Main

type

0 (not classified)

status

21 (imported old-v2, waiting for another import)

review version

0

cleanup version

0

pending deletion

0 (-)

created at

2025-10-24 19:10:41

updated at

2025-11-01 13:34:38

Address

url

https://perennialconsultancy.com/chaining-in-cybersecurity-how-attackers-exploit-multiple-vulnerabilities/

url length

106

url crc

51767

url crc32

1346423351

location type

1 (url matches target location, page_location is empty)

canonical status

10 (verified canonical url)

canonical page id

-

Source

domain id

163199737

domain tld

2211

domain parts

0

originating warc id

-

originating url

https://ec2-13-228-90-21.ap-southeast-1.compute.amazonaws.com/chaining-in-cybersecurity-how-attackers-exploit-multiple-vulnerabilities/

source type

10 (canonical url)

Server response

server ip

13.228.90.21

Publication date

2025-08-10 13:26:43

Fetch attempts

0

Original html size

88898

Normalized and saved size

44374

Content

title

Chaining in Cybersecurity: How Attackers Exploit Multiple Vulnerabilities - Perennial Consultancy

excerpt

content

author

beehong

updated

2025-11-18 21:56:52

Text analysis

block type

0

extracted fields

141

extracted bits

featured image
article author
title
OpenGraph suggests this is an article

detected location

0

detected language

1 (English)

category id

Serwisy SEC (10)

index version

2025110801

paywall score

0

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

7707

text words

1335

text unique words

536

text lines

130

text sentences

57

text paragraphs

25

text words per sentence

23

text matched phrases

29

text matched dictionaries

12