May 2025 Vulnerability Digest Recording
Watch this webinar to learn about patches for Microsoft vulnerabilities from Patch Tuesday:
Windows CLFS Driver Use After Free Vulnerability (CVE-2025-32701) Windows CLFS Driver Input Validation Vulnerability (CVE-2025-32706) Microsoft Scripting Engine Memory Corruption Vulnerability (CVE-2025-30397)
Microsoft Office Remote Code Execution Vulnerability (CVE-2025-30386)
Microsoft Office Remote Code Execution Vulnerability (CVE-2025-30377)
Remote Desktop Client Remote Code Execution Vulnerability (CVE-2025-29966)
Remote Desktop Gateway Service Remote Code Execution Vulnerability (CVE-2025-29967)
Third‑party & upstream component vulnerabilities: Action1, Microsoft, Google, Android, Firefox, WordPress, Apache Parquet, Apple, Linux, ASUS, Python, SSH, Cisco, Lantronix Xport, Windows Task Scheduler, Industrial Control Systems and Fortinet
Register to watch
Speakers
Gene Moody
Field CTO
Gene Moody has over 30 years of experience in systems administration, information security, software & database development, and IT management. Gene has led red and blue team initiatives, architected hybrid environments, modernized software stacks, and mentored cross‑functional teams
William Busler
Technical Product Engineer
William Busler, a Technical Product Engineer at Action1, brings over 20 years of experience in networking infrastructure management for Carriers and Large Enterprises. With strong technical and troubleshooting skills, he’s facilitated the implementation of world-class performance monitoring solutions.