{"id":541,"date":"2024-07-25T11:38:48","date_gmt":"2024-07-25T09:38:48","guid":{"rendered":"https:\/\/ayrilys.com\/?p=541"},"modified":"2024-07-25T11:39:06","modified_gmt":"2024-07-25T09:39:06","slug":"les-dernieres-vulnerabilites-decouvertes","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/","title":{"rendered":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes"},"content":{"rendered":"\n<p>Voici quelques-unes des derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2021-26855 \u2013 \u00ab ProxyLogon \u00bb<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\"><strong>CVE-2021-31207 \u2013 \u00ab ProxyShell \u00bb<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2021-26084 \u2013 Confluence<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\"><strong>CVE-2021-22205 \u2013 Gitlab<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\"><strong>CVE-2021-22893 \u2013 Pulse Secure<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\"><strong>CVE-2021-20016 \u2013 SonicWall<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\"><strong>CVE-2021-22986 \u2013 F5<\/strong><\/a><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/ANSSI_top-10-edition-2022_NP_v1.0.4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>1<\/sup><\/a><a href=\"https:\/\/www.it-connect.fr\/top-10-des-vulnerabilites-de-2021-selon-lanssi\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>2<\/sup><\/a><\/li>\n<\/ol>\n\n\n\n<p><a href=\"https:\/\/www.bitdefender.fr\/blog\/businessinsights\/previsions-de-cybersecurite-2024-les-nouvelles-tactiques-et-cibles-des-ransomwares\/\" target=\"_blank\" rel=\"noreferrer noopener\">En 2024, les acteurs de la menace des ransomwares continueront d\u2019adopter un \u00e9tat d\u2019esprit plus opportuniste, en exploitant rapidement les vuln\u00e9rabilit\u00e9s nouvellement d\u00e9couvertes dans les derni\u00e8res 24 heures<\/a><a href=\"https:\/\/www.bitdefender.fr\/blog\/businessinsights\/previsions-de-cybersecurite-2024-les-nouvelles-tactiques-et-cibles-des-ransomwares\/\" target=\"_blank\" rel=\"noreferrer noopener\"><sup>3<\/sup><\/a>. Il est donc crucial de rester inform\u00e9 et de prendre des mesures de s\u00e9curit\u00e9 appropri\u00e9es pour prot\u00e9ger vos syst\u00e8mes d\u2019information.<\/p>\n\n\n\n<p>Veuillez noter que ces informations sont bas\u00e9es sur les derni\u00e8res donn\u00e9es disponibles et peuvent ne pas inclure toutes les vuln\u00e9rabilit\u00e9s r\u00e9cemment d\u00e9couvertes. Il est recommand\u00e9 de consulter r\u00e9guli\u00e8rement les sources officielles de cybers\u00e9curit\u00e9 pour obtenir les informations les plus r\u00e9centes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Voici quelques-unes des derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes : En 2024, les acteurs de la menace des ransomwares continueront d\u2019adopter un \u00e9tat d\u2019esprit plus opportuniste, en exploitant rapidement les vuln\u00e9rabilit\u00e9s nouvellement d\u00e9couvertes dans les derni\u00e8res 24 heures3. Il est donc crucial de rester inform\u00e9 et de prendre des mesures de s\u00e9curit\u00e9 appropri\u00e9es pour prot\u00e9ger vos syst\u00e8mes d\u2019information&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"fullscreen","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[22],"tags":[],"class_list":["post-541","post","type-post","status-publish","format-standard","hentry","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -<\/title>\r\n<meta name=\"description\" content=\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes\" \/>\r\n<meta property=\"og:description\" content=\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-07-25T09:38:48+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-07-25T09:39:06+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilysentete.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"988\" \/>\r\n\t<meta property=\"og:image:height\" content=\"222\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes\",\"datePublished\":\"2024-07-25T09:38:48+00:00\",\"dateModified\":\"2024-07-25T09:39:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\"},\"wordCount\":148,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\",\"name\":\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"datePublished\":\"2024-07-25T09:38:48+00:00\",\"dateModified\":\"2024-07-25T09:39:06+00:00\",\"description\":\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique PME TPE sur Viroflay en ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","description":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/","og_locale":"fr_FR","og_type":"article","og_title":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes","og_description":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/","og_site_name":"Prestataire informatique depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-07-25T09:38:48+00:00","article_modified_time":"2024-07-25T09:39:06+00:00","og_image":[{"width":988,"height":222,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilysentete.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes","datePublished":"2024-07-25T09:38:48+00:00","dateModified":"2024-07-25T09:39:06+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/"},"wordCount":148,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"articleSection":["S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/","url":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/","name":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"datePublished":"2024-07-25T09:38:48+00:00","dateModified":"2024-07-25T09:39:06+00:00","description":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes Prestataire informatique depuis 2003 pour les PME\/PMI S\u00e9curit\u00e9 informatique -","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/les-dernieres-vulnerabilites-decouvertes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Les derni\u00e8res vuln\u00e9rabilit\u00e9s d\u00e9couvertes"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique PME TPE sur Viroflay en ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=541"}],"version-history":[{"count":1,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/541\/revisions"}],"predecessor-version":[{"id":542,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/541\/revisions\/542"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}