{"id":3288,"date":"2021-06-18T07:22:30","date_gmt":"2021-06-18T07:22:30","guid":{"rendered":"https:\/\/cyberwatch.fr\/encyclopedia\/"},"modified":"2021-07-28T09:42:12","modified_gmt":"2021-07-28T09:42:12","slug":"encyclopedia","status":"publish","type":"page","link":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/","title":{"rendered":"Encyclopedia"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.9.4&#8243; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3c4b64&#8243; background_color_gradient_end=&#8221;#3c4b64&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_start_position=&#8221;27%&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg&#8221; background_blend=&#8221;overlay&#8221; custom_padding=&#8221;40px|0px|40px|0px||&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|0px|30px|0px|true|false&#8221;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_module=&#8221;2861&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][lwp_divi_breadcrumbs home_text=&#8221;Accueil&#8221; font_icon=&#8221;%%20%%&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|600||on|||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.3em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; width=&#8221;74%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h1>Vulnerability Encyclopedia<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;35px&#8221; header_line_height=&#8221;1.3em&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;30px&#8221; header_2_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;5px||||false|false&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Have a comprehensive information base on vulnerabilities<\/h2>\n<p>Access hourly updates on vulnerabilities, security alerts from vendors, and publicly available attack kits.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Request access&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;10px&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; custom_padding=&#8221;10px|45px|10px|15px|true|false&#8221; global_module=&#8221;2204&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_border_width__hover_enabled=&#8221;on|desktop&#8221; button_border_width__hover=&#8221;0px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Produits&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;1px||40px|||&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||false|false&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_color_phone=&#8221;off&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Left Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_filtres.png&#8221; alt=&#8221;Filter vulnerabilities by the technologies and criteria you are interested in&#8221; title_text=&#8221;Cyberwatch Vulnerability Encyclopedia Filter Feature&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;45px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||-1px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; module_alignment_tablet=&#8221;&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Filter vulnerabilities by the technologies and criteria you are interested in<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;45px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Use our search engine to access a relevant list of vulnerabilities, based on the technologies present in your information system, the CVSS score you are looking for, and the maturity level of the exploits available.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Request access&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#321FDB&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;|0px|||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|0px|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|45px|10px|15px|false|false&#8221; button_text_size_tablet=&#8221;&#8221; button_text_size_phone=&#8221;14px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; button_text_color_tablet=&#8221;&#8221; button_text_color_phone=&#8221;&#8221; button_text_color_last_edited=&#8221;on|desktop&#8221; button_icon_tablet=&#8221;&#8221; button_icon_phone=&#8221;&#8221; button_icon_last_edited=&#8221;on|phone&#8221; button_icon_color_tablet=&#8221;&#8221; button_icon_color_phone=&#8221;&#8221; button_icon_color_last_edited=&#8221;on|desktop&#8221; global_module=&#8221;2193&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Right Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|40px|0px|true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||-1px|||&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#ffffff&#8221; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Quickly identify the easiest and most impactful vulnerabilities to attack<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;45px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Our web crawlers scan the Internet every hour for new attack kits and vulnerabilities. This information is consolidated in our encyclopedia, and allows you to identify the vulnerabilities that have the most advanced attack kits, and the highest CVSS scores.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Request access&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#321FDB&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;|0px|||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|0px|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|45px|10px|15px|false|false&#8221; button_text_size_tablet=&#8221;&#8221; button_text_size_phone=&#8221;14px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; button_text_color_tablet=&#8221;&#8221; button_text_color_phone=&#8221;&#8221; button_text_color_last_edited=&#8221;on|desktop&#8221; button_icon_tablet=&#8221;&#8221; button_icon_phone=&#8221;&#8221; button_icon_last_edited=&#8221;on|phone&#8221; button_icon_color_tablet=&#8221;&#8221; button_icon_color_phone=&#8221;&#8221; button_icon_color_last_edited=&#8221;on|desktop&#8221; global_module=&#8221;2193&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_vulnerabiliteimpactante.png&#8221; alt=&#8221;Cyberwatch provides you with timely and relevant information about your vulnerabilities&#8221; title_text=&#8221;Cyberwatch watches over your vulnerabilities&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Left Sided Image&#8221; _builder_version=&#8221;4.9.4&#8243; custom_padding=&#8221;40px|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|false|false&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_cyberscore.png&#8221; title_text=&#8221;cyberwatch_encyclopedie_cyberscore&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;45px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||1px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Prioritize the vulnerabilities with the Cyberscore<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins||||||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;45px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; max_width=&#8221;700px&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221;]<\/p>\n<p>Cyberwatch automatically computes the real score of each vulnerability based on the <a href=\"https:\/\/cyberwatch.fr\/en\/vulnerability-manager-features\/\">Cyberscore<\/a>, which adds the Temporal metrics of the CVSS v3.1 score to each entry. The new score allows you to prioritize risks according to their ease of operation. You can also modify the vulnerability score to customize it to your needs.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Request access&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#321FDB&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; custom_margin=&#8221;|0px|||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|0px|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|45px|10px|15px|false|false&#8221; button_text_size_tablet=&#8221;&#8221; button_text_size_phone=&#8221;14px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; button_text_color_tablet=&#8221;&#8221; button_text_color_phone=&#8221;&#8221; button_text_color_last_edited=&#8221;on|desktop&#8221; button_icon_tablet=&#8221;&#8221; button_icon_phone=&#8221;&#8221; button_icon_last_edited=&#8221;on|phone&#8221; button_icon_color_tablet=&#8221;&#8221; button_icon_color_phone=&#8221;&#8221; button_icon_color_last_edited=&#8221;on|desktop&#8221; global_module=&#8221;2193&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.9.4&#8243; background_color=&#8221;#321FDB&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#000000&#8243; background_color_gradient_end=&#8221;#3c4b64&#8243; background_color_gradient_direction=&#8221;1deg&#8221; background_color_gradient_end_position=&#8221;0%&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg&#8221; background_blend=&#8221;overlay&#8221; custom_padding=&#8221;40px|0px|40px|0px||&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;3px||3px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;2em&#8221; header_font=&#8221;||||||||&#8221; header_text_align=&#8221;center&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#ffffff&#8221; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.4em&#8221; header_3_font=&#8221;Poppins||||||||&#8221; header_3_font_size=&#8221;25px&#8221; header_3_line_height=&#8221;1.5em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;80%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Receive automatically alerts on your vulnerabilities<\/h2>\n<p>Take advantage of our support and entrust us with the monitoring of your vulnerabilities. Thanks to our email and SMS alerts, you won&#8217;t miss any important information.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI4NSJ9fQ==@&#8221; button_text=&#8221;Find out more&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#ffffff&#8221; button_border_radius=&#8221;10px&#8221; button_use_icon=&#8221;off&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;-10px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;10px|30px|10px|30px|false|false&#8221; global_module=&#8221;2115&#8243; saved_tabs=&#8221;all&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#ffffff&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#000000&#8243; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_border_width__hover=&#8221;0px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/Formulaire_Blanc-1.png&#8221; custom_padding=&#8221;40px||40px||true|&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px||30px||true|false&#8221; global_module=&#8221;2139&#8243;][et_pb_row _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;1px||1px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#636F83&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;Poppins|||on|||||&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#535b7c&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.7em&#8221; header_2_font=&#8221;Poppins|500|||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;27px&#8221; header_2_line_height=&#8221;1.3em&#8221; header_3_font=&#8221;||||||||&#8221; header_3_text_align=&#8221;center&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_font_size=&#8221;27px&#8221; header_3_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;||||false|false&#8221; text_text_color_tablet=&#8221;&#8221; text_text_color_phone=&#8221;#3C4B64&#8243; text_text_color_last_edited=&#8221;on|phone&#8221; header_2_text_color_tablet=&#8221;&#8221; header_2_text_color_phone=&#8221;#000000&#8243; header_2_text_color_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;&#8221; header_2_font_size_phone=&#8221;22px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221;]<\/p>\n<h2>Do you have a question?<br \/>Do you want to schedule a free demo?<\/h2>\n<p>Contact-us and our experts will get back to you within 24h.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@&#8221; button_text=&#8221;Get a free demo&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.9.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#321fdb&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;RGBA(0,0,0,0)&#8221; button_border_radius=&#8221;10px&#8221; button_font=&#8221;Poppins||||||||&#8221; button_icon=&#8221;%%3%%&#8221; button_icon_color=&#8221;#ffffff&#8221; button_on_hover=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;10px|35px|10px|15px|false|false&#8221; transform_styles__hover_enabled=&#8221;on|hover&#8221; transform_scale__hover_enabled=&#8221;on|hover&#8221; transform_translate__hover_enabled=&#8221;on|desktop&#8221; transform_rotate__hover_enabled=&#8221;on|desktop&#8221; transform_skew__hover_enabled=&#8221;on|desktop&#8221; transform_origin__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#301abf&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/cyberwatch.fr\/en\/\" class=\"home\"><span property=\"name\">Accueil<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">5<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Vulnerability EncyclopediaHave a comprehensive information base on vulnerabilities Access hourly updates on vulnerabilities, security alerts from vendors, and publicly available attack kits.Filter vulnerabilities by the technologies and criteria you are interested inUse our search engine to access a relevant list of vulnerabilities, based on the technologies present in your information system, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6897,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-3288","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Complete database of vulnerabilities and their exploits - Encyclopedia<\/title>\n<meta name=\"description\" content=\"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Complete database of vulnerabilities and their exploits - Encyclopedia\" \/>\n<meta property=\"og:description\" content=\"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-28T09:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Complete database of vulnerabilities and their exploits - Encyclopedia\" \/>\n<meta name=\"twitter:description\" content=\"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\",\"url\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\",\"name\":\"Complete database of vulnerabilities and their exploits - Encyclopedia\",\"isPartOf\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png\",\"datePublished\":\"2021-06-18T07:22:30+00:00\",\"dateModified\":\"2021-07-28T09:42:12+00:00\",\"description\":\"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png\",\"width\":1200,\"height\":628,\"caption\":\"Logo cyberwatch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberwatch.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encyclopedia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#website\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\/\/cyberwatch.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"contentUrl\":\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Complete database of vulnerabilities and their exploits - Encyclopedia","description":"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/","og_locale":"en_US","og_type":"article","og_title":"Complete database of vulnerabilities and their exploits - Encyclopedia","og_description":"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits","og_url":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/","og_site_name":"Cyberwatch","article_modified_time":"2021-07-28T09:42:12+00:00","og_image":[{"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Complete database of vulnerabilities and their exploits - Encyclopedia","twitter_description":"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits","twitter_image":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/06\/metas-site.png","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/","url":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/","name":"Complete database of vulnerabilities and their exploits - Encyclopedia","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","datePublished":"2021-06-18T07:22:30+00:00","dateModified":"2021-07-28T09:42:12+00:00","description":"Get detailed information on vulnerabilities, vendor security alerts, public attack kits, and exploits","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/en\/encyclopedia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","width":1200,"height":628,"caption":"Logo cyberwatch"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/en\/encyclopedia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Encyclopedia"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/en\/#website","url":"https:\/\/cyberwatch.fr\/en\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/en\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/comments?post=3288"}],"version-history":[{"count":13,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3288\/revisions"}],"predecessor-version":[{"id":4035,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/pages\/3288\/revisions\/4035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media\/6897"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/en\/wp-json\/wp\/v2\/media?parent=3288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}