{"id":27892,"date":"2021-09-27T16:34:00","date_gmt":"2021-09-27T14:34:00","guid":{"rendered":"https:\/\/perseus.de\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/"},"modified":"2026-03-31T07:32:28","modified_gmt":"2026-03-31T05:32:28","slug":"la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/","title":{"rendered":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27892\" class=\"elementor elementor-27892 elementor-22959\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>27.09.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>En raison d\u2019une faille de s\u00e9curit\u00e9, Google Chrome et Microsoft Edge pourraient tous deux devenir la cible de cyberattaques. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et comment vous pouvez le mieux vous prot\u00e9ger. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans un article du 24 septembre 2021, les d\u00e9veloppeurs de Chrome de Google Project Zero ont signal\u00e9 une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 (CVE-2021-37973 \u00ab \u00e9lev\u00e9 \u00bb) et d\u2019\u00e9ventuelles attaques qui en d\u00e9coulaient. Les vuln\u00e9rabilit\u00e9s se trouvent dans l\u2019interface de programmation d\u2019applications (API) Portals. Puisque celui-ci appartient \u00e0 Chromium \u2013 la variante open source du navigateur \u2013 les navigateurs bas\u00e9s sur cette variante d\u2019autres fabricants sont \u00e9galement concern\u00e9s : par exemple, Microsoft Edge, le navigateur web du fabricant Windows Microsoft.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quels sont les dangers pour mon entreprise ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vuln\u00e9rabilit\u00e9 peut \u00eatre utilis\u00e9e \u00e0 distance par les attaquants pour acc\u00e9der \u00e0 des informations, extraire un code de programme arbitraire, effectuer des attaques par d\u00e9ni de service et installer des logiciels malveillants. Il met \u00e9galement en garde contre d\u2019autres attaques non sp\u00e9cifi\u00e9es. Aucun privil\u00e8ge sp\u00e9cifique n\u2019est requis pour que les attaquants exploitent la vuln\u00e9rabilit\u00e9. Cela ne n\u00e9cessite que l\u2019interaction des utilisateurs, par exemple le clic sur un lien.   <\/p><p>Selon l\u2019Office f\u00e9d\u00e9ral allemand de la s\u00e9curit\u00e9 de l\u2019information (BSI), Google a d\u00e9j\u00e0 ferm\u00e9 plusieurs vuln\u00e9rabilit\u00e9s dans Chrome.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ce que vous pouvez faire \u2013 Pers\u00e9e recommande :<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Les versions obsol\u00e8tes des navigateurs repr\u00e9sentent un risque de s\u00e9curit\u00e9 \u00e9norme et une porte d\u2019entr\u00e9e pour les hackers criminels. Nous vous recommandons de r\u00e9aliser r\u00e9guli\u00e8rement la v\u00e9rification du navigateur Perseus depuis notre bo\u00eete \u00e0 outils. Cela vous permettra de savoir si le navigateur de votre entreprise est \u00e0 jour.  <\/li><li>Combler la vuln\u00e9rabilit\u00e9 en installant les mises \u00e0 jour de s\u00e9curit\u00e9 fournies par les fabricants.<br>Si vous avez d\u2019autres questions, l\u2019\u00e9quipe d\u2019experts de Perseus sera ravie de vous aider.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>27.09.2021 La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant En raison d\u2019une faille de s\u00e9curit\u00e9, Google Chrome et Microsoft Edge pourraient tous deux devenir la cible de cyberattaques. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et comment vous pouvez le mieux vous prot\u00e9ger. Que s\u2019est-il pass\u00e9 ? [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27892","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"27.09.2021 La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant En raison d\u2019une faille de s\u00e9curit\u00e9, Google Chrome et Microsoft Edge pourraient tous deux devenir la cible de cyberattaques. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et comment vous pouvez le mieux vous prot\u00e9ger. Que s\u2019est-il pass\u00e9 ? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-27T14:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:32:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant\",\"datePublished\":\"2021-09-27T14:34:00+00:00\",\"dateModified\":\"2026-03-31T05:32:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/\"},\"wordCount\":370,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/\",\"name\":\"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-09-27T14:34:00+00:00\",\"dateModified\":\"2026-03-31T05:32:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/","og_locale":"fr_FR","og_type":"article","og_title":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies","og_description":"27.09.2021 La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant En raison d\u2019une faille de s\u00e9curit\u00e9, Google Chrome et Microsoft Edge pourraient tous deux devenir la cible de cyberattaques. Nous allons au c\u0153ur de ce qui s\u2019est exactement pass\u00e9 et comment vous pouvez le mieux vous prot\u00e9ger. Que s\u2019est-il pass\u00e9 ? [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/","og_site_name":"Perseus Technologies","article_published_time":"2021-09-27T14:34:00+00:00","article_modified_time":"2026-03-31T05:32:28+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant","datePublished":"2021-09-27T14:34:00+00:00","dateModified":"2026-03-31T05:32:28+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/"},"wordCount":370,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/","url":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/","name":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-09-27T14:34:00+00:00","dateModified":"2026-03-31T05:32:28+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/la-vulnerabilite-rend-google-chrome-et-microsoft-edge-vulnerables-corrigez-la-des-maintenant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"La vuln\u00e9rabilit\u00e9 rend Google Chrome et Microsoft Edge vuln\u00e9rables \u2013 corrigez-la d\u00e8s maintenant"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27892"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27892\/revisions"}],"predecessor-version":[{"id":27893,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27892\/revisions\/27893"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}