SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Be Careful With Fake Zoom Client Downloads
Published: 2025-06-05
Last Updated: 2025-06-05 06:36:36 UTC
by Xavier Mertens (Version: 1)
Collaborative tools are really popular these days. Since the COVID-19 pandemic, many people switched to remote work positions and we need to collaborate with our colleagues or customers every day. Tools like Microsoft Teams, Zoom, WebEx, (name your best solution), ... became popular and must be regularly updated.Yesterday, I received an interesting email with a fake Zoom meeting invitation ...
When you click on join, you'll visite a website. The HTML page is not malicious but it asks you to install the latest Zoom client ...
If you click on the download button, you'll get a nice "gift" ...
Read the full entry: https://isc.sans.edu/diary/Be+Careful+With+Fake+Zoom+Client+Downloads/32014/
Microsoft Patch Tuesday June 2025
Published: 2025-06-10
Last Updated: 2025-06-10 17:50:23 UTC
by Johannes Ullrich (Version: 1)
Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today.
Notable Vulnerabilities:
CVE-2025-33053: WebDAV remote code execution vulnerability. This vulnerability has already been exploited. Microsoft rates it as important. This affects the client part of WebDAV, not the server part. User interaction is required. If an attacker can control the file name and path, they can trick the victim into executing code over the network. This is another issue related to the still supported remnants of Internet Explorer, like the Scripting Engine and MSHTML. You must apply the IE Cumulative Update to patch, even if you no longer use IE.
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053
CVE-2025-33073: A Windows SMB client elevation of Privilege Vulnerability. This vulnerability has already been disclosed but Microsoft has not yet observed it being exploited. An attacker exploiting this vulnerability will gain SYSTEM privileges. But Microsoft considers successful exploitation less likely. An attacker would need the victim to connect to a malicious SMB server.
- https://nvd.nist.gov/vuln/detail/CVE-2025-33073
CVE-2025-32710: An unauthenticated remote code execution vulnerability in the remote desktop service. But it requires the exploitation of a race condition. Microsoft believes it is less likely that an exploit will become available.
- https://nvd.nist.gov/vuln/detail/CVE-2025-32710
CVE-2025-29828: Microsoft states that this vulnerability is due to a "missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network". This vulnerability worries me a bit if this could be used to exploit various TLS services. However, not enough is known to gauge the exploitability. Microsoft considers the attack as "highly complex" and exploitation as less likely.
- https://nvd.nist.gov/vuln/detail/CVE-2025-29828
Microsoft Office Remote Code Execution Vulnerability: Four of the critical vulnerabilities apply to Microsoft Office. These are rated critical as they may be exploited via the preview pane, without actually opening the malicious document ...
Read the full entry: https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+June+2025/32032/
Quasar RAT Delivered Through Bat Files
Published: 2025-06-11
Last Updated: 2025-06-11 05:53:08 UTC
by Xavier Mertens (Version: 1)
RAT's are popular malware. They are many of them in the wild, Quasar being one of them. The malware has been active for a long time and new campaigns come regularly back on stage. I spotted an interesting .bat file (Windows script) that attracted my attention because it is very well obfuscated. This file is a second stage that is downloaded and launched from a simple script ...
Read the full entry: https://isc.sans.edu/diary/Quasar+RAT+Delivered+Through+Bat+Files/32036/
OctoSQL & Vulnerability Data (2026.06.08)
https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026/
Extracting With pngdump.py (2025.06.08)
https://isc.sans.edu/diary/Extracting+With+pngdumppy/32022/
Wireshark 4.4.7 Released (2025.06.08)
https://isc.sans.edu/diary/Wireshark+447+Released/32020/
Upcoming DShield Honeypot Changes and Customizations (2025.06.06)
https://isc.sans.edu/diary/Upcoming+DShield+Honeypot+Changes+and+Customizations/32016/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: Qualcomm AQT1000
CVSS Score: 8.6
** KEV since 2025-06-03 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21479
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21480
ISC Diary: https://isc.sans.edu/diary/32026
NVD References: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html
Product: Qualcomm AR8031
CVSS Score: 7.5
** KEV since 2025-06-03 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-27038
ISC Diary: https://isc.sans.edu/diary/32026
NVD References: https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html
Product: WebDAV Microsoft
CVSS Score: 8.8
** KEV since 2025-06-10 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-33053
ISC Diary: https://isc.sans.edu/diary/32032
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053
Product: Google Chrome
CVSS Score: 8.8
** KEV since 2025-06-05 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5419
NVD References:
- https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html
Product: Microsoft Power Automate
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-47966
ISC Diary: https://isc.sans.edu/diary/32032
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47966
Product: vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-48827
ISC Podcast: https://isc.sans.edu/podcastdetail/9478
Product: Certain vBulletin versions
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-48828
ISC Podcast: https://isc.sans.edu/podcastdetail/9478
Product: Python Software Foundation
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4517
NVD References:
- https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f
- https://github.com/python/cpython/issues/135034
Product: IBM QRadar Suite Software
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-25022
NVD References: https://www.ibm.com/support/pages/node/7235432
Product: MailEnable
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-44148
NVD References: http://mailenable.com
Product: Sangoma IMG2020
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-32105
NVD References: https://github.com/austin2111/papers/blob/main/Software_Vulnerabilities_in_Telecommunications_Hardware.pdf
Product: Audiocodes MP-112
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-32106
NVD References:
Product: Samsung Exynos 1380
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-23097
NVD References:
- https://semiconductor.samsung.com/support/quality-support/product-security-updates/
- https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2025-23097/
Product: DataEase
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49001
NVD References: https://github.com/dataease/dataease/security/advisories/GHSA-xx2m-gmwg-mf3r
Product: DataEase
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49002
NVD References:
- https://github.com/dataease/dataease/security/advisories/GHSA-999m-jv2p-5h34
- https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-4j78-cvc7
Product: Naver Billboard.Js
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49223
NVD References: https://cve.naver.com/detail/cve-2025-49223.html
Product: Cisco Identity Services Engine (ISE)
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20286
NVD References: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-aws-static-cred-FPMjUcm7
Product: TOTOLINK EX1200T
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5600
NVD References:
Product: D-Link DIR-816CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5622NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5623NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5624NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5630NVD References: - https://www.dlink.com/- https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_50/50.md- https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_51/51.md- https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_53/53.md- https://github.com/wudipjq/my_vuln/blob/main/D-Link5/vuln_54/54.mdCVE-2025-3365 - A missing protection against path traversal allows to accessany file on the server.Product: Nozomi Networks GuardianCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3365NVD References: https://www.bbraun.com/productsecurityCVE-2025-27531 - Apache InLong is vulnerable to deserialization of untrusted data which allows an attacker to read arbitrary files by double writing the param.Product: Apache InLongCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-27531NVD References: https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5NVD References: http://www.openwall.com/lists/oss-security/2025/02/28/2CVE-2025-41646 - The Kunbus RevPi Webstatus application is vulnerable to an unauthorized remote attacker bypassing authentication through incorrect type conversion, resulting in full device compromise.Product: Kunbus RevPi StatusCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41646NVD References: https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003CVE-2025-3461 -The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default, posing a high security risk due to missing authentication for critical functions.Product: Quantenna Wi-Fi chipsetCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3461NVD References: - https://community.onsemi.com/s/article/QCS-Quantenna-Wi-Fi-product-support-and-security-best-practices- https://takeonme.org/cves/cve-2025-3461/CVE-2025-5893 - Smart Parking Management System from Honding Technology is vulnerable to unauthorized remote access and plaintext administrator credential theft due to an Exposure of Sensitive Information flaw.Product: Honding Technology Smart Parking Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5893NVD References: - https://www.twcert.org.tw/en/cp-139-10169-651d6-2.html- https://www.twcert.org.tw/tw/cp-132-10167-39c6d-1.htmlCVE-2025-3835 - Zohocorp ManageEngineÊExchange Reporter Plus versionsÊ5721 and prior are vulnerable to Remote code execution in theÊContent Search module.Product: Zohocorp ManageEngine Exchange Reporter PlusCVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3835NVD References: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-3835.htmlCVE-2025-49013 - WilderForge is vulnerable to code injection via unsafe usage of user-controlled variables in GitHub Actions workflows, potentially leading to arbitrary command execution and compromise of CI infrastructure and secrets.Product: WilderForgeCVSS Score: 9.9NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49013NVD References: - https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection- https://github.com/WilderForge/WilderForge/security/advisories/GHSA-m6r3-c73x-8fw5- https://securitylab.github.com/research/github-actions-untrusted-inputCVE-2025-49136 - Listmonk version 4.0.0 to 5.0.1 allows non-super-admin users to capture sensitive environment variables using the `env` and `expandenv` template functions, which can be mitigated by upgrading to version 5.0.2.Product: ListmonkCVSS Score: 9.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49136NVD References: https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3hCVE-2025-49652 - Lablup's BackendAI lacks proper authentication in its registration feature, allowing unauthorized users to create accounts with access to sensitive data.Product: Lablup BackendAICVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49652NVD References: https://hiddenlayer.com/sai_security_advisor/2025-05-backendai-49653/CVE-2025-30184 - CyberDataÊ011209 Intercom could allow an unauthenticated user access to the Web Interface through an alternate path.Product: CyberData 011209 IntercomCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30184NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01CVE-2025-30515 - CyberDataÊ011209 Intercom could allow an authenticated attacker to upload arbitrary files to multiple locations within the system.Product: CyberData 011209 IntercomCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30515NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01CVE-2025-42989 - RFC inbound processing lacks necessary authorization checks, allowing authenticated user privilege escalation and critical impact on application integrity and availab…
Product: Apache InLong
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-27531
NVD References: https://lists.apache.org/thread/r62lkqrr739wvcb60j6ql6q63rh4bxx5
NVD References: http://www.openwall.com/lists/oss-security/2025/02/28/2
Product: Kunbus RevPi Status
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41646
NVD References: https://www.kunbus.com/en/productsecurity/Kunbus-2025-0000003
Product: Quantenna Wi-Fi chipset
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3461
NVD References:
Product: Honding Technology Smart Parking Management System
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5893
NVD References:
Product: Zohocorp ManageEngine Exchange Reporter Plus
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3835
NVD References: https://www.manageengine.com/products/exchange-reports/advisory/CVE-2025-3835.html
Product: WilderForge
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49013
NVD References:
- https://codeql.github.com/codeql-query-help/javascript/js-actions-command-injection
- https://github.com/WilderForge/WilderForge/security/advisories/GHSA-m6r3-c73x-8fw5
- https://securitylab.github.com/research/github-actions-untrusted-input
Product: Listmonk
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49136
NVD References: https://github.com/knadh/listmonk/security/advisories/GHSA-jc7g-x28f-3v3h
Product: Lablup BackendAI
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49652
NVD References: https://hiddenlayer.com/sai_security_advisor/2025-05-backendai-49653/
Product: CyberData 011209 Intercom
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30184
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01
Product: CyberData 011209 Intercom
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30515
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01
Product: SAP NetWeaver Application Server for ABAP
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-42989
NVD References:
Product: Avaya Call Management System
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-1041
NVD References: https://support.avaya.com/css/public/documents/101093084
Product: LoftOcean TinySalt
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49455
NVD References: https://patchstack.com/database/wordpress/theme/tinysalt/vulnerability/wordpress-tinysalt-3-10-0-php-object-injection-vulnerability?_s_id=cve
Product: LoftOcean CozyStay
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-49507
NVD References: https://patchstack.com/database/wordpress/theme/cozystay/vulnerability/wordpress-cozystay-1-7-1-php-object-injection-vulnerability?_s_id=cve
Product: GeoServer
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-34711
NVD References:
- https://docs.geoserver.org/latest/en/user/production/config.html#production-config-external-entities
- https://github.com/geoserver/geoserver/security/advisories/GHSA-mc43-4fqr-c965
Product: Open Source Geospatial Foundation GeoServer
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-30220
NVD References:
- https://docs.geoserver.org/latest/en/user/production/config.html#production-config-external-entities
- https://github.com/geoserver/geoserver/security/advisories/GHSA-jj54-8f66-c5pc
- https://github.com/geotools/geotools/security/advisories/GHSA-826p-4gcg-35vw
Product: Energy Services G5DFR
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-40585
NVD References: https://cert-portal.siemens.com/productcert/html/ssa-345750.html
Product: Adobe Commerce
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-47110
NVD References: https://helpx.adobe.com/security/products/magento/apsb25-50.html
Product: Microsoft Windows Cryptographic Services
CVSS Score: 8.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-29828
ISC Diary: https://isc.sans.edu/diary/32032
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828
Product: Microsoft Windows Remote Desktop Services
CVSS Score: 8.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-32710
ISC Diary: https://isc.sans.edu/diary/32032
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710
Product: Microsoft Windows SMB
CVSS Score: 8.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-33073
ISC Diary: https://isc.sans.edu/diary/32032
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073
Product: QNX SDP
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-2474
NVD References: https://support.blackberry.com/pkb/s/article/140646
Product: Microsoft UEFI firmware
CVSS Score: 8.2
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-3052
ISC Diary: https://isc.sans.edu/diary/32032
NVD References:
- https://uefi.org/specs/UEFI/2.10/32_Secure_Boot_and_Driver_Signing.html
Product: Golo City Travel Guide WordPress Theme
Active Installations: Unknown. Update to version 1.7.1, or a newer patched version
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4797
NVD References:
- https://themeforest.net/item/golo-directory-listing-travel-wordpress-theme/25397810
Product: Dimdavid File_Provider
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-4578
NVD References: https://wpscan.com/vulnerability/3aa76b96-40b7-4bde-a39c-c1aa6f8278fc/
Product: HyperComments WordPress plugin
Active Installations: This plugin has been closed as of November 28, 2019 and is not available for download. Reason: Security Issue.
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5701
NVD References:
- https://plugins.trac.wordpress.org/browser/hypercomments/trunk/hypercomments.php
Product: WordPress WP Email Debug plugin
Active Installations: This plugin has been closed as of June 3, 2025 and is not available for download. This closure is temporary, pending a full review.
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-5486
NVD References:
- https://plugins.trac.wordpress.org/browser/wp-email-debug/trunk/hooks.php#L71
Product: StylemixThemes Motors - Events
Active Installations: Unknown.
CVSS Score: 9.0
Product: AncoraThemes Mr. Murphy
Active Installations: Unknown. Update to version 1.2.12.1 or later.
CVSS Score: 9.8
Product: Axiomthemes Sweet Dessert
Active Installations: Unknown. Update to version 1.1.13 or later.
CVSS Score: 9.8
Product: facturaone TicketBAI Facturas para WooCommerce
Active Installations: Unknown
CVSS Score: 9.3
Product: PayU India
Active Installations: 5,000+
CVSS Score: 9.8
Product: pixelgrade Category Icon
Active Installations: 2,000+
CVSS Score: 9.1
Product: themeton The Fashion - Model Agency One Page Beauty Theme
Active Installations: Unknown
CVSS Score: 9.8
Product: themeton FLAP - Business WordPress Theme
Active Installations: Unknown
CVSS Score: 9.8
Product: themeton PressGrid - Frontend Publish Reaction & Multimedia Theme
Active Installations: Unknown
CVSS Score: 9.8
Product: Woobewoo WBW Product Table PRO
Active Installations: 2,000+
CVSS Score: 9.3
Product: kamleshyadav WP Lead Capturing Pages
Active Installations: Unknown
CVSS Score: 9.3
Product: FantasticPlugins SUMO Affiliates Pro
Active Installations: Unknown
CVSS Score: 10.0
Product: sonalsinha21 Recover abandoned cart for WooCommerce
Active Installations: 100+
CVSS Score: 9.3
Product: Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce Ð Light
Active Installations: 600+
CVSS Score: 9.3
Product: Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce - Light
Active Installations: 600+
CVSS Score: 10.0
Product: Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce - Light
Active Installations: 600+
CVSS Score: 9.8
Product: MetalpriceAPI
Active Installations: 400+. Update to version 1.1.5 or later.
CVSS Score: 9.9
Product: Alex Zaytseff Multi CryptoCurrency Payments
Active Installations: 400+
CVSS Score: 9.3
Product: mystyleplatform MyStyle Custom Product Designer
Active Installations: 80+. Update to version 3.21.2 or later.
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-48281
The following vulnerabilities need a manual review:
Product: Microsoft .NET and Visual Studio
CVSS Score: 7.5
NVD: N/A
ISC Diary: https://isc.sans.edu/diary/32032
ISC Podcast: https://isc.sans.edu/podcastdetail/9488
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399
Product: Microsoft Visual Studio
CVSS Score: 7.1
NVD: N/A
ISC Diary: https://isc.sans.edu/diary/32032
ISC Podcast: https://isc.sans.edu/podcastdetail/9488
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959
New Research | How 100+ security leaders are tackling AI risk AI adoption is accelerating-and new research shows most security programs are still working to catch up. Get a clear view into how real teams are securing AI in the cloud with this new AI Readiness Report. Read the report:
Virtual Event | SANS 2025 Cloud Security Exchange | Thursday, August 21 at 10:30 AM ET Earn 4 CPEs Meet Google Cloud, Microsoft, and AWS security leaders-LIVE. Join Dr. Anton Chuvakin, Dr. Paul Vixie, Frank Kim, and other top cloud minds for a front-line look at what's working in cloud security today-and what's next. Plus: You'll receive the free Cloud Security eBook co-authored by the Big 3 + SANS. Can't join live? Register now for access to recordings and eBook:
Virtual Event | SANS 2025 Cloud Security Exchange | Thursday, August 21 at 10:30 AM ET Earn 4 CPEs Meet Google Cloud, Microsoft, and AWS security leaders-LIVE. Join Dr. Anton Chuvakin, Dr. Paul Vixie, Frank Kim, and other top cloud minds for a front-line look at what's working in cloud security today-and what's next. Plus: You'll receive the free Cloud Security eBook co-authored by the Big 3 + SANS. Can't join live? Register now for access to recordings and eBook:
Virtual Event | SANS 2025 Cloud Security Exchange | Thursday, August 21 at 10:30 AM ET Earn 4 CPEs Meet Google Cloud, Microsoft, and AWS security leaders-LIVE. Join Dr. Anton Chuvakin, Dr. Paul Vixie, Frank Kim, and other top cloud minds for a front-line look at what's working in cloud security today-and what's next. Plus: You'll receive the free Cloud Security eBook co-authored by the Big 3 + SANS. Can't join live? Register now for access to recordings and eBook: