{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"Techniques et outils d\u2019attaque sur les moteurs de d\u00e9s\u00e9rialisation (Java) - RiskInsight","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KW8UcrGXKa\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/techniques-outils-deserialisation-java\/\">Techniques et outils d\u2019attaque sur les moteurs de d\u00e9s\u00e9rialisation (Java)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/techniques-outils-deserialisation-java\/embed\/#?secret=KW8UcrGXKa\" width=\"600\" height=\"338\" title=\"&#8220;Techniques et outils d\u2019attaque sur les moteurs de d\u00e9s\u00e9rialisation (Java)&#8221; &#8212; RiskInsight\" data-secret=\"KW8UcrGXKa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"La s\u00e9rialisation consiste \u00e0 transformer un objet applicatif en un format de donn\u00e9es pouvant \u00eatre restaur\u00e9 ult\u00e9rieurement. Ce proc\u00e9d\u00e9 est utilis\u00e9 pour sauvegarder des objets ou les envoyer dans le cadre de communications.","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/10\/I1.png"}