{"id":327,"date":"2020-01-14T11:31:55","date_gmt":"2020-01-14T10:31:55","guid":{"rendered":"https:\/\/www.iicrai.org\/?page_id=327"},"modified":"2023-02-15T15:17:48","modified_gmt":"2023-02-15T14:17:48","slug":"cve-search","status":"publish","type":"page","link":"https:\/\/www.iicrai.org\/fr\/community-services\/cve-search\/","title":{"rendered":"CVE-Search"},"content":{"rendered":"<h2 id=\"tw-target-text\" class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\"><span lang=\"fr\"><strong>Vuln\u00e9rabilit\u00e9s et exposition Interface Web et API<\/strong> <\/span><\/h2>\n<h3 class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\"><span lang=\"fr\"><strong>cve-search est accessible via <a href=\"https:\/\/cve-search.iicrai.org\">une interface web<\/a>.<\/strong> <\/span><\/h3>\n<p><strong>Site Web :<\/strong> <a href=\"https:\/\/cve.iicrai.org\">https:\/\/cve.iicrai.org<\/a><\/p>\n<p class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\"><span lang=\"fr\">cve-search est une interface pour rechercher des informations connues des sources public \u00e0 partir de vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans les logiciels et le mat\u00e9riel ainsi que leurs expositions correspondantes. \u00a0 <\/span><\/p>\n<h3 class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\"><span lang=\"fr\">cve-search comprend les flux de donn\u00e9es suivants: <\/span><\/h3>\n<ul>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\"><span lang=\"fr\">NIST National Vulnerability Database<\/span><\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\">\u00c9num\u00e9ration de plate-forme commune (CPE)<\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\">\u00c9num\u00e9ration des faiblesses communes (CWE)<\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\">Statistiques sur les incidents CIRCL et classement des menaces<\/li>\n<li class=\"tw-data-text tw-text-large tw-ta\" dir=\"ltr\" data-placeholder=\"Traduction\">toolswatch \/ vFeed<\/li>\n<\/ul>\n<p>cve-search est un service communautaire g\u00e9r\u00e9 par l&rsquo;IICRAI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vuln\u00e9rabilit\u00e9s et exposition Interface Web et API cve-search est accessible via une interface web. Site Web : https:\/\/cve.iicrai.org cve-search est une interface pour rechercher des informations connues des sources public \u00e0 partir de vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans les logiciels et&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":62,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-327","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/pages\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":11,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":452,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/pages\/327\/revisions\/452"}],"up":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/pages\/62"}],"wp:attachment":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}