SharePoint Shadow: Havoc’s FUD Malware Conceals Cyber Attacks
SharePoint Shadow: Havoc’s FUD Malware Conceals Cyber Attacks Attack flow | Source: FortiGuard LabsA recent report from FortiGuard Labs has shed light on an advanced cyber campaign leveraging the open-source Havoc command-and-control (C2) framework to execute fu … Read more Published Date: Mar 05, 2025 (3 hours, 28 minutes ago) Vulnerabilities has been mentioned in this article. […]
CVE-2025-24924 – Apache GMOD Apollo Unauthenticated Administrative Access
The following table lists the changes that have been made to the CVE-2025-24924 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-23410 – GMOD Apollo Path Traversal Vulnerability
The following table lists the changes that have been made to the CVE-2025-23410 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-21092 – GMOD Apollo Privilege Escalation Vulnerability
The following table lists the changes that have been made to the CVE-2025-21092 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-20002 – “GMOD Apollo Local Path Information Disclosure Vulnerability”
The following table lists the changes that have been made to the CVE-2025-20002 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1963 – Projectworlds Online Hotel Booking SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1962 – Apache Projectworlds Online Hotel Booking SQL Injection Vulnerability
The following table lists the changes that have been made to the CVE-2025-1962 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.
CVE-2025-1316 – Edimax IC-7100 Remote Code Execution Vulnerability
The following table lists the changes that have been made to the CVE-2025-1316 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.