SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
An unusual "shy z-wasp" phishing
Published: 2025-01-27
Last Updated: 2025-01-27 10:45:52 UTC
by Jan Kopriva (Version: 1)
Threat actors who send out phishing messages have long ago learned that zero-width characters and unrendered HTML entities can be quite useful to them. Inserting a zero-width character into a hyperlink can be used to bypass some URL security checks without any negative impact on the function of the link, while any unrendered entities can be used to break up any suspicious words or sentences that might lead to the message being classified as a potential phishing, without the recipient being aware of their inclusion.
One of the better-known techniques that depend on the use of zero-width characters (e.g., a Zero-Width Space – ​ a Zero-Width Non-Joiner – ‌ a Zero-Width Joiner – ‍ etc.) was named Z-WASP by the researchers in Avanan who first discovered it being used to bypass O365 security filters in 2018 [1]. Nevertheless, the aforementioned practice of using “invisible” characters in phishing messages is far older – for example, the soft hyphen or “SHY” html entity (­) has been used by threat actors at least since 2010[2].
Both of these techniques are relevant to the topic of today’s diary – an interesting phishing message that arrived in our hander mailbox late last week.
At first glance, it looked like any other run of the mill phishing message (apart from the use of an unusually small font and a somewhat difficult to see red spot under the “KEEP MY PASSWORD” link) ...
Read the full entry: https://isc.sans.edu/diary/An+unusual+shy+zwasp+phishing/31626/
[Guest Diary] How Access Brokers Maintain Persistence
Published: 2025-01-24
Last Updated: 2025-01-24 00:42:06 UTC
by Joseph Flint, SANS.edu BACS Student (Version: 1)
[This is a Guest Diary by Joseph Flint, an ISC intern as part of the SANS.edu BACS program]
Access brokers are groups referred to that obtain initial access in compromised environments, establish persistence through different methods, and sell this access to secondary bad actor groups who contribute to follow up attacks.
CrowdStrike wrote an article outlining desired targets typically involved with compromises that were shown to come from an access broker group. They broke down the top 10 targeted sectors for access brokers by percentage and found the following:
21% Academic
15% Government
13% Technology
9% Financial Services
9% Healthcare
8% Energy
7% Manufacturing
7% Industrials & Engineering
6% Legal
5% Insurance
Is your organization, or an organizations security posture you manage a part of this profile? For most Cybersecurity professionals the answer will be an overwhelming yes due to several factors including budgets for internal companies and for various audit requirements. These findings directly put environments related to these fields at risk as bad actors are looking to buy access to these environments.
Proofpoint outlined some commonly observed persistence mechanisms that are utilized by cyber criminals including a SystemBC botnet which is observed routinely in different environments I have personally worked on and across honeypot systems. Many botnets are observed scanning the internet for previously infected hosts. One of these examples comes from my own honeypot. Observed traffic from a Digital Ocean hosted IP shows web URL requests looking for this previously mentioned SystemBC directories ...
Read the full entry: https://isc.sans.edu/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/
From PowerShell to a Python Obfuscation Race! (2025.01.29)
https://isc.sans.edu/diary/From+PowerShell+to+a+Python+Obfuscation+Race/31634/
Fileless Python InfoStealer Targeting Exodus (2025.01.28)
https://isc.sans.edu/diary/Fileless+Python+InfoStealer+Targeting+Exodus/31630/
XSS Attempts via E-Mail (2025.01.23)
https://isc.sans.edu/diary/XSS+Attempts+via+EMail/31620/
Catching CARP: Fishing for Firewall States in PFSync Traffic (2025.01.22)
https://isc.sans.edu/diary/Catching+CARP+Fishing+for+Firewall+States+in+PFSync+Traffic/31616/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: SonicWall SMA8200V
CVSS Score: 9.8
** KEV since 2025-01-24 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-23006
ISC Podcast: https://isc.sans.edu/podcastdetail/9294
NVD References: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
Product: Llama Stack prior to revision 7a8aa775e5a267cf8660d83140011a0b7f91e005
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-50050
ISC Podcast: https://isc.sans.edu/podcastdetail/9296
Product: Fortinet FortiOS
CVSS Score: 0
** KEV since 2025-01-14 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55591
ISC Podcast: https://isc.sans.edu/podcastdetail/9298
Product: Easy Real Estate
Active Installations: unknown
CVSS Score: 9.8
Product: ARPrice
Active Installations: unknown
CVSS Score: 9.3
Product: ARPrice
Active Installations: unknown
CVSS Score: 9.8
Product: Fancy Product Designer
Active Installations: unknown
CVSS Score: 9.3
Product: Fancy Product Designer
Active Installations: unknown
CVSS Score: 9.0
Product: Homey Login Register
Active Installations: unknown
CVSS Score: 9.8
Product: Multiple Carousel
Active Installations: unknown
CVSS Score: 9.3
Product: UkrSolution Barcode Scanner with Inventory & Order Manager
Active Installations: unknown
CVSS Score: 9.1
Product: SpagoBI
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54794
NVD References: https://github.com/MarioTesoro/CVE-2024-54794
Product: Ruijie RG-EW300N
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-42936
NVD References: https://gist.github.com/smrx86/2008111b12ab47882b3928d0cbc9e415
Product: Matrix Mjolnir
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24024
NVD References:
- https://github.com/matrix-org/mjolnir/commit/b437fa16b5425985715df861987c836affd51eea
- https://github.com/matrix-org/mjolnir/commit/d0ef527a9e3eb45e17143d5295a64b775ccaa23d
- https://github.com/matrix-org/mjolnir/security/advisories/GHSA-3jq6-xc85-m394
Product: Northern.tech Mender Client
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55959
NVD References:
Product: Oracle JD Edwards EnterpriseOne
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21524
NVD References: https://www.oracle.com/security-alerts/cpujan2025.html
Product: Oracle WebLogic Server
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21535
NVD References: https://www.oracle.com/security-alerts/cpujan2025.html
Product: Oracle Hospitality OPERA 5
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21547
NVD References: https://www.oracle.com/security-alerts/cpujan2025.html
Product: Oracle Agile PLM Framework
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-21556
NVD References: https://www.oracle.com/security-alerts/cpujan2025.html
Product: pearProjectApi
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-27112
NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-27113
NVD References:
Product: Apache Ranger
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45479
NVD References:
- https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger
Product: Magma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-24421
NVD References: https://cellularsecurity.org/ransacked
Product: Google Android OS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-49747
NVD References: https://source.android.com/security/bulletin/2025-01-01
Product: Google Android
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-49748
NVD References: https://source.android.com/security/bulletin/2025-01-01
Product: WPBot Pro Wordpress Chatbot plugin
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-13091
NVD References:
Product: Scriptsbundle AdForest theme
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12857
NVD References:
- https://themeforest.net/item/adforest-classified-wordpress-theme/19481695
Product: Smallerik File Browser
Active Installations: This plugin has been closed as of January 8, 2025 and is not available for download. This closure is temporary, pending a full review.
CVSS Score: 9.9
Product: Multi Uploader for Gravity Forms
Active Installations: unknown
CVSS Score: 9.0
Product: WordPress Local SEO
Active Installations: unknown
CVSS Score: 9.3
Product: Quick Count
Active Installations: This plugin has been closed as of January 2, 2025 and is not available for download. This closure is temporary, pending a full review.
CVSS Score: 9.8
Product: NgocCode WP Load Gallery
Active Installations: unknown
CVSS Score: 9.1
Product: Innovative Solutions user files
Active Installations: unknown
CVSS Score: 10.0
Product: Muzaara Google Ads Report
Active Installations: unknown
CVSS Score: 9.8
NVD: https://patchstack.com/database/wordpress/plugin/muzaara-adwords-optimize-dashboard/vulnerability/wordpress-muzaara-google-ads-report-plugin-3-1-php-object-injection-vulnerability?_s_id=cvehttps://nvd.nist.gov/vuln/detail/CVE-2025-23914
Product: Cisco Meeting Management
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-20156
NVD References:
- https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Product: Elastic Fleet ServerCVSS Score: 9.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52975NVD References: https://discuss.elastic.co/t/fleet-server-8-15-0-security-update-esa-2024-31/373522CVE-2024-52325 - ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection.Product: ECOVACS robot lawnmowersCVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52325NVD References: - https://dontvacuum.me/talks/DEFCON32/DEFCON32_reveng_hacking_ecovacs_robots.pdf- https://www.ecovacs.com/global/userhelp/dsa20241119- https://www.ecovacs.com/global/userhelp/dsa20241130001- https://youtu.be/_wUsM0Mlenc?t=2041CVE-2025-0637 - Beta10 software contains a vulnerability that allows unauthorized users to access private areas without authentication.Product: Beta10 CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-0637NVD References: https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-beta10CVE-2024-53923 - Centreon Web versions 24.10.x before 24.10.3, 24.04.x before 24.04.9, 23.10.x before 23.10.19, and 23.04.x before 23.04.24 allows a user with high privileges to perform SQL injection via a form for uploading media.Product: Centreon WebCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-53923NVD References: - https://github.com/centreon/centreon/releases- https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-53923-centreon-web-critical-severity-4265CVE-2024-55573 - Centreon centreon-web before versions 24.10.3, 24.04.9, 23.10.19, and 23.04.24 allows high privileged users to inject SQL in the form for virtual metric creation.Product: Centreon WebCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55573NVD References: - https://github.com/centreon/centreon/releases- https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-55573-centreon-web-critical-severity-4264CVE-2024-55194 - OpenImageIO v3.1.0.0dev was discovered to contain a heap overflow via the component /OpenImageIO/fmath.h.Product: OpenImageIOCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55194NVD References: - https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552- https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552CVE-2024-57328 - Online Food Ordering System v1.0 login form is vulnerable to SQL Injection due to lack of proper input sanitization, enabling unauthorized access through malicious queries.Product: Online Food Ordering System v1.0CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-57328NVD References: https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328CVE-2024-13545 - The Bootstrap Ultimate theme for WordPress is vulnerable to Local File Inclusion in all versions up to 1.4.9, allowing unauthenticated attackers to include PHP files on the server and potentially execute code.Product: WordPress Bootstrap Ultimate themeActive Installations: 7,000+CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-13545NVD References: - https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8- https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cveCVE-2025-22609, CVE-2025-22611, CVE-2025-22612 - Coolify allows any authenticated user to attach any existing private key on a coolify instance to his own server, leading to potential remote code execution on the victim's server.Product: CoolifyCVSS Scores: 9.9 - 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22609NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22611NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22612NVD References: - https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9- https://github.com/coollabsio/coolify/security/advisories/GHSA-9w72-9qww-qj6g- https://github.com/coollabsio/coolify/security/advisories/GHSA-wg8x-cgq4-vjxjCVE-2024-56404 - One Identity Identity Manager 9.x before 9.3 is vulnerable to an insecure direct object reference (IDOR) flaw that enables privilege escalation in On-Premise installations.Product: One Identity Identity ManagerCVSS Score: 9.9NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-56404NVD References: - https://support.oneidentity.com/product-notification/noti-00001678- https://support.oneidentity.com/technical-documents/identity-manager/9.3/release-notes/- https://www.oneidentity.com/community/identity-manager/CVE-2025-24650 - Themefic Tourfic allows the unrestricted upload of dangerous file types, potentially enabling the upload of a web shell to a web server, affecting versions up to 2.15.3.Product: Themefic TourficActive Installations 1,000+CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24650NVD References: https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cveCVE-2025-24601 - Deserialization of Untrusted Data vulnerability in ThimPress FundPre…
Product: Beta10
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-0637
NVD References: https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-beta10
Product: Centreon Web
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-53923
NVD References:
- https://github.com/centreon/centreon/releases
-
Product: Centreon Web
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55573
NVD References:
- https://github.com/centreon/centreon/releases
-
Product: OpenImageIO
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-55194
NVD References:
- https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552
- https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552
Product: Online Food Ordering System v1.0
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-57328
NVD References: https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328
Product: WordPress Bootstrap Ultimate theme
Active Installations: 7,000+
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-13545
NVD References:
- https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8
Product: Coolify
CVSS Scores: 9.9 - 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22609
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22611
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22612
NVD References:
- https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9
- https://github.com/coollabsio/coolify/security/advisories/GHSA-9w72-9qww-qj6g
- https://github.com/coollabsio/coolify/security/advisories/GHSA-wg8x-cgq4-vjxj
Product: One Identity Identity Manager
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-56404
NVD References:
- https://support.oneidentity.com/product-notification/noti-00001678
- https://support.oneidentity.com/technical-documents/identity-manager/9.3/release-notes/
Product: Themefic Tourfic
Active Installations 1,000+
CVSS Score: 9.1
Product: ThimPress FundPress
Active Installations: 300+
CVSS Score: 9.8
Product: MORKVA Shipping for Nova Poshta
Active Installations 500+
CVSS Score: 9.3
Product: TRENDnet TEW-632BRP
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-57590
NVD References: https://github.com/IdaJea/IOT_vuln_1/blob/master/tew632/ntp_sync.md
Product: DLINK DIR-825 REVB 2.03
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-57595
NVD References:
- https://github.com/IdaJea/IOT_vuln_1/blob/master/DIR825/wps_pin.md
Product: Pdfcrowd Save as PDF plugin
Active Installations: 1,000+
CVSS Score: 9.8
Product: CactiCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-22604NVD References: - https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0- https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36CVE-2024-48841 - Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.Product: FLXEONCVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48841NVD References: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A5684&LanguageCode=en&DocumentPartId=PDF&Action=LaunchCVE-2024-54530 - macOS Sequoia, watchOS, visionOS, iOS, and iPadOS versions 15.2, 11.2, 2.2, 18.2, and 18.2 allow password autofill to fill in passwords after failing authentication due to improved checks.Product: Multiple Apple productsCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54530NVD References: - https://support.apple.com/en-us/121837- https://support.apple.com/en-us/121839- https://support.apple.com/en-us/121843- https://support.apple.com/en-us/121845CVE-2025-24093 - macOS Ventura and macOS Sonoma versions 13.7.3 and 14.7.3 resolved a permissions issue allowing apps to access removable volumes without user consent.Product: Apple macOS Ventura and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24093NVD References: - https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24102 - iPadOS, macOS Sequoia, macOS Sonoma, and macOS Ventura versions 17.7.4, 15.3, 14.7.3, and 13.7.3 respectively fixed an issue where an app could determine a user's current location by implementing improved checks.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24102NVD References: - https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24106 - macOS Ventura, macOS Sequoia, and macOS Sonoma versions 13.7.3, 15.3, and 14.7.3 are susceptible to unexpected app termination when parsing certain files.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24106NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070---CVE-2025-24109 - macOS Ventura, macOS Sequoia, and macOS Sonoma were fixed for a downgrade issue that allowed apps to access sensitive user data through additional code-signing restrictions.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24109NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24118 - iPadOS, macOS Sequoia, and macOS Sonoma versions 17.7.4, 15.3, and 14.7.3 respectively exhibit improved memory handling to prevent unexpected system termination or kernel memory writing by malicious apps.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24118NVD References: - https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069CVE-2025-24123 & CVE-2025-24124 - Parsing a file in various Apple products may lead to an unexpected app termination but has been fixed in recent updates.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24123NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24124NVD References: - https://support.apple.com/en-us/122066- https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070- https://support.apple.com/en-us/122071- https://support.apple.com/en-us/122072- https://support.apple.com/en-us/122073CVE-2025-24126 - visionOS 2.3, iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, and tvOS 18.3 fixed an input validation issue, which could allow a local network attacker to terminate the system or corrupt process memory.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24126NVD References: - https://support.apple.com/en-us/122066- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122071- https://support.apple.com/en-us/122072- https://support.apple.com/en-us/122073CVE-2025-24130 - macOS Ventura, macOS Sequoia, and macOS Sonoma are vulnerable to an issue where an app may be able to modify protected parts of the file system, but it has been fixed with improved checks in versions 13.7.3, 15.3, and 14.7.3.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24130NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/12…
Product: Multiple Apple products
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-54530
NVD References:
- https://support.apple.com/en-us/121837
- https://support.apple.com/en-us/121839
Product: Apple macOS Ventura and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24093NVD References: - https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24102 - iPadOS, macOS Sequoia, macOS Sonoma, and macOS Ventura versions 17.7.4, 15.3, 14.7.3, and 13.7.3 respectively fixed an issue where an app could determine a user's current location by implementing improved checks.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24102NVD References: - https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24106 - macOS Ventura, macOS Sequoia, and macOS Sonoma versions 13.7.3, 15.3, and 14.7.3 are susceptible to unexpected app termination when parsing certain files.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24106NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070---CVE-2025-24109 - macOS Ventura, macOS Sequoia, and macOS Sonoma were fixed for a downgrade issue that allowed apps to access sensitive user data through additional code-signing restrictions.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24109NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24118 - iPadOS, macOS Sequoia, and macOS Sonoma versions 17.7.4, 15.3, and 14.7.3 respectively exhibit improved memory handling to prevent unexpected system termination or kernel memory writing by malicious apps.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24118NVD References: - https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069CVE-2025-24123 & CVE-2025-24124 - Parsing a file in various Apple products may lead to an unexpected app termination but has been fixed in recent updates.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24123NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24124NVD References: - https://support.apple.com/en-us/122066- https://support.apple.com/en-us/122067- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070- https://support.apple.com/en-us/122071- https://support.apple.com/en-us/122072- https://support.apple.com/en-us/122073CVE-2025-24126 - visionOS 2.3, iOS 18.3, iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, and tvOS 18.3 fixed an input validation issue, which could allow a local network attacker to terminate the system or corrupt process memory.Product: Multiple Apple productsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24126NVD References: - https://support.apple.com/en-us/122066- https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122071- https://support.apple.com/en-us/122072- https://support.apple.com/en-us/122073CVE-2025-24130 - macOS Ventura, macOS Sequoia, and macOS Sonoma are vulnerable to an issue where an app may be able to modify protected parts of the file system, but it has been fixed with improved checks in versions 13.7.3, 15.3, and 14.7.3.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24130NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24135 - macOS Sequoia 15.3 allows an app to gain elevated privileges due to improved message validation issues.Product: Apple macOS SequoiaCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24135NVD References: https://support.apple.com/en-us/122068CVE-2025-24139 - macOS is vulnerable to unexpected app termination when parsing a maliciously crafted file, fixed in recent updates.Product: Apple macOSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24139NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24146 - macOS Messages may expose user contact information in system logging when deleting a conversation.Product: Apple macOSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24146NVD References: - https://support.apple.com/en-us/122068- https://support.apple.com/en-us/122069- https://support.apple.com/en-us/122070CVE-2025-24151 - macOS Ventura, macOS Sequoia, and macOS Sonoma are vulnerable to an app being able to cause unexpected system termination or corrupt kernel memory due to poor memory handling.Product: Apple macOS Ventura, macOS Sequoia, and macOS SonomaCVSS Score: 9.8NVD: https://nvd.ni…
Product: Apple macOS Ventura, macOS Sequoia, and macOS Sonoma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24106
NVD References:
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122069
- https://support.apple.com/en-us/122070
---
Product: Apple macOS Ventura, macOS Sequoia, and macOS Sonoma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24109
NVD References:
- https://support.apple.com/en-us/122068
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24118
NVD References:
- https://support.apple.com/en-us/122067
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24123
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24124
NVD References:
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122067
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122069
- https://support.apple.com/en-us/122070
- https://support.apple.com/en-us/122071
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24126
NVD References:
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122071
Product: Apple macOS Ventura, macOS Sequoia, and macOS Sonoma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24130
NVD References:
- https://support.apple.com/en-us/122068
Product: Apple macOS Sequoia
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24135
NVD References: https://support.apple.com/en-us/122068
Product: Apple macOS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24139
NVD References:
- https://support.apple.com/en-us/122068
Product: Apple macOS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24146
NVD References:
- https://support.apple.com/en-us/122068
Product: Apple macOS Ventura, macOS Sequoia, and macOS Sonoma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24151
NVD References:
- https://support.apple.com/en-us/122068
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24154
NVD References:
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122069
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24162
NVD References:
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122071
- https://support.apple.com/en-us/122072
Product: Multiple Apple products
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24163
NVD References:
- https://support.apple.com/en-us/122066
- https://support.apple.com/en-us/122067
- https://support.apple.com/en-us/122068
- https://support.apple.com/en-us/122069
- https://support.apple.com/en-us/122070
- https://support.apple.com/en-us/122071
Product: Apple macOS Ventura, macOS Sequoia, and macOS Sonoma
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-24174
NVD References:
- https://support.apple.com/en-us/122068
Product: youdiancms
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-57052
NVD References: https://gist.github.com/yahaha9/720fb45bbebda62dc198568c8d275df8
Product: Emote Interactive Remote Mouse Server
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-3365
NVD References: https://github.com/rapid7/metasploit-framework/pull/17067
Product: Canon Small Office Multifunction Printers and Laser Printers
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12647
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12648
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-12649
NVD References:
- https://canon.jp/support/support-info/250127vulnerability-response
- https://psirt.canon/advisory-information/cp2025-001/
- https://www.canon-europe.com/support/product-security/#news
Product: ThemeREX Addons_PLUGIN
Active Installations: unknown
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-13448
NVD References:
- https://themeforest.net/item/qwery-multipurpose-business-wordpress-theme/29678687
Product: TeamViewer Clients
CVSS Score: 7.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-0065
ISC Podcast: https://isc.sans.edu/podcastdetail/9300
NVD References: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1001/
Product: Tandoor Recipes Jinja2
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-23211
NVD References:
- https://github.com/TandoorRecipes/recipes/commit/e6087d5129cc9d0c24278948872377e66c2a2c20
- https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-r6rj-h75w-vj8v
- https://github.com/TandoorRecipes/recipes/security/advisories/GHSA-r6rj-h75w-vj8v
Product: Apache Software Foundation Apache Solr
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-52012
ISC Podcast: https://isc.sans.edu/podcastdetail/9298
NVD References:
- https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd
Webcast | SANS 2025 Threat Hunting Survey Webcast & Forum: Chasing Shadows - Advancements in Threat Hunting Amidst AI and Cloud Challenges | March 13, 10:30 am ET | Join SANS Principal Instructor Josh Lemon as he delves into results from the SANS 2025 Threat Hunting Survey. The 2025 survey analyzes how businesses enhance their threat detection capabilities amid an evolving threat landscape, characterized by increasingly sophisticated and rapid adversary tactics. Save your seat today!
Webcast | Empowering Responders with Automated Investigation, February 19, 1:00 ET | Join Megan Roddie-Fonseca and Lee Sult from Binalyze as they discuss how with the right tooling, analysts of all backgrounds can effectively handle incidents, reducing the response time by removing the need for frequent escalation.
Webcast: February 25, 3:30 pm ET | Insights into Detection Engineering: Findings from a SANS and Anvilogic Survey | Join SANS Certified Instructor Terrence Williams and Anvilogic’s Kevin Gonzalez as they discuss insights from this survey, including effective detection types and the most popular tools and technologies used by detection engineers, the impact of AI on detection efforts, cloud architectures, automation in detection workflows, the integration of Detection Engineering with other operational areas, and much more!
Webcast: February 26 at 1:00 ET | 2025 ICS Security Budget vs. Modern Risk Webcast: Optimizing Cybersecurity Investments for ICS/OT and Critical Infrastructure | Join Dean Parsons as he explores actionable insights into balancing security budgets with the unique needs and risks of ICS/OT systems in the face of escalating cyber threats.