Summary: 2025/04/15 18:30
First reported date: 2010/05/28
Inquiry period : 2025/04/14 18:30 ~ 2025/04/15 18:30 (1 days), 2 search results
지난 7일 기간대비 -100% 낮은 트렌드를 보이고 있습니다.
지난 7일 기간대비 상승한 Top5 연관 키워드는 Malware Report CrushFTP 입니다.
기타 file link amp Hit SSRF 신규 키워드도 확인됩니다.
The Common Vulnerabilities and Exposures (CVE) system provides a reference method for publicly known information-security vulnerabilities and exposures.
CVE(Common Vulnerabilities and Exposure)는 공개적으로 알려진 소프트웨어의 보안취약점을 가리키는 고유 표기
* 최근 뉴스기사 Top3:
ㆍ 2025/04/14 Fortinet FortiGate fixes circumvented by symlink exploit
Trend graph by period
Related keyword cloud
Top 100# | Trend | Count | Comparison |
---|---|---|---|
1 | CVE | 2 | ▼ -2 (-100%) |
2 | Vulnerability | 2 | ▼ -2 (-100%) |
3 | Malware | 1 | ▲ 1 (100%) |
4 | Report | 1 | ▲ 1 (100%) |
5 | Fortinet | 1 | - 0 (0%) |
6 | Update | 1 | ▼ -1 (-100%) |
7 | Exploit | 1 | - 0 (0%) |
8 | file | 1 | ▲ new |
9 | FortiGate | 1 | - 0 (0%) |
10 | link | 1 | ▲ new |
11 | Alert | 1 | - 0 (0%) |
12 | amp | 1 | ▲ new |
13 | CrushFTP | 1 | ▲ 1 (100%) |
14 | Hit | 1 | ▲ new |
15 | SSRF | 1 | ▲ new |
Special keyword group
Top 5
Malware Type
This is the type of malware that is becoming an issue.
No data.

Attacker & Actors
The status of the attacker or attack group being issued.
No data.

Technique
This is an attack technique that is becoming an issue.
Keyword | Average | Label |
---|---|---|
Exploit |
|
1 (100%) |

Country & Company
This is a country or company that is an issue.
Keyword | Average | Label |
---|---|---|
Fortinet |
|
1 (100%) |
Threat info
Last 5SNS
(Total : 1)News
(Total : 1)Vulnerability Malware Report Fortinet Update Exploit CVE
No | Title | Date |
---|---|---|
1 | Fortinet FortiGate fixes circumvented by symlink exploit - Malware.News | 2025.04.14 |
Additional information
No | Title | Date |
---|---|---|
1 | Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow - Malware.News | 2025.04.15 |
2 | Colleges and Schools Now Top Targets for Online Threat Actors - Malware.News | 2025.04.15 |
3 | Trump Revenge Tour Targets Cyber Leaders, Elections - Malware.News | 2025.04.15 |
4 | GenAI vulnerabilities fixed only 21% of the time after pentesting - Malware.News | 2025.04.15 |
5 | Meta slurps up EU user data for AI training - Malware.News | 2025.04.15 |
View only the last 5 |
No | Title | Date |
---|---|---|
1 | Fortinet FortiGate fixes circumvented by symlink exploit - Malware.News | 2025.04.14 |
2 | Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit - The Hacker News | 2025.04.12 |
3 | CVE-2025-24813: Remote Code Execution in Apache Tomcat via Malicious Session Deserialization - Malware.News | 2025.04.10 |
4 | Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities - The Hacker News | 2025.04.08 |
5 | Kubernetes Ingress-nginx Controller RCE - FortiGuard Labs | 2025.04.04 |
View only the last 5 |
No | Request | Hash(md5) | Report No | Date |
---|---|---|---|---|
1 | ![]() CVE MS-MSDT AntiDebug AntiVM PNG Format MSOffice File JPEG Format | f6febdcc05cc9e04e4119c83e1afa2c8 | 30083 | 2022.08.02 |
2 | ![]() Formbook CVE MS-MSDT Word 2007 file format(docx) | 730768c4f029608adf0032e95e8e8a1d | 29851 | 2022.07.26 |
3 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | cdd33ffa502cbffec6e64c4574846a89 | 29852 | 2022.07.26 |
4 | ![]() CVE MS-MSDT AntiDebug AntiVM MSOffice File | 465585177a642d88295d7f0a55b8984c | 29868 | 2022.07.26 |
5 | ![]() Formbook CVE MS-MSDT AntiDebug AntiVM MSOffice File | e7bde7d2b74218b4faf98d5f45b86593 | 29669 | 2022.07.20 |
View only the last 5 |
Level | Description |
---|---|
warning | File has been identified by 29 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Resumed a suspended thread in a remote process potentially indicative of process injection |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Performs some HTTP requests |
notice | Uses Windows utilities for basic Windows functionality |
notice | Yara rule detected in process memory |
info | One or more processes crashed |
Network | ET INFO TLS Handshake Failure |
Network | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) |