Emergency Response

Microsoft’s Security Patches for July 2019 Fix 79 Security Vulnerabilities

July 16, 2019 | Mina Hao

Overview Microsoft released July 2019 security updates on Tuesday which fix 79 vulnerabilities ranging from simple spoofing attacks to remote code execution. Such security updates cover the following products: .NET Framework, ASP.NET, Azure, Azure DevOps, Internet Explorer, Microsoft Browsers, Microsoft Exchange Server, Microsoft Graphics Component, Microsoft Office, Microsoft Office SharePoint, Microsoft Scripting Engine, Microsoft Windows, […]

Adobe Security Advisory for July 2019 Security Updates

July 12, 2019 | Mina Hao

Overview On July 9, 2019, local time, Adobe officially released July’s security updates to fix multiple vulnerabilities in its various products, including Adobe Bridge CC, Adobe Experience Manager, and Adobe Dreamweaver.

Linux Kernel Multiple Remote Denial-of-Service Vulnerabilities Threat Alert

June 25, 2019 | Mina Hao

Overview Recently, Red Hat released a security bulletin, pointing out multiple TCP-based remote denial-of-service vulnerabilities in the Linux kernel, namely, a SACK Panic vulnerability of important severity and two other vulnerabilities of moderate severity.

TP-Link Wi-Fi Extenders Remote Code Execution Vulnerability (CVE-2019-7406) Threat Alert

June 24, 2019 | Mina Hao

Overview Recently, a security expert from IBM X-Force discovered a remote code execution vulnerability (CVE-2019-7406) in multiple models of TP-Link Wi-Fi extenders. This vulnerability can be exploited by unauthenticated, remote attackers by sending a malformed HTTP request so as to execute arbitrary shell commands on a target Wi-Fi extender. The attack does not require escalation […]

Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide

June 21, 2019 | Mina Hao

Vulnerability Overview Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command execution vulnerability, which allows attackers to obtain privileges of the target server and remotely execute commands without authorization by sending a crafted HTTP-POST request.

Oracle WebLogic Remote Code Execution Vulnerability (CVE-2019-2725) Patch Bypass Threat Alert

June 18, 2019 | Mina Hao

Overview Recently, the NSFOCUS security team has found that the Oracle Weblogic vulnerability is exploited in the wild. Its attack signature is similar to that of the CVE-2019-2725 vulnerability. The attack can bypass the latest security patch released by Oracle in April. This vulnerability exists because no proper sanitization is performed when deserialized information is […]

Windows NTLM Tampering Vulnerability (CVE-2019-1040) Threat Alert

June 17, 2019 | Mina Hao

1 Vulnerability Overview On June 12, 2019, Beijing time, Microsoft released security patches for the Windows NTLM tampering vulnerability (CVE-2019-1040), which exists in Windows operating systems and allows attackers to bypass the NTLM MIC (Message Integrity Check) protection.

Microsoft’s SecurityPatches for June that Fix 93 Security Vulnerabilities Threat Alert

June 14, 2019 | Mina Hao

Overview Microsoft released June 2019 security patches on Tuesday that fix 93 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including Adobe Flash Player, Kerberos, Microsoft Browsers, Microsoft Devices, Microsoft Edge, Microsoft Exchange Server, Microsoft Graphics Component, Microsoft JET Database Engine, Microsoft Office, Microsoft Office SharePoint, Microsoft Scripting Engine, Microsoft […]

Adobe Security Bulletins for June 2019 Security Updates Threat Alert

June 11, 2019 | Mina Hao

Overview On June 11, 2019, local time, Adobe officially released June’s security updates to fix multiple vulnerabilities in its various products, including Adobe Flash Player, Adobe Campaign, and Adobe ColdFusion.

Absolute Computrace Security Risk Threat Alert

June 5, 2019 | Mina Hao

Overview Recently, a researcher discovered that his computer motherboard BIOS comes with an anti-theft trace application Computrace from Absolute, which, after a computer startup, will be silently installed by the operating system and then transmit data overseas. Besides, this software can remotely obtain users’ files from their computers, monitor their behavior, and download and install […]