id
type
0 (not classified)
status
21 (imported old-v2, waiting for another import)
review version
0
cleanup version
0
pending deletion
0 (-)
created at
2025-10-24 19:10:41
updated at
2025-11-01 13:34:38
url
https://perennialconsultancy.com/chaining-in-cybersecurity-how-attackers-exploit-multiple-vulnerabilities/
url length
106
url crc
51767
url crc32
1346423351
location type
1 (url matches target location, page_location is empty)
canonical status
10 (verified canonical url)
canonical page id
-
domain id
domain tld
2211
domain parts
0
originating warc id
-
originating url
https://ec2-13-228-90-21.ap-southeast-1.compute.amazonaws.com/chaining-in-cybersecurity-how-attackers-exploit-multiple-vulnerabilities/
source type
10 (canonical url)
server ip
Publication date
2025-08-10 13:26:43
Fetch attempts
0
Original html size
88898
Normalized and saved size
44374
title
Chaining in Cybersecurity: How Attackers Exploit Multiple Vulnerabilities - Perennial Consultancy
excerpt
content
author
beehong
updated
2025-11-18 21:56:52
block type
0
extracted fields
141
extracted bits
featured image
article author
title
OpenGraph suggests this is an article
detected location
0
detected language
1 (English)
category id
index version
2025110801
paywall score
0
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
7707
text words
1335
text unique words
536
text lines
130
text sentences
57
text paragraphs
25
text words per sentence
23
text matched phrases
29
text matched dictionaries
12
links self subdomains
0
links other subdomains
links other domains
0
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
0
links ext klim
0
links ext generic
0
status
0
updated
2025-11-18 21:56:52