{"id":26261,"date":"2022-04-10T11:46:00","date_gmt":"2022-04-10T09:46:00","guid":{"rendered":"https:\/\/perseus.de\/applications-web-compromises\/"},"modified":"2026-03-27T13:22:45","modified_gmt":"2026-03-27T12:22:45","slug":"applications-web-compromises","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/applications-web-compromises\/","title":{"rendered":"Applications web compromises"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26261\" class=\"elementor elementor-26261 elementor-22341\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Applications web compromises\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79f6947c e-flex e-con-boxed e-con e-parent\" data-id=\"79f6947c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6588cc2a e-con-full e-flex e-con e-child\" data-id=\"6588cc2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Les applications web d\u00e9signent l&rsquo;ensemble des programmes et sous-programmes accessibles et utilisables via Internet. Cela comprend notamment les sites web, les formulaires de contact, les publicit\u00e9s diffus\u00e9es sur les sites web, les images anim\u00e9es, etc. Comme tous les programmes, les applications web pr\u00e9sentent des failles qui peuvent \u00eatre exploit\u00e9es \u2013 c&rsquo;est-\u00e0-dire compromises \u2013 par des cybercriminels \u00e0 leurs propres fins. Une application web ainsi compromise peut, par exemple, rediriger un visiteur vers un autre site web, lui proposer sous un pr\u00e9texte fallacieux de t\u00e9l\u00e9charger un <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">logiciel malveillant<\/a> ou espionner ses donn\u00e9es afin, par exemple, de prendre le contr\u00f4le de son compte utilisateur sur le site web compromis.   <\/p><h4> <\/h4><h4>Qu&rsquo;est-ce que cela signifie en d\u00e9tail ?<\/h4><p>Il existe diff\u00e9rentes appellations pour d\u00e9signer les applications web compromises. Par exemple : attaques contre les applications web. <\/p><p>Parmi les formes d&rsquo;attaque les plus courantes, on peut citer :<\/p><ul><li>Cross-Site Scripting : une faille est exploit\u00e9e pour introduire un programme qui s&rsquo;ex\u00e9cute lors de l&rsquo;appel de l&rsquo;application web<\/li><li>Injection SQL : un code malveillant SQL est saisi dans un champ de saisie de l&rsquo;application web. En cas de r\u00e9ussite, le cybercriminel peut acc\u00e9der \u00e0 la base de donn\u00e9es SQL connect\u00e9e \u00e0 l&rsquo;application web <\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/malvertising\/\">Malvertising <\/a>: diffusion, sur un site web, de publicit\u00e9s en ligne contenant des programmes malveillants.<\/li><\/ul><p>Les cybercriminels appr\u00e9cient particuli\u00e8rement d&rsquo;exploiter les failles des applications web tr\u00e8s r\u00e9pandues. Parmi celles-ci figurent notamment les syst\u00e8mes de gestion de contenu tels que WordPress. <\/p><h3> <\/h3><h4>O\u00f9 est-ce que je rencontre ce th\u00e8me dans mon travail quotidien ?<\/h4><p>Dans votre travail quotidien, vous pouvez vous-m\u00eame \u00eatre r\u00e9guli\u00e8rement confront\u00e9 \u00e0 des applications web compromises. Si, par exemple, vous cliquez sur une annonce int\u00e9ressante qui vous invite \u00e0 mettre \u00e0 jour votre lecteur Flash et vous fournit imm\u00e9diatement un lien \u00e0 cet effet, vous avez probablement affaire \u00e0 une application web compromise. (T\u00e9l\u00e9chargez toujours les mises \u00e0 jour directement depuis le site du fabricant du programme concern\u00e9 et acc\u00e9dez \u00e0 ce site manuellement.) Mais le site web de votre propre entreprise peut \u00e9galement \u00eatre compromis. Par exemple, si des cybercriminels exploitent une faille de votre serveur ou ont obtenu un ou plusieurs mots de passe provenant d\u2019autres sources. Ou, si, comme de nombreuses entreprises, vous utilisez un syst\u00e8me de gestion de contenu tel que WordPress : lorsqu\u2019une faille de ce syst\u00e8me est exploit\u00e9e.     <\/p><h3> <\/h3><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p>R\u00e8gles importantes concernant votre utilisation des applications web :<\/p><ul><li>Ne cliquez jamais sur les publicit\u00e9s en ligne.<\/li><li>T\u00e9l\u00e9chargez toujours les mises \u00e0 jour directement depuis le site du fabricant, en y acc\u00e9dant manuellement.<\/li><li>Veillez \u00e0 toujours maintenir votre navigateur (par exemple Firefox, Microsoft Edge, Safari, Google Chrome) \u00e0 jour et installez les mises \u00e0 jour d\u00e8s que possible.<\/li><\/ul><p> <\/p><p>Informations importantes pour le site web de votre entreprise :<\/p><ul><li>Veillez \u00e0 ce que tous vos syst\u00e8mes soient toujours \u00e0 jour et installez les<a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\"> mises \u00e0 jour<\/a> d\u00e8s que possible.<\/li><li>Si vous diffusez des publicit\u00e9s, veillez \u00e0 les faire v\u00e9rifier minutieusement afin de d\u00e9tecter tout logiciel malveillant ou lien suspect.<\/li><li>Utilisez des<a href=\"https:\/\/perseus.de\/2022\/04\/22\/passwortsicherheit\/\"> mots de passe<\/a> s\u00fbrs et uniques.<\/li><li>Envisagez de mettre en place un <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">pare-feu<\/a> pour applications web.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06514bd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"06514bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Applications web compromises Les applications web d\u00e9signent l&rsquo;ensemble des programmes et sous-programmes accessibles et utilisables via Internet. Cela comprend notamment les sites web, les formulaires de contact, les publicit\u00e9s diffus\u00e9es sur les sites web, les images anim\u00e9es, etc. Comme tous les programmes, les applications web pr\u00e9sentent des failles qui peuvent \u00eatre exploit\u00e9es \u2013 c&rsquo;est-\u00e0-dire compromises [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26261","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Applications web compromises - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/applications-web-compromises\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Applications web compromises - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Applications web compromises Les applications web d\u00e9signent l&rsquo;ensemble des programmes et sous-programmes accessibles et utilisables via Internet. Cela comprend notamment les sites web, les formulaires de contact, les publicit\u00e9s diffus\u00e9es sur les sites web, les images anim\u00e9es, etc. Comme tous les programmes, les applications web pr\u00e9sentent des failles qui peuvent \u00eatre exploit\u00e9es \u2013 c&rsquo;est-\u00e0-dire compromises [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/applications-web-compromises\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-10T09:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T12:22:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Applications web compromises\",\"datePublished\":\"2022-04-10T09:46:00+00:00\",\"dateModified\":\"2026-03-27T12:22:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/\",\"name\":\"Applications web compromises - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-10T09:46:00+00:00\",\"dateModified\":\"2026-03-27T12:22:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/applications-web-compromises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Applications web compromises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Applications web compromises - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/applications-web-compromises\/","og_locale":"fr_FR","og_type":"article","og_title":"Applications web compromises - Perseus Technologies","og_description":"Applications web compromises Les applications web d\u00e9signent l&rsquo;ensemble des programmes et sous-programmes accessibles et utilisables via Internet. Cela comprend notamment les sites web, les formulaires de contact, les publicit\u00e9s diffus\u00e9es sur les sites web, les images anim\u00e9es, etc. Comme tous les programmes, les applications web pr\u00e9sentent des failles qui peuvent \u00eatre exploit\u00e9es \u2013 c&rsquo;est-\u00e0-dire compromises [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/applications-web-compromises\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-10T09:46:00+00:00","article_modified_time":"2026-03-27T12:22:45+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Applications web compromises","datePublished":"2022-04-10T09:46:00+00:00","dateModified":"2026-03-27T12:22:45+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/applications-web-compromises\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/","url":"https:\/\/perseus.de\/fr\/applications-web-compromises\/","name":"Applications web compromises - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-10T09:46:00+00:00","dateModified":"2026-03-27T12:22:45+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/applications-web-compromises\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/applications-web-compromises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Applications web compromises"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26261"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26261\/revisions"}],"predecessor-version":[{"id":26262,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26261\/revisions\/26262"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}