SharePoint Shadow: Havoc’s FUD Malware Conceals Cyber Attacks

SharePoint Shadow: Havoc’s FUD Malware Conceals Cyber Attacks Attack flow | Source: FortiGuard LabsA recent report from FortiGuard Labs has shed light on an advanced cyber campaign leveraging the open-source Havoc command-and-control (C2) framework to execute fu … Read more Published Date: Mar 05, 2025 (3 hours, 28 minutes ago) Vulnerabilities has been mentioned in this article. […]

CVE-2025-24924 – Apache GMOD Apollo Unauthenticated Administrative Access

The following table lists the changes that have been made to the CVE-2025-24924 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-23410 – GMOD Apollo Path Traversal Vulnerability

The following table lists the changes that have been made to the CVE-2025-23410 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-21092 – GMOD Apollo Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-21092 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-20002 – “GMOD Apollo Local Path Information Disclosure Vulnerability”

The following table lists the changes that have been made to the CVE-2025-20002 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1963 – Projectworlds Online Hotel Booking SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1963 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1316 – Edimax IC-7100 Remote Code Execution Vulnerability

The following table lists the changes that have been made to the CVE-2025-1316 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.