{"id":8088,"date":"2025-02-05T09:26:39","date_gmt":"2025-02-05T09:26:39","guid":{"rendered":"https:\/\/cyberwatch.fr\/enciclopedia\/"},"modified":"2025-02-05T09:26:44","modified_gmt":"2025-02-05T09:26:44","slug":"enciclopedia","status":"publish","type":"page","link":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/","title":{"rendered":"Enciclopedia"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.9.4&#8243; background_enable_color=\u00bboff\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_start=\u00bb#3c4b64&#8243; background_color_gradient_end=\u00bb#3c4b64&#8243; background_color_gradient_type=\u00bbradial\u00bb background_color_gradient_start_position=\u00bb27%\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg\u00bb background_blend=\u00bboverlay\u00bb custom_padding=\u00bb40px|0px|40px|0px||\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px|0px|30px|0px|true|false\u00bb][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||||false|false\u00bb global_module=\u00bb2861&#8243;][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][lwp_divi_breadcrumbs home_text=\u00bbAccueil\u00bb font_icon=\u00bb%%20%%\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][\/lwp_divi_breadcrumbs][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px||false|false\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbPoppins|600||on|||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb18px\u00bb text_line_height=\u00bb1.3em\u00bb header_font=\u00bbPoppins|||on|||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb18px\u00bb header_line_height=\u00bb1.2em\u00bb text_orientation=\u00bbcenter\u00bb width=\u00bb74%\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb||||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb16px\u00bb text_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h1>Enciclopedia de vulnerabilidades<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_text_color=\u00bb#ffffff\u00bb header_font_size=\u00bb35px\u00bb header_line_height=\u00bb1.3em\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb30px\u00bb header_2_line_height=\u00bb1.2em\u00bb text_orientation=\u00bbcenter\u00bb width_tablet=\u00bb\u00bb width_phone=\u00bb100%\u00bb width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb5px||||false|false\u00bb header_font_size_tablet=\u00bb\u00bb header_font_size_phone=\u00bb25px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>Disponer de una base de datos completa de informaci\u00f3n sobre vulnerabilidades<\/h2>\n<p>Acceda a actualizaciones cada hora sobre vulnerabilidades, alertas de seguridad de proveedores y kits de ataque disponibles p\u00fablicamente.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@\u00bb button_text=\u00bbSolicitar acceso\u00bb button_alignment=\u00bbcenter\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb10px\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb custom_padding=\u00bb10px|45px|10px|15px|true|false\u00bb global_module=\u00bb2204&#8243; saved_tabs=\u00bball\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_border_width__hover_enabled=\u00bbon|desktop\u00bb button_border_width__hover=\u00bb0px\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbProduits\u00bb _builder_version=\u00bb4.9.4&#8243; background_color=\u00bb#ffffff\u00bb custom_padding=\u00bb1px||40px|||\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px||30px||false|false\u00bb background_last_edited=\u00bbon|phone\u00bb background_enable_color_phone=\u00bboff\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado izquierdo\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb0px|0px|0px|0px|false|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_filtres.png\u00bb alt=\u00bbFiltra las vulnerabilidades seg\u00fan las tecnolog\u00edas y los criterios que te interesan\u00bb title_text=\u00bbFunci\u00f3n de filtrado de la enciclopedia de vulnerabilidades de Cyberwatch\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb45px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||-1px|||\u00bb text_font_tablet=\u00bb\u00bb text_font_phone=\u00bb\u00bb text_font_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb module_alignment_tablet=\u00bb\u00bb module_alignment_phone=\u00bbcenter\u00bb module_alignment_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>Filtra las vulnerabilidades seg\u00fan las tecnolog\u00edas y los criterios que te interesan<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb45px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb text_font_tablet=\u00bb\u00bb text_font_phone=\u00bb\u00bb text_font_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]<\/p>\n<p>Utilice nuestro motor de b\u00fasqueda para acceder a una lista relevante de vulnerabilidades, en funci\u00f3n de las tecnolog\u00edas presentes en su sistema de informaci\u00f3n, el puntaje CVSS buscado y el nivel de madurez de los exploits disponibles.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@\u00bb button_text=\u00bbSolicitar acceso\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#321FDB\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb custom_margin=\u00bb|0px|||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|45px|10px|15px|false|false\u00bb button_text_size_tablet=\u00bb\u00bb button_text_size_phone=\u00bb14px\u00bb button_text_size_last_edited=\u00bbon|phone\u00bb button_text_color_tablet=\u00bb\u00bb button_text_color_phone=\u00bb\u00bb button_text_color_last_edited=\u00bbon|desktop\u00bb button_icon_tablet=\u00bb\u00bb button_icon_phone=\u00bb\u00bb button_icon_last_edited=\u00bbon|phone\u00bb button_icon_color_tablet=\u00bb\u00bb button_icon_color_phone=\u00bb\u00bb button_icon_color_last_edited=\u00bbon|desktop\u00bb global_module=\u00bb2193&#8243; saved_tabs=\u00bball\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado derecho\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|40px|0px|true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb30px||30px||true|false\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||-1px|||\u00bb text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#ffffff\u00bb text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>Identifique r\u00e1pidamente las vulnerabilidades m\u00e1s f\u00e1ciles de atacar y de mayor impacto<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb45px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb text_font_tablet=\u00bb\u00bb text_font_phone=\u00bb\u00bb text_font_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]<\/p>\n<p>Nuestros rastreadores escanean Internet cada hora en busca de nuevos kits de ataque y vulnerabilidades. Esta informaci\u00f3n est\u00e1 consolidada en nuestra enciclopedia, y permite identificar las vulnerabilidades que tienen los kits de ataque m\u00e1s avanzados y los puntajes CVSS m\u00e1s altos. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@\u00bb button_text=\u00bbSolicitar acceso\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#321FDB\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb custom_margin=\u00bb|0px|||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|45px|10px|15px|false|false\u00bb button_text_size_tablet=\u00bb\u00bb button_text_size_phone=\u00bb14px\u00bb button_text_size_last_edited=\u00bbon|phone\u00bb button_text_color_tablet=\u00bb\u00bb button_text_color_phone=\u00bb\u00bb button_text_color_last_edited=\u00bbon|desktop\u00bb button_icon_tablet=\u00bb\u00bb button_icon_phone=\u00bb\u00bb button_icon_last_edited=\u00bbon|phone\u00bb button_icon_color_tablet=\u00bb\u00bb button_icon_color_phone=\u00bb\u00bb button_icon_color_last_edited=\u00bbon|desktop\u00bb global_module=\u00bb2193&#8243; saved_tabs=\u00bball\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_vulnerabiliteimpactante.png\u00bb alt=\u00bbCyberwatch le proporciona informaci\u00f3n relevante sobre sus vulnerabilidades lo m\u00e1s r\u00e1pido posible\u00bb title_text=\u00bbCyberwatch monitorea tus vulnerabilidades\u00bb disabled_on=\u00bbon|on|off\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_2,1_2&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbImagen del lado izquierdo\u00bb _builder_version=\u00bb4.9.4&#8243; custom_padding=\u00bb40px|0px|0px|0px|false|false\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb0px|0px|0px|0px|false|false\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_image src=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/cyberwatch_encyclopedie_cyberscore.png\u00bb title_text=\u00bbEnciclopedia Cyberwatch y Cyberscore\u00bb disabled_on=\u00bbon|on|off\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb45px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||1px|||\u00bb text_font_tablet=\u00bb\u00bb text_font_phone=\u00bb\u00bb text_font_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>Priorizar las vulnerabilidades con Cyberscore<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins||||||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb45px\u00bb header_line_height=\u00bb1.4em\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb max_width=\u00bb700px\u00bb max_width_tablet=\u00bb\u00bb max_width_phone=\u00bb100%\u00bb max_width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb text_font_tablet=\u00bb\u00bb text_font_phone=\u00bb\u00bb text_font_last_edited=\u00bbon|phone\u00bb text_orientation_tablet=\u00bb\u00bb text_orientation_phone=\u00bbcenter\u00bb text_orientation_last_edited=\u00bbon|phone\u00bb]<\/p>\n<p>Cyberwatch calcula autom\u00e1ticamente la puntuaci\u00f3n real de cada vulnerabilidad utilizando <a href=\"https:\/\/cyberwatch.fr\/vulnerability-manager-fonctionnalites\/\">Cyberscore<\/a> , que agrega las m\u00e9tricas temporales de la puntuaci\u00f3n CVSS v3.1 a cada entrada. La nueva puntuaci\u00f3n as\u00ed obtenida permite priorizar los riesgos en funci\u00f3n de su facilidad de explotaci\u00f3n. Tambi\u00e9n puede cambiar la puntuaci\u00f3n de vulnerabilidad para personalizarla y adaptarla a sus necesidades.  <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@\u00bb button_text=\u00bbSolicitar acceso\u00bb button_alignment=\u00bbleft\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_bg_color=\u00bb#321FDB\u00bb button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb custom_margin=\u00bb|0px|||false|false\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb|0px|||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|45px|10px|15px|false|false\u00bb button_text_size_tablet=\u00bb\u00bb button_text_size_phone=\u00bb14px\u00bb button_text_size_last_edited=\u00bbon|phone\u00bb button_text_color_tablet=\u00bb\u00bb button_text_color_phone=\u00bb\u00bb button_text_color_last_edited=\u00bbon|desktop\u00bb button_icon_tablet=\u00bb\u00bb button_icon_phone=\u00bb\u00bb button_icon_last_edited=\u00bbon|phone\u00bb button_icon_color_tablet=\u00bb\u00bb button_icon_color_phone=\u00bb\u00bb button_icon_color_last_edited=\u00bbon|desktop\u00bb global_module=\u00bb2193&#8243; saved_tabs=\u00bball\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbFeatures\u00bb _builder_version=\u00bb4.9.4&#8243; background_color=\u00bb#321FDB\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_start=\u00bb#000000&#8243; background_color_gradient_end=\u00bb#3c4b64&#8243; background_color_gradient_direction=\u00bb1deg\u00bb background_color_gradient_end_position=\u00bb0%\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/coding-background-texture.jpg\u00bb background_blend=\u00bboverlay\u00bb custom_padding=\u00bb40px|0px|40px|0px||\u00bb][et_pb_row _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb3px||3px|||\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#ffffff\u00bb text_font_size=\u00bb16px\u00bb text_line_height=\u00bb2em\u00bb header_font=\u00bb||||||||\u00bb header_text_align=\u00bbcenter\u00bb header_2_font=\u00bbPoppins||||||||\u00bb header_2_text_align=\u00bbcenter\u00bb header_2_text_color=\u00bb#ffffff\u00bb header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.4em\u00bb header_3_font=\u00bbPoppins||||||||\u00bb header_3_font_size=\u00bb25px\u00bb header_3_line_height=\u00bb1.5em\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb80%\u00bb max_width_tablet=\u00bb100%\u00bb max_width_phone=\u00bb100%\u00bb max_width_last_edited=\u00bbon|phone\u00bb module_alignment=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Reciba alertas autom\u00e1ticamente sobre sus vulnerabilidades<\/h2>\n<p>Benef\u00edciese de nuestro apoyo y conf\u00edenos la vigilancia de sus vulnerabilidades. Gracias a nuestro sistema de alerta por correo electr\u00f3nico y SMS, nunca m\u00e1s te pierdas informaci\u00f3n importante. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI4NSJ9fQ==@\u00bb button_text=\u00bbM\u00e1s informaci\u00f3n\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#ffffff\u00bb button_border_radius=\u00bb10px\u00bb button_use_icon=\u00bboff\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb-10px||||false|false\u00bb custom_margin_last_edited=\u00bbon|phone\u00bb custom_padding=\u00bb10px|30px|10px|30px|false|false\u00bb global_module=\u00bb2115&#8243; saved_tabs=\u00bball\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#ffffff\u00bb button_bg_enable_color__hover=\u00bbon\u00bb button_text_color__hover_enabled=\u00bbon|hover\u00bb button_text_color__hover=\u00bb#000000&#8243; button_border_width__hover_enabled=\u00bbon|hover\u00bb button_border_width__hover=\u00bb0px\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/05\/Formulaire_Blanc-1.png\u00bb custom_padding=\u00bb40px||40px||true|\u00bb custom_padding_tablet=\u00bb\u00bb custom_padding_phone=\u00bb30px||30px||true|false\u00bb global_module=\u00bb2139&#8243;][et_pb_row _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb1px||1px|||\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.4&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text _builder_version=\u00bb4.9.4&#8243; text_font=\u00bbPoppins|300|||||||\u00bb text_text_color=\u00bb#636F83&#8243; text_font_size=\u00bb16px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bbPoppins|||on|||||\u00bb header_text_align=\u00bbleft\u00bb header_text_color=\u00bb#535b7c\u00bb header_font_size=\u00bb27px\u00bb header_line_height=\u00bb1.7em\u00bb header_2_font=\u00bbPoppins|500|||||||\u00bb header_2_text_color=\u00bb#000000&#8243; header_2_font_size=\u00bb27px\u00bb header_2_line_height=\u00bb1.3em\u00bb header_3_font=\u00bb||||||||\u00bb header_3_text_align=\u00bbcenter\u00bb header_3_text_color=\u00bb#000000&#8243; header_3_font_size=\u00bb27px\u00bb header_3_line_height=\u00bb1.4em\u00bb text_orientation=\u00bbcenter\u00bb max_width=\u00bb700px\u00bb module_alignment=\u00bbcenter\u00bb custom_padding=\u00bb||||false|false\u00bb text_text_color_tablet=\u00bb\u00bb text_text_color_phone=\u00bb#3C4B64&#8243; text_text_color_last_edited=\u00bbon|phone\u00bb header_2_text_color_tablet=\u00bb\u00bb header_2_text_color_phone=\u00bb#000000&#8243; header_2_text_color_last_edited=\u00bbon|phone\u00bb header_2_font_size_tablet=\u00bb\u00bb header_2_font_size_phone=\u00bb22px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb]<\/p>\n<h2>\u00bfTienes alguna pregunta?<br \/>\u00bfQuieres una demostraci\u00f3n?<\/h2>\n<p>Cont\u00e1ctenos y nuestros expertos le responder\u00e1n dentro de 24 horas.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc3NiJ9fQ==@\u00bb button_text=\u00bbSolicitar una demostraci\u00f3n\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bb\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.9.4&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb16px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#321fdb\u00bb button_border_width=\u00bb2px\u00bb button_border_color=\u00bbRGBA(0,0,0,0)\u00bb button_border_radius=\u00bb10px\u00bb button_font=\u00bbPoppins||||||||\u00bb button_icon=\u00bb%%3%%\u00bb button_icon_color=\u00bb#ffffff\u00bb button_on_hover=\u00bboff\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb||||false|false\u00bb custom_padding=\u00bb10px|35px|10px|15px|false|false\u00bb transform_styles__hover_enabled=\u00bbon|hover\u00bb transform_scale__hover_enabled=\u00bbon|hover\u00bb transform_translate__hover_enabled=\u00bbon|desktop\u00bb transform_rotate__hover_enabled=\u00bbon|desktop\u00bb transform_skew__hover_enabled=\u00bbon|desktop\u00bb transform_origin__hover_enabled=\u00bbon|desktop\u00bb button_bg_color__hover_enabled=\u00bbon|hover\u00bb button_bg_color__hover=\u00bb#301abf\u00bb button_bg_enable_color__hover=\u00bbon\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"et_pb_module lwp_divi_breadcrumbs lwp_divi_breadcrumbs_0\">\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"et_pb_module_inner\">\n\t\t\t\t\t<div class=\"lwp-breadcrumbs\"> <span class=\"before\"><\/span> <span vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\"><span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" href=\"https:\/\/cyberwatch.fr\/es\/\" class=\"home\"><span property=\"name\">Accueil<\/span><\/a><meta property=\"position\" content=\"1\"><\/span> <span class=\"separator et-pb-icon\">5<\/span> <\/span><\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>Enciclopedia de vulnerabilidadesDisponer de una base de datos completa de informaci\u00f3n sobre vulnerabilidades Acceda a actualizaciones cada hora sobre vulnerabilidades, alertas de seguridad de proveedores y kits de ataque disponibles p\u00fablicamente.Filtra las vulnerabilidades seg\u00fan las tecnolog\u00edas y los criterios que te interesanUtilice nuestro motor de b\u00fasqueda para acceder a una lista [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7690,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-8088","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia<\/title>\n<meta name=\"description\" content=\"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwatch.fr\/es\/enciclopedia\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia\" \/>\n<meta property=\"og:description\" content=\"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwatch.fr\/es\/enciclopedia\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwatch\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-05T09:26:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia\" \/>\n<meta name=\"twitter:description\" content=\"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/\",\"name\":\"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"datePublished\":\"2025-02-05T09:26:39+00:00\",\"dateModified\":\"2025-02-05T09:26:44+00:00\",\"description\":\"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/meta-cyberwatch.png\",\"width\":1200,\"height\":628,\"caption\":\"Logo cyberwatch\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/enciclopedia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enciclopedia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\",\"name\":\"Cyberwatch\",\"description\":\"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#organization\",\"name\":\"Cyberwatch\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"contentUrl\":\"https:\\\/\\\/cyberwatch.fr\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo_simple_black.png\",\"width\":1883,\"height\":500,\"caption\":\"Cyberwatch\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwatch.fr\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia","description":"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/","og_locale":"es_ES","og_type":"article","og_title":"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia","og_description":"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.","og_url":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/","og_site_name":"Cyberwatch","article_modified_time":"2025-02-05T09:26:44+00:00","og_image":[{"url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia","twitter_description":"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.","twitter_image":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch-1024x536.png","twitter_misc":{"Tiempo de lectura":"15 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/","url":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/","name":"Base de datos completa de vulnerabilidades y sus exploits - Enciclopedia","isPartOf":{"@id":"https:\/\/cyberwatch.fr\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/#primaryimage"},"image":{"@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","datePublished":"2025-02-05T09:26:39+00:00","dateModified":"2025-02-05T09:26:44+00:00","description":"Obtenga informaci\u00f3n detallada sobre vulnerabilidades, avisos de seguridad de proveedores, kits de ataque p\u00fablicos y exploits.","breadcrumb":{"@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwatch.fr\/es\/enciclopedia\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/#primaryimage","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2023\/04\/meta-cyberwatch.png","width":1200,"height":628,"caption":"Logo cyberwatch"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwatch.fr\/es\/enciclopedia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwatch.fr\/es\/"},{"@type":"ListItem","position":2,"name":"Enciclopedia"}]},{"@type":"WebSite","@id":"https:\/\/cyberwatch.fr\/es\/#website","url":"https:\/\/cyberwatch.fr\/es\/","name":"Cyberwatch","description":"Supervisez vos vuln\u00e9rabilit\u00e9s. Contr\u00f4lez vos conformit\u00e9s.","publisher":{"@id":"https:\/\/cyberwatch.fr\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwatch.fr\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cyberwatch.fr\/es\/#organization","name":"Cyberwatch","url":"https:\/\/cyberwatch.fr\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberwatch.fr\/es\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","contentUrl":"https:\/\/cyberwatch.fr\/wp-content\/uploads\/2021\/04\/logo_simple_black.png","width":1883,"height":500,"caption":"Cyberwatch"},"image":{"@id":"https:\/\/cyberwatch.fr\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/comments?post=8088"}],"version-history":[{"count":6,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8088\/revisions"}],"predecessor-version":[{"id":8098,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/pages\/8088\/revisions\/8098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/media\/7690"}],"wp:attachment":[{"href":"https:\/\/cyberwatch.fr\/es\/wp-json\/wp\/v2\/media?parent=8088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}