{"version":"1.0","provider_name":"Perseus Technologies","provider_url":"https:\/\/perseus.de\/fr\/","title":"Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server - Perseus Technologies","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Jg68fOYX17\"><a href=\"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/\">Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/perseus.de\/fr\/guide-gratuit-vulnerabilites-dans-microsoft-exchange-server\/embed\/#?secret=Jg68fOYX17\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Guide gratuit : Vuln\u00e9rabilit\u00e9s dans Microsoft Exchange Server\u00a0\u00bb &#8212; Perseus Technologies\" data-secret=\"Jg68fOYX17\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/perseus.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cover-microsoft-768x589-1.png","thumbnail_width":768,"thumbnail_height":589,"description":"Il est devenu connu que des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 d\u00e9couvertes dans le logiciel serveur de transport de messagerie \u00ab Microsoft Exchange Server \u00bb. L\u2019aide d\u2019urgence Perseus fut particuli\u00e8rement utilis\u00e9e \u00e0 cette \u00e9poque. Tous les conseils obtenus, les instructions concr\u00e8tes pour la bonne conduite \u00e0 suivre pendant et apr\u00e8s un incident ainsi que des conseils utiles sur ce que vous pouvez faire pour mieux prot\u00e9ger votre entreprise se trouvent dans le livre blanc actuel de Perseus."}