{"id":8489,"date":"2019-04-12T03:19:29","date_gmt":"2019-04-12T03:19:29","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8489"},"modified":"2026-04-17T18:07:54","modified_gmt":"2026-04-17T18:07:54","slug":"apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/","title":{"rendered":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>1 Vulnerability Overview<\/strong><\/h2>\n<p>Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211). Apache HTTP Server running MPM event, worker or, prefork could allow a less-privileged child thread or process (including scripts executed by an in-process scripting interpreter) to execute arbitrary code with privileges of the parent process (usually root) by manipulating the scoreboard.<!--more--><\/p>\n<p>Apache HTTP Server is an open-source web server from the Apache Software Foundation. Thanks to its capability of working across platforms, it has been widely used and become one of the most popular web server programs. According to data from NSFOCUS Threat Intelligence center (NTI), the number of Apache-enabled assets publicly available worldwide exceeds 52 million.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8490\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"543\" height=\"275\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-1.jpg 543w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-1-300x152.jpg 300w\" sizes=\"(max-width: 543px) 100vw, 543px\" \/><\/a><\/p>\n<p>Reference link:<\/p>\n<p>https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html#CVE-2019-0211<\/p>\n<h2><strong>2 Scope of Impact<\/strong><\/h2>\n<p>Affected Versions<\/p>\n<ul>\n<li>Apache HTTP Server 2.4.17&acirc;&euro;&ldquo;2.4.38<\/li>\n<\/ul>\n<p>Unaffected Versions<\/p>\n<ul>\n<li>Apache HTTP Server 2.4.39<\/li>\n<\/ul>\n<p>Apache points out that this vulnerability affects only applications in the UNIX system. Besides, it does not affect the versions of httpd package shipped with Red Hat Enterprise Linux, but affects the version of httpd package shipped with Red Hat Software Collections. Further impacts of this vulnerability are still under evaluation. For details, visit the following link:<\/p>\n<p>https:\/\/access.redhat.com\/security\/cve\/cve-2019-0211<\/p>\n<p><strong><br \/>\n<\/strong><\/p>\n<h2><strong>3 Check for the Vulnerability<\/strong><\/h2>\n<p>Apache HTTP Server users can run the following command to check the current version of the application. If it is within the affected scope, the application is potentially at risk and users should upgrade it to the latest version as soon as possible.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8491\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"517\" height=\"190\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-2.jpg 517w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0412-2-300x110.jpg 300w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/a><\/p>\n<h2><strong>4 Recommended Solution<\/strong><\/h2>\n<p>An official release is available to fix this vulnerability. Users are advised to download it from the following link and install it as soon as possible:<\/p>\n<p>https:\/\/httpd.apache.org\/download.cgi<\/p>\n<p><strong><br \/>\n<\/strong><\/p>\n<h2><strong>Appendix<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>Statement<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<ul>\n<li>\n<h3><strong>About NSFOCUS<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com.<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Vulnerability Overview Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211). Apache HTTP Server running MPM event, worker or, prefork could allow a less-privileged child thread or process (including scripts executed by an in-process scripting interpreter) to execute arbitrary code with privileges of the parent process (usually root) by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8002,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[77],"class_list":["post-8489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-apache-http-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Vulnerability Overview Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-12T03:19:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Vulnerability Overview Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211).\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert\",\"datePublished\":\"2019-04-12T03:19:29+00:00\",\"dateModified\":\"2026-04-17T18:07:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/\"},\"wordCount\":511,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/0128-4.jpg\",\"keywords\":[\"Apache HTTP Server\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/\",\"name\":\"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/0128-4.jpg\",\"datePublished\":\"2019-04-12T03:19:29+00:00\",\"dateModified\":\"2026-04-17T18:07:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/0128-4.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/0128-4.jpg\",\"width\":729,\"height\":367,\"caption\":\"Hacker in hoodie with computer code overlay.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS","og_description":"1 Vulnerability Overview Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211).","og_url":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/","og_site_name":"NSFOCUS","article_published_time":"2019-04-12T03:19:29+00:00","article_modified_time":"2026-04-17T18:07:54+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS","twitter_description":"1 Vulnerability Overview Recently, Apache released a security advisory, announcing remediation of a privilege escalation vulnerability (CVE-2019-0211).","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert","datePublished":"2019-04-12T03:19:29+00:00","dateModified":"2026-04-17T18:07:54+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/"},"wordCount":511,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","keywords":["Apache HTTP Server"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/","url":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/","name":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","datePublished":"2019-04-12T03:19:29+00:00","dateModified":"2026-04-17T18:07:54+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/0128-4.jpg","width":729,"height":367,"caption":"Hacker in hoodie with computer code overlay."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-http-server-privilege-escalation-vulnerability-cve-2019-0211-threat-alert-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache HTTP Server Privilege Escalation Vulnerability Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8489"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8489\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8002"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}