<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Perseus Technologies</provider_name><provider_url>https://perseus.de/en/</provider_url><title>Compromised web applications - Perseus Technologies</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="OuuHT2KU9s"&gt;&lt;a href="https://perseus.de/en/compromised-web-applications/"&gt;Compromised web applications&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://perseus.de/en/compromised-web-applications/embed/#?secret=OuuHT2KU9s" width="600" height="338" title="&#x201C;Compromised web applications&#x201D; &#x2014; Perseus Technologies" data-secret="OuuHT2KU9s" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://perseus.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Compromised web applications Web applications are all programmes and sub-programmes that are accessed and used via the internet. These include, amongst other things, websites, contact forms, advertisements displayed on websites, moving images, and so on. Like all programmes, web applications also have vulnerabilities that can be exploited &#x2013; or compromised &#x2013; by cybercriminals for their [&hellip;]</description><thumbnail_url>https://perseus.de/wp-content/uploads/2025/05/Headerbild-Glossary-Page.png</thumbnail_url><thumbnail_width>800</thumbnail_width><thumbnail_height>800</thumbnail_height></oembed>
