{"version":"1.0","provider_name":"EMBIBE - The most powerful AI-powered learning platform","provider_url":"https:\/\/www.embibe.com\/in-hi","author_name":"Surender Singh","author_url":"https:\/\/www.embibe.com\/in-hi\/author\/surender-singhembibe-com\/","title":"Vulnerability Disclosure Program - EMBIBE - The most powerful AI-powered learning platform","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Sl2VHMyps3\"><a href=\"https:\/\/www.embibe.com\/in-hi\/vulnerability-disclosure-program\/\">Vulnerability Disclosure Program<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.embibe.com\/in-hi\/vulnerability-disclosure-program\/embed\/#?secret=Sl2VHMyps3\" width=\"600\" height=\"338\" title=\"&#8220;Vulnerability Disclosure Program&#8221; &#8212; EMBIBE - The most powerful AI-powered learning platform\" data-secret=\"Sl2VHMyps3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"1. CONSENT Embibe is truly dedicated to protecting data safety and security. One of our founding principles is to \u201cImprove Continuously\u201d which directly translates into our information security program enabling the protection of our internal and external confidential&nbsp; data as a top priority.&nbsp;The Embibe Security Team acknowledges the valuable role that honest, independent security researchers and bug reporters play in the overall security of connected systems. As a result, we encourage the responsible reporting of any vulnerability that may be....","thumbnail_url":"https:\/\/wordpress-static.embibe.com\/in-en\/wp-content\/uploads\/2023\/05\/18070749\/right-tick.png"}