{"id":26554,"date":"2022-04-20T17:24:00","date_gmt":"2022-04-20T15:24:00","guid":{"rendered":"https:\/\/perseus.de\/exploit\/"},"modified":"2026-03-30T10:02:12","modified_gmt":"2026-03-30T08:02:12","slug":"exploit","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/exploit\/","title":{"rendered":"Exploit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26554\" class=\"elementor elementor-26554 elementor-22251\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Exploit<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53b92b48 e-flex e-con-boxed e-con e-parent\" data-id=\"53b92b48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3bef2ebb e-con-full e-flex e-con e-child\" data-id=\"3bef2ebb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Le terme se traduit par \u00ab exploiter, exploiter \u00bb et d\u00e9signe les programmes informatiques qui d\u00e9tectent les failles de s\u00e9curit\u00e9. Les cybercriminels utilisent g\u00e9n\u00e9ralement des programmes d\u2019exploitation qui exploitent les vuln\u00e9rabilit\u00e9s qu\u2019ils trouvent. Par cons\u00e9quent, les exploits sont consid\u00e9r\u00e9s comme des programmes <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">malveillants<\/a>.  <\/p><h4> <\/h4><h4>Que signifie en d\u00e9tail le terme exploit ?<\/h4><div> <\/div><ul><li>Les programmes d\u2019exploitation sont \u00e9galement utilis\u00e9s par les programmeurs pour d\u00e9couvrir des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 puis les corriger.<\/li><li>Les cybercriminels distribuent les programmes d\u2019exploitation malveillants de deux mani\u00e8res principales :<ul><li>Via banni\u00e8res publicitaires : Apr\u00e8s avoir cliqu\u00e9 sur la publicit\u00e9, le programme d\u2019exploitation est t\u00e9l\u00e9charg\u00e9 sans \u00eatre remarqu\u00e9.<\/li><li>En fichiers, principalement en pi\u00e8ces jointes par email<\/li><\/ul><\/li><\/ul><p> <\/p><p>Si un cybercriminel d\u00e9couvre une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 jusque-l\u00e0 inconnue, il peut l\u2019exploiter jusqu\u2019\u00e0 ce qu\u2019elle soit connue et cl\u00f4tur\u00e9e par une mise \u00e0 jour. Cependant, tant que la mise \u00e0 jour en question n\u2019a pas \u00e9t\u00e9 install\u00e9e, la vuln\u00e9rabilit\u00e9 en question peut \u00eatre exploit\u00e9e.<br>Les cybercriminels aiment utiliser les soi-disant \u00ab kits d\u2019exploitation \u00bb. Cela inclut plusieurs programmes d\u2019exploitation diff\u00e9rents qui v\u00e9rifient un syst\u00e8me \u00e0 la recherche de diff\u00e9rentes vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9.  <\/p><h4> <\/h4><h4>O\u00f9 est-ce que je rencontre des failles dans mon travail quotidien ?<\/h4><div> <\/div><p>Comme beaucoup d\u2019autres programmes malveillants, vous pouvez rencontrer des failles sur Internet ou dans votre programme de messagerie.<\/p><ul><li>Les banni\u00e8res publicitaires diffusant des exploits peuvent \u00e9galement \u00eatre plac\u00e9es sur des sites totalement l\u00e9gitimes (voir <a href=\"https:\/\/perseus.de\/2022\/04\/22\/malvertising\/\">malvertising<\/a>).<\/li><li>Les e-mails contenant des failles peuvent sembler l\u00e9gitimes au premier coup d\u2019\u0153il, voire deuxi\u00e8mement. Par exemple, ils semblent provenir d\u2019un de vos clients ou contenir une application. Votre attention et votre approche critique de la publicit\u00e9 sur Internet et par e-mail peuvent sauver votre entreprise de dommages importants caus\u00e9s par des exploits.  <\/li><\/ul><h4> <\/h4><h4>Que puis-je faire pour me prot\u00e9ger des exploits ?<\/h4><div> <\/div><p>De nombreuses mesures visant \u00e0 renforcer la <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybersicherheit\/\">cybers\u00e9curit\u00e9<\/a> de votre entreprise prot\u00e8gent \u00e9galement contre les exploits. En particulier : <\/p><ul><li>Si possible, utilisez un <a href=\"https:\/\/perseus.de\/2022\/03\/21\/ad-blocker\/\">bloqueur de publicit\u00e9s<\/a> pour bloquer les banni\u00e8res.<\/li><li>Ne cliquez jamais sur les banni\u00e8res publicitaires. Si vous voyez une publicit\u00e9 tr\u00e8s int\u00e9ressante, allez manuellement \u00e0 la page correspondante. <\/li><li>Soyez extr\u00eamement critique envers les e-mails. V\u00e9rifiez leur authenticit\u00e9 au moindre soup\u00e7on, si n\u00e9cessaire \u00e0 plusieurs \u00e9tapes. Les d\u00e9g\u00e2ts que vous pouvez \u00e9viter avec elle justifient l\u2019effort.  <\/li><li>Gardez toujours votre syst\u00e8me d\u2019exploitation, tous les logiciels et surtout vos antivirus \u00e0 jour, installez <a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\">les mises \u00e0 jour<\/a> d\u00e8s que possible.<\/li><li>Utilisez un <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">pare-feu<\/a> qui bloque le trafic ind\u00e9sirable.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-778fb2e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"778fb2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Exploit Le terme se traduit par \u00ab exploiter, exploiter \u00bb et d\u00e9signe les programmes informatiques qui d\u00e9tectent les failles de s\u00e9curit\u00e9. Les cybercriminels utilisent g\u00e9n\u00e9ralement des programmes d\u2019exploitation qui exploitent les vuln\u00e9rabilit\u00e9s qu\u2019ils trouvent. Par cons\u00e9quent, les exploits sont consid\u00e9r\u00e9s comme des programmes malveillants. Que signifie en d\u00e9tail le terme exploit ? Les programmes d\u2019exploitation [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26554","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/exploit\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Exploit Le terme se traduit par \u00ab exploiter, exploiter \u00bb et d\u00e9signe les programmes informatiques qui d\u00e9tectent les failles de s\u00e9curit\u00e9. Les cybercriminels utilisent g\u00e9n\u00e9ralement des programmes d\u2019exploitation qui exploitent les vuln\u00e9rabilit\u00e9s qu\u2019ils trouvent. Par cons\u00e9quent, les exploits sont consid\u00e9r\u00e9s comme des programmes malveillants. Que signifie en d\u00e9tail le terme exploit ? Les programmes d\u2019exploitation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T15:24:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T08:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Exploit\",\"datePublished\":\"2022-04-20T15:24:00+00:00\",\"dateModified\":\"2026-03-30T08:02:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/\"},\"wordCount\":454,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/\",\"name\":\"Exploit - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-20T15:24:00+00:00\",\"dateModified\":\"2026-03-30T08:02:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/exploit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/exploit\/","og_locale":"fr_FR","og_type":"article","og_title":"Exploit - Perseus Technologies","og_description":"Exploit Le terme se traduit par \u00ab exploiter, exploiter \u00bb et d\u00e9signe les programmes informatiques qui d\u00e9tectent les failles de s\u00e9curit\u00e9. Les cybercriminels utilisent g\u00e9n\u00e9ralement des programmes d\u2019exploitation qui exploitent les vuln\u00e9rabilit\u00e9s qu\u2019ils trouvent. Par cons\u00e9quent, les exploits sont consid\u00e9r\u00e9s comme des programmes malveillants. Que signifie en d\u00e9tail le terme exploit ? Les programmes d\u2019exploitation [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/exploit\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-20T15:24:00+00:00","article_modified_time":"2026-03-30T08:02:12+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/exploit\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/exploit\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Exploit","datePublished":"2022-04-20T15:24:00+00:00","dateModified":"2026-03-30T08:02:12+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/exploit\/"},"wordCount":454,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/exploit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/exploit\/","url":"https:\/\/perseus.de\/fr\/exploit\/","name":"Exploit - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/exploit\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/exploit\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-20T15:24:00+00:00","dateModified":"2026-03-30T08:02:12+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/exploit\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/exploit\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/exploit\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Exploit"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26554"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26554\/revisions"}],"predecessor-version":[{"id":26555,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26554\/revisions\/26555"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}