Skip to content
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • Home
  • News
    • Cyber Threats
    • Dark Web
    • Hacking
    • IoT
    • Malware
    • OS
    • Vulnerability
  • Security
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • Archives
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
  • About
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Application Migration

Do you really know your IT? Discovery tools unearth high-risk surprises

2 December 2019

If the average enterprise could see every part composing its infrastructure and applications, they’d be worried. Is that supposed to be …

Tags Application Migration, Cloud Computing, Discovery, Public Cloud

NVD

CVE-2019-5252 – There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Hon …

14 December 2019

CVE-2019-5235 – Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts …

14 December 2019

CVE-2019-19777 – stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a …

13 December 2019

CVE-2019-14344 – TemaTres 3.0 has reflected XSS via the replace_string or search_string parameter to the vo …

13 December 2019

CVE-2019-16730 – processCommandUpgrade() in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI …

13 December 2019

EXPLOITS

FTP Commander Pro 8.03 – Local Stack Overflow

13 December 2019

NVMS 1000 – Directory Traversal

13 December 2019

Lenovo Power Management Driver 1.67.17.48 – ‘pmdrvs.sys’ Denial of Service (PoC)

12 December 2019

Bullwark Momentum Series JAWS 1.0 – Directory Traversal

12 December 2019

OpenNetAdmin 18.1.1 – Command Injection Exploit (Metasploit)

12 December 2019

SECURELIST

Kaspersky Security Bulletin 2019. Statistics

12 December 2019

Story of the year 2019: Cities under ransomware siege

11 December 2019

Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium

10 December 2019

APT review: what the world’s threat actors got up to in 2019

4 December 2019

Corporate security prediction 2020

3 December 2019

Information Cyber Network Enterprise Security News

© 2019 GeekWire | Privacy Policy | We are not responsible for the content of external sites.
Scroll back to top
We use cookies to make the site simpler. Please let us know if you agree our Privacy Policy including cookie policy.Yes, I agree