{"id":15774,"date":"2024-03-04T11:38:56","date_gmt":"2024-03-04T11:38:56","guid":{"rendered":"https:\/\/ramsdata.com.pl\/opswat\/technologies\/evaluation-de-la-vulnerabilite-a-partir-de-fichiers\/"},"modified":"2024-03-16T11:58:37","modified_gmt":"2024-03-16T11:58:37","slug":"evaluation-de-la-vulnerabilite-a-partir-de-fichiers","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/fr\/opswat\/technologies\/evaluation-de-la-vulnerabilite-a-partir-de-fichiers\/","title":{"rendered":"\u00c9valuation de la vuln\u00e9rabilit\u00e9 \u00e0 partir de fichiers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15774\" class=\"elementor elementor-15774 elementor-11619\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-426a921f e-flex e-con-boxed e-con e-parent\" data-id=\"426a921f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63dc2dcc e-con-full e-flex e-con e-child\" data-id=\"63dc2dcc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-629209cd elementor-widget elementor-widget-image\" data-id=\"629209cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"145\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp\" class=\"attachment-large size-large wp-image-13341\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b0c147 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"28b0c147\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">\u00c9valuation de la vuln\u00e9rabilit\u00e9<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5dfe44ce e-flex e-con-boxed e-con e-parent\" data-id=\"5dfe44ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31e37442 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"31e37442\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65094df0 elementor-widget elementor-widget-heading\" data-id=\"65094df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">\u00c9valuation de la vuln\u00e9rabilit\u00e9<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320d63fe e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"320d63fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4653d901 elementor-widget elementor-widget-heading\" data-id=\"4653d901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">D\u00e9tecter les lacunes en mati\u00e8re de s\u00e9curit\u00e9 des applications\navant leur installation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af35814 elementor-widget elementor-widget-text-editor\" data-id=\"6af35814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Notre technologie d&rsquo;\u00e9valuation des vuln\u00e9rabilit\u00e9s bas\u00e9e sur les fichiers d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans les applications et les fichiers avant qu&rsquo;ils ne soient install\u00e9s. Nous utilisons notre technologie brevet\u00e9e (U.S. 9749349 B1) pour corr\u00e9ler les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans les composants logiciels, les installateurs de produits, les microprogrammes et de nombreux autres types de fichiers binaires collect\u00e9s aupr\u00e8s d&rsquo;une vaste communaut\u00e9 d&rsquo;utilisateurs et d&rsquo;entreprises clientes.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ee9ab09 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3ee9ab09\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bea4df4 elementor-widget elementor-widget-heading\" data-id=\"6bea4df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Augmentation des vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 des logiciels<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1b2833 elementor-widget elementor-widget-text-editor\" data-id=\"5b1b2833\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Plus les logiciels sont complexes, plus le nombre de failles de s\u00e9curit\u00e9 augmente. Chaque ann\u00e9e, un nouveau record est \u00e9tabli pour le nombre de vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 connues, y compris non seulement les vuln\u00e9rabilit\u00e9s des syst\u00e8mes d&rsquo;exploitation et des applications, mais aussi les composants binaires, les microprogrammes de l&rsquo;internet des objets (IoT) et d&rsquo;autres vuln\u00e9rabilit\u00e9s bas\u00e9es sur des fichiers.<\/p>\n<p>Les failles dans la s\u00e9curit\u00e9 des logiciels sont de plus en plus nombreuses. Depuis 2002, le nombre total de failles dans les logiciels a augment\u00e9 en moyenne de 12 % par an.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16e13239 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"16e13239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71fc5a4c elementor-widget elementor-widget-heading\" data-id=\"71fc5a4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Augmentation rapide des failles de s\u00e9curit\u00e9 dans les fichiers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-276fdc1e elementor-widget elementor-widget-text-editor\" data-id=\"276fdc1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les vuln\u00e9rabilit\u00e9s bas\u00e9es sur les fichiers sont l&rsquo;une des cat\u00e9gories de vuln\u00e9rabilit\u00e9s qui ont connu la croissance la plus rapide ces derni\u00e8res ann\u00e9es.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bcea219 e-flex e-con-boxed e-con e-child\" data-id=\"5bcea219\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-303504d elementor-widget elementor-widget-image\" data-id=\"303504d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"360\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22.png\" class=\"attachment-large size-large wp-image-14466\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22.png 1000w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22-300x135.png 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22-768x346.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20a2341b elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"20a2341b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e7d5c95\" data-id=\"1e7d5c95\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28662b59 elementor-widget elementor-widget-image\" data-id=\"28662b59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp\" class=\"attachment-medium size-medium wp-image-13021\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png.webp 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10cb9385 elementor-widget elementor-widget-heading\" data-id=\"10cb9385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">D\u00e9monstration de la technologie - \u00e9valuation de la vuln\u00e9rabilit\u00e9 des applications et des fichiers<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5da0cf elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"e5da0cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-e5da0cf\" class=\"eael-advance-tabs eael-tabs-vertical eael-tab-auto-active  active-caret-on responsive-vertical-layout\" data-tabid=\"e5da0cf\">\n            <div class=\"eael-tabs-nav \">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"dtection-des-installateurs-vulnrables\" class=\"active-default eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"dtection-des-installateurs-vulnrables-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >D\u00e9tection des installateurs vuln\u00e9rables<\/span>                                                    <\/li>\n                                            <li id=\"plus-dun-milliard-de-points-de-donnes\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"plus-dun-milliard-de-points-de-donnes-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Plus d&rsquo;un milliard de points de donn\u00e9es<\/span>                                                    <\/li>\n                                            <li id=\"vulnrabilits-des-logiciels-et-des-microprogrammes-de-lido\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"vulnrabilits-des-logiciels-et-des-microprogrammes-de-lido-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Vuln\u00e9rabilit\u00e9s des logiciels et des microprogrammes de l&rsquo;IdO<\/span>                                                    <\/li>\n                                            <li id=\"valuer-les-vulnrabilits-avant-leur-mise-en-uvre\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"valuer-les-vulnrabilits-avant-leur-mise-en-uvre-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >\u00c9valuer les vuln\u00e9rabilit\u00e9s avant leur mise en \u0153uvre<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"dtection-des-installateurs-vulnrables-tab\" class=\"clearfix eael-tab-content-item active-default\" data-title-link=\"dtection-des-installateurs-vulnrables-tab\">\n\t\t\t\t        <p>Des millions d&rsquo;utilisateurs sont vuln\u00e9rables aux attaques qui exploitent les failles de s\u00e9curit\u00e9. L&rsquo;une des meilleures pratiques en mati\u00e8re de cybers\u00e9curit\u00e9 consiste \u00e0 d\u00e9tecter et \u00e0 emp\u00eacher les installateurs de s&rsquo;introduire dans les r\u00e9seaux et de les utiliser pour propager des vuln\u00e9rabilit\u00e9s.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"plus-dun-milliard-de-points-de-donnes-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"plus-dun-milliard-de-points-de-donnes-tab\">\n\t\t\t\t        <p>Les vuln\u00e9rabilit\u00e9s associ\u00e9es \u00e0 des composants binaires sp\u00e9cifiques sont difficiles \u00e0 d\u00e9tecter \u00e0 l&rsquo;aide de la technologie traditionnelle de d\u00e9tection des vuln\u00e9rabilit\u00e9s. Notre technologie innovante a recueilli et analys\u00e9 plus d&rsquo;un milliard de points de donn\u00e9es logicielles sensibles (et ce chiffre ne cesse de cro\u00eetre) provenant d&rsquo;appareils en circulation et utilise ces donn\u00e9es comme base pour l&rsquo;\u00e9valuation des vuln\u00e9rabilit\u00e9s en fonction des composants logiciels.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"vulnrabilits-des-logiciels-et-des-microprogrammes-de-lido-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"vulnrabilits-des-logiciels-et-des-microprogrammes-de-lido-tab\">\n\t\t\t\t        <p>Les failles de s\u00e9curit\u00e9 dans les logiciels et les microprogrammes de l&rsquo;IdO sont de plus en plus importantes. Les appareils IoT sont g\u00e9n\u00e9ralement con\u00e7us pour des fonctions sp\u00e9cifiques et ne comportent aucune pr\u00e9caution. Emp\u00eacher le d\u00e9ploiement de microprogrammes vuln\u00e9rables sur les appareils IoT est une mesure de s\u00e9curit\u00e9 essentielle compte tenu de la croissance rapide de ces appareils. Notre technologie de d\u00e9tection des vuln\u00e9rabilit\u00e9s est capable de d\u00e9tecter les vuln\u00e9rabilit\u00e9s des logiciels avant leur installation et leur d\u00e9ploiement.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"valuer-les-vulnrabilits-avant-leur-mise-en-uvre-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"valuer-les-vulnrabilits-avant-leur-mise-en-uvre-tab\">\n\t\t\t\t        <p>La plupart des solutions d&rsquo;analyse des vuln\u00e9rabilit\u00e9s identifient les failles lors de l&rsquo;installation de l&rsquo;application, ce qui cr\u00e9e une fen\u00eatre de d\u00e9tection qui peut \u00eatre exploit\u00e9e. La technologie brevet\u00e9e d&rsquo;OPSWAT (U.S. 9749349 B1) \u00e9value et identifie les vuln\u00e9rabilit\u00e9s \u00e0 l&rsquo;aide de fichiers binaires associ\u00e9s \u00e0 des composants vuln\u00e9rables ou \u00e0 des versions sp\u00e9cifiques d&rsquo;une application. Donne aux administrateurs informatiques la possibilit\u00e9 de :<\/p>\n<ul>\n<li>Avant l&rsquo;installation, v\u00e9rifiez que certains types de logiciels ne pr\u00e9sentent pas de failles de s\u00e9curit\u00e9 connues.<\/li>\n<li>Analyser les syst\u00e8mes pour d\u00e9tecter les failles de s\u00e9curit\u00e9 connues lorsque les appareils sont au repos<\/li>\n<li>V\u00e9rifier rapidement si les applications en cours d&rsquo;ex\u00e9cution et les biblioth\u00e8ques qui y sont charg\u00e9es pr\u00e9sentent des failles de s\u00e9curit\u00e9.<\/li>\n<\/ul>\n                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00c9valuation de la vuln\u00e9rabilit\u00e9 \u00c9valuation de la vuln\u00e9rabilit\u00e9 D\u00e9tecter les lacunes en mati\u00e8re de s\u00e9curit\u00e9 des applications avant leur installation Notre technologie d&rsquo;\u00e9valuation des vuln\u00e9rabilit\u00e9s bas\u00e9e sur les fichiers d\u00e9tecte les vuln\u00e9rabilit\u00e9s dans les applications et les fichiers avant qu&rsquo;ils ne soient install\u00e9s. Nous utilisons notre technologie brevet\u00e9e (U.S. 9749349 B1) pour corr\u00e9ler les vuln\u00e9rabilit\u00e9s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15631,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15774","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/comments?post=15774"}],"version-history":[{"count":1,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15774\/revisions"}],"predecessor-version":[{"id":15784,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15774\/revisions\/15784"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/pages\/15631"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/fr\/wp-json\/wp\/v2\/media?parent=15774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}