\/www.inuvika.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inuvika.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.inuvika.com\/#organization","name":"Inuvika Inc","url":"https:\/\/www.inuvika.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.inuvika.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.png","contentUrl":"https:\/\/www.inuvika.com\/wp-content\/uploads\/2018\/10\/inuvika-logo.png","width":718,"height":169,"caption":"Inuvika Inc"},"image":{"@id":"https:\/\/www.inuvika.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inuvika\/","https:\/\/x.com\/InuvikaInc","https:\/\/www.linkedin.com\/company\/inuvika-inc-\/","https:\/\/www.youtube.com\/channel\/UC4nWPydrDItH1KMWqfQw8aA"]},{"@type":"Person","@id":"https:\/\/www.inuvika.com\/#\/schema\/person\/3dce21cd04a407041a24be571b54137e","name":"inuvika","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3fd02665c9f370276f5686b17375b209374886f7697d9e1bcd2e3da4d5d104a2?s=96&d=mm&r=g","caption":"inuvika"}}]}},"brizy_media":[],"_links":{"self":[{"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/comments?post=2435"}],"version-history":[{"count":0,"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/posts\/2435\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/media?parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/categories?post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inuvika.com\/fr\/wp-json\/wp\/v2\/tags?post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}