[BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2024-11-18

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Mon Nov 18 10:13:32 PST 2024


Total New Fixlets:      0
Total Updated Fixlets:  83
Total Fixlets in Site:  2740
Total CVEs Covered:     773
Release Date:           2024-11-18

New Fixlets:
    No Fixlets Added In This Release

Updated Fixlets:
    33290    Apple Multiple Products WebKit Memory Corruption Vulnerability
- RHEL
    6670    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows 10
    33300    Apple Multiple Products WebKit Use-After-Free Vulnerability -
RHEL
    33310    Apple Multiple Products WebKit Code Execution Vulnerability -
RHEL
    30240    Linux Kernel Use-After-Free Vulnerability - RHEL
    33340    Apple Multiple Products WebKit Type Confusion Vulnerability -
RHEL
    33350    Apple Multiple Products WebKit Memory Corruption Vulnerability
- RHEL
    31820    Linux Kernel Privilege Escalation Vulnerability - Oracle Linux
    14930    WhatsApp Cross-Site Scripting Vulnerability - Any Version of
MacOS
    33370    Apple Multiple Products WebKit Code Execution Vulnerability -
RHEL
    29790    GitLab Community and Enterprise Editions Improper Access
Control Vulnerability - Any Version of Linux
    13920    Microsoft Win32k Privilege Escalation Vulnerability - Windows
11
    33390    Apple Multiple Products WebKit Type Confusion Vulnerability -
RHEL
    14450    Plex Media Server Remote Code Execution Vulnerability - Any
Version of Windows
    33910    Microsoft Windows Kernel TOCTOU Race Condition Vulnerability -
Windows 11
    33400    Apple Multiple Products WebKit Out-of-Bounds Read
Vulnerability - RHEL
    32380    Microsoft Windows Installer Improper Privilege Management
Vulnerability - Windows 11
    30340    Microsoft Windows Error Reporting Service Improper Privilege
Management Vulnerability - Windows 11
    29830    Microsoft SmartScreen Prompt Security Feature Bypass
Vulnerability - Windows 11
    32390    Microsoft Windows Mark of the Web (MOTW) Protection Mechanism
Failure Vulnerability - Windows 11
    31890    Linux Kernel Heap-Based Buffer Overflow Vulnerability - Oracle
Linux
    19610    TeamViewer Desktop Bypass Remote Login Vulnerability - Any
Version of MacOS
    31910    Linux Kernel Use-After-Free Vulnerability - Oracle Linux
    14000    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows 11
    31940    Linux Kernel Use-After-Free Vulnerability - Oracle Linux
    31970    Linux Kernel Privilege Escalation Vulnerability - Oracle Linux
    9960    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2012 R2
    29930    Microsoft Windows MSHTML Platform Security Feature Bypass
Vulnerability - Windows 11
    5360    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2008 SP2
    31990    Linux Kernel Use-After-Free Vulnerability - Oracle Linux
    13560    Microsoft Win32k Privilege Escalation Vulnerability - Windows
Server 2022
    28930    Linux Kernel Use-After-Free Vulnerability - RHEL
    12550    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2008 R2 SP1
    2310    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows 8.1
    30470    Linux Kernel Use-After-Free Vulnerability - RHEL
    18730    ImageMagick Server-Side Request Forgery (SSRF) Vulnerability -
Any Version of Linux
    27950    Microsoft Windows Desktop Window Manager (DWM) Core Library
Privilege Escalation Vulnerability - Windows 11
    27970    Microsoft Windows SmartScreen Security Feature Bypass
Vulnerability - Windows 11
    27980    Microsoft Windows Cloud Files Mini Filter Driver Privilege
Escalation Vulnerability - Windows 11
    13650    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2022
    15700    TeamViewer Desktop Bypass Remote Login Vulnerability - Any
Version of Windows
    17750    GitLab Community and Enterprise Editions Remote Code Execution
Vulnerability - Any Version of Linux
    32090    ImageMagick Improper Input Validation Vulnerability - Any
Version of Windows
    16730    ImageMagick Server-Side Request Forgery (SSRF) Vulnerability -
Any Version of Windows
    29530    Microsoft Windows Kernel Exposed IOCTL with Insufficient
Access Control Vulnerability - Windows 11
    18270    ImageMagick Arbitrary File Deletion Vulnerability - Any
Version of Linux
    7520    Microsoft Win32k Privilege Escalation Vulnerability - Windows
Server 2019
    14180    Microsoft Defender Remote Code Execution Vulnerability - Any
Version of Windows
    32620    Microsoft Windows MSHTML Platform Spoofing Vulnerability -
Windows 11
    31610    Microsoft Windows Power Dependency Coordinator Privilege
Escalation Vulnerability - Windows 11
    14210    Microsoft Malware Protection Engine Improper Restriction of
Operations Vulnerability - Any Version of Windows
    34690    Microsoft Windows Task Scheduler Privilege Escalation
Vulnerability - Windows Server 2016
    31620    Microsoft Windows SmartScreen Security Feature Bypass
Vulnerability - Windows 11
    34700    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows Server 2016
    32140    ImageMagick Improper Input Validation Vulnerability - Any
Version of Linux
    31630    Microsoft Windows Kernel Privilege Escalation Vulnerability -
Windows 11
    34710    Microsoft Windows Task Scheduler Privilege Escalation
Vulnerability - Windows Server 2019
    31640    Microsoft Windows Ancillary Function Driver for WinSock
Privilege Escalation Vulnerability - Windows 11
    7580    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2019
    34720    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows Server 2019
    31650    Microsoft Windows Scripting Engine Memory Corruption
Vulnerability - Windows 11
    34730    Microsoft Windows Task Scheduler Privilege Escalation
Vulnerability - Windows 10
    30130    Microsoft DWM Core Library Privilege Escalation Vulnerability
- Windows 11
    34740    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows 10
    16310    ImageMagick Arbitrary File Deletion Vulnerability - Any
Version of Windows
    30140    Linux Kernel Use-After-Free Vulnerability - Ubuntu
    34750    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows Server 2008 SP2
    6590    Microsoft Win32k Privilege Escalation Vulnerability - Windows
10
    31170    Microsoft Windows Hyper-V Privilege Escalation Vulnerability -
Windows 11
    3530    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows 7 SP1
    31180    Microsoft Windows MSHTML Platform Spoofing Vulnerability -
Windows 11
    34770    Microsoft Windows Task Scheduler Privilege Escalation
Vulnerability - Windows Server 2022
    33240    Apple Multiple Products WebKit Type Confusion Vulnerability -
RHEL
    34780    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows Server 2022
    8670    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2016
    34790    Microsoft Windows Task Scheduler Privilege Escalation
Vulnerability - Windows 11
    11240    Microsoft Windows User Profile Service Privilege Escalation
Vulnerability - Windows Server 2012
    34800    Microsoft Windows NTLMv2 Hash Disclosure Spoofing
Vulnerability - Windows 11
    29170    Microsoft Windows SmartScreen Security Feature Bypass
Vulnerability - Windows 11
    33780    Microsoft Windows Management Console Remote Code Execution
Vulnerability - Windows 11
    33270    Apple Multiple Products WebKit Use-After-Free Vulnerability -
RHEL
    29180    Microsoft Windows Internet Shortcut Files Security Feature
Bypass Vulnerability - Windows 11
    33790    Microsoft Windows MSHTML Platform Spoofing Vulnerability -
Windows 11
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20241118/c2ef31ef/attachment.html>


More information about the Besadmin-announcements mailing list