{"id":14,"count":41,"description":"Les vuln\u00e9rabilit\u00e9s, les exploits et les Proof of Concept d\u00e9taill\u00e9s par ASafety.","link":"https:\/\/www.asafety.fr\/en\/category\/vuln-exploit-poc\/","name":"Vulnerabilities, exploits and PoC","slug":"vuln-exploit-poc","taxonomy":"category","parent":0,"meta":[],"_links":{"self":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/categories\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts?categories=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}