{"id":51474,"date":"2019-02-20T11:35:04","date_gmt":"2019-02-20T16:35:04","guid":{"rendered":"https:\/\/www.cyberark.com\/product-security\/"},"modified":"2023-12-08T08:09:05","modified_gmt":"2023-12-08T13:09:05","slug":"product-security","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/product-security\/","title":{"rendered":"S\u00e9curit\u00e9 des produits"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text]<\/p>\n<h1>Bulletins de s\u00e9curit\u00e9 des produits CyberArk<\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbcybv2-pad-btm\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6 vc_custom_1550095646903\">Restez \u00e0 jour<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550871538546\">\n<div class=\"wpb_wrapper\">\n<p>Cette page contient des informations sur des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui peuvent avoir un impact sur les produits CyberArk. CyberArk encourage fortement les utilisateurs \u00e0 s\u2019assurer qu\u2019ils mettent \u00e0 niveau leurs produits ou appliquent les correctifs appropri\u00e9s en temps opportun.<\/p>\n<p>CyberArk prend la s\u00e9curit\u00e9 des produits tr\u00e8s au s\u00e9rieux. Si vous pensez avoir trouv\u00e9 une vuln\u00e9rabilit\u00e9 dans l\u2019un de nos produits, nous vous demandons de suivre les directives de divulgation responsable et de contacter <a class=\"ext-url\" href=\"mailto:product_security@cyberark.com\">product_security@cyberark.com<\/a> et de collaborer avec nous pour trouver une r\u00e9solution rapide afin de prot\u00e9ger nos clients.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbConsulter notre politique\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fcyberark-security-vulnerability-policy.pdf|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid\u00a0\u00bb][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad text-center\u00a0\u00bb][vc_column][vc_column_text css=\u00a0\u00bb.vc_custom_1701169516508{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h3 class=\"vc_custom_heading vc_custom_1550858186777\">Derniers bulletins de s\u00e9curit\u00e9<\/h3>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1550859075590\">\n<div class=\"wpb_wrapper\">\n<p>Pour en savoir plus sur nos bulletins de s\u00e9curit\u00e9, <a class=\"ext-url\" href=\"https:\/\/cyberark.my.site.com\/s\/login\/\" target=\"_blank\" rel=\"noopener noreferrer\">connectez-vous ou rejoignez<\/a> notre communaut\u00e9 technique.<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime; offset=\u00a0\u00bbvc_col-sm-offset-4 vc_col-xs-6&Prime; css=\u00a0\u00bb.vc_custom_1561728971210{padding-right: 0px !important;}\u00a0\u00bb][vc_column_text css=\u00a0\u00bb.vc_custom_1701169432891{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">Date<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=\u00a0\u00bb1\/6&Prime; css=\u00a0\u00bb.vc_custom_1561728983798{padding-left: 0px !important;}\u00a0\u00bb offset=\u00a0\u00bbvc_col-xs-6&Prime;][vc_column_text css=\u00a0\u00bb.vc_custom_1655316673613{padding-bottom: 20px !important;}\u00a0\u00bb]<\/p>\n<h4 class=\"vc_custom_heading vc_custom_1550858186777\">ID<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=\u00a0\u00bb1\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-4&Prime;][vc_basic_grid post_type=\u00a0\u00bbsecurity_bulletin\u00a0\u00bb max_items=\u00a0\u00bb10&Prime; element_width=\u00a0\u00bb12&Prime; gap=\u00a0\u00bb1&Prime; item=\u00a0\u00bb36838&Prime; initial_loading_animation=\u00a0\u00bbnone\u00a0\u00bb grid_id=\u00a0\u00bbvc_gid:1701169469098-42e0d8be-29de-0&Prime;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2_talk_to_an_expert\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1608677118624{background-color: #061b2b !important;}\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbextra-space\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Connectez-vous ou rejoignez notre communaut\u00e9 technique<\/h2>\n<p>[\/vc_column_text][vc_btn title=\u00a0\u00bbConnexion\u00a0\u00bb style=\u00a0\u00bbcustom\u00a0\u00bb custom_background=\u00a0\u00bb\u00a0\u00bb custom_text=\u00a0\u00bb\u00a0\u00bb shape=\u00a0\u00bbsquare\u00a0\u00bb align=\u00a0\u00bbcenter\u00a0\u00bb link=\u00a0\u00bburl:https%3A%2F%2Fcyberark.my.site.com%2Fs%2Flogin%2F|target:_blank|\u00a0\u00bb el_class=\u00a0\u00bbcybv2-button-solid cyb-button-hpstyle_section5&Prime;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Bulletins de s\u00e9curit\u00e9 des produits CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbcybv2-pad-btm\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00a0\u00bb] Restez \u00e0 jour Cette page contient des informations sur des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui&#8230;<\/p>\n","protected":false},"author":125,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-51474","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des produits | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/product-security\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des produits\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Bulletins de s\u00e9curit\u00e9 des produits CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbcybv2-pad-btm\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00a0\u00bb] Restez \u00e0 jour Cette page contient des informations sur des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/product-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T13:09:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/product-security\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/product-security\/\",\"name\":\"S\u00e9curit\u00e9 des produits | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2019-02-20T16:35:04+00:00\",\"dateModified\":\"2023-12-08T13:09:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/product-security\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/product-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/product-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des produits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des produits | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/product-security\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 des produits","og_description":"[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text] Bulletins de s\u00e9curit\u00e9 des produits CyberArk [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=\u00a0\u00bbcybv2 cybv2-pad-top text-md-center\u00a0\u00bb][vc_column][vc_column_text el_class=\u00a0\u00bbcybv2-pad-btm\u00a0\u00bb css=\u00a0\u00bb.vc_custom_1701169393494{padding-bottom: 20px !important;}\u00a0\u00bb] Restez \u00e0 jour Cette page contient des informations sur des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 qui...","og_url":"https:\/\/www.cyberark.com\/fr\/product-security\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2023-12-08T13:09:05+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/product-security\/","url":"https:\/\/www.cyberark.com\/fr\/product-security\/","name":"S\u00e9curit\u00e9 des produits | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2019-02-20T16:35:04+00:00","dateModified":"2023-12-08T13:09:05+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/product-security\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/product-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/product-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des produits"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/125"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=51474"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/51474\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=51474"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=51474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}