{"id":8567,"date":"2019-05-03T04:25:02","date_gmt":"2019-05-03T04:25:02","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=8567"},"modified":"2026-04-17T18:07:53","modified_gmt":"2026-04-17T18:07:53","slug":"oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/","title":{"rendered":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>1 Vulnerability Overview<\/strong><\/h2>\n<p>On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle WebLogic Server. Specifically, this vulnerability exists in the wls9_async_response.war component that comes with Oracle WebLogic Server as this component fails to properly deserialize the input information. An unauthorized attacker could exploit this vulnerability to gain server privileges for remote code execution by sending a carefully crafted malicious HTTP request.<!--more--><\/p>\n<p>wls9_async_response.war provides asynchronous communications for the WebService component. This file, by default, is contained in WebLogic Server of most versions.<\/p>\n<p>Reference link:<\/p>\n<p><a href=\"http:\/\/www.cnvd.org.cn\/webinfo\/show\/4989\">http:\/\/www.cnvd.org.cn\/webinfo\/show\/4989<\/a><\/p>\n<h2><strong><a name=\"_Toc6583950\"><\/a>2 Scope of Impact<\/strong><\/h2>\n<p>Affected Versions<\/p>\n<ul>\n<li>Oracle WebLogic Server 10.*<\/li>\n<li>Oracle WebLogic Server 12.1.3<\/li>\n<\/ul>\n<p>This vulnerability affects all versions of Oracle WebLogic Server with the bea_wls9_async_response component enabled.<\/p>\n<h2><strong><a name=\"_Toc6583951\"><\/a>3 Vulnerability Check<\/strong><\/h2>\n<p>This vulnerability exists in the asynchronous communication service. Users can access \/_async\/AsyncResponseService to check whether the bea_wls9_async_response component is enabled. If the following page is returned, this component is enabled. Users of this software should attach importance to this issue and take corresponding protective measures as soon as possible.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-8568\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"681\" height=\"190\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-1.jpg 681w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-1-300x84.jpg 300w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><\/a><\/p>\n<h2><strong><a name=\"_Toc6583952\"><\/a>4 Vulnerability Mitigation<\/strong><\/h2>\n<p>The vendor has not released patches to fix this vulnerability and users can adopt the following measures for temporary protection:<\/p>\n<ol>\n<li>Configure a URL access policy: Configure an access control policy to block access to \/_async\/*.<\/li>\n<li>Delete wls9_async_response.war and related folders and restart WebLogic Server.<\/li>\n<\/ol>\n<p>The following shows the path to the vulnerable file:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-8569\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"874\" height=\"353\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-2.jpg 874w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-2-300x121.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/0503-2-768x310.jpg 768w\" sizes=\"(max-width: 874px) 100vw, 874px\" \/><\/a><\/p>\n<p>Note: wls9_async_response.war is a level-1 application package. Removing or renaming it could cause unintended consequences, and thus Oracle does not recommend such operations. For issues arising from the direct deletion of this package, Oracle does not provide technical support for resolution. <strong>In view of this, users, before performing such operations, should assess the resulting impact and back up this file.<\/strong><\/p>\n<h3><strong><a name=\"_Toc6583953\"><\/a>Appendix<\/strong><\/h3>\n<ul>\n<li>\n<h3><strong>Statement<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<ul>\n<li>\n<h3><strong>About NSFOCUS<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p><a href=\"https:\/\/www.nsfocusglobal.com\">https:\/\/www.nsfocusglobal.com<\/a><\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Vulnerability Overview On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle WebLogic Server. Specifically, this vulnerability exists in the wls9_async_response.war component that comes with Oracle WebLogic Server as this component fails to properly deserialize the input information. An unauthorized attacker could exploit this vulnerability to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7955,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[573],"class_list":["post-8567","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-oracle-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Vulnerability Overview On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-03T04:25:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Vulnerability Overview On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert\",\"datePublished\":\"2019-05-03T04:25:02+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/\"},\"wordCount\":534,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/oracle123.jpg\",\"keywords\":[\"Oracle Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/\",\"name\":\"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/oracle123.jpg\",\"datePublished\":\"2019-05-03T04:25:02+00:00\",\"dateModified\":\"2026-04-17T18:07:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/oracle123.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/oracle123.jpg\",\"width\":572,\"height\":486,\"caption\":\"Oracle logo in red text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS","og_description":"1 Vulnerability Overview On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle","og_url":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-05-03T04:25:02+00:00","article_modified_time":"2026-04-17T18:07:53+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS","twitter_description":"1 Vulnerability Overview On April 17, China National Vulnerability Database (CNVD) published details of a remote code execution vulnerability in Oracle","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert","datePublished":"2019-05-03T04:25:02+00:00","dateModified":"2026-04-17T18:07:53+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/"},"wordCount":534,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","keywords":["Oracle Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/","name":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","datePublished":"2019-05-03T04:25:02+00:00","dateModified":"2026-04-17T18:07:53+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/01\/oracle123.jpg","width":572,"height":486,"caption":"Oracle logo in red text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/oracle-weblogic-server-deserialization-remote-code-execution-vulnerability-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Oracle WebLogic Server Deserialization Remote Code Execution Vulnerability Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8567"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/8567\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7955"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=8567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=8567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}