From besadmin-announcements at bigmail.bigfix.com Tue Apr 1 05:34:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 1 Apr 2025 08:34:13 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Vim-Common - Raspbian 11 (all) (ID: 25033101) * Unspecified - Vim-Tiny - Raspbian 11 (armhf) (ID: 25033102) Published Site Version: * Patches for Raspbian 11, version 47. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 1 05:35:07 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 1 Apr 2025 08:35:07 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 11 Message-ID: New content have been added to the Patches for Debian 11 site. New Fixlets: * Unspecified - Vim-Tiny - Debian 11 (amd64) (ID: 25033001) Published Site Version: * Patches for Debian 11, version 115. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Wed Apr 2 07:45:54 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 2 Apr 2025 09:45:54 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applicaitons published 2025-04-02 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011664 Google Chrome 135.0.7049.42 Available * 5058219 Zoom (x64) 6.4.3.63669 Available * 5058268 Zoom 6.4.3.63669 Available * 6082174 Mozilla Firefox (x64) 137.0 Available * 6082297 Mozilla Firefox 137.0 Available * 6082299 Mozilla Firefox (x64) 128.9.0 ESR Available * 6082301 Mozilla Firefox 128.9.0 ESR Available * 6082303 Mozilla Firefox (x64) 115.22.0 ESR Available * 6082305 Mozilla Firefox 115.22.0 ESR Available * 2061211 Apple iTunes 12.13.7 Available - Win10 * 5058221 Skype 8.138.0.214 Available * 6101730 Mozilla Thunderbird 128.9.0 ESR Available * 6101732 Mozilla Thunderbird 137.0 Available Modified : * 14011662 Google Chrome 134.0.6998.178 Available (Superseded) * 5058207 Zoom (x64) 6.4.2.62735 Available (Superseded) * 5058266 Zoom 6.4.2.62735 Available (Superseded) * 6082172 Mozilla Firefox (x64) 136.0.4 Available (Superseded) * 6082287 Mozilla Firefox 136.0.4 Available (Superseded) * 6082289 Mozilla Firefox (x64) 128.8.1 ESR Available (Superseded) * 6082291 Mozilla Firefox 128.8.1 ESR Available (Superseded) * 6082293 Mozilla Firefox (x64) 115.21.1 ESR Available (Superseded) * 6082295 Mozilla Firefox 115.21.1 ESR Available (Superseded) * 2061209 Apple iTunes 12.13.6 Available - Win10 (Superseded) * 5058217 Skype 8.138.0.213 Available (Superseded) * 6101722 Mozilla Thunderbird 128.8.0 ESR Available (Superseded) * 6101728 Mozilla Thunderbird 128.8.1 ESR Available (Superseded) * 6101724 Mozilla Thunderbird 136.0 Available (Superseded) * 6101726 Mozilla Thunderbird 136.0.1 Available (Superseded) Reason : * New update for Chrome , Zoom, Firefox , iTunes , Skype and Thunderbird Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2303 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 2 09:07:38 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 2 Apr 2025 11:07:38 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-02 Message-ID: Content in the Patches for Windows site has been modified * Major [ID:405262302] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 * Major [ID:405262303] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 (x64) Reason for Update: * New update for Microsoft Defender. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4520 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 07:28:29 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 09:28:29 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-03 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058274 Microsoft Edge Extended Stable Build 134.0.3124.51 Available (x64) * 5058276 Microsoft Edge Extended Stable Build 134.0.3124.51 Available Modified : * 5058212 Microsoft Edge Extended Stable Build 132.0.2957.178 Available (x64) (Superseded) * 5058214 Microsoft Edge Extended Stable Build 132.0.2957.178 Available (Superseded) * 5058208 Microsoft Edge Extended Stable Build 132.0.2957.171 Available (x64) (Superseded) * 5058210 Microsoft Edge Extended Stable Build 132.0.2957.171 Available (Superseded) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2304 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 09:09:05 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 11:09:05 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-03 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:50073659] 5007364: Update for Microsoft Visual Studio 2022 version 17.13.5 update - KB5007364 * Major [ID:305186049] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hebrew) * Major [ID:305186048] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Bulgarian) * Major [ID:305186047] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Vietnamese) * Major [ID:305186046] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (German) * Major [ID:305186045] Office 365 Version 16.0.18623.20156 Available for Network Share for Office 365 - Current Channel - Office 365 * Major [ID:305186044] Office 2021 Version 16.0.18623.20156 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * Major [ID:305186043] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Japanese) * Major [ID:305186042] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Spanish) * Major [ID:305186041] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Lithuanian) * Major [ID:305186040] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Spanish (Mexico)) * Major [ID:305186039] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Italian) * Major [ID:305186038] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Polish) * Major [ID:305186037] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Indonesian) * Major [ID:305186036] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Korean) * Major [ID:305186035] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Slovenian) * Major [ID:305186034] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (French) * Major [ID:305186033] Office 2016 Version 16.0.18623.20156 Available - Current Channel - Office 2016 * Major [ID:305186032] Office 2024 Version 16.0.18623.20156 Available - Current Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305186031] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Russian) * Major [ID:305186030] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Swedish) * Major [ID:305186029] Office 2021 Version 16.0.18623.20156 Available - Current Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305186028] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Dutch) * Major [ID:305186027] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Finnish) * Major [ID:305186026] Office 2016 Version 16.0.18623.20156 Available for Network Share for Office 2016 - Current Channel - Office 2016 * Major [ID:305186025] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Serbian Latin) * Major [ID:305186024] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Ukrainian) * Major [ID:305186023] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Slovak) * Major [ID:305186022] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305186021] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Chinese (Simplified)) * Major [ID:305186020] Office 2019 Version 16.0.18623.20156 Available - Current Channel - Office 2019 Retail * Major [ID:305186019] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hungarian) * Major [ID:305186018] Office 2019 Version 16.0.18623.20156 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail * Major [ID:305186017] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Greek) * Major [ID:305186016] Office 2024 Version 16.0.18623.20156 Available - Current Channel - Office 2024 Retail * Major [ID:305186015] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Turkish) * Major [ID:305186014] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Danish) * Major [ID:305186013] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (English (United States)) * Major [ID:305186012] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Arabic) * Major [ID:305186011] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hindi) * Major [ID:305186010] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Chinese (Traditional)) * Major [ID:305186009] Office 2019 Version 16.0.18623.20156 Available - Current Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305186008] Office 2024 Version 16.0.18623.20156 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * Major [ID:305186007] Office 2016 Version 16.0.18623.20156 Available - Current Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305186006] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Czech) * Major [ID:305186005] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Portugese (Portugal)) * Major [ID:305186004] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (English (United Kingdom)) * Major [ID:305186003] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Norwegian) * Major [ID:305186002] Office 2021 Version 16.0.18623.20156 Available - Current Channel - Office 2021 Retail * Major [ID:305186001] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Thai) * Major [ID:305186000] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Update from Local Client Cache) Modified: * Major [ID:500529201] 5005292: Update for Microsoft Defender for Endpoint - Microsoft Defender for Endpoint (Version 10.8775.27682.1015) - KB5005292 (x64) * Major [ID:502588501] 5025885: Manage of the Windows Boot Manager revocations for Secure Boot changes associated with (CVE-2023-24932) - KB5025885 Reason for Update: * New update for Visual Studio 2022 and Office 365 Current Channel from Microsoft. * Modified Sha256 value for fixlet [ID:500529201] and added source release date for fixlet [ID:502588501] Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4521 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 09:29:02 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 11:29:02 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-03 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 49 Total Fixlets in Site: 449 Release Date: 2025-04-03 Updated Fixlets: 8600201 Sandboxie Plus v1.15.9 11300101 WinSCP v6.5 49300101 Numara v5.8.3 50900101 Certify The Web v6.1.5 1000201 AnyDesk (EXE) v9.5.0 51700101 Cockatrice v2.10.1 53800201 spacedesk Windows DRIVER v2.1.42.0 20700301 Logi Options v1.88.697541 5601801 PowerToys v0.90.0 67000201 Cold Turkey Blocker v4.6 5603601 Windows Defender Virus Definitions v1.427.31.0 8600101 Sandboxie Classic v5.70.9 901901 AWS Command Line Interface v2 v2.25.9.0 56500101 Revo Uninstaller v2.5.8 5604001 Microsoft Azure PowerShell (MSI) v13.4.0.39483 1800101 Bandicam v8.1.1.2518 28600101 balena-cli v21.1.4.0 3800101 Go Programming Language v1.24.2 51000101 Clink v1.7.14 11600301 XnViewMP v1.8.7.0 5100201 KeePassXC v2.7.10 2600501 Dell Command | Configure v5.2.0.9 901301 Amazon WorkSpaces v5.26.2.5308 7000101 Opera Stable v117.0.5408.197 5601601 Microsoft Power BI Desktop v2.141.1253.0 1500101 Sourcetree v3.4.23 2700101 Remote Desktop Manager Enterprise v2025.1.29.0 54300101 Dolt v1.51.1 67700101 Vivaldi v7.3.3635.7 68300101 BlueStacks v5.22.51.1038 74300101 Free Download Manager v6.26.1.6177 4100301 Google Drive v106.0.4.0 8900101 Slack v4.43.51.0 5602901 Microsoft Power BI Desktop v2.141.1253.0 5801301 Firefox Developer Edition (x64 en-US) v138.0 60500101 Mp3tag v3.29.0.0 73000101 Egnyte v3.24.0.158 7800101 Podman v5.4.2 22400101 Koodo Reader v1.9.0 29600101 Vim v9.1.1270 52000101 Coder v2.21.0.0 6000101 NAPS2 v8.1.3 62000101 Box v2.44.209 62400101 Microsoft Azure CLI (32-bit) v2.71.0 64000101 Leaklog v2.3.2 6500201 Node.js v23.11.0 70400101 CMake v4.0.0 55700101 OpenVPN Community v2.6.1401 900601 AWS SAM Command Line Interface v1.136.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 09:47:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 11:47:42 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MacOS Applications Extended published 2025-04-03 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 2 Total Fixlets in Site: 27 Release Date: 2025-04-03 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 62000201 Boxdrive v2.44 20600201 Insomnia v11.0.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 09:59:45 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 18:59:45 +0200 Subject: [BESAdmin-Announcements] New update to BigFix Software Distribution (site 122) and the Self-Service Application (v3.3.3) Message-ID: The BigFix team is pleased to announce an update to Software Distribution and the Self-Service Application! **Content available in Self Service Application (SSA 3.3.3):** **Custom default icons** SSA now allows you to customize the default icons for Actions, Multiple Action Groups, and Restart. These custom icons will be used for the Restart action and any software package action that lacks a specific icon **Ask User to save work** SSA now supports displaying a message to ask user to save work before running an action. The BigFix console operator can flag the "ask user to save work" message to add this text message to the action description on SSA. **Fixed Defect Articles:** - KB0118298 - Typo in English time-to-deadline component **Actions to Take** - Gathering of the site will automatically show the new updates. - Users of the BigFix Self Service Application will need to update this component to version 3.3.3 using the following fixlets from Software Distribution site: -- Fixlet 302 to upgrade SSA for Windows. -- Fixlet 304 to upgrade SSA for Mac OS. **Published Site Version** Software Distribution, site version 122 ? The BigFix Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 11:01:05 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 20:01:05 +0200 Subject: [BESAdmin-Announcements] New update in BigFix OS Deployment and Bare Metal Imaging site v115 Message-ID: BigFix OS Deployment and Bare Metal Imaging site has been updated. New OSD Bare Metal Server version 311.51 is available. ***Content available:*** **Windows offline patching** Windows OS deployment has been streamlined with offline patching. Instead of the complex process of deploying, patching, capturing, and importing, you can now directly update Windows images by importing and applying cumulative patches offline via the OSD dashboard. **Other updates** - Added support to deploy Red Hat Enterprise Linux 9.5 - Updated embedded SQL Express to latest version 2022 ***Resolved Defect Articles:*** - KB0119825: Error importing Rhel in-place upgrade os resource if the path has spaces - KB0119675: Windows in fresh install does not work as MDT bundle creator computer - KB0117636: Winpe module could be corrupted for driver auto injection ***Published site version:*** OS Deployment and Bare Metal Imaging, version 115. The BigFix OS Deployment Team. -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 3 11:05:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 3 Apr 2025 13:05:52 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-03 Message-ID: Total New Fixlets: 4 Total Updated Fixlets: 232 Total Fixlets in Site: 2923 Total CVEs Covered: 840 Release Date: 2025-04-03 New Fixlets: 17200 Kaseya Virtual System/Server Administrator (VSA) Information Disclosure Vulnerability - Any Version of Windows 19320 Kaseya Virtual System/Server Administrator (VSA) Information Disclosure Vulnerability - Any Version of Linux 20960 Kaseya Virtual System/Server Administrator (VSA) Information Disclosure Vulnerability - Any Version of MacOS 36910 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability - Any Version of Windows Updated Fixlets: 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 34840 Android Kernel Remote Code Execution Vulnerability - Ubuntu 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28700 Linux Kernel Privilege Escalation Vulnerability - Ubuntu 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 30240 Linux Kernel Use-After-Free Vulnerability - RHEL 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 30380 Linux Kernel Use-After-Free Vulnerability - Ubuntu 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 25360 Apple Multiple Products Type Confusion Vulnerability - Any Version of Windows 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 23920 WebKitGTK Memory Corruption Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 23930 Apple Multiple Products Type Confusion Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 30140 Linux Kernel Use-After-Free Vulnerability - Ubuntu 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 31710 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Ubuntu 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 28650 Linux Kernel Privilege Escalation Vulnerability - Ubuntu 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 28660 Linux Kernel Use-After-Free Vulnerability - Ubuntu 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 09:31:14 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 18:31:14 +0200 Subject: [BESAdmin-Announcements] BigFix WebUI new release available Message-ID: The HCL BigFix team announces a new release of all WebUI apps. The WebUI release includes the following features: - Support MCM 3.3 release (see https://forum.bigfix.com/t/content-release-mcm-sites-published-2025-03-31/51362 ) - In the SSA configuration page it is possible to define three new icons (Action, Multi Action Group, Restart). These icons will be used when a specific icon is not defined for the software package, or for the Restart action - Note: This need SSA version 3.3.3 (available soon) or higher - Ubuntu 24.04 support in Patch and Patch Policies Apps The WebUI release addresses the following Security Vulnerabilities: ? CVE-2024-47764 (cookie) ? CVE-2025-25977 (canvg) ? CVE-2025-27152 (axios) ? CVE-2025-27789 (runtime) ? CVE-2025-28774 (xml-crypto) ? CVE-2025-28775 (xml-crypto) ? CVE-2025-29907 (jsPDF) This release addresses the following Defect Articles: ? KB0119814 - WebUI SAML login using Chrome may return "Invalid csrf token" ? KB0118863 - WebUI may fail deploying Software Packages ? KB0118547 - Patch Policy Schedules may schedule incorrect patching date when using high day offset ? KB0118690 - IVR v4 .0.1.1 install does not show data ? KB0116470 - Missing CIS Solaris 11.4 Checklist in Custom Checklist Wizard ? KB0116797 - Missing MCM Firewall Requirements ? KB0115259 - Unable to deploy fixlet "502 Update Certificates for Apple Plugin" ? KB0114274 - Add a note in the documentation for the server installation ? KB0118 595 - Unable to perform BYOD profile enrollme nt on iOS 18 ? KB0113953 - Fixlets to modify the MDM settings after changing the internet exposed public DNS name of the MDM server should be updated ? KB0116499 - Missing new enrolled Android devices ? KB0115446 - Cannot create or edit policy groups in MCM ? KB0117222 - Unable to to push / deploy any action on enrolled device. ? KB0119870 - MCM Device corelation breaks and reestablished for no apparent reason ? KB0110085 - Docker containers not starting after upgrade to MCM v3.2 ? KB0114835 - Document the NMO permissions needed to view an existing MCM policy ? KB0115921 - Sizing for MDM is not clear in documentation ? KB0111108 - Missing app deploy option in the Policy drop-down menu ? KB0115597 - BigFix MDM cannot capture Iphone numbers ? KB0112555 - WNS credentials JSON format ? KB0113214 - The command for encrypting the TLS private key is not correct for RHEL9 ? KB0113952 - MCM Documentation to provide steps to perform when the exposed public DNS of the MDM server is changed ? KB0115968 - Fixlet compatibility issue on Linux Plugin Portal with BigFix Platform v11.0.2 and above *How to update* WebUI will update automatically by default, unless configured otherwise. Please note that updates for BigFix Insights must be done manually via the Application Updates page on WebUI. For more information, please see https://help.hcltechsw.com/bigfix/11.0/webui/WebUI/Admin_Guide/c_manage_application_updates.html . Please note this release brings a NodeJS update to all WebUI apps; you must ensure all apps are updated successfully for the WebUI to be operational. *Published WebUI Site Versions* *WebUI Site Name* *Site Version* Application Administration 38 Common 96 Custom 48 Patch 52 Patch Policies 46 Profile Management 31 Query 42 Software Distribution 52 WebUI API 30 WebUI Content App 26 WebUI Data Sync 35 WebUI Extensions 12 WebUI Framework 32 WebUI MDM 23 WebUI Permissions and Preferences 25 WebUI Insights 28 WebUI IVR 19 WebUI CMEP 20 WebUI SCM 18 WebUI Reports 22 WebUI Take Action 35 WebUI Documentation link: https://help.hcltechsw.com/bigfix/11.0/webui/index.html -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 03:57:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 06:57:15 -0400 Subject: [BESAdmin-Announcements] Content Modification: Patches for Mac OS X published 2025-04-04 Message-ID: Content in Patches for Mac OS X has been modified. New Fixlets: UPDATE macOS Sequoia 15.4 Available via Nudge (ID:15100006) UPDATE macOS Sequoia 15.4 Available for Apple Silicon (ARM64) (ID:15000012) UPDATE macOS Sequoia 15.4 Available (ID:15000011) UPDATE macOS Sonoma 14.7.5 Available via Nudge (ID:14100015) UPDATE macOS Sonoma 14.7.5 Available for Apple Silicon (ARM64) (ID:14000030) UPDATE macOS Sonoma 14.7.5 Available (ID:14000029) UPDATE macOS Ventura 13.7.5 Available via Nudge (ID:13100021) UPDATE macOS Ventura 13.7.5 Available for Apple Silicon (ARM64) (ID:13000048) UPDATE macOS Ventura 13.7.5 Available (ID:13000047) UPDATE Safari 18.4 - macOS Sonoma (14.0 Client) (ID:98140894) UPDATE Safari 18.4 - macOS Ventura (13.0 Client) (ID:98140895) Published site version: Updates for Mac OS X, version 605. Reasons for Update: A newer version of Sequoia, Ventura, Sonoma OS and safari for MAC has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 06:11:31 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 09:11:31 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2-2025-2804 - Rust Security update - Amazon linux 2 x86_64 (ID: 2528041) * ALAS2-2025-2805 - Ghostscript Security update - Amazon linux 2 x86_64 (ID: 2528051) * ALAS2-2025-2806 - Freetype Security update - Amazon linux 2 x86_64 (ID: 2528061) * ALAS2-2025-2807 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2528071) * ALAS2-2025-2808 - Python3 Security update - Amazon linux 2 x86_64 (ID: 2528081) * ALAS2-2025-2809 - Iniparser Security update - Amazon linux 2 x86_64 (ID: 2528091) * ALAS2-2025-2810 - Iptraf-Ng Security update - Amazon linux 2 x86_64 (ID: 2528101) * ALAS2-2025-2811 - Packagekit Security update - Amazon linux 2 x86_64 (ID: 2528111) * ALAS2-2025-2812 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 2528121) * ALAS2-2025-2813 - Jsoup Security update - Amazon linux 2 x86_64 (ID: 2528131) * ALAS2-2025-2814 - Python-Pip Security update - Amazon linux 2 x86_64 (ID: 2528141) * ALAS2-2025-2815 - Python3 Security update - Amazon linux 2 x86_64 (ID: 2528151) * ALAS2-2025-2816 - Python Security update - Amazon linux 2 x86_64 (ID: 2528161) Published Site Version: * Patches for Amazon Linux 2, version 176. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 06:14:25 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 09:14:25 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2-2025-2804 - Rust Security update - Amazon linux 2 aarch64 (ID: 2528041) * ALAS2-2025-2805 - Ghostscript Security update - Amazon linux 2 aarch64 (ID: 2528051) * ALAS2-2025-2806 - Freetype Security update - Amazon linux 2 aarch64 (ID: 2528061) * ALAS2-2025-2807 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2528071) * ALAS2-2025-2808 - Python3 Security update - Amazon linux 2 aarch64 (ID: 2528081) * ALAS2-2025-2809 - Iniparser Security update - Amazon linux 2 aarch64 (ID: 2528091) * ALAS2-2025-2810 - Iptraf-Ng Security update - Amazon linux 2 aarch64 (ID: 2528101) * ALAS2-2025-2811 - Packagekit Security update - Amazon linux 2 aarch64 (ID: 2528111) * ALAS2-2025-2812 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 2528121) * ALAS2-2025-2813 - Jsoup Security update - Amazon linux 2 aarch64 (ID: 2528131) * ALAS2-2025-2814 - Python-Pip Security update - Amazon linux 2 aarch64 (ID: 2528141) * ALAS2-2025-2815 - Python3 Security update - Amazon linux 2 aarch64 (ID: 2528151) * ALAS2-2025-2816 - Python Security update - Amazon linux 2 aarch64 (ID: 2528161) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 103. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 06:16:02 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 09:16:02 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2025-906 - Ghostscript Security update - Amazon linux 2023 x86_64 (ID: 320259061) * ALAS2023-2025-907 - Ghostscript Security update - Amazon linux 2023 x86_64 (ID: 320259071) * ALAS2023-2025-908 - Ghostscript Security update - Amazon linux 2023 x86_64 (ID: 320259081) * ALAS2023-2025-909 - Libxslt Security update - Amazon linux 2023 x86_64 (ID: 320259091) * ALAS2023-2025-910 - Tomcat10 Security update - Amazon linux 2023 x86_64 (ID: 320259101) * ALAS2023-2025-911 - Tomcat9 Security update - Amazon linux 2023 x86_64 (ID: 320259111) * ALAS2023-2025-912 - Dotnet8.0 Security update - Amazon linux 2023 x86_64 (ID: 320259121) * ALAS2023-2025-913 - Golang Security update - Amazon linux 2023 x86_64 (ID: 320259131) * ALAS2023-2025-914 - Runfinch-Finch Security update - Amazon linux 2023 x86_64 (ID: 320259141) * ALAS2023-2025-915 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 320259151) * ALAS2023-2025-916 - Php8.1 Security update - Amazon linux 2023 x86_64 (ID: 320259161) * ALAS2023-2025-917 - Python3.9 Security update - Amazon linux 2023 x86_64 (ID: 320259171) * ALAS2023-2025-918 - Ansible-Core Security update - Amazon linux 2023 x86_64 (ID: 320259181) * ALAS2023-2025-919 - Jq Security update - Amazon linux 2023 x86_64 (ID: 320259191) * ALAS2023-2025-920 - Containerd Security update - Amazon linux 2023 x86_64 (ID: 320259201) * ALAS2023-2025-921 - Ruby3.2 Security update - Amazon linux 2023 x86_64 (ID: 320259211) * ALAS2023-2025-922 - Php8.3 Security update - Amazon linux 2023 x86_64 (ID: 320259221) * ALAS2023-2025-923 - Python-Pip Security update - Amazon linux 2023 x86_64 (ID: 320259231) * ALAS2023-2025-924 - Python3.11-Pip Security update - Amazon linux 2023 x86_64 (ID: 320259241) Published Site Version: * Patches for Amazon Linux 2023, version 53. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 06:17:37 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 09:17:37 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2025-906 - Ghostscript Security update - Amazon linux 2023 aarch64 (ID: 320259061) * ALAS2023-2025-907 - Ghostscript Security update - Amazon linux 2023 aarch64 (ID: 320259071) * ALAS2023-2025-908 - Ghostscript Security update - Amazon linux 2023 aarch64 (ID: 320259081) * ALAS2023-2025-909 - Libxslt Security update - Amazon linux 2023 aarch64 (ID: 320259091) * ALAS2023-2025-910 - Tomcat10 Security update - Amazon linux 2023 aarch64 (ID: 320259101) * ALAS2023-2025-911 - Tomcat9 Security update - Amazon linux 2023 aarch64 (ID: 320259111) * ALAS2023-2025-912 - Dotnet8.0 Security update - Amazon linux 2023 aarch64 (ID: 320259121) * ALAS2023-2025-913 - Golang Security update - Amazon linux 2023 aarch64 (ID: 320259131) * ALAS2023-2025-914 - Runfinch-Finch Security update - Amazon linux 2023 aarch64 (ID: 320259141) * ALAS2023-2025-915 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 320259151) * ALAS2023-2025-916 - Php8.1 Security update - Amazon linux 2023 aarch64 (ID: 320259161) * ALAS2023-2025-917 - Python3.9 Security update - Amazon linux 2023 aarch64 (ID: 320259171) * ALAS2023-2025-918 - Ansible-Core Security update - Amazon linux 2023 aarch64 (ID: 320259181) * ALAS2023-2025-919 - Jq Security update - Amazon linux 2023 aarch64 (ID: 320259191) * ALAS2023-2025-920 - Containerd Security update - Amazon linux 2023 aarch64 (ID: 320259201) * ALAS2023-2025-921 - Ruby3.2 Security update - Amazon linux 2023 aarch64 (ID: 320259211) * ALAS2023-2025-922 - Php8.3 Security update - Amazon linux 2023 aarch64 (ID: 320259221) * ALAS2023-2025-923 - Python-Pip Security update - Amazon linux 2023 aarch64 (ID: 320259231) * ALAS2023-2025-924 - Python3.11-Pip Security update - Amazon linux 2023 aarch64 (ID: 320259241) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 33. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 06:18:40 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 09:18:40 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Tzdata - Raspbian 11 (all) (ID: 25040201) Published Site Version: * Patches for Raspbian 11, version 48. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 08:11:48 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 11:11:48 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for RHEL 8 published 2025-04-04 Message-ID: Content in the Patches for RHEL 8 Extended Support site has been added: RHSA-2025:3386 Red Hat Security Advisory: freetype security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHBA-2025:3394 Red Hat Bug Fix Advisory: tzdata bug fix and enhancement update - Red Hat Enterprise Linux 8.8 EUS (x64) RHSA-2025:3580 Red Hat Security Advisory: python-jinja2 security update - Red Hat Enterprise Linux 8.8 EUS (x64) Content in the Patches for RHEL 8 Extended Support site has been superseded: RHSA-2025:0883 Red Hat Security Advisory: python-jinja2 security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) RHBA-2025:1104 Red Hat Bug Fix Advisory: tzdata bug fix and enhancement update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) Reason for Update: Red Hat released new EUS content. Actions to Take: None Published site version: Patches for RHEL 8 Extended Support, version 157 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 4 10:17:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 4 Apr 2025 13:17:15 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-04 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 135.0.7049.42 Available - Mac OS X (ID: 83000199) Microsoft Office for Mac 2019 - Word 16.95.3 Available (ID: 19000493) Microsoft Office for Mac 2019 - PowerPoint 16.95.3 Available (ID: 19000494) Microsoft Office for Mac 2019 - Outlook 16.95.3 Available (ID: 19000495) Microsoft Office for Mac 2019 - Excel 16.95.3 Available (ID: 19000496) Firefox 137.0 Available - Mac OS X (ID: 20750256) Firefox 128.9.0 ESR Available - Mac OS X (ID: 20750257) Firefox 115.22.0 ESR Available - Mac OS X (ID: 20750258) Published site version: Updates for Mac Applications, version 743. Reasons for Update: A newer version of Chrome, MS Office and Firefox for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 7 06:53:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 7 Apr 2025 08:53:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-07 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058227 Microsoft Edge Stable Build 135.0.3179.54 Available (x64) * 5058223 Microsoft Edge Stable Build 135.0.3179.54 Available * 4001314 Notepad++ (x64) 8.7.9 Available * 4001313 Notepad++ 8.7.9 Available * 6101734 Mozilla Thunderbird 137.0.1 Available Modified : * 5058213 Microsoft Edge Stable Build 134.0.3124.93 Available (Superseded) * 5058215 Microsoft Edge Stable Build 134.0.3124.93 Available (x64) (Superseded) * 4001312 Notepad++ (x64) 8.7.8 Available (Superseded) * 4001311 Notepad++ 8.7.8 Available (Superseded) Reason : * New update for Edge , Notepad++ and Thunderbird. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2305 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 7 07:05:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 7 Apr 2025 09:05:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MacOS Applications Extended published 2025-04-07 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 4 Total Fixlets in Site: 26 Release Date: 2025-04-07 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 20600201 Insomnia v11.0.2 43800201 Cryptomator v1.15.2 48300201 Bitwarden v2025.3.0 67300101 Rectangle v0.87 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 7 07:18:57 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 7 Apr 2025 09:18:57 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-07 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 26 Total Fixlets in Site: 449 Release Date: 2025-04-07 Updated Fixlets: 64004101 Microsoft Edge WebView2 Runtime v135.0.3179.54 16900101 DuoConnect v2.0.6 19300101 DBeaver v25.0.2.0 26500101 AOMEI Partition Assistant v10.8.0 51700101 Cockatrice v2.10.2 901901 AWS Command Line Interface v2 v2.25.11.0 5603601 Windows Defender Virus Definitions v1.427.100.0 28600101 balena-cli v21.1.8.0 39000101 CLAN v8.27.00 45400101 Plottr v2025.4.5 59800101 MakeMKV v1.18.1 63400101 Proton VPN v4.1.10 7400101 PDF24 Creator v11.24.0 5601601 Microsoft Power BI Desktop v2.141.1451.0 5700801 MongoDB Compass v1.46.0.0 48300101 Bitwarden v2025.3.0 5602501 Microsoft Visual Studio Code x64 v1.99.0 74300101 Free Download Manager v6.26.2.6190 5602901 Microsoft Power BI Desktop v2.141.1451.0 5801301 Firefox Developer Edition (x64 en-US) v138.0 19600101 VSCodium (x64) v1.99.02289 29600101 Vim v9.1.1283 22400101 Koodo Reader v1.9.1 29300201 windows_exporter v0.30.6 43803901 Cryptomator (MSI) v1.15.2.5577 23500101 PhraseExpress v17.0.120 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 7 08:17:59 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 7 Apr 2025 11:17:59 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-07 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Microsoft Office for Mac 2019 - Word 16.95.4 Available (ID: 19000497) Microsoft Office for Mac 2019 - PowerPoint 16.95.4 Available (ID: 19000498) Microsoft Office for Mac 2019 - Excel 16.95.4 Available (ID: 19000499) 51000121-Zoom 6.4.3 (52139) Available - Mac OS X (ID: 51000121) Published site version: Updates for Mac Applications, version 744. Reasons for Update: A newer version of MS Office and Zoom for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 7 08:24:02 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 7 Apr 2025 10:24:02 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-07 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 63 Total Fixlets in Site: 2923 Total CVEs Covered: 840 Release Date: 2025-04-07 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 8320 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows Server 2016 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 36100 Dante Discovery Process Control Vulnerability - Any Version of Windows 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 14470 Intel Ethernet Diagnostics Driver for Windows Denial-of-Service Vulnerability - Any Version of Windows 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 6280 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows 10 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 3210 Microsoft Windows Privilege Escalation Vulnerability - Windows 7 SP1 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 22800 MinIO Information Disclosure Vulnerability - Any Version of Linux 31890 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Oracle Linux 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 35480 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 11 5020 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2008 SP2 10910 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2012 21540 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2019 31910 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 12200 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2008 R2 SP1 9640 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2012 R2 7340 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 8380 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 18750 ChakraCore Scripting Engine Type Confusion Vulnerability - Any Version of Linux 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 5570 Microsoft Windows Shell Remote Code Execution Vulnerability - Windows 10 11330 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 R2 SP1 6340 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows 16070 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of Windows 26950 MinIO Security Feature Bypass Vulnerability - Any Version of Linux 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 30790 Microsoft SharePoint Remote Code Execution Vulnerability - SharePoint 21450 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2016 28740 Red Hat Polkit Out-of-Bounds Read and Write Vulnerability - Debian 31820 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 31940 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 28630 Red Hat Polkit Out-of-Bounds Read and Write Vulnerability - Ubuntu 19930 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of MacOS 2010 Microsoft Windows Privilege Escalation Vulnerability - Windows 8.1 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 31870 Red Hat Polkit Out-of-Bounds Read and Write Vulnerability - Oracle Linux 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS 31970 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18020 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of Linux 2410 Microsoft Win32k Privilege Escalation Vulnerability - Windows 7 SP1 16750 ChakraCore Scripting Engine Type Confusion Vulnerability - Any Version of Windows 28910 Red Hat Polkit Out-of-Bounds Read and Write Vulnerability - RHEL 4210 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 SP2 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS 31990 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS 35450 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 10 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 21630 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2013 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 04:29:59 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 07:29:59 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Xz-Utils - Debian 12 (amd64) (ID: 25040601) Published Site Version: * Patches for Debian 12, version 93. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 04:34:57 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 07:34:57 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLBA-2025:2871 - Glibc Bug Fix Update - RockyLinux 8 x86_64 (ID: 25287101) Published Site Version: * Patches for Rocky Linux 8, version 64. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 04:38:14 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 07:38:14 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLBA-2022:6583 - Walinuxagent Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 22658301) * RLSA-2024:11123 - Gstreamer1-Plugins-Base Security Update - RockyLinux 9 x86_64 (ID: 24111231) * RLBA-2024:11239 - Rpm-Ostree Bug Fix Update - RockyLinux 9 x86_64 (ID: 24112391) * RLSA-2024:9093 - Xorg-X11-Server-Xwayland Security Update - RockyLinux 9 x86_64 (ID: 24909301) * RLBA-2024:9099 - Crun Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24909901) * RLBA-2024:9109 - Udica Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24910901) * RLSA-2024:9167 - Poppler Security Update - RockyLinux 9 x86_64 (ID: 24916701) * RLSA-2024:9192 - Python3.11 Security Update - RockyLinux 9 x86_64 (ID: 24919201) * RLBA-2024:9205 - Libvirt-Python Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24920501) * RLBA-2024:9209 - Dwarves Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24920901) * RLBA-2024:9229 - Cockpit-Files Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24922901) * RLBA-2024:9255 - Lorax Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24925501) * RLBA-2024:9256 - Opentelemetry-Collector Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24925601) * RLSA-2025:1671 - Mysql Security Update - RockyLinux 9 x86_64 (ID: 25167101) Published Site Version: * Patches for Rocky Linux 9, version 46. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 16:51:59 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 19:51:59 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for Windows 2012 published 2025-04-08 Message-ID: Content in the ESU Patching Add-on for Windows 2012 site has been added: 5044009: Security and Quality Rollup - Windows Server 2012 - .NET Framework 3.5.1 - KB5044009 (x64) 5044009: Security and Quality Rollup - Windows Server 2012 - .NET Framework 3.5.1 - KB5044009 (x64) (Unentitled) 5044012: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 3.5.1 - KB5044012 (x64) 5044012: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 3.5.1 - KB5044012 (x64) (Unentitled) 5054697: Security and Quality Rollup - Windows Server 2012 - .NET Framework 4.6/4.7 - KB5054697 (x64) 5054697: Security and Quality Rollup - Windows Server 2012 - .NET Framework 4.6/4.7 - KB5054697 (x64) (Unentitled) 5054698: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 4.6/4.7 - KB5054698 (x64) 5054698: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 4.6/4.7 - KB5054698 (x64) (Unentitled) 5055172: Security and Quality Rollup - Windows Server 2012 - .NET Framework 4.8 - KB5055172 (x64) 5055172: Security and Quality Rollup - Windows Server 2012 - .NET Framework 4.8 - KB5055172 (x64) (Unentitled) 5055173: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 4.8 - KB5055173 (x64) 5055173: Security and Quality Rollup - Windows Server 2012 R2 - .NET Framework 4.8 - KB5055173 (x64) (Unentitled) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5055515 (x64) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5055515 (x64) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5055515 (x64) (Unentitled) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5055515 (x64) (Unentitled) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5055557 (x64) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5055557 (x64) (Unentitled) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5055581 (x64) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5055581 (x64) (Unentitled) MS25-APR: Servicing Stack Update - Windows Server 2012 R2 - KB5055665 (x64) MS25-APR: Servicing Stack Update - Windows Server 2012 - KB5055667 (x64) Content in the ESU Patching Add-on for Windows 2012 site has been superseded: MS25-FEB: Servicing Stack Update - Windows Server 2012 R2 - KB5052108 (x64) (Superseded) MS25-FEB: Servicing Stack Update - Windows Server 2012 - KB5052109 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5053593 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5053593 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5053593 (x64) (Unentitled) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5053593 (x64) (Unentitled) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5053886 (x64) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5053886 (x64) (Unentitled) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5053887 (x64) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5053887 (x64) (Unentitled) (Superseded) Reason for Update: Microsoft released Extended Support Updates on Apr 8th Patch Tuesday. Actions to Take: Update any baselines containing the superseded fixlets. Published site version: ESU Patching Add-on for Windows 2012, version 38 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 17:06:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 20:06:15 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for Windows 2008 published 2025-04-08 Message-ID: Content in the ESU Patching Add-on for Windows 2008 site has been added: 5054696: Security and Quality Rollup - Windows Server 2008 R2 - .NET Framework 4.6/4.7 - KB5054696 (x64) 5054696: Security and Quality Rollup - Windows Server 2008 SP2 - .NET Framework 4.6 - KB5054696 5054696: Security and Quality Rollup - Windows Server 2008 SP2 - .NET Framework 4.6 - KB5054696 (x64) 5054696: Security and Quality Rollup - Windows Server 2008 R2 - .NET Framework 4.6/4.7 - KB5054696 (x64) (Unentitled) 5054696: Security and Quality Rollup - Windows Server 2008 SP2 - .NET Framework 4.6 - KB5054696 (Unentitled) 5054696: Security and Quality Rollup - Windows Server 2008 SP2 - .NET Framework 4.6 - KB5054696 (x64) (Unentitled) 5055171: Security and Quality Rollup - Windows Server 2008 R2 - .NET Framework 4.8 - KB5055171 (x64) 5055171: Security and Quality Rollup - Windows Server 2008 R2 - .NET Framework 4.8 - KB5055171 (x64) (Unentitled) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5055515 (x64) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (x64) MS25-APR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5055515 (x64) (Unentitled) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (Unentitled) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (x64) (Unentitled) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5055561 (x64) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5055561 (x64) (Unentitled) MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 R2 - KB5055570 (x64) MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 R2 - KB5055570 (x64) (Unentitled) MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5055596 MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5055596 (x64) MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5055596 (Unentitled) MS25-APR: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5055596 (x64) (Unentitled) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5055609 MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5055609 (x64) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5055609 (Unentitled) MS25-APR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5055609 (x64) (Unentitled) MS25-APR: Servicing Stack Update - Windows Server 2008 R2 - KB5056456 (x64) MS25-APR: Servicing Stack Update - Windows Server 2008 SP2 - KB5056457 MS25-APR: Servicing Stack Update - Windows Server 2008 SP2 - KB5056457 (x64) Content in the ESU Patching Add-on for Windows 2008 site has been superseded: MS25-JAN: Servicing Stack Update - Windows Server 2008 R2 - KB5050681 (x64) (Superseded) MS25-JAN: Servicing Stack Update - Windows Server 2008 SP2 - KB5050682 (Superseded) MS25-JAN: Servicing Stack Update - Windows Server 2008 SP2 - KB5050682 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5053593 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5053593 (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5053593 (x64) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5053593 (x64) (Unentitled) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5053593 (Unentitled) (Superseded) MS25-MAR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5053593 (x64) (Unentitled) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5053620 (x64) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5053620 (x64) (Unentitled) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5053888 (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5053888 (x64) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5053888 (Unentitled) (Superseded) MS25-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5053888 (x64) (Unentitled) (Superseded) Reason for Update: Microsoft released Extended Support Updates on April 8th Patch Tuesday. (NOTE: The Windows 2008 ESU program ended 9 January 2024, but Microsoft has continued releasing patches.) Actions to Take: Update any baselines containing the superseded fixlets. Published site version: ESU Patching Add-on for Windows 2008, version 117 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 8 17:42:28 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 8 Apr 2025 20:42:28 -0400 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows - April 2025 Security Updates Message-ID: Content in the Patches for Windows site has been released. New: * MAJOR [ID:505552305] MS25-APR: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5055523 (arm64) * MAJOR [ID:505552807] MS25-APR: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5055528 (arm64) * MAJOR [ID:505552803] MS25-APR: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5055528 (arm64) * MAJOR [ID:505552701] MS25-APR: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5055527 (x64) * MAJOR [ID:505552602] MS25-APR: Cumulative Update for Microsoft server operating system version 2022 - Windows Server 2022 Datacenter Azure Edition - KB5055526 (x64) * MAJOR [ID:505552601] MS25-APR: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5055526 (x64) * MAJOR [ID:505552301] MS25-APR: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5055523 (x64) * MAJOR [ID:505551905] MS25-APR: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5055519 (x64) * MAJOR [ID:505566105] MS25-APR: Servicing Stack Update for Windows Server 2016 - Windows Server 2016 - KB5055661 (x64) * MAJOR [ID:505552103] MS25-APR: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5055521 (x64) * MAJOR [ID:505552805] MS25-APR: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5055528 (x64) * MAJOR [ID:505552303] MS25-APR: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5055523 (x64) * MAJOR [ID:505552801] MS25-APR: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5055528 (x64) * MAJOR [ID:505551807] MS25-APR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5055518 (x64) * MAJOR [ID:505551805] MS25-APR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5055518 * MAJOR [ID:505551803] MS25-APR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5055518 (x64) * MAJOR [ID:505551801] MS25-APR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5055518 * MAJOR [ID:505551903] MS25-APR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5055519 (x64) * MAJOR [ID:505551901] MS25-APR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5055519 * MAJOR [ID:505566103] MS25-APR: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5055661 (x64) * MAJOR [ID:505566101] MS25-APR: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5055661 * MAJOR [ID:505552105] MS25-APR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5055521 (x64) * MAJOR [ID:505552101] MS25-APR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5055521 * MAJOR [ID:500270201] MS25-APR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002702 (x64) * MAJOR [ID:500270203] MS25-APR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002702 * MAJOR [ID:50073667] MS25-APR: Security Update for Microsoft Visual Studio 2022 version 17.8.20 update - KB5007364 * MAJOR [ID:50073665] MS25-APR: Security Update for Microsoft Visual Studio 2022 version 17.13.6 update - KB5007364 * MAJOR [ID:50073663] MS25-APR: Security Update for Microsoft Visual Studio 2022 version 17.12.7 update - KB5007364 * MAJOR [ID:50073661] MS25-APR: Security Update for Microsoft Visual Studio 2022 version 17.10.13 update - KB5007364 * MAJOR [ID:500268001] MS25-APR: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002680 (x64) * MAJOR [ID:500269101] MS25-APR: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002691 (x64) * MAJOR [ID:500268201] MS25-APR: Security update for SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002682 (x64) * MAJOR [ID:500269201] MS25-APR: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002692 (x64) * MAJOR [ID:500270501] MS25-APR: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002705 (x64) * MAJOR [ID:500262201] MS25-APR: Security Update for Microsoft OneNote 2016 - Office 2016 - KB5002622 (x64) * MAJOR [ID:500262203] MS25-APR: Security Update for Microsoft OneNote 2016 - Office 2016 - KB5002622 * MAJOR [ID:500269901] MS25-APR: Security Update for Microsoft Office Online Server - Office Online Server - KB5002699 (x64) * MAJOR [ID:500270301] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002703 (x64) * MAJOR [ID:500270303] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002703 * MAJOR [ID:500270003] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002700 (x64) * MAJOR [ID:500270001] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002700 * MAJOR [ID:500266901] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002669 (x64) * MAJOR [ID:500258801] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002588 (x64) * MAJOR [ID:500258803] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002588 * MAJOR [ID:500257301] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002573 (x64) * MAJOR [ID:500257303] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002573 * MAJOR [ID:448443201] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB4484432 (x64) * MAJOR [ID:448443203] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB4484432 * MAJOR [ID:500270401] MS25-APR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002704 (x64) * MAJOR [ID:500270403] MS25-APR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002704 * MAJOR [ID:500270101] MS25-APR: Security Update for Microsoft Access 2016 - Access 2016 - KB5002701 (x64) * MAJOR [ID:500270103] MS25-APR: Security Update for Microsoft Access 2016 - Access 2016 - KB5002701 * MAJOR [ID:45763455] 4576341: Security Update for Microsoft Visual Studio 2017 version 15.9.72 update - KB4576341 * MAJOR [ID:45763359] 4576339: Security Update for Microsoft Visual Studio 2019 version 16.11.46 update - KB4576339 * MAJOR [ID:505517005] 5055170: Cumulative Update for .NET Framework 4.8 for Windows Server 2016 - Windows Server 2016 - .NET Framework 4.8 - KB5055170 (x64) * MAJOR [ID:505517003] 5055170: Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1607 - Windows 10 Version 1607 - .NET Framework 4.8 - KB5055170 (x64) * MAJOR [ID:505517001] 5055170: Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1607 - Windows 10 Version 1607 - .NET Framework 4.8 - KB5055170 * MAJOR [ID:505568803] 5055688: Cumulative Update for .NET Framework 3.5 and 4.8 for Microsoft server operating system version 21H2 - Windows Server 2022 - .NET Framework 3.5/4.8 - KB5055169 (x64) * MAJOR [ID:505568307] 5055683: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8 - KB5054977 (x64) * MAJOR [ID:505568305] 5055683: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8 - KB5054977 * MAJOR [ID:505568207] 5055682: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 21H2 - Windows 10 Version 21H2 - .NET Framework 3.5/4.8 - KB5054977 (x64) * MAJOR [ID:505568205] 5055682: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 21H2 - Windows 10 Version 21H2 - .NET Framework 3.5/4.8 - KB5054977 * MAJOR [ID:505568111] 5055681: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows Server 2019 - Windows Server 2019 - .NET Framework 3.5/4.8 - KB5055175 (x64) * MAJOR [ID:505568109] 5055681: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1809 - Windows 10 Version 1809 - .NET Framework 3.5/4.8 - KB5055175 (x64) * MAJOR [ID:505568107] 5055681: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1809 - Windows 10 Version 1809 - .NET Framework 3.5/4.8 - KB5055175 * MAJOR [ID:505568801] 5055688: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system version 21H2 - Windows Server 2022 - .NET Framework 3.5/4.8.1 - KB5054693 (x64) * MAJOR [ID:505568303] 5055683: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5054978 (x64) * MAJOR [ID:505568301] 5055683: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5054978 * MAJOR [ID:505568203] 5055682: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 21H2 - Windows 10 Version 21H2 - .NET Framework 3.5/4.8.1 - KB5054978 (x64) * MAJOR [ID:505568201] 5055682: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 21H2 - Windows 10 Version 21H2 - .NET Framework 3.5/4.8.1 - KB5054978 * MAJOR [ID:505498013] 5054980: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 for ARM64 - Windows 11 Version 23H2 - .NET Framework 3.5/4.8.1 - KB5054980 (arm64) * MAJOR [ID:505498011] 5054980: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 - Windows 11 Version 23H2 - .NET Framework 3.5/4.8.1 - KB5054980 (x64) * MAJOR [ID:505498015] 5054980: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 for ARM64 - Windows 11 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5054980 (arm64) * MAJOR [ID:505498009] 5054980: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 - Windows 11 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5054980 (x64) * MAJOR [ID:505497905] 5054979: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 24H2 for ARM64 - Windows 11 Version 24H2 - .NET Framework 3.5/4.8.1 - KB5054979 (arm64) * MAJOR [ID:505497903] 5054979: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 24H2 - Windows 11 Version 24H2 - .NET Framework 3.5/4.8.1 - KB5054979 (x64) * MAJOR [ID:505497901] 5054979: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system version 24H2 - Windows Server 2025 - .NET Framework 3.5/4.8.1 - KB5054979 (x64) * MAJOR [ID:505470501] 5054705: Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2 - Windows Server version 23H2 - .NET Framework 3.5/4.8.1 - KB5054705 (x64) * MAJOR [ID:505568105] 5055681: Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows Server 2019 - Windows Server 2019 - .NET Framework 3.5/4.7.2 - KB5054695 (x64) * MAJOR [ID:505568103] 5055681: Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows 10 Version 1809 - Windows 10 Version 1809 - .NET Framework 3.5/4.7.2 - KB5054695 (x64) * MAJOR [ID:505568101] 5055681: Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows 10 Version 1809 - Windows 10 Version 1809 - .NET Framework 3.5/4.7.2 - KB5054695 Superseded: * MAJOR [ID:505400603] MS25-MAR: Servicing Stack Update for Windows Server 2016 - Windows Server 2016 - KB5054006 (x64) (Superseded) * MAJOR [ID:505400601] MS25-MAR: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5054006 (x64) (Superseded) * MAJOR [ID:505400605] MS25-MAR: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5054006 (Superseded) * MAJOR [ID:500266201] MS25-MAR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002662 (x64) (Superseded) * MAJOR [ID:500266203] MS25-MAR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002662 (Superseded) * MAJOR [ID:500269001] MS25-MAR: Security Update for Microsoft Office Online Server - Office Online Server - KB5002690 (x64) (Superseded) * MAJOR [ID:500269401] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002694 (x64) (Superseded) * MAJOR [ID:500269403] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002694 (Superseded) * MAJOR [ID:500269301] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002693 (x64) (Superseded) * MAJOR [ID:500269303] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002693 (Superseded) * MAJOR [ID:500269601] MS25-MAR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002696 (x64) (Superseded) * MAJOR [ID:500269603] MS25-MAR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002696 (Superseded) * MAJOR [ID:500269701] MS25-MAR: Security Update for Microsoft Access 2016 - Access 2016 - KB5002697 (x64) (Superseded) * MAJOR [ID:500269703] MS25-MAR: Security Update for Microsoft Access 2016 - Access 2016 - KB5002697 (Superseded) * MAJOR [ID:505359901] MS25-MAR: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5053599 (x64) (Superseded) * MAJOR [ID:505359601] MS25-MAR: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5053596 (x64) (Superseded) * MAJOR [ID:505359403] MS25-MAR: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5053594 (x64) (Superseded) * MAJOR [ID:505359801] MS25-MAR: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5053598 (arm64) (Superseded) * MAJOR [ID:505359803] MS25-MAR: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5053598 (x64) (Superseded) * MAJOR [ID:505360203] MS25-MAR: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5053602 (arm64) (Superseded) * MAJOR [ID:505360207] MS25-MAR: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5053602 (x64) (Superseded) * MAJOR [ID:505360205] MS25-MAR: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5053602 (arm64) (Superseded) * MAJOR [ID:505360201] MS25-MAR: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5053602 (x64) (Superseded) * MAJOR [ID:505360601] MS25-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5053606 (x64) (Superseded) * MAJOR [ID:505360605] MS25-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5053606 (Superseded) * MAJOR [ID:505360603] MS25-MAR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5053606 (x64) (Superseded) * MAJOR [ID:505360607] MS25-MAR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5053606 (Superseded) * MAJOR [ID:505359603] MS25-MAR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5053596 (x64) (Superseded) * MAJOR [ID:505359605] MS25-MAR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5053596 (Superseded) * MAJOR [ID:505359401] MS25-MAR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5053594 (x64) (Superseded) * MAJOR [ID:505359405] MS25-MAR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5053594 (Superseded) * MAJOR [ID:505359805] MS25-MAR: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5053598 (x64) (Superseded) * MAJOR [ID:505360301] MS25-MAR: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5053603 (x64) (Superseded) * MAJOR [ID:500266701] MS25-JAN: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002667 (x64) (Superseded) * MAJOR [ID:500268101] MS25-FEB: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002681 (x64) (Superseded) * MAJOR [ID:500267801] MS25-FEB: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002678 (x64) (Superseded) * MAJOR [ID:500268501] MS25-FEB: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002685 (x64) (Superseded) * MAJOR [ID:500252201] MS24-FEB: Security Update for Microsoft Office 2016 - Office 2016 - KB5002522 (x64) (Superseded) * MAJOR [ID:500252203] MS24-FEB: Security Update for Microsoft Office 2016 - Office 2016 - KB5002522 (Superseded) * MAJOR [ID:292071601] MS24-DEC: Security Update for Microsoft Office 2016 - Office 2016 - KB2920716 (x64) (Superseded) * MAJOR [ID:500229301] MS23-JAN: Update for Microsoft Office 2016 - Office 2016 - KB5002293 (x64) (Superseded) * MAJOR [ID:500229303] MS23-JAN: Update for Microsoft Office 2016 - Office 2016 - KB5002293 (Superseded) * MAJOR [ID:505365707] 5053657: Cumulative Update Preview for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5053657 (arm64) (Superseded) * MAJOR [ID:505365705] 5053657: Cumulative Update Preview for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5053657 (x64) (Superseded) * MAJOR [ID:505365703] 5053657: Cumulative Update Preview for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5053657 (arm64) (Superseded) * MAJOR [ID:505365701] 5053657: Cumulative Update Preview for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5053657 (x64) (Superseded) * MAJOR [ID:505364303] 5053643: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5053643 (x64) (Superseded) * MAJOR [ID:505364301] 5053643: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5053643 (Superseded) * MAJOR [ID:505209301] 5052093: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5052093 (arm64) (Superseded) * MAJOR [ID:500234001] 5002340: Update for Microsoft Office 2016 - Office 2016 - KB5002340 (x64) (Superseded) * MAJOR [ID:500234003] 5002340: Update for Microsoft Office 2016 - Office 2016 - KB5002340 (Superseded) * MAJOR [ID:500224301] 5002243: Update for Microsoft Office 2016 - Office 2016 - KB5002243 (x64) (Superseded) Reason for Update: * Microsoft released March 2025 security updates. * Microsoft released .NET updates. Additional Notes: * BigFix identified that SharePoint 2016 fixlet #500269201 failed during testing with exit code 17302. Consequently, the default action has been temporarily removed from the fixlet while we investigate this anomaly. Actions to Take: None Published site version: Patches for Windows, Version: 4522 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 9 01:55:45 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 9 Apr 2025 03:55:45 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-09 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011666 Google Chrome 135.0.7049.85 Available * 6082176 Mozilla Firefox (x64) 137.0.1 Available * 6082307 Mozilla Firefox 137.0.1 Available * 6101736 Mozilla Thunderbird 128.9.1 ESR Available * 5058229 ASP .NET Core Runtime (x64) 8.0.15 Available * 5058288 ASP .NET Core Hosting Bundle Runtime 8.0.15 Available * 5058286 ASP .NET Core Runtime 8.0.15 Available * 5058284 .NET Desktop Runtime (x64) 8.0.15 Available * 5058282 .NET Desktop Runtime 8.0.15 Available * 5058280 .NET Runtime (x64) 8.0.15 Available * 5058278 .NET Runtime 8.0.15 Available * 5058231 ASP .NET Core Runtime (x64) 9.0.4 Available * 5058300 ASP .NET Core Hosting Bundle Runtime 9.0.4 Available * 5058298 ASP .NET Core Runtime 9.0.4 Available * 5058296 .NET Desktop Runtime (x64) 9.0.4 Available * 5058294 .NET Desktop Runtime 9.0.4 Available * 5058292 .NET Runtime (x64) 9.0.4 Available * 5058290 .NET Runtime 9.0.4 Available Modified : * 14011664 Google Chrome 135.0.7049.42 Available (Superseded) * 5058173 ASP .NET Core Runtime (x64) 8.0.14 Available (Superseded) * 5058248 ASP .NET Core Hosting Bundle Runtime 8.0.14 Available (Superseded) * 5058246 ASP .NET Core Runtime 8.0.14 Available (Superseded) * 5058244 .NET Desktop Runtime (x64) 8.0.14 Available (Superseded) * 5058242 .NET Desktop Runtime 8.0.14 Available (Superseded) * 5058240 .NET Runtime (x64) 8.0.14 Available (Superseded) * 5058238 .NET Runtime 8.0.14 Available (Superseded) * 5058175 ASP .NET Core Runtime (x64) 9.0.3 Available (Superseded) * 5058260 ASP .NET Core Hosting Bundle Runtime 9.0.3 Available (Superseded) * 5058258 ASP .NET Core Runtime 9.0.3 Available (Superseded) * 5058256 .NET Desktop Runtime (x64) 9.0.3 Available (Superseded) * 5058254 .NET Desktop Runtime 9.0.3 Available (Superseded) * 5058252 .NET Runtime (x64) 9.0.3 Available (Superseded) * 5058250 .NET Runtime 9.0.3 Available (Superseded) Reason : * New update for Chrome , Firefox , Thunderbird and .NET. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2306 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 9 03:58:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 9 Apr 2025 05:58:42 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-09 Message-ID: Content in the Patches for Windows site has been modified New: * MAJOR [ID:305186077] Office 365 Version 16.0.18623.20178 Available for Network Share for Office 365 - Current Channel - Office 365 * MAJOR [ID:305186072] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Vietnamese) * MAJOR [ID:305186055] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:305186081] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Ukrainian) * MAJOR [ID:305186075] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Turkish) * MAJOR [ID:305186095] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Thai) * MAJOR [ID:305186058] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Swedish) * MAJOR [ID:305186078] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Spanish) * MAJOR [ID:305186082] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:305186092] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Slovenian) * MAJOR [ID:305186099] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Slovak) * MAJOR [ID:305186064] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Serbian Latin) * MAJOR [ID:305186096] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Russian) * MAJOR [ID:305186097] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:305186088] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:305186056] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Polish) * MAJOR [ID:305186098] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Norwegian) * MAJOR [ID:305186074] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Lithuanian) * MAJOR [ID:305186060] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Korean) * MAJOR [ID:305186067] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Japanese) * MAJOR [ID:305186059] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Italian) * MAJOR [ID:305186066] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Indonesian) * MAJOR [ID:305186086] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Hungarian) * MAJOR [ID:305186084] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Hindi) * MAJOR [ID:305186061] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Hebrew) * MAJOR [ID:305186085] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Greek) * MAJOR [ID:305186071] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (German) * MAJOR [ID:305186062] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (French) * MAJOR [ID:305186052] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Finnish) * MAJOR [ID:305186091] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (English (United States)) * MAJOR [ID:305186089] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:305186051] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Dutch) * MAJOR [ID:305186069] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Danish) * MAJOR [ID:305186083] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Czech) * MAJOR [ID:305186063] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:305186073] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:305186080] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Bulgarian) * MAJOR [ID:305186076] Office 365 Version 16.0.18623.20178 Available - Current Channel - Office 365 (Arabic) * MAJOR [ID:305185235] Office 365 Version 16.0.18526.20264 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel (Preview) - Office 365 * MAJOR [ID:305185187] Office 365 Version 16.0.18526.20264 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 * MAJOR [ID:305185243] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Vietnamese) * MAJOR [ID:305185249] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Update from Local Client Cache) * MAJOR [ID:305185248] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Ukrainian) * MAJOR [ID:305185222] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Turkish) * MAJOR [ID:305185246] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Thai) * MAJOR [ID:305185238] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Swedish) * MAJOR [ID:305185220] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish) * MAJOR [ID:305185207] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish (Mexico)) * MAJOR [ID:305185245] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovenian) * MAJOR [ID:305185234] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovak) * MAJOR [ID:305185236] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Serbian Latin) * MAJOR [ID:305185242] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Russian) * MAJOR [ID:305185229] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:305185226] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portugese (Portugal)) * MAJOR [ID:305185225] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Polish) * MAJOR [ID:305185227] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Norwegian) * MAJOR [ID:305185247] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Lithuanian) * MAJOR [ID:305185211] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Korean) * MAJOR [ID:305185241] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Japanese) * MAJOR [ID:305185221] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Italian) * MAJOR [ID:305185223] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Indonesian) * MAJOR [ID:305185202] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hungarian) * MAJOR [ID:305185224] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hindi) * MAJOR [ID:305185232] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hebrew) * MAJOR [ID:305185228] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Greek) * MAJOR [ID:305185216] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (German) * MAJOR [ID:305185200] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (French) * MAJOR [ID:305185217] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Finnish) * MAJOR [ID:305185203] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United States)) * MAJOR [ID:305185201] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United Kingdom)) * MAJOR [ID:305185240] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Dutch) * MAJOR [ID:305185239] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Danish) * MAJOR [ID:305185212] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Czech) * MAJOR [ID:305185205] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Traditional)) * MAJOR [ID:305185244] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Simplified)) * MAJOR [ID:305185214] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Bulgarian) * MAJOR [ID:305185210] Office 365 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Arabic) * MAJOR [ID:305185188] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:305185154] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:305185163] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:305185189] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:305185186] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Thai) * MAJOR [ID:305185174] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:305185171] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:305185176] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:305185179] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:305185151] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:305185164] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:305185175] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Russian) * MAJOR [ID:305185195] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:305185157] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:305185159] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Polish) * MAJOR [ID:305185173] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:305185180] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:305185155] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Korean) * MAJOR [ID:305185194] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:305185181] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Italian) * MAJOR [ID:305185193] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:305185161] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:305185160] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:305185191] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:305185198] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Greek) * MAJOR [ID:305185185] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (German) * MAJOR [ID:305185166] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (French) * MAJOR [ID:305185172] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:305185167] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:305185165] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:305185150] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:305185169] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Danish) * MAJOR [ID:305185182] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Czech) * MAJOR [ID:305185178] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:305185192] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:305185168] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:305185184] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:305179388] Office 365 Version 16.0.17928.20512 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:305179397] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:305179367] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:305179413] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:305179366] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:305179414] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:305179412] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:305179374] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:305179385] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:305179394] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:305179391] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:305179403] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:305179411] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:305179375] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:305179393] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:305179401] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:305179400] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:305179369] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:305179379] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:305179410] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:305179381] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:305179399] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:305179409] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:305179368] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:305179395] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:305179402] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:305179372] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:305179376] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:305179408] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:305179407] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:305179389] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:305179382] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:305179392] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:305179377] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:305179404] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:305179398] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:305179384] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:305179386] Office 365 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:305173273] Office 365 Version 16.0.17328.20770 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:305173276] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:305173264] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:305173293] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:305173274] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:305173282] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:305173262] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:305173268] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:305173272] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:305173251] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:305173295] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:305173279] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:305173250] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:305173256] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:305173275] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:305173288] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:305173266] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:305173257] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:305173291] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:305173280] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:305173271] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:305173292] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:305173258] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:305173296] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:305173261] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:305173297] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:305173281] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:305173255] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:305173289] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:305173267] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:305173290] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:305173252] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:305173286] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:305173270] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:305173287] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:305173298] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:305173294] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:305173259] Office 365 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:305186050] Office 2024 Version 16.0.18623.20178 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * MAJOR [ID:305186093] Office 2024 Version 16.0.18623.20178 Available - Current Channel - Office 2024 Retail * MAJOR [ID:305186094] Office 2024 Version 16.0.18623.20178 Available - Current Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305185231] Office 2024 Version 16.0.18526.20264 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * MAJOR [ID:305185162] Office 2024 Version 16.0.18526.20264 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:305185218] Office 2024 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * MAJOR [ID:305185206] Office 2024 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305185170] Office 2024 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:305185158] Office 2024 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305179417] Office 2024 Version 16.0.17932.20328 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:305179415] Office 2024 Version 16.0.17932.20328 Available - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:305179416] Office 2024 Version 16.0.17932.20328 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305179373] Office 2024 Version 16.0.17928.20512 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:305179405] Office 2024 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:305179383] Office 2024 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305173284] Office 2024 Version 16.0.17328.20770 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:305173283] Office 2024 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:305173265] Office 2024 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:305186054] Office 2021 Version 16.0.18623.20178 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * MAJOR [ID:305186068] Office 2021 Version 16.0.18623.20178 Available - Current Channel - Office 2021 Retail * MAJOR [ID:305186065] Office 2021 Version 16.0.18623.20178 Available - Current Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305185233] Office 2021 Version 16.0.18526.20264 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * MAJOR [ID:305185183] Office 2021 Version 16.0.18526.20264 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:305185209] Office 2021 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * MAJOR [ID:305185213] Office 2021 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305185177] Office 2021 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:305185199] Office 2021 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305179390] Office 2021 Version 16.0.17928.20512 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:305179380] Office 2021 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:305179371] Office 2021 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305173254] Office 2021 Version 16.0.17328.20770 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:305173260] Office 2021 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:305173299] Office 2021 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305143016] Office 2021 Version 16.0.14332.21017 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:305143015] Office 2021 Version 16.0.14332.21017 Available - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:305143017] Office 2021 Version 16.0.14332.21017 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:305186053] Office 2019 Version 16.0.18623.20178 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail * MAJOR [ID:305186057] Office 2019 Version 16.0.18623.20178 Available - Current Channel - Office 2019 Retail * MAJOR [ID:305186070] Office 2019 Version 16.0.18623.20178 Available - Current Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305185237] Office 2019 Version 16.0.18526.20264 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * MAJOR [ID:305185156] Office 2019 Version 16.0.18526.20264 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail * MAJOR [ID:305185208] Office 2019 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * MAJOR [ID:305185219] Office 2019 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305185190] Office 2019 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2019 Retail * MAJOR [ID:305185196] Office 2019 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305179387] Office 2019 Version 16.0.17928.20512 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR [ID:305179370] Office 2019 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR [ID:305179365] Office 2019 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305173263] Office 2019 Version 16.0.17328.20770 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR [ID:305173269] Office 2019 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR [ID:305173278] Office 2019 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305104015] Office 2019 Version 16.0.10417.20007 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:305104017] Office 2019 Version 16.0.10417.20007 Available - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:305104016] Office 2019 Version 16.0.10417.20007 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:305186090] Office 2016 Version 16.0.18623.20178 Available for Network Share for Office 2016 - Current Channel - Office 2016 * MAJOR [ID:305186079] Office 2016 Version 16.0.18623.20178 Available - Current Channel - Office 2016 (Update from Local Client Cache) * MAJOR [ID:305186087] Office 2016 Version 16.0.18623.20178 Available - Current Channel - Office 2016 * MAJOR [ID:305185204] Office 2016 Version 16.0.18526.20264 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel (Preview) - Office 2016 * MAJOR [ID:305185153] Office 2016 Version 16.0.18526.20264 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 * MAJOR [ID:305185215] Office 2016 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Update from Local Client Cache) * MAJOR [ID:305185230] Office 2016 Version 16.0.18526.20264 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 * MAJOR [ID:305185152] Office 2016 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR [ID:305185197] Office 2016 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2016 * MAJOR [ID:305179396] Office 2016 Version 16.0.17928.20512 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * MAJOR [ID:305179406] Office 2016 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR [ID:305179378] Office 2016 Version 16.0.17928.20512 Available - Semi-Annual Enterprise Channel - Office 2016 * MAJOR [ID:305173285] Office 2016 Version 16.0.17328.20770 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * MAJOR [ID:305173277] Office 2016 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR [ID:305173253] Office 2016 Version 16.0.17328.20770 Available - Semi-Annual Enterprise Channel - Office 2016 Modified: * MAJOR [ID:305186045] Office 365 Version 16.0.18623.20156 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * MAJOR [ID:305186047] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305186000] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305186024] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305186015] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Turkish) (Superseded) * MAJOR [ID:305186001] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Thai) (Superseded) * MAJOR [ID:305186030] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Swedish) (Superseded) * MAJOR [ID:305186042] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Spanish) (Superseded) * MAJOR [ID:305186040] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305186035] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305186023] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Slovak) (Superseded) * MAJOR [ID:305186025] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305186031] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Russian) (Superseded) * MAJOR [ID:305186022] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305186005] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305186038] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Polish) (Superseded) * MAJOR [ID:305186003] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305186041] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305186036] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Korean) (Superseded) * MAJOR [ID:305186043] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Japanese) (Superseded) * MAJOR [ID:305186039] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Italian) (Superseded) * MAJOR [ID:305186037] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Indonesian) (Superseded) * MAJOR [ID:305186019] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305186011] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hindi) (Superseded) * MAJOR [ID:305186049] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305186017] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Greek) (Superseded) * MAJOR [ID:305186046] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (German) (Superseded) * MAJOR [ID:305186034] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (French) (Superseded) * MAJOR [ID:305186027] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Finnish) (Superseded) * MAJOR [ID:305186013] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305186004] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305186028] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Dutch) (Superseded) * MAJOR [ID:305186014] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Danish) (Superseded) * MAJOR [ID:305186006] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Czech) (Superseded) * MAJOR [ID:305186010] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305186021] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305186048] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * MAJOR [ID:305186012] Office 365 Version 16.0.18623.20156 Available - Current Channel - Office 365 (Arabic) (Superseded) * MAJOR [ID:305185132] Office 365 Version 16.0.18526.20168 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel (Preview) - Office 365 (Superseded) * MAJOR [ID:305185086] Office 365 Version 16.0.18526.20168 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * MAJOR [ID:305185113] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305185120] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185104] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305185111] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Turkish) (Superseded) * MAJOR [ID:305185145] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Thai) (Superseded) * MAJOR [ID:305185144] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Swedish) (Superseded) * MAJOR [ID:305185106] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish) (Superseded) * MAJOR [ID:305185108] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305185102] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305185105] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovak) (Superseded) * MAJOR [ID:305185139] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305185107] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Russian) (Superseded) * MAJOR [ID:305185149] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305185142] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305185147] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Polish) (Superseded) * MAJOR [ID:305185129] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305185137] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305185114] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Korean) (Superseded) * MAJOR [ID:305185117] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Japanese) (Superseded) * MAJOR [ID:305185112] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Italian) (Superseded) * MAJOR [ID:305185127] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Indonesian) (Superseded) * MAJOR [ID:305185101] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305185122] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hindi) (Superseded) * MAJOR [ID:305185103] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305185135] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Greek) (Superseded) * MAJOR [ID:305185130] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (German) (Superseded) * MAJOR [ID:305185128] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (French) (Superseded) * MAJOR [ID:305185118] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Finnish) (Superseded) * MAJOR [ID:305185125] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305185138] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305185109] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Dutch) (Superseded) * MAJOR [ID:305185133] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Danish) (Superseded) * MAJOR [ID:305185115] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Czech) (Superseded) * MAJOR [ID:305185123] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305185119] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305185121] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Bulgarian) (Superseded) * MAJOR [ID:305185148] Office 365 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Arabic) (Superseded) * MAJOR [ID:305185082] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305185055] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185099] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305185073] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Turkish) (Superseded) * MAJOR [ID:305185097] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Thai) (Superseded) * MAJOR [ID:305185074] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Swedish) (Superseded) * MAJOR [ID:305185087] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Spanish) (Superseded) * MAJOR [ID:305185052] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305185079] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305185088] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Slovak) (Superseded) * MAJOR [ID:305185089] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305185096] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Russian) (Superseded) * MAJOR [ID:305185057] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305185091] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305185075] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Polish) (Superseded) * MAJOR [ID:305185069] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305185084] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305185080] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Korean) (Superseded) * MAJOR [ID:305185062] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Japanese) (Superseded) * MAJOR [ID:305185056] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Italian) (Superseded) * MAJOR [ID:305185083] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Indonesian) (Superseded) * MAJOR [ID:305185098] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305185064] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Hindi) (Superseded) * MAJOR [ID:305185067] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305185063] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Greek) (Superseded) * MAJOR [ID:305185054] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (German) (Superseded) * MAJOR [ID:305185059] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (French) (Superseded) * MAJOR [ID:305185077] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Finnish) (Superseded) * MAJOR [ID:305185061] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305185094] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305185065] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Dutch) (Superseded) * MAJOR [ID:305185050] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Danish) (Superseded) * MAJOR [ID:305185092] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Czech) (Superseded) * MAJOR [ID:305185085] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305185060] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305185072] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * MAJOR [ID:305185051] Office 365 Version 16.0.18526.20168 Available - Current Channel - Office 365 (Arabic) (Superseded) * MAJOR [ID:305184148] Office 365 Version 16.0.18429.20200 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 (Superseded) * MAJOR [ID:305184115] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305184124] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305184147] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305184104] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR [ID:305184134] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR [ID:305184135] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR [ID:305184111] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR [ID:305184113] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305184119] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305184149] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR [ID:305184121] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305184126] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR [ID:305184109] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305184100] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305184112] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR [ID:305184141] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305184136] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305184131] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR [ID:305184120] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR [ID:305184140] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR [ID:305184105] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Indonesian) (Superseded) * MAJOR [ID:305184123] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305184117] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR [ID:305184127] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305184125] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR [ID:305184142] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (German) (Superseded) * MAJOR [ID:305184101] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (French) (Superseded) * MAJOR [ID:305184129] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR [ID:305184139] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305184146] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305184110] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR [ID:305184106] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR [ID:305184130] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR [ID:305184137] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305184116] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305184132] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) (Superseded) * MAJOR [ID:305184145] Office 365 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR [ID:305179330] Office 365 Version 16.0.17928.20468 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 (Superseded) * MAJOR [ID:305179327] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305179326] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305179338] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR [ID:305179331] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR [ID:305179315] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR [ID:305179360] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR [ID:305179323] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305179345] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305179329] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR [ID:305179344] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305179341] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR [ID:305179335] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305179333] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305179318] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR [ID:305179336] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305179312] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305179337] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR [ID:305179334] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR [ID:305179343] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR [ID:305179359] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) (Superseded) * MAJOR [ID:305179324] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305179351] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR [ID:305179357] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305179320] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR [ID:305179347] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (German) (Superseded) * MAJOR [ID:305179339] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (French) (Superseded) * MAJOR [ID:305179340] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR [ID:305179352] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305179356] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305179321] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR [ID:305179361] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR [ID:305179316] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR [ID:305179319] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305179350] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305179349] Office 365 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR [ID:305173226] Office 365 Version 16.0.17328.20738 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 (Superseded) * MAJOR [ID:305173201] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR [ID:305173216] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305173208] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR [ID:305173205] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR [ID:305173236] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR [ID:305173231] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR [ID:305173209] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR [ID:305173213] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR [ID:305173242] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR [ID:305173235] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR [ID:305173220] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR [ID:305173228] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR [ID:305173238] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR [ID:305173211] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR [ID:305173217] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR [ID:305173214] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR [ID:305173239] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR [ID:305173218] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR [ID:305173210] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR [ID:305173244] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR [ID:305173241] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR [ID:305173237] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR [ID:305173246] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR [ID:305173230] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR [ID:305173200] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (German) (Superseded) * MAJOR [ID:305173203] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (French) (Superseded) * MAJOR [ID:305173215] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR [ID:305173222] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR [ID:305173207] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR [ID:305173219] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR [ID:305173212] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR [ID:305173249] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR [ID:305173224] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR [ID:305173223] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR [ID:305173225] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) (Superseded) * MAJOR [ID:305173227] Office 365 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR [ID:305186008] Office 2024 Version 16.0.18623.20156 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305186016] Office 2024 Version 16.0.18623.20156 Available - Current Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305186032] Office 2024 Version 16.0.18623.20156 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185134] Office 2024 Version 16.0.18526.20168 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail (Superseded) * MAJOR [ID:305185058] Office 2024 Version 16.0.18526.20168 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305185140] Office 2024 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail (Superseded) * MAJOR [ID:305185126] Office 2024 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185070] Office 2024 Version 16.0.18526.20168 Available - Current Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305185093] Office 2024 Version 16.0.18526.20168 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305184122] Office 2024 Version 16.0.18429.20200 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305184138] Office 2024 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305184118] Office 2024 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305179364] Office 2024 Version 16.0.17932.20286 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed (Superseded) * MAJOR [ID:305179362] Office 2024 Version 16.0.17932.20286 Available - Perpetual Channel - Office 2024 Volume Licensed (Superseded) * MAJOR [ID:305179363] Office 2024 Version 16.0.17932.20286 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305179353] Office 2024 Version 16.0.17928.20468 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305179328] Office 2024 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305173202] Office 2024 Version 16.0.17328.20738 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305173243] Office 2024 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR [ID:305186044] Office 2021 Version 16.0.18623.20156 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305186002] Office 2021 Version 16.0.18623.20156 Available - Current Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305186029] Office 2021 Version 16.0.18623.20156 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185131] Office 2021 Version 16.0.18526.20168 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail (Superseded) * MAJOR [ID:305185068] Office 2021 Version 16.0.18526.20168 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305185124] Office 2021 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail (Superseded) * MAJOR [ID:305185143] Office 2021 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185081] Office 2021 Version 16.0.18526.20168 Available - Current Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305185066] Office 2021 Version 16.0.18526.20168 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305184114] Office 2021 Version 16.0.18429.20200 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305184144] Office 2021 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305184128] Office 2021 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305179332] Office 2021 Version 16.0.17928.20468 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305179346] Office 2021 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305173221] Office 2021 Version 16.0.17328.20738 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305173206] Office 2021 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR [ID:305143014] Office 2021 Version 16.0.14332.21007 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed (Superseded) * MAJOR [ID:305143013] Office 2021 Version 16.0.14332.21007 Available - Perpetual Channel - Office 2021 Volume Licensed (Superseded) * MAJOR [ID:305186018] Office 2019 Version 16.0.18623.20156 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305186020] Office 2019 Version 16.0.18623.20156 Available - Current Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305186009] Office 2019 Version 16.0.18623.20156 Available - Current Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185110] Office 2019 Version 16.0.18526.20168 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail (Superseded) * MAJOR [ID:305185078] Office 2019 Version 16.0.18526.20168 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305185136] Office 2019 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail (Superseded) * MAJOR [ID:305185146] Office 2019 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185090] Office 2019 Version 16.0.18526.20168 Available - Current Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305185095] Office 2019 Version 16.0.18526.20168 Available - Current Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305184143] Office 2019 Version 16.0.18429.20200 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305184102] Office 2019 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305184107] Office 2019 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305179317] Office 2019 Version 16.0.17928.20468 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305179354] Office 2019 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305173234] Office 2019 Version 16.0.17328.20738 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305173204] Office 2019 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR [ID:305104014] Office 2019 Version 16.0.10416.20073 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed (Superseded) * MAJOR [ID:305104013] Office 2019 Version 16.0.10416.20073 Available - Perpetual Channel - Office 2019 Volume Licensed (Superseded) * MAJOR [ID:305104012] Office 2019 Version 16.0.10416.20073 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305186026] Office 2016 Version 16.0.18623.20156 Available for Network Share for Office 2016 - Current Channel - Office 2016 (Superseded) * MAJOR [ID:305186007] Office 2016 Version 16.0.18623.20156 Available - Current Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305186033] Office 2016 Version 16.0.18623.20156 Available - Current Channel - Office 2016 (Superseded) * MAJOR [ID:305185116] Office 2016 Version 16.0.18526.20168 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Superseded) * MAJOR [ID:305185076] Office 2016 Version 16.0.18526.20168 Available for Network Share for Office 2016 - Current Channel - Office 2016 (Superseded) * MAJOR [ID:305185141] Office 2016 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185100] Office 2016 Version 16.0.18526.20168 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Superseded) * MAJOR [ID:305185053] Office 2016 Version 16.0.18526.20168 Available - Current Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305185071] Office 2016 Version 16.0.18526.20168 Available - Current Channel - Office 2016 (Superseded) * MAJOR [ID:305184108] Office 2016 Version 16.0.18429.20200 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 (Superseded) * MAJOR [ID:305184103] Office 2016 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305184133] Office 2016 Version 16.0.18429.20200 Available - Monthly Enterprise Channel - Office 2016 (Superseded) * MAJOR [ID:305179325] Office 2016 Version 16.0.17928.20468 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR [ID:305179348] Office 2016 Version 16.0.17928.20468 Available - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR [ID:305173233] Office 2016 Version 16.0.17328.20738 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR [ID:305173247] Office 2016 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR [ID:305173248] Office 2016 Version 16.0.17328.20738 Available - Semi-Annual Enterprise Channel - Office 2016 (Superseded) Reason for Update: * New update for the below channels * Current Channel * Monthly Enterprise Channel * Semi-Annual Enterprise Channel (Preview) * Semi-Annual Enterprise Channel * Office 2019 Volume Licensed Additional Notes : * None. Actions to Take: None Published site version: Site Name: Patches for Windows Version: 4523 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 9 07:50:39 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 9 Apr 2025 20:20:39 +0530 Subject: [BESAdmin-Announcements] BigFix Inventory: Catalog 20250406 Update published 2025-04-09 Message-ID: BigFix Inventory Team is proud to announce the new version of BigFix Inventory Catalog. Product: BigFix Inventory Catalog update 20250406 Published site version: BigFix Inventory Discovery - version 17 Note: BigFix Inventory v10 site is deprecated and no longer used for updates. Features: Key updates in HCL BigFix Inventory Catalog 20250406: - Discovery of 120+ new software versions with the use of standard and template signatures including but not limited to the following software manufacturers like Cisco, Microsoft, Open Text & RED HAT. - Delivered Ideas BFINV-I-92 , BFINV-I-350 and BFINV-I-377 (addressed multiple components) - ISO SWID tag discovery based HCL products enhanced with software categories (85 components) and license type data (82 software products). To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20250406-ReleaseNotes.pdf To view the complete catalog content, use the Software Components report in BigFix Inventory. Actions needed: To apply new discovery capability, run the Server Software Catalog Update Fixlet (check new BigFix Inventory Discovery site) from the BigFix console and then wait for the next data import. If BigFix Inventory Discovery site is not visible 1. Check for License Update via BigFix License Overview (refresh if needed) License Overview dashboard 2. Enable new sites: BigFix Inventory and BigFix Inventory Discovery. Selecting Sites Starting from 20240612 release, Catalog updates are available from a new BigFix Inventory Discovery site, and BigFix Inventory server version 11.x is required for all subsequent catalog releases. For more information about how to install, maintain, and use BigFix Inventory application, refer to the user documentation: https://help.hcl-software.com/bigfix/11.0/inventory/welcome/BigFix_Inventory_welcome.html To find out more about Catalog Updates, visit: Catalog Overview We hope you find this latest release of BigFix Inventory Catalog content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 9 08:25:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 9 Apr 2025 11:25:13 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-09 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 135.0.7049.85 Available - Mac OS X (ID: 83000200) Firefox 137.0.1 Available - Mac OS X (ID: 20750259) Published site version: Updates for Mac Applications, version 745. Reasons for Update: A newer version of Chrome and Firefox for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 07:03:29 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 09:03:29 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-10 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058235 Microsoft Edge Stable Build 135.0.3179.66 Available (x64) * 5058233 Microsoft Edge Stable Build 135.0.3179.66 Available Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2307 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 07:18:06 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 09:18:06 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2025-04-10 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: MongoDB v7.0.18 - Windows (x64) - Update: MongoDB v8.0.6 - Windows (x64) - Update: OracleJDK v8.441 - Windows (x32) ## Modified Items: - Update: MongoDB v7.0.17 - Windows (x64) - Update: MongoDB v8.0.5 - Windows (x64) - Update: OracleJDK v8.441 - Windows (x64) ## Deleted Items: - 5701201 MongoDB-Update.bes - 5700704 MongoDB-Update.bes ## Reason for Update: - New Software Releases from Vendors - The older fixlets of MongoDB v7.0 and MongoDB v8.0 have been archived ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v36 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 07:30:25 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 09:30:25 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2025-04-10 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: MongoDB v7.0.18 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.18 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.18 - RedHat / CentOS 9 (x64) - Update: MongoDB v7.0.18 - SUSE 12 (x64) - Update: MongoDB v7.0.18 - SUSE 15 (x64) - Update: MongoDB v7.0.18 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.18 - Ubuntu 22.04 (x64) - Update: MongoDB v8.0.6 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.6 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.6 - SUSE 15 (x64) - Update: MongoDB v8.0.6 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.6 - Ubuntu 22.04 (x64) ## Modified Items: - Update: MongoDB v7.0.17 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.17 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.17 - RedHat / CentOS 9 (x64) - Update: MongoDB v7.0.17 - SUSE 12 (x64) - Update: MongoDB v7.0.17 - SUSE 15 (x64) - Update: MongoDB v7.0.17 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.17 - Ubuntu 22.04 (x64) - Update: MongoDB v8.0.5 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.5 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.5 - SUSE 15 (x64) - Update: MongoDB v8.0.5 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.5 - Ubuntu 22.04 (x64) ## Deleted Items: - 5700104 MongoDB-Update.bes - 5700204 MongoDB-Update.bes - 5700304 MongoDB-Update.bes - 5700404 MongoDB-Update.bes - 5700604 MongoDB-Update.bes - 5701004 MongoDB-Update.bes - 5701104 MongoDB-Update.bes - 5701401 MongoDB-Update.bes - 5701501 MongoDB-Update.bes - 5701701 MongoDB-Update.bes - 5701901 MongoDB-Update.bes - 5702001 MongoDB-Update.bes ## Reason for Update: - New Software Releases from Vendors - The older fixlets of MongoDB 7.0 and MongoDB 8.0 have been archived. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v53 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 07:59:26 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 09:59:26 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MacOS Applications Extended published 2025-04-10 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 3 Total Fixlets in Site: 27 Release Date: 2025-04-10 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 58700201 Speedify v15.5 63200301 Pale Moon v33.7.0 902001 AWS VPN Client v5.2.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 08:01:51 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 10:01:51 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-10 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 38 Total Fixlets in Site: 449 Release Date: 2025-04-10 Updated Fixlets: 1200201 Apache Tomcat 10 v10.1.40 1200401 Apache Tomcat 9 v9.0.104 16900201 Duo Desktop v7.6.0.0 19600101 VSCodium (x64) v1.99.12392 21700101 8x8 Work v8.21.3.1 23400101 PhonerLite v3.29 24200101 TablePlus v6.4.8 2700101 Remote Desktop Manager Enterprise v2025.1.30.0 2800101 Docker Desktop v4.40.0 28600101 balena-cli v21.1.9.0 29600101 Vim v9.1.1289 37300101 Argus Monitor v7.2.2.3018 4000101 GoodSync v12.8.7.7 4200201 GoTo Machine v4.14.0 45400101 Plottr v2025.4.8 53800201 spacedesk Windows DRIVER v2.1.43.0 54300101 Dolt v1.51.2 5602001 SQL Server Management Studio 20 v20.2.1 5602501 Microsoft Visual Studio Code x64 v1.99.1 5603601 Windows Defender Virus Definitions v1.427.158.0 5801301 Firefox Developer Edition (x64 en-US) v138.0 58700101 Speedify v15.5.0.12997 58900101 Advanced Installer v22.6 59400101 Syncovery v11.2.3 59900101 Intel Driver && Support Assistant v25.2.15.9 6000101 NAPS2 v8.1.4 63200101 Pale Moon v33.7.0 - Windows (x64) 63200201 Pale Moon v33.7.0 - Windows (x86) 67000201 Cold Turkey Blocker v4.6 67600101 ScreenConnect v25.2.3.9216 67700101 Vivaldi v7.3.3635.9 - Windows (x86) 67700201 Vivaldi v7.3.3635.9 - Windows (x64) 67900101 SteelSeries GG v84.0.0 68400101 BarTender v11.4.1.240978 8000101 Python v3.13.3 900601 AWS SAM Command Line Interface v1.137.0 901201 AWS VPN Client v5.2.0 901901 AWS Command Line Interface v2 v2.25.14.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 08:56:03 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 10:56:03 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-10 Message-ID: Total New Fixlets: 10 Total Updated Fixlets: 880 Total Fixlets in Site: 2933 Total CVEs Covered: 842 Release Date: 2025-04-10 New Fixlets: 36960 CrushFTP Authentication Bypass Vulnerability - Any Version of Linux 37030 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 37010 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 36950 CrushFTP Authentication Bypass Vulnerability - Any Version of Windows 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 Updated Fixlets: 32770 Apple Multiple Products WebKit Memory Corruption Vulnerability - Ubuntu 34820 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2025 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 6150 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows 10 8200 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2016 26630 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 11 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 6160 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows 10 8210 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2016 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 2070 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 34840 Android Kernel Remote Code Execution Vulnerability - Ubuntu 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 8220 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 2080 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 8.1 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 6180 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 32810 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Ubuntu 6190 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows 10 8240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 30770 Microsoft SharePoint Server Privilege Escalation Vulnerability - SharePoint 12340 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 6200 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 8250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2016 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 30780 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - SharePoint 12350 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 8260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 10310 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 2120 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 6230 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows 10 8280 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 2140 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows 8.1 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 6240 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8290 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 6250 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 8300 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 24690 Microsoft Excel Remote Code Execution Vulnerability - Excel 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 6260 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 30850 Microsoft SharePoint Server Code Injection Vulnerability - SharePoint 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8330 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 24720 Microsoft Excel Security Feature Bypass - Excel 6290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 28820 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 8340 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 6300 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 28830 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28840 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2019 8360 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2016 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 12460 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 6320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows 10 28850 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 8370 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 6330 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 28860 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 10 8380 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 2240 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 6340 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8390 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 28870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 28880 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2022 8410 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 6370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8420 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2016 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 6380 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 10 8430 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 6390 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8440 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 6400 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8450 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2016 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 4360 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 SP2 35080 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 6410 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 10 22800 MinIO Information Disclosure Vulnerability - Any Version of Linux 35090 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8470 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 35100 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 10 6430 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8480 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2016 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 6440 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 8490 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 31020 Microsoft Windows Remote Code Execution Vulnerability - Windows Server 2008 Gold 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 6450 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows 10 8500 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 31030 Microsoft Windows Kernel Exception Handler Vulnerability - Windows Server 2008 Gold 35130 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 6460 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 10 8510 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 31040 Microsoft Windows Kernel Exception Handler Vulnerability - Windows Vista Gold 35140 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 6470 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 26950 MinIO Security Feature Bypass Vulnerability - Any Version of Linux 8520 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2016 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 4430 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 35150 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 6480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 6490 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows 10 8540 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2016 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 31070 Microsoft Windows Remote Code Execution Vulnerability - Windows Vista SP 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 6500 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 10 8550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 8560 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 31090 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2012 R2 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 31100 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 8580 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 31110 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 6540 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 8590 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 31120 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 22930 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows 10 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 6550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 8600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2016 4510 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 SP2 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 31140 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows Server 2022 6570 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2016 31150 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 6580 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 2490 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 7 SP1 35260 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2016 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6590 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8640 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 31170 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows 11 35270 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2019 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 6600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 8650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2016 31180 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 35280 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 10 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 27100 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 6620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows 10 8670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 27110 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 10 6630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 8680 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2016 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 35310 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2022 6640 Microsoft Windows SAM Local Privilege Escalation Vulnerability - Windows 10 8690 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 29170 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 20980 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 10 23030 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows Server 2016 35320 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 11 6650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows 10 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 29180 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 11 20990 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 10 27140 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 6670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 27150 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2019 21010 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 14870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 6680 Microsoft GDI Remote Code Execution Vulnerability - Windows 10 27160 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 21020 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows 10 14880 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6690 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows 10 21030 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 SP2 25130 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 14890 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 6700 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 21040 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 SP2 6710 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 27190 Microsoft Word Information Disclosure Vulnerability - Word 6720 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows Server 2019 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 6730 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 2640 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 6740 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows Server 2019 21080 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 25180 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 6750 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2019 21090 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 35430 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 10 25190 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 6760 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2019 35440 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 10 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 6770 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2019 8820 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 R2 35450 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 10 6780 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2019 35460 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 6790 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 35470 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 6800 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27280 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2022 31380 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 35480 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 11 6810 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2019 27290 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 21150 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 7 SP1 31390 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2016 2720 Microsoft Win32k Privilege Escalation Vulnerability - Windows 7 SP1 35490 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows Server 2025 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 6820 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2019 27300 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 11 31400 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 35500 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 6830 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows Server 2019 27310 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 31410 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 35510 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 6840 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 31420 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2016 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6850 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 21190 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 8.1 31430 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 6860 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 31440 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2019 6870 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2019 31450 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 10970 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 6880 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 21220 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 31460 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 10980 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2012 27370 Microsoft WordPad Information Disclosure Vulnerability - Windows 10 6890 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 21230 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 31470 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2019 35570 JQuery Cross-Site Scripting (XSS) Vulnerability - Any Operating System 4850 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2008 SP2 6900 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2019 29430 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2016 21240 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 31480 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 6910 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 29440 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2019 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 31490 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 10 21250 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2019 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 27400 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2019 6920 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29450 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 10 31500 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 21260 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 15120 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 6930 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2019 27410 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2016 29460 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2022 31510 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 21270 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 11030 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 6940 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 29470 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 11 31520 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 10 15140 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 6950 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 29480 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2019 31530 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 21290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 11050 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 6960 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 27440 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2022 29490 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 10 21300 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2016 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6970 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 9020 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 27450 Microsoft WordPad Information Disclosure Vulnerability - Windows 11 6980 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2019 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 21320 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 R2 31560 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2022 6990 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2019 29520 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2022 31570 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 7000 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 29530 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 11 31580 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2022 7010 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 31590 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2022 7020 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 31600 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2022 7030 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31610 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 11 35710 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2016 7040 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 21380 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 31620 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 7050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2019 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 31630 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 11 33680 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 35730 Microsoft .NET Framework Information Disclosure Vulnerability - Windows 10 7060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 11160 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 31640 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 11 33690 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2016 7070 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 31650 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 11 33700 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 7080 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 33710 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2019 35760 Microsoft Outlook Improper Input Validation Vulnerability - Office 7090 Microsoft Windows Spoofing Vulnerability - Windows Server 2019 33720 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 25530 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 10 7100 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 33730 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 10 25540 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 10 7110 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2019 25550 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 7120 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows Server 2019 5080 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2008 SP2 7130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 33760 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2022 7140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2019 33770 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 7150 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 33780 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 11 7160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 33790 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 27660 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13330 Microsoft Windows Kernel Exception Handler Vulnerability - Windows 7 35860 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2016 27670 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 10 7190 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 29720 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 35870 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 27680 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 7200 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2019 29730 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 5160 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 35880 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2019 27690 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 7210 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2019 29740 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 13360 Microsoft Windows Remote Code Execution Vulnerability - Windows 7 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 25650 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2019 35890 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 7220 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2019 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 35900 Microsoft Windows Storage Link Following Vulnerability - Windows 10 5180 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 25660 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2019 7230 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 29760 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 35910 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 10 25670 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 7240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 29770 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 33870 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2016 25680 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2016 7250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2019 27730 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2016 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 33880 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2019 13400 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 25690 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2016 7260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 27740 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 33890 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 10 13410 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2022 25700 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 35940 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2022 7270 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows Server 2019 27750 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 29800 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2019 13420 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 33900 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2022 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 35950 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 27760 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2019 7280 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 29810 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 10 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 13430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2022 33910 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 11 35960 Microsoft Windows Storage Link Following Vulnerability - Windows 11 27770 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2019 7290 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 29820 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2022 13440 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2022 35970 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 11 27780 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 7300 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 29830 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 11 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 13450 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 35980 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 27790 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 7310 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 13460 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2022 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 5270 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 7320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2019 35990 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2025 13470 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 7330 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 13480 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 33960 Microsoft SharePoint Deserialization Vulnerability - SharePoint 7340 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 13490 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 7350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 13500 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2022 7360 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29890 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2016 3270 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 13510 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 7370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 29900 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2019 1230 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 8.1 3280 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 7 SP1 13520 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 7380 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 29910 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 10 13530 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 7390 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2019 29920 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2022 13540 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2022 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 7400 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 29930 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 11 13550 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2022 7410 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 11510 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 13560 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 7420 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows Server 2019 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 11520 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 13570 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 7430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2019 27910 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2022 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 3340 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 13580 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 27920 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 3350 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 13590 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2022 5400 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 7450 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27930 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13600 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 5410 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows 10 7460 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2019 27940 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2022 13610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 5420 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 7470 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2019 27950 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 11 13620 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2022 5430 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows 10 7480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27960 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13630 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 7490 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27970 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 11590 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 13640 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 5450 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 10 27980 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 11 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 13650 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 5460 Microsoft Internet Explorer Type Confusion Vulnerability - Windows 10 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 7510 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 13660 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2022 5470 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows 10 7520 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 13670 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 5480 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows 10 7530 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 3440 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 13680 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2022 7540 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2019 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows 13690 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 7550 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 30080 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2016 13700 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 7560 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 30090 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2019 1420 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 5520 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 7570 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2019 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 30100 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 10 11670 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 R2 SP1 5530 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 7580 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 5540 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 10 7590 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2019 36260 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2016 30120 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2022 32170 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2016 7600 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows Server 2019 30130 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 11 32180 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2016 36280 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows 10 5560 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows 10 7610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 30140 Linux Kernel Use-After-Free Vulnerability - Ubuntu 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 7620 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 32200 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2019 13770 Microsoft Windows Remote Code Execution Vulnerability - Windows Server 2008 R2 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 32210 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2019 5590 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 7640 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 9700 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 32230 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 10 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13800 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 11 5610 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 9710 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2012 R2 32240 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 10 13810 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 11 5620 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 7670 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2016 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 5630 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows 10 7680 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2016 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 5640 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 36360 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2016 7690 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2016 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 5650 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 36370 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2016 7700 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 5660 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 10 36380 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2016 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 7710 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 9760 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 13860 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 36390 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows Server 2016 7720 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2016 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 5680 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 36400 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 7730 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2016 9780 Microsoft Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 22070 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 5690 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 36410 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2016 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 32320 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2022 13890 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 11 36420 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2019 32330 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2022 24140 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 5710 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36430 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2019 7760 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 13910 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 11 5720 Microsoft Windows LSA Spoofing Vulnerability - Windows 10 36440 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2019 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 30300 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2016 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 5730 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 36450 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 7780 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 30310 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2019 24170 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 36460 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2019 7790 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 30320 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 10 36470 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 10 7800 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2016 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 30330 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2022 32380 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 11 36480 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 10 5760 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 7810 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 30340 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 11 32390 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 11 13960 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 36490 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 10 5770 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 7820 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 36500 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows 10 5780 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows 10 7830 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2016 26260 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 13980 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 11 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 36510 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 10 7840 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 26270 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2022 9890 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 13990 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 36520 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 10 26280 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2022 7850 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 30380 Linux Kernel Use-After-Free Vulnerability - Ubuntu 26290 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 11 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 26300 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 11 7870 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2016 26310 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 11 7880 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 14030 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 5840 Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 14040 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 7900 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 7910 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2016 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 5870 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 36590 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2022 7920 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2016 5880 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36600 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2022 5890 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36610 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2022 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 12040 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 36620 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 5910 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 36630 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2022 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 5920 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 7970 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 32560 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 26420 Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability - Any Version of Windows 5940 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 10 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 32570 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 8000 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 32580 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 5960 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 8010 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 30540 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2008 R2 26450 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 10 36690 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 11 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 5980 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 8030 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 32610 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 36710 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 11 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 32620 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 6000 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 8050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2016 36720 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 11 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6010 Microsoft Windows Spoofing Vulnerability - Windows 10 26490 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2019 8060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36730 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 11 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 34690 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2016 6020 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 36740 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 10120 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 34700 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2016 24460 Microsoft Office Remote Code Execution Vulnerability - Office 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 6030 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows 10 26510 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2016 8080 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 34710 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2019 6040 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows 10 36760 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2025 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8090 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 32670 Apple Multiple Products WebKit Type Confusion Vulnerability - Ubuntu 34720 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2019 6050 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 36770 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2025 8100 Microsoft Windows Spoofing Vulnerability - Windows Server 2016 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34730 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows 10 6060 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows 10 36780 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2025 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 8110 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 34740 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows 10 6070 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 8120 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2016 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 8130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 6090 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2016 22480 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 34770 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2022 6100 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 34780 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2022 6110 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows 10 8160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 12260 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 34790 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows 11 16360 Trihedral VTScada (formerly VTS) Denial-of-Service Vulnerability - Any Version of Windows 6120 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8170 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 12270 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 34800 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows 11 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 6130 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows 10 8180 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2016 26610 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2022 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 28660 Linux Kernel Use-After-Free Vulnerability - Ubuntu 34810 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2025 6140 Microsoft Windows SMB Information Disclosure Vulnerability - Windows 10 8190 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2016 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 10 12:27:08 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 10 Apr 2025 14:27:08 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-10 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505566401] 5055664: Servicing Stack Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5055664 * Major [ID:505566403] 5055664: Servicing Stack Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5055664 (x64) * Major [ID:505554703] 5055547: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5055547 (x64) * Major [ID:505554701] 5055547: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5055547 Reason for Update: * New Updates for Windows 10 Version 1507 from Microsoft. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4524 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 03:51:07 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 06:51:07 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for RHEL 8 published 2025-04-11 Message-ID: Content in the Patches for RHEL 8 Extended Support site has been added: RHSA-2025:3620 Red Hat Security Advisory: firefox security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHSA-2025:3624 Red Hat Security Advisory: libxslt security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHSA-2025:3684 Red Hat Security Advisory: tomcat security update - Red Hat Enterprise Linux 8.8 EUS (x64) Content in the Patches for RHEL 8 Extended Support site has been superseded: RHSA-2024:5695 Red Hat Security Advisory: tomcat security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) RHSA-2025:2486 Red Hat Security Advisory: firefox security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) Reason for Update: Red Hat released new EUS content. Actions to Take: None Published site version: Patches for RHEL 8 Extended Support, version 158 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 05:39:37 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 08:39:37 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2-2025-2817 - Python3 Security update - Amazon linux 2 x86_64 (ID: 2528171) Published Site Version: * Patches for Amazon Linux 2, version 177. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 05:42:20 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 08:42:20 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2-2025-2817 - Python3 Security update - Amazon linux 2 aarch64 (ID: 2528171) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 104. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 07:34:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 09:34:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-11 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 2 Total Fixlets in Site: 449 Release Date: 2025-04-11 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 5603601 Windows Defender Virus Definitions v1.427.187.0 901901 AWS Command Line Interface v2 v2.26.0.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 10:56:32 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 12:56:32 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-11 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:405262302] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 * Major [ID:405262303] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 (x64) Reason for Update: * New Updates for Windows Defender antimalware platform from Microsoft. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4525 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 11 12:15:17 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 11 Apr 2025 14:15:17 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-11 Message-ID: BigFix has modified content in the Updates for Windows Applications site. * 5058302 Microsoft Edge Extended Stable Build 134.0.3124.119 Available * 5058304 Microsoft Edge Extended Stable Build 134.0.3124.119 Available (x64) Reason : * New update for Microsoft Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2308 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 08:03:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 10:03:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-14 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058237 Microsoft Edge Stable Build 135.0.3179.73 Available * 5058239 Microsoft Edge Stable Build 135.0.3179.73 Available (x64) * 5058306 Microsoft Edge Extended Stable Build 134.0.3124.93 Available * 5058308 Microsoft Edge Extended Stable Build 134.0.3124.93 Available (x64) Modified : * 5058233 Microsoft Edge Stable Build 135.0.3179.66 Available (Superseded) * 5058235 Microsoft Edge Stable Build 135.0.3179.66 Available (x64) (Superseded) * 5058274 Microsoft Edge Extended Stable Build 134.0.3124.51 Available (x64) (Superseded) * 5058276 Microsoft Edge Extended Stable Build 134.0.3124.51 Available (Superseded) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2309 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 08:45:29 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 10:45:29 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-04-14 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 1 Total Fixlets in Site: 27 Release Date: 2025-04-14 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 48300201 Bitwarden v2025.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 09:02:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 11:02:16 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-14 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 27 Total Fixlets in Site: 449 Release Date: 2025-04-14 Updated Fixlets: 1000201 AnyDesk (EXE) v9.5.1 19600101 VSCodium (x64) v1.99.22418 29600101 Vim v9.1.1299 39000101 CLAN v8.28.00 43803901 Cryptomator (MSI) v1.15.2.5577 48300101 Bitwarden v2025.3.1 50500101 Juju v3.6.5 51000101 Clink v1.7.15 54300101 Dolt v1.51.3 55500101 Nitro PDF Pro (MSI) v14.37.2.0 55500201 Nitro PDF Pro Enterprise (MSI) v14.37.2.0 5601601 Microsoft Power BI Desktop v2.141.1558.0 5601801 PowerToys v0.90.1 5602501 Microsoft Visual Studio Code x64 v1.99.2 5602901 Microsoft Power BI Desktop v2.141.1558.0 5603601 Windows Defender Virus Definitions v1.427.234.0 6400101 Microsoft Edge WebView2 Runtime v135.0.3179.73 5801301 Firefox Developer Edition (x64 en-US) v138.0 59400101 Syncovery v11.3.0 62200101 Duplicati v2.1.0.113 67000201 Cold Turkey Blocker v4.6 70400101 CMake v4.0.1 74100101 Rocket.Chat v4.3.1 - Windows (x64) 74100201 Rocket.Chat v4.3.1 - Windows 8300101 R for Windows v4.5.0 900601 AWS SAM Command Line Interface v1.137.1 901901 AWS Command Line Interface v2 v2.26.1.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 10:44:36 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 12:44:36 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-14 Message-ID: Total New Fixlets: 20 Total Updated Fixlets: 71 Total Fixlets in Site: 2953 Total CVEs Covered: 850 Release Date: 2025-04-14 New Fixlets: 37120 Apache Tomcat Path Equivalence Vulnerability - Any Version of Windows 37250 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - VMware ESXi 7.0 37130 Apache Tomcat Path Equivalence Vulnerability - Any Version of Linux 37260 VMware ESXi Arbitrary Write Vulnerability - VMware ESXi 7.0 37140 Linux Kernel Use of Uninitialized Resource Vulnerability - SLE 37270 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - VMware ESXi 7.0 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 37060 HTTP/2 Rapid Reset Attack Vulnerability - Ubuntu 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 37070 Linux Kernel Out-of-Bounds Read Vulnerability - Ubuntu 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 37080 Linux Kernel Out-of-Bounds Access Vulnerability - Ubuntu 37210 HTTP/2 Rapid Reset Attack Vulnerability - leap 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 37220 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - VMware ESXi 8.0 37100 Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability - Any Operating System 37230 VMware ESXi Arbitrary Write Vulnerability - VMware ESXi 8.0 37110 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability - Any Operating System 37240 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - VMware ESXi 8.0 Updated Fixlets: 12800 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Windows 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 33530 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Oracle Linux 8070 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows Server 2016 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 37010 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 33430 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 15640 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of Windows 34840 Android Kernel Remote Code Execution Vulnerability - Ubuntu 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 28700 Linux Kernel Privilege Escalation Vulnerability - Ubuntu 35360 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Linux 34980 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Windows 8740 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2012 R2 37030 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 25130 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 36010 Linux Kernel Out-of-Bounds Write Vulnerability - SLE 9260 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows Server 2012 R2 30380 Linux Kernel Use-After-Free Vulnerability - Ubuntu 34990 Apache Tomcat Improper Privilege Management Vulnerability - Any Version of Windows 33450 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 25140 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 SP2 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 11320 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2008 R2 SP1 10040 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2012 35000 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Linux 27580 rConfig OS Command Injection Vulnerability - Any Version of CentOS 30140 Linux Kernel Use-After-Free Vulnerability - Ubuntu 25150 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 25280 Microsoft MSHTML Remote Code Execution Vulnerability - Office 35010 Apache Tomcat Improper Privilege Management Vulnerability - Any Version of Linux 25160 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 7 SP1 5450 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 10 25290 Microsoft MSHTML Remote Code Execution Vulnerability - Word Viewer 5970 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows 10 25170 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 8.1 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 35030 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Windows 25300 Microsoft MSHTML Remote Code Execution Vulnerability - Excel Viewer 33490 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 25180 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 1630 Microsoft DirectX Graphics Kernel Privilege Escalation Vulnerability - Windows 8.1 6750 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2019 2400 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 7 SP1 35040 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Linux 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS 31710 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Ubuntu 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 33500 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 25190 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS 28650 Linux Kernel Privilege Escalation Vulnerability - Ubuntu 25200 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2012 R2 33520 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 14450 Plex Media Server Remote Code Execution Vulnerability - Any Version of Windows 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 28660 Linux Kernel Use-After-Free Vulnerability - Ubuntu 7670 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2016 25210 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2012 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 1150 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 8.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 10:42:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 19:42:04 +0200 Subject: [BESAdmin-Announcements] BigFix 11.0 Patch 4 is now available! Message-ID: The BigFix Team is pleased to announce the release of version 11 Patch 4 (11.0.4.60) of BigFix Platform. The main features in this release are as follows: You can now secure HTTPS communication in BigFix with your preferred Certificate Authority! (aka Bring Your Own CA) With the setcustomca BESAdmin command, you can install an external Certificate Authority (CA) in the BigFix Platform. When that happens, BigFix components at 11.0.4 and later versions will start using certificates generated from the imported CA to secure HTTPS traffic. Back level components will continue to use the current BigFix CA. For details, see Configuring the root server with a custom CA , BESAdmin Windows Command Line and BESAdmin Linux Command Line . More console performance improvements! Prior releases have improved console load times and performance analytics. Our goal was to cut console load times in half, and customers generally meet or exceed this goal. With this release we have improved the general console performance, with a focus on process concurrency, efficiency, and device correlation impact. The net is through our cumulative improvements, you have a more responsive console! More options for High Availability & Disaster Recovery (HADR)! The BigFix HADR solution until now has involved the Disaster Server Architecture (DSA) based on proprietary replication code. We now offer a full HADR solution based on a combination of database replication (e.g., and MS SQL Availability Group), cluster management, and shared file store. The solution aligns with industry best practices, has reference level data integrity, and is operationally more scalable and lighter weight than the DSA solution. This is especially important if you consider BigFix ?mission critical? to your business! For details, see HA and DR configurations . Enhanced PeerNest! Streamlined functionality and reduced network traffic Significant advancement in PeerNest efficiency: agents can exchange payloads among themselves without the need of Multicast UDP. Root Server and Relays will be used as trackers, sharing information about which clients are able to share which files. This means reduced network traffic, possibility to leverage the capability in diverse networking environments, and improved efficiency especially in the early phases of the communication. For details, see Configuring PeerNest without the multicast function and Peer to peer mode . Higher Relay Scalability! A non-authenticating relay on Windows and Linux can now support up to 10000 endpoints! Increased number of persistent connections! Persistent connections can be enabled on network configurations where UDP notifications are not available. The limit of endpoints that can be configured in this way is increased to 1000 per Relay. BigFix Relay metrics collected and exposed! You can now monitor the status and efficiency of your relay infrastructure. The relay is now able to collect and expose metrics related to its HTTP server operations and lets you use Prometheus to collect them. The collected data can then be viewed and analyzed by a visualization application such as Grafana. For details, see Exposed Metrics and Exported Metrics . Data upload infrastructure enhancement - Pass-Through mode on Relays! In file upload scenarios, BigFix Platform allows you to enable the BigFix Relays to immediately forward received file chunks upstream, instead of storing files locally, using a new setting named _BESRelay_PostFile_PassThrough. For details, see List of settings and detailed descriptions . VMware cloud plugin connection secured with vCenter certificates! BigFix Platform allows you to install the vCenter certificates on the system where you intend to install the VMware cloud plugin; this allows it to open secure connections. For details, see Configuring cloud plugins . Azure cloud plugin is able to put the VMs in a deallocated state! The Azure cloud plugin has a new command named deallocate instance; by leveraging this feature you can more closely control your infrastructure costs on Azure. For details, see Microsoft Azure Plugin Commands . Added BESAdmin command to convert BigFix operators from one Identity Provider to another! With the converttoidpoperators BESAdmin command, you can convert BigFix operators from one Identity Provider to another already configured Identity Provider. This is useful if, for example, you want to convert your BigFix operators from referencing MSAD to referencing Entra ID. This command is available on Windows platform only. For details, see BESAdmin Windows Command Line . Added BESAdmin command to set the priority in case of transaction deadlocks in the database! With the databaseDeadlockPriority BESAdmin command, you can set a "Low", "Normal" or "High" priority for the BigFix Administration tool Computer Remover and Audit Trail Cleaner so that you can influence how Microsoft SQL Server resolves the deadlocks. In particular, setting the databaseDeadlockPriority option value to "High" ensures that critical transactions are most likely not interrupted. For details, see BESAdmin Windows Command Line , BESAdmin Linux Command Line , Computer Remover and Audit Trail Cleaner . Added BESAdmin command to rotate the BigFix WebUI certificate! With the rotatewebuicredentials BESAdmin command, you can rotate one BigFix WebUI certificate associated to a given hostname, or the whole BigFix WebUI Certificate Authority (CA) and all BigFix WebUI certificates. For details, see BESAdmin Windows Command Line and BESAdmin Linux Command Line . Inspector changes! - New client inspector type named "cidr subnet" was added to represent the Classless Inter-Domain Routing (CIDR) value. For details, see cidr subnet . - New "named" constructor for process inspector on MacOS to return the process object corresponding to the specified name. For details, see https://developer.bigfix.com/relevance/reference/process.html - New inspector properties named "first line of" and "last line of" were added to return specific lines of a given file. For details, see file line . - New inspector properties named "first rawline of" and "last rawline of" were added to return specific rawlines of a given file. For details, see file rawline . - New inspector properties named "enabled of", "global state of" and "stealth enabled of" were added on MacOS to return specific firewall information. For details, see firewall . Added Support for BigFix Server on Windows and Linux with database Amazon RDS for Microsoft SQL Server 2022 Starting from Patch 4, BigFix Server on Windows Server (2019 or later) and on Red Hat 9 supports Amazon RDS for Microsoft SQL Server 2022 database. Added Support for BigFix Server on Windows and Linux with database Azure SQL Managed Instance for Microsoft SQL Server 2022 Starting from Patch 4, BigFix Server on Windows Server (2019 or later) and on Red Hat 9 supports Azure SQL Managed Instance for Microsoft SQL Server 2022 database. Added Support for BigFix Agent Added support for BigFix Agent running on Alma Linux 9.5 x86 64-bit. Library and driver upgrades - The boost library was upgraded to Version 1.87.0. - The jQuery-UI library was upgraded to Version 1.14.0. - The libssh2 library was upgraded to Version 1.11.1. - The OpenSSL library was upgraded to Version 3.2.4. - InstallShield was upgraded to Version 2024 R2. - The Xerces-C++ XML Parser library was upgraded to Version 3.3.0 *Additional information about this release * - The standalone BigFix tools are published under the 11.0 Utilities section in BigFix Enterprise Suite Download Center - A Non-Functional Requirements checklist, covering both performance and security management of your BigFix deployment, is available at ?BigFix Performance & Capacity Planning Resources *References* - See the full?technical?changelist *Pre-Upgrade Considerations * Important considerations?to keep into account before upgrading to BigFix Platform Version 11 are: - BigFix?Version 10.0.7?is the minimum version supporting the upgrade of the BigFix server components to Version 11 - You must enable the ?Enhanced Security? before upgrading BigFix Platform to Version 11 - The minimum TLS supported protocol in?BigFix?V11 is TLS 1.2 - The SHA1 hashing algorithm for content and action signature will no longer be supported. SHA1 is still supported for file download in actionscript. For details, see the BigFix Platform V11 Overview Page - The unixODBC RPM package is a prerequisite for the Server components on Linux systems (see Server Requirements). This applies to installations with a DB2 database. - The msodbcsql17 RPM package is a prerequisite for the Server components on Linux systems (see Server Requirements). This applies to installations with a MSSQL database - For detailed information on the specific changes to minimum supported versions of operating systems and databases for BigFix 11, see Detailed system requirements . - Before?getting started with the upgrade process, stop any active application that is connected to the BigFix database (such as Web Reports, WebUI, BigFix Inventory, or BigFix Compliance). *Useful links * - BigFix downloads and release information - BigFix 11 Platform Documentation - Upgrade Windows considerations - Upgrade Linux considerations - Detailed system requirements A blog that discusses the benefits of BigFix 11 is available here Upgrade Fixlets are available in BES Support version 1600 (or later). Continue to discuss on the forum https://forum.bigfix.com/t/bigfix-11-0-patch-4-is-now-available/51502 ? HCL BigFix ? Platform Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 10:42:07 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 19:42:07 +0200 Subject: [BESAdmin-Announcements] BigFix Reports - Update 2 is available! Message-ID: The BigFix product team is happy to announce the second update to the BigFix Reports release that was shipped last December! As you know, *BigFix Reports* is the new initiative aimed at modernizing the reporting experience in BigFix, bringing in new design elements, improved navigation, accessibility, easier report creation and management and access to more data sources. In this update the team addressed feedback received so far, resolved product defects and improved accessibility stance for the new user interface. In addition, the *Patch Performance Playlist* is now available! A Playlist is a collection of report widgets that retrieve information from different product areas. It represents an abstraction layer on top of reports, meant to tailor user experience for the benefit of different stakeholders, and to make BigFix visibility capabilities tangible. The Patch Performance Playlist provides relevant KPIs on your patching process efficiency. It displays patch performance views by exposure and by device, with trending information. It also delivers risk scoring based on different environmental factors, that allows you to easily identify the areas where you need to focus and act quickly. In addition, this release addresses the following vulnerabilities: - CVE-2025-25977(canvg) - CVE-2025-29907(jspdf) - CVE-2025-27152(axios) - CVE-2025-27789(runtime) - CVE-2025-26791(dompurify) For more information on BigFix Reports: - BigFix Reports documentation - First Release announcement *Prerequisites*: - BigFix Reports is available for deployments running BigFix Platform version 11.0.3 or above - In order to have access to the CyberFOCUS Playlist, you must be entitled to the CyberFOCUS content through your BigFix license, and you must enable the CyberFOCUS site: http://sync.bigfix.com/cgi-bin/bfgather/cyberfocus. - Widgets specific to CISA KEV vulnerabilities are only available if you are entitled to the related content pack: http://sync.bigfix.com/cgi-bin/bfgather/kevcontent - In order to have access to the Patch Performance and CyberFOCUS Playlists and obtain meaningful information you need to have at least one Patch content site enabled. *Site name*: BigFix Reports *Site url*: https://sync.bigfix.com/cgi-bin/bfgather/bigfixreports *Site versio*n: 6 The updated content will be automatically gathered. The BigFix product team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 14 12:02:50 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 14 Apr 2025 14:02:50 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-14 Message-ID: Content in the Patches for Windows site has been modified Modified : * MAJOR [ID:505892205] 5058922: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5058922 (x64) * MAJOR [ID:505892203] 5058922: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5058922 (x64) * MAJOR [ID:505892201] 5058922: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5058922 * MAJOR [ID:505892105] 5058921: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5058921 (x64) * MAJOR [ID:505892103] 5058921: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5058921 (x64) * MAJOR [ID:505892101] 5058921: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5058921 * MAJOR [ID:505892001] 5058920: Cumulative Update Preview for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5058920 (x64) * MAJOR [ID:505891907] 5058919: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5058919 (arm64) * MAJOR [ID:505891905] 5058919: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5058919 (x64) * MAJOR [ID:505891903] 5058919: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5058919 (arm64) * MAJOR [ID:505891901] 5058919: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5058919 (x64) * MAJOR [ID:500262301] 5002623: Update for Microsoft Office 2016 - Office 2016 - KB5002623 (x64) * MAJOR [ID:500262303] 5002623: Update for Microsoft Office 2016 - Office 2016 - KB5002623 Reason for Update: * New OOB updates released from Microsoft. * New update for Office 2016 Actions to Take: None Published site version: Site Name: Patches for Windows Version: 4526 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 15 05:39:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 15 Apr 2025 08:39:23 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Perl - Debian 12 (amd64) (ID: 25041401) * Unspecified - Perl-Base - Debian 12 (amd64) (ID: 25041402) Published Site Version: * Patches for Debian 12, version 94. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 15 09:43:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 15 Apr 2025 11:43:04 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-15 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505568109] 5055681: Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1809 - Windows 10 Version 1809 - .NET Framework 3.5/4.8 - KB5055175 (x64) Reason for Update: * Size has been modified. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4527 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 16 01:13:09 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 16 Apr 2025 10:13:09 +0200 Subject: [BESAdmin-Announcements] BigFix Asset Discovery Content has been updated! Message-ID: The HCL Development team is pleased to announce updates to the BigFix Asset Discovery. This release provides the following capabilities: - BES Asset Discovery now supports Nmap scan in IPv6 protocol Defect articles addressed: - DA KB0119570 - Asset Discovery Import service fails with NotAMACAddress - DA KB0118021 - The UAImporter does not add the discovered asset - DA KB0118304 - NMAP Upgrade Fixlet Name is incorrect - DA KB0118306 - UAImporter parse date error - DA KB0118837 - NMAP ASSET Discovery Wizard update to show correct OS Actions to Take: Users of the BigFix Asset Discovery will need to upgrade the Asset Discovery Import Service, using the following Fixlets from the BES Asset Discovery site: - Fixlet 15 Upgrade Nmap Asset Discovery Import Service - Fixlet 251 Upgrade Nmap Asset Discovery Import Service - Red Hat Enterprise Linux There is no Platform version as a prerequisite. Published Site Version: BES Asset Discovery, site version 112 Additional Links: Asset Discovery User?s Guide (v11) Asset Discovery User?s Guide (v10) -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 16 06:42:49 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 16 Apr 2025 08:42:49 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-16 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011668 Google Chrome 135.0.7049.96 Available * 6082309 Mozilla Firefox 137.0.2 Available * 6082178 Mozilla Firefox (x64) 137.0.2 Available * 6101738 Mozilla Thunderbird 128.9.2 ESR Available * 6101740 Mozilla Thunderbird 137.0.2 Available * 9101563 Adobe Acrobat 2025.001.20458 Available - Adobe Acrobat - Continuous Track (x64) * 9101562 Adobe Acrobat 2025.001.20458 Available - Adobe Acrobat - Continuous Track * 8101882 Adobe Acrobat Reader 2025.001.20458 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 8101880 Adobe Acrobat Reader 2025.001.20458 Available - Adobe Acrobat Reader - Continuous Track (x64) * 8101875 Adobe Acrobat Reader 2025.001.20458 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8101873 Adobe Acrobat Reader 2025.001.20458 Available - Adobe Acrobat Reader - Continuous Track * 7057161 Java Runtime Environment 8 update 451 (32-bit) Available (JRE < 8 32-bit version Installed) (x64) - CPU * 7057159 Java Runtime Environment 8 update 451 (32-bit) Available (JRE 8 32-bit version Installed) (x64) - CPU * 7057157 Java Runtime Environment 8 update 451 (32-bit) Available (x64) - CPU - CORRUPT PATCH * 7057155 Java Runtime Environment 8 update 451 Available (x64) - CPU - CORRUPT PATCH * 7057153 Java Runtime Environment 8 update 451 Available (x64) (JRE < 8 Installed) - CPU * 7057151 Java Runtime Environment 8 update 451 Available (x64) (JRE 8 Installed) - CPU * 7051637 Java Runtime Environment 8 update 451 Available - CPU - CORRUPT PATCH * 7051635 Java Runtime Environment 8 update 451 Available (JRE < 8 Installed) - CPU * 7051633 Java Runtime Environment 8 update 451 Available (JRE 8 Installed) - CPU Modified : * 14011666 Google Chrome 135.0.7049.85 Available (Superseded) * 6082297 Mozilla Firefox 137.0 Available (Superseded) * 6082174 Mozilla Firefox (x64) 137.0 Available (Superseded) * 6082307 Mozilla Firefox 137.0.1 Available (Superseded) * 6082176 Mozilla Firefox (x64) 137.0.1 Available (Superseded) * 6101730 Mozilla Thunderbird 128.9.0 ESR Available (Superseded) * 6101736 Mozilla Thunderbird 128.9.1 ESR Available (Superseded) * 6101732 Mozilla Thunderbird 137.0 Available (Superseded) * 6101734 Mozilla Thunderbird 137.0.1 Available (Superseded) * 9101560 Adobe Acrobat 2025.001.20435 Available - Adobe Acrobat - Continuous Track (Superseded) * 9101557 Adobe Acrobat 2025.001.20435 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 8101878 Adobe Acrobat Reader 2025.001.20435 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101876 Adobe Acrobat Reader 2025.001.20435 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101871 Adobe Acrobat Reader 2025.001.20435 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101869 Adobe Acrobat Reader 2025.001.20435 Available - Adobe Acrobat Reader - Continuous Track (Superseded) * 7057149 Java Runtime Environment 8 update 441 (32-bit) Available (JRE < 8 32-bit version Installed) (x64) - CPU (Superseded) * 7057147 Java Runtime Environment 8 update 441 (32-bit) Available (JRE 8 32-bit version Installed) (x64) - CPU (Superseded) * 7057145 Java Runtime Environment 8 update 441 (32-bit) Available (x64) - CPU - CORRUPT PATCH (Superseded) * 7057143 Java Runtime Environment 8 update 441 Available (x64) - CPU - CORRUPT PATCH (Superseded) * 7057141 Java Runtime Environment 8 update 441 Available (x64) (JRE < 8 Installed) - CPU (Superseded) * 7057139 Java Runtime Environment 8 update 441 Available (x64) (JRE 8 Installed) - CPU (Superseded) * 7051631 Java Runtime Environment 8 update 441 Available - CPU - CORRUPT PATCH (Superseded) * 7051629 Java Runtime Environment 8 update 441 Available (JRE < 8 Installed) - CPU (Superseded) * 7051627 Java Runtime Environment 8 update 441 Available (JRE 8 Installed) - CPU (Superseded) Reason : * New update for Chrome, Firefox , Thunderbird , Adobe and Java. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2310 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 16 07:33:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 16 Apr 2025 09:33:19 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-16 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:305185299] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Japanese) * Major [ID:305185298] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (German) * Major [ID:305185297] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Korean) * Major [ID:305185296] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * Major [ID:305185295] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * Major [ID:305185294] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * Major [ID:305185293] Office 2019 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305185292] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Spanish) * Major [ID:305185291] Office 2019 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2019 Retail * Major [ID:305185290] Office 2024 Version 16.0.18526.20286 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * Major [ID:305185289] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305185288] Office 2016 Version 16.0.18526.20286 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 * Major [ID:305185287] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Slovak) * Major [ID:305185286] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * Major [ID:305185285] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * Major [ID:305185284] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * Major [ID:305185283] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * Major [ID:305185282] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Swedish) * Major [ID:305185281] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Czech) * Major [ID:305185280] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * Major [ID:305185279] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * Major [ID:305185278] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * Major [ID:305185277] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * Major [ID:305185276] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * Major [ID:305185275] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Danish) * Major [ID:305185274] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Italian) * Major [ID:305185273] Office 2021 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2021 Retail * Major [ID:305185272] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * Major [ID:305185271] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (French) * Major [ID:305185270] Office 2016 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305185269] Office 2024 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305185268] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * Major [ID:305185267] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Finnish) * Major [ID:305185266] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Turkish) * Major [ID:305185265] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Dutch) * Major [ID:305185264] Office 365 Version 16.0.18526.20286 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 * Major [ID:305185263] Office 2016 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2016 * Major [ID:305185262] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Hindi) * Major [ID:305185261] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Thai) * Major [ID:305185260] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Arabic) * Major [ID:305185259] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Russian) * Major [ID:305185258] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Polish) * Major [ID:305185257] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Greek) * Major [ID:305185256] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * Major [ID:305185255] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * Major [ID:305185254] Office 2024 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2024 Retail * Major [ID:305185253] Office 365 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * Major [ID:305185252] Office 2021 Version 16.0.18526.20286 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * Major [ID:305185251] Office 2019 Version 16.0.18526.20286 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail * Major [ID:305185250] Office 2021 Version 16.0.18526.20286 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) Modified: * Major [ID:500269201] MS25-APR: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002692 (x64) * Major[ID:305185199] Office 2021 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) (Superseded) * Major[ID:305185198] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Greek) (Superseded) * Major[ID:305185197] Office 2016 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2016 (Superseded) * Major[ID:305185196] Office 2019 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) (Superseded) * Major[ID:305185195] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * Major[ID:305185194] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Japanese) (Superseded) * Major[ID:305185193] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Indonesian) (Superseded) * Major[ID:305185192] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * Major[ID:305185191] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hebrew) (Superseded) * Major[ID:305185190] Office 2019 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * Major[ID:305185189] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Turkish) (Superseded) * Major[ID:305185188] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) (Superseded) * Major[ID:305185187] Office 365 Version 16.0.18526.20264 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 (Superseded) * Major[ID:305185186] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Thai) (Superseded) * Major[ID:305185185] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (German) (Superseded) * Major[ID:305185184] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Arabic) (Superseded) * Major[ID:305185183] Office 2021 Version 16.0.18526.20264 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * Major[ID:305185182] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Czech) (Superseded) * Major[ID:305185181] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Italian) (Superseded) * Major[ID:305185180] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) (Superseded) * Major[ID:305185179] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Slovenian) (Superseded) * Major[ID:305185178] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * Major[ID:305185177] Office 2021 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * Major[ID:305185176] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * Major[ID:305185175] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Russian) (Superseded) * Major[ID:305185174] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Swedish) (Superseded) * Major[ID:305185173] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Norwegian) (Superseded) * Major[ID:305185172] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Finnish) (Superseded) * Major[ID:305185171] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Spanish) (Superseded) * Major[ID:305185170] Office 2024 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * Major[ID:305185169] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Danish) (Superseded) * Major[ID:305185168] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) (Superseded) * Major[ID:305185167] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (English (United States)) (Superseded) * Major[ID:305185166] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (French) (Superseded) * Major[ID:305185165] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * Major[ID:305185164] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * Major[ID:305185163] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) (Superseded) * Major[ID:305185162] Office 2024 Version 16.0.18526.20264 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * Major[ID:305185161] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hungarian) (Superseded) * Major[ID:305185160] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Hindi) (Superseded) * Major[ID:305185159] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Polish) (Superseded) * Major[ID:305185158] Office 2024 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) (Superseded) * Major[ID:305185157] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * Major[ID:305185156] Office 2019 Version 16.0.18526.20264 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * Major[ID:305185155] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Korean) (Superseded) * Major[ID:305185154] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * Major[ID:305185153] Office 2016 Version 16.0.18526.20264 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 (Superseded) * Major[ID:305185152] Office 2016 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * Major[ID:305185151] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Slovak) (Superseded) * Major[ID:305185150] Office 365 Version 16.0.18526.20264 Available - Monthly Enterprise Channel - Office 365 (Dutch) (Superseded) Reason for Update: * New security update for Office 365 - Monthly Enterprise Channel. * Microsoft has revised KB5002692 for SharePoint Enterprise Server 2016. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4528 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 06:33:44 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 08:33:44 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-04-17 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 1 Total Fixlets in Site: 27 Release Date: 2025-04-17 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 7100701 MySQLWorkbench v8.0.42 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 06:54:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 08:54:27 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-17 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 48 Total Fixlets in Site: 449 Release Date: 2025-04-17 Updated Fixlets: 8600201 Sandboxie Plus v1.15.11 2000901 WebexNonLocalized (x64) v45.4.0.32158 37300101 Argus Monitor v7.2.3.3030 11800201 Zoom Outlook Plugin v6.4.5 67000201 Cold Turkey Blocker v4.6 67700101 Vivaldi v7.3.3635.11 7100301 MySQL Workbench v8.0.42 7100101 Oracle VM VirtualBox v7.1.8 400401 Eclipse Temurin JDK with Hotspot v17.0.15.6 5603601 Windows Defender Virus Definitions v1.427.296.0 70200101 DisplayLink Graphics v11.7.4696.0 7400101 PDF24 Creator v11.25.0 901901 AWS Command Line Interface v2 v2.26.3.0 11500201 Wireshark v4.4.6 51000101 Clink v1.7.16 59400101 Syncovery v11.3.1 11600301 XnViewMP v1.8.8.0 62200101 Duplicati v2.1.0.115 8900101 Slack v4.43.52.0 901001 Amazon Corretto 8 (x86) v1.8.0.452 900401 Amazon Corretto (x64) v17.0.15.6 900901 Amazon Corretto (x64) v21.0.7.6 7100601 Oracle Java(TM) SE Development Kit 21 v21.0.7.0 7000101 Opera Stable v118.0.5461.41 5601601 Microsoft Power BI Desktop v2.141.1754.0 8600101 Sandboxie Classic v5.70.11 2700101 Remote Desktop Manager Enterprise v2025.1.31.0 54300101 Dolt v1.51.4 5602501 Microsoft Visual Studio Code x64 v1.99.3 5604301 Microsoft Azure Storage Explorer v1.38.0 6300101 Nextcloud v3.16.3.20250416 74100101 Rocket.Chat v4.3.3 - Windows (x64) 900301 Amazon Corretto (x64) v11.0.27.6 5602901 Microsoft Power BI Desktop v2.141.1754.0 5801301 Firefox Developer Edition (x64 en-US) v138.0 73000101 Egnyte v3.24.1.159 8700101 Beyond Compare v5.0.7 7500101 PeaZip v10.4.0 19600101 VSCodium (x64) v1.99.32562 22400101 Koodo Reader v1.9.3 29600101 Vim v9.1.1313 3600101 GlassWire v3.5.821 67600101 ScreenConnect v25.2.4.9229 67700201 Vivaldi v7.3.3635.11 74100201 Rocket.Chat v4.3.3 - Windows (x86) 900201 Amazon Corretto JRE 8 (x64) v1.8.0.452 901101 Amazon Corretto JRE 8 (x86) v1.8.0.452 900101 Amazon Corretto 8 (x64) v1.8.0.452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 07:46:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 09:46:13 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-17 Message-ID: Total New Fixlets: 14 Total Updated Fixlets: 266 Total Fixlets in Site: 2967 Total CVEs Covered: 854 Release Date: 2025-04-17 New Fixlets: 37440 HTTP/2 Rapid Reset Attack Vulnerability - Oracle Linux 37410 HTTP/2 Rapid Reset Attack Vulnerability - RHEL 37380 VMware ESXi OpenSLP Use-After-Free Vulnerability - VMware ESXi 6.7 37320 Gladinet CentreStack Use of Hard-coded Cryptographic Key Vulnerability - Any Version of Windows 37290 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - Any Version of Windows 37450 VMware ESXi Authentication Bypass Vulnerability - VMware ESXi 8.0 37420 VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability - RHEL 37390 VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability - VMware ESXi 6.5 37360 VMware ESXi OpenSLP Use-After-Free Vulnerability - VMware ESXi 7.0 37300 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - Any Version of Windows 37430 VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability - VMware ESXi 6.0 37400 VMware ESXi OpenSLP Use-After-Free Vulnerability - VMware ESXi 6.5 37370 VMware ESXi and Horizon DaaS OpenSLP Heap-Based Buffer Overflow Vulnerability - VMware ESXi 6.7 37340 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - Any Version of MacOS Updated Fixlets: 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 19460 Oracle VirtualBox Insufficient Input Validation Vulnerability - Any Version of MacOS 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 36370 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2016 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 30240 Linux Kernel Use-After-Free Vulnerability - RHEL 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 36430 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2019 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 10360 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2012 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 36480 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 10 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 5770 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 2700 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 7 SP1 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 37010 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 37030 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 36540 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 SP2 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 37060 HTTP/2 Rapid Reset Attack Vulnerability - Ubuntu 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 7900 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36600 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2022 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 15640 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of Windows 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 36640 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 R2 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 6970 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 37210 HTTP/2 Rapid Reset Attack Vulnerability - leap 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 9070 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2012 R2 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 11650 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 29690 Elasticsearch Remote Code Execution Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 4500 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2008 SP2 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17320 Oracle VirtualBox Insufficient Input Validation Vulnerability - Any Version of Linux 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 1470 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 8.1 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16360 Trihedral VTScada (formerly VTS) Denial-of-Service Vulnerability - Any Version of Windows 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 29680 Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 08:08:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 10:08:27 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-17 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 116 Update for Azure Connected Machine Agent Version 1.51 - Windows (x64) * 5058312 Zoom 6.4.5.64357 Available * 5058269 Zoom (x64) 6.4.5.64357 Available Modified: * 114 Update for Azure Connected Machine Agent Version 1.50 - Windows (x64) (Superseded) * 5058268 Zoom 6.4.3.63669 Available (Superseded) * 5058219 Zoom (x64) 6.4.3.63669 Available (Superseded) Reason : * New update for Azure Connected Machine Agent and Zoom. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2311 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 11:30:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 14:30:52 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-18 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Zoom 6.4.5 (53616) Available - Mac OS X (ID: 51000122) Adobe Acrobat DC 25.001.20458 (Continuous Track) Available - Mac OS X (ID: 10152196) Adobe Acrobat Reader DC 25.001.20458 (Continuous Track) Available - Mac OS X (ID: 10152197) Google Chrome 135.0.7049.96 Available - Mac OS X (ID: 83000201) Firefox 137.0.2 Available - Mac OS X (ID: 20750260) Microsoft Office for Mac 2019 - PowerPoint 16.96.0 Available (ID: 19000500) Microsoft Office for Mac 2019 - OneNote 16.96.0 Available (ID: 19000501) Microsoft Office for Mac 2019 - Outlook 16.96.0 Available (ID: 19000502) Microsoft Office for Mac 2019 - Excel 16.96.0 Available (ID: 19000503) Microsoft Office for Mac 2019 - Word 16.96.0 Available (ID: 19000504) Published site version: Updates for Mac Applications, version 746. Reasons for Update: A newer version of MS Office, Zoom, Adobe continuous, Chrome and Firefox for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 11:30:54 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 14:30:54 -0400 Subject: [BESAdmin-Announcements] Content Modification: Patches for Mac OS X published 2025-04-18 Message-ID: Content in Patches for Mac OS X has been modified. New Fixlets: UPDATE macOS Sequoia 15.4.1 Available via Nudge (ID:15100007) UPDATE macOS Sequoia 15.4.1 Available for Apple Silicon (ARM64) (ID:15000014) UPDATE macOS Sequoia 15.4.1 Available (ID:15000013) UPDATE Java Runtime Environment 8 update 451 Available (ID:74131189) Published site version: Updates for Mac OS X, version 606. Reasons for Update: A newer version of Sequoia and JRE for MAC has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 17 12:22:22 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 17 Apr 2025 14:22:22 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-17 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505908703] 5059087: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5059087 (x64) * Major [ID:505908701] 5059087: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5059087 (arm64) * Major [ID:505909101] 5059091: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5059091 * Major [ID:505909105] 5059091: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5059091 (x64) * Major [ID:505909103] 5059091: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5059091 (x64) * Major [ID:505909201] 5059092: Cumulative Update Preview for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5059092 (x64) Modified: * Major [ID:500262303] 5002623: Update for Microsoft Office 2016 - Office 2016 - KB5002623 * Major [ID:500262301] 5002623: Update for Microsoft Office 2016 - Office 2016 - KB5002623 (x64) Reason for Update: * New OOB updates for Windows 10 Version 1809 from Microsoft. * New cumulative preview updates from Microsoft. * New updates for * New Updates for Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4529 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:42:28 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:42:28 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALASECS-2025-053 - Containerd Security update - Amazon linux 2 x86_64 (ID: 250531) * ALASECS-2025-054 - Docker Security update - Amazon linux 2 x86_64 (ID: 250541) * ALAS2-2025-2818 - Git Security update - Amazon linux 2 x86_64 (ID: 2528181) * ALAS2-2025-2819 - Apache-Commons-Vfs Security update - Amazon linux 2 x86_64 (ID: 2528191) * ALAS2-2025-2820 - Ghostscript Security update - Amazon linux 2 x86_64 (ID: 2528201) * ALAS2-2025-2821 - Nerdctl Security update - Amazon linux 2 x86_64 (ID: 2528211) * ALAS2-2025-2822 - Pcs Security update - Amazon linux 2 x86_64 (ID: 2528221) * ALAS2-2025-2824 - Edk2 Security update - Amazon linux 2 x86_64 (ID: 2528241) * ALAS2-2025-2825 - Golang Security update - Amazon linux 2 x86_64 (ID: 2528251) * ALAS2-2025-2826 - Kernel Security update - Amazon linux 2 x86_64 (ID: 2528261) * ALAS2-2025-2827 - Vim Security update - Amazon linux 2 x86_64 (ID: 2528271) * ALAS2-2025-2828 - Glibc Security update - Amazon linux 2 x86_64 (ID: 2528281) * ALAS2-2025-2829 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 2528291) * ALAS2-2025-2830 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2528301) * ALAS2-2025-2831 - Libxslt Security update - Amazon linux 2 x86_64 (ID: 2528311) * ALAS2-2025-2832 - Php Security update - Amazon linux 2 x86_64 (ID: 2528321) * ALAS2-2025-2833 - Evolution Security update - Amazon linux 2 x86_64 (ID: 2528331) Published Site Version: * Patches for Amazon Linux 2, version 178. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:45:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:45:19 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALASECS-2025-053 - Containerd Security update - Amazon linux 2 aarch64 (ID: 250531) * ALASECS-2025-054 - Docker Security update - Amazon linux 2 aarch64 (ID: 250541) * ALAS2-2025-2818 - Git Security update - Amazon linux 2 aarch64 (ID: 2528181) * ALAS2-2025-2819 - Apache-Commons-Vfs Security update - Amazon linux 2 aarch64 (ID: 2528191) * ALAS2-2025-2820 - Ghostscript Security update - Amazon linux 2 aarch64 (ID: 2528201) * ALAS2-2025-2821 - Nerdctl Security update - Amazon linux 2 aarch64 (ID: 2528211) * ALAS2-2025-2822 - Pcs Security update - Amazon linux 2 aarch64 (ID: 2528221) * ALAS2-2025-2824 - Edk2 Security update - Amazon linux 2 aarch64 (ID: 2528241) * ALAS2-2025-2825 - Golang Security update - Amazon linux 2 aarch64 (ID: 2528251) * ALAS2-2025-2826 - Kernel Security update - Amazon linux 2 aarch64 (ID: 2528261) * ALAS2-2025-2827 - Vim Security update - Amazon linux 2 aarch64 (ID: 2528271) * ALAS2-2025-2828 - Glibc Security update - Amazon linux 2 aarch64 (ID: 2528281) * ALAS2-2025-2829 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 2528291) * ALAS2-2025-2830 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2528301) * ALAS2-2025-2831 - Libxslt Security update - Amazon linux 2 aarch64 (ID: 2528311) * ALAS2-2025-2832 - Php Security update - Amazon linux 2 aarch64 (ID: 2528321) * ALAS2-2025-2833 - Evolution Security update - Amazon linux 2 aarch64 (ID: 2528331) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 106. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:46:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:46:55 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2025-925 - Freetype Security update - Amazon linux 2023 x86_64 (ID: 320259251) * ALAS2023-2025-926 - Ecs-Service-Connect-Agent Security update - Amazon linux 2023 x86_64 (ID: 320259261) * ALAS2023-2025-927 - Ghostscript Security update - Amazon linux 2023 x86_64 (ID: 320259271) * ALAS2023-2025-928 - Ruby3.2 Security update - Amazon linux 2023 x86_64 (ID: 320259281) * ALAS2023-2025-929 - Ruby3.2 Security update - Amazon linux 2023 x86_64 (ID: 320259291) * ALAS2023-2025-930 - Containerd Security update - Amazon linux 2023 x86_64 (ID: 320259301) * ALAS2023-2025-931 - Nerdctl Security update - Amazon linux 2023 x86_64 (ID: 320259311) * ALAS2023-2025-932 - Vim Security update - Amazon linux 2023 x86_64 (ID: 320259321) * ALAS2023-2025-933 - Golang Security update - Amazon linux 2023 x86_64 (ID: 320259331) * ALAS2023-2025-934 - Docker Security update - Amazon linux 2023 x86_64 (ID: 320259341) * ALAS2023-2025-935 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 320259351) * ALAS2023-2025-936 - Php8.2 Security update - Amazon linux 2023 x86_64 (ID: 320259361) * ALAS2023-2025-937 - Grub2 Security update - Amazon linux 2023 x86_64 (ID: 320259371) * ALAS2023-2025-938 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 320259381) * ALAS2023-2025-939 - Xorg-X11-Server Security update - Amazon linux 2023 x86_64 (ID: 320259391) Published Site Version: * Patches for Amazon Linux 2023, version 54. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:48:32 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:48:32 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2025-925 - Freetype Security update - Amazon linux 2023 aarch64 (ID: 320259251) * ALAS2023-2025-926 - Ecs-Service-Connect-Agent Security update - Amazon linux 2023 aarch64 (ID: 320259261) * ALAS2023-2025-927 - Ghostscript Security update - Amazon linux 2023 aarch64 (ID: 320259271) * ALAS2023-2025-928 - Ruby3.2 Security update - Amazon linux 2023 aarch64 (ID: 320259281) * ALAS2023-2025-929 - Ruby3.2 Security update - Amazon linux 2023 aarch64 (ID: 320259291) * ALAS2023-2025-930 - Containerd Security update - Amazon linux 2023 aarch64 (ID: 320259301) * ALAS2023-2025-931 - Nerdctl Security update - Amazon linux 2023 aarch64 (ID: 320259311) * ALAS2023-2025-932 - Vim Security update - Amazon linux 2023 aarch64 (ID: 320259321) * ALAS2023-2025-933 - Golang Security update - Amazon linux 2023 aarch64 (ID: 320259331) * ALAS2023-2025-934 - Docker Security update - Amazon linux 2023 aarch64 (ID: 320259341) * ALAS2023-2025-935 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 320259351) * ALAS2023-2025-936 - Php8.2 Security update - Amazon linux 2023 aarch64 (ID: 320259361) * ALAS2023-2025-937 - Grub2 Security update - Amazon linux 2023 aarch64 (ID: 320259371) * ALAS2023-2025-938 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 320259381) * ALAS2023-2025-939 - Xorg-X11-Server Security update - Amazon linux 2023 aarch64 (ID: 320259391) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 34. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:54:14 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:54:14 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * 2504101 - Package Rocky-Release-8.10-1.10.El8.Noarch.Rpm is Available - RockyLinux 8 noarch (ID: 25041011) Published Site Version: * Patches for Rocky Linux 8, version 65. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 05:58:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:58:04 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2024:10590 - Python-Tornado Security Update - RockyLinux 9 x86_64 (ID: 24105901) * RLBA-2024:9127 - Cockpit-Machines Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24912701) * RLBA-2024:9154 - Systemtap Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24915401) * RLBA-2024:9168 - Aide Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24916801) * RLBA-2024:9214 - Python-Rpm-Macros Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24921401) * RLEA-2024:9259 - Rust-Coreos-Installer Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24925901) * RLBA-2024:9263 - Gcc-Toolset-14-Binutils Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24926301) * 2504101 - Package Rocky-Release-9.5-1.3.El9.Noarch.Rpm is Available - RockyLinux 9 noarch (ID: 25041011) Published Site Version: * Patches for Rocky Linux 9, version 47. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 18 06:38:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 18 Apr 2025 08:38:16 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-18 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058271 Microsoft Edge Stable Build 135.0.3179.85 Available * 5058273 Microsoft Edge Stable Build 135.0.3179.85 Available (x64) * 5058314 Microsoft Edge Extended Stable Build 134.0.3124.129 Available * 5058316 Microsoft Edge Extended Stable Build 134.0.3124.129 Available (x64) Modified : * 5058223 Microsoft Edge Stable Build 135.0.3179.54 Available (Superseded) * 5058227 Microsoft Edge Stable Build 135.0.3179.54 Available (x64) (Superseded) * 5058237 Microsoft Edge Stable Build 135.0.3179.73 Available (Superseded) * 5058239 Microsoft Edge Stable Build 135.0.3179.73 Available (x64) (Superseded) * 5058306 Microsoft Edge Extended Stable Build 134.0.3124.93 Available (Superseded) * 5058308 Microsoft Edge Extended Stable Build 134.0.3124.93 Available (x64) (Superseded) * 5058302 Microsoft Edge Extended Stable Build 134.0.3124.119 Available (Superseded) * 5058304 Microsoft Edge Extended Stable Build 134.0.3124.119 Available (x64) (Superseded) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2312 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:10:09 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:10:09 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 11 Message-ID: New content have been added to the Patches for Debian 11 site. New Fixlets: * Unspecified - Adduser - Debian 11 (amd64) (ID: 25041901) * Unspecified - Apt-Listchanges - Debian 11 (amd64) (ID: 25041902) * Unspecified - Python3-Pyassimp - Debian 11 (amd64) (ID: 25041903) * Unspecified - Bash-Completion - Debian 11 (amd64) (ID: 25041904) * Unspecified - Python-Behave-Doc - Debian 11 (amd64) (ID: 25041905) * Unspecified - Ca-Certificates - Debian 11 (amd64) (ID: 25041906) * Unspecified - Cmake-Extras - Debian 11 (amd64) (ID: 25041907) * Unspecified - Python3-Commando - Debian 11 (amd64) (ID: 25041908) * Unspecified - Debconf - Debian 11 (amd64) (ID: 25041909) * Unspecified - Debconf-I18n - Debian 11 (amd64) (ID: 25041910) * Unspecified - Debian-Archive-Keyring - Debian 11 (amd64) (ID: 25041911) * Unspecified - Debian-Faq - Debian 11 (amd64) (ID: 25041912) * Unspecified - Dhcpig - Debian 11 (amd64) (ID: 25041913) * Unspecified - Doc-Debian - Debian 11 (amd64) (ID: 25041914) * Unspecified - Freedom-Maker - Debian 11 (amd64) (ID: 25041915) * Unspecified - Libc-L10n - Debian 11 (amd64) (ID: 25041918) * Unspecified - Locales - Debian 11 (amd64) (ID: 25041921) * Unspecified - Golang-Blitiri-Go-Log-Dev - Debian 11 (amd64) (ID: 25041922) * Unspecified - Golang-Blitiri-Go-Spf-Dev - Debian 11 (amd64) (ID: 25041923) * Unspecified - Golang-Blitiri-Go-Systemd-Dev - Debian 11 (amd64) (ID: 25041924) * Unspecified - Golang-Github-Eclipse-Paho.mqtt.golang-Dev - Debian 11 (amd64) (ID: 25041925) * Unspecified - Golang-Github-Aliyun-Aliyun-Oss-Go-Sdk-Dev - Debian 11 (amd64) (ID: 25041926) * Unspecified - Golang-Github-Approvals-Go-Approval-Tests-Dev - Debian 11 (amd64) (ID: 25041927) * Unspecified - Golang-Github-Bgentry-Go-Netrc-Dev - Debian 11 (amd64) (ID: 25041928) * Unspecified - Golang-Github-Biogo-Hts-Dev - Debian 11 (amd64) (ID: 25041929) * Unspecified - Golang-Github-Bsm-Pool-Dev - Debian 11 (amd64) (ID: 25041930) * Unspecified - Golang-Github-Cespare-Xxhash-Dev - Debian 11 (amd64) (ID: 25041931) * Unspecified - Golang-Github-Cheekybits-Is-Dev - Debian 11 (amd64) (ID: 25041932) * Unspecified - Golang-Github-Chzyer-Readline-Dev - Debian 11 (amd64) (ID: 25041933) * Unspecified - Golang-Github-Dcso-Bloom-Dev - Debian 11 (amd64) (ID: 25041934) * Unspecified - Golang-Github-Denverdino-Aliyungo-Dev - Debian 11 (amd64) (ID: 25041935) * Unspecified - Golang-Github-Erikstmartin-Go-Testdb-Dev - Debian 11 (amd64) (ID: 25041936) * Unspecified - Golang-Github-Gin-Contrib-Sse-Dev - Debian 11 (amd64) (ID: 25041937) * Unspecified - Golang-Github-Gin-Gonic-Gin-Dev - Debian 11 (amd64) (ID: 25041938) * Unspecified - Golang-Github-Gophercloud-Gophercloud-Dev - Debian 11 (amd64) (ID: 25041939) * Unspecified - Golang-Github-Gorilla-Rpc - Debian 11 (amd64) (ID: 25041940) * Unspecified - Golang-Github-Hashicorp-Go-Rootcerts-Dev - Debian 11 (amd64) (ID: 25041941) * Unspecified - Golang-Github-Jasonish-Go-Idsrules-Dev - Debian 11 (amd64) (ID: 25041942) * Unspecified - Golang-Github-Jdkato-Syllables-Dev - Debian 11 (amd64) (ID: 25041943) * Unspecified - Golang-Github-Jlaffaye-Ftp-Dev - Debian 11 (amd64) (ID: 25041944) * Unspecified - Golang-Github-Kurin-Blazer-Dev - Debian 11 (amd64) (ID: 25041945) * Unspecified - Golang-Github-Manyminds-Api2go-Dev - Debian 11 (amd64) (ID: 25041946) * Unspecified - Golang-Github-Markbates-Inflect-Dev - Debian 11 (amd64) (ID: 25041947) * Unspecified - Golang-Github-Matryer-Try-Dev - Debian 11 (amd64) (ID: 25041948) * Unspecified - Golang-Github-Mgutz-Ansi-Dev - Debian 11 (amd64) (ID: 25041949) * Unspecified - Golang-Github-Minio-Dsync-Dev - Debian 11 (amd64) (ID: 25041950) * Unspecified - Golang-Github-Montanaflynn-Stats-Dev - Debian 11 (amd64) (ID: 25041951) * Unspecified - Golang-Github-Olekukonko-Ts-Dev - Debian 11 (amd64) (ID: 25041952) * Unspecified - Golang-Github-Oneofone-Xxhash-Dev - Debian 11 (amd64) (ID: 25041953) * Unspecified - Golang-Github-Opencontainers-Selinux-Dev - Debian 11 (amd64) (ID: 25041954) * Unspecified - Golang-Github-Opentracing-Contrib-Go-Stdlib-Dev - Debian 11 (amd64) (ID: 25041955) * Unspecified - Golang-Github-Opentracing-Opentracing-Go-Dev - Debian 11 (amd64) (ID: 25041956) * Unspecified - Golang-Github-Rifflock-Lfshook-Dev - Debian 11 (amd64) (ID: 25041957) * Unspecified - Golang-Github-Rubyist-Tracerx-Dev - Debian 11 (amd64) (ID: 25041958) * Unspecified - Golang-Github-Shogo82148-Go-Shuffle-Dev - Debian 11 (amd64) (ID: 25041959) * Unspecified - Golang-Github-Ssor-Bom-Dev - Debian 11 (amd64) (ID: 25041960) * Unspecified - Golang-Github-Tdewolff-Minify-Dev - Debian 11 (amd64) (ID: 25041961) * Unspecified - Golang-Github-Tdewolff-Parse-Dev - Debian 11 (amd64) (ID: 25041962) * Unspecified - Golang-Github-Tdewolff-Test-Dev - Debian 11 (amd64) (ID: 25041963) * Unspecified - Golang-Github-Thomsonreuterseikon-Go-Ntlm-Dev - Debian 11 (amd64) (ID: 25041964) * Unspecified - Golang-Github-Valyala-Bytebufferpool-Dev - Debian 11 (amd64) (ID: 25041965) * Unspecified - Golang-Github-Xanzy-Ssh-Agent-Dev - Debian 11 (amd64) (ID: 25041966) * Unspecified - Golang-Github-Yuin-Gopher-Lua-Dev - Debian 11 (amd64) (ID: 25041967) * Unspecified - Golang-Go.uber-Atomic-Dev - Debian 11 (amd64) (ID: 25041968) * Unspecified - Golang-Go.uber-Multierr-Dev - Debian 11 (amd64) (ID: 25041969) * Unspecified - Golang-Golang-X-Image-Dev - Debian 11 (amd64) (ID: 25041970) * Unspecified - Golang-Gopkg-Go-Playground-Assert.v1-Dev - Debian 11 (amd64) (ID: 25041971) * Unspecified - Golang-Gopkg-Go-Playground-Validator.v8-Dev - Debian 11 (amd64) (ID: 25041972) * Unspecified - Golang-Gopkg-Neurosnap-Sentences.v1-Dev - Debian 11 (amd64) (ID: 25041973) * Unspecified - Golang-Pault-Go-Gecos-Dev - Debian 11 (amd64) (ID: 25041974) * Unspecified - Golang-Pault-Go-Macchanger-Dev - Debian 11 (amd64) (ID: 25041975) * Unspecified - Golang-Pault-Go-Technicolor-Dev - Debian 11 (amd64) (ID: 25041976) * Unspecified - Golang-Pault-Go-Ykpiv-Dev - Debian 11 (amd64) (ID: 25041977) * Unspecified - Golang-Github-Aviau-Gopass-Dev - Debian 11 (amd64) (ID: 25041978) * Unspecified - Libghc-Alsa-Core-Doc - Debian 11 (amd64) (ID: 25041979) * Unspecified - Libghc-Alsa-Mixer-Doc - Debian 11 (amd64) (ID: 25041980) * Unspecified - Libghc-Attoparsec-Iso8601-Doc - Debian 11 (amd64) (ID: 25041981) * Unspecified - Libghc-Base-Prelude-Doc - Debian 11 (amd64) (ID: 25041982) * Unspecified - Libghc-Cabal-Doctest-Doc - Debian 11 (amd64) (ID: 25041983) * Unspecified - Libghc-Cereal-Vector-Doc - Debian 11 (amd64) (ID: 25041984) * Unspecified - Libghc-Config-Schema-Doc - Debian 11 (amd64) (ID: 25041985) * Unspecified - Libghc-Cryptohash-Md5-Doc - Debian 11 (amd64) (ID: 25041986) * Unspecified - Libghc-Cryptohash-Sha1-Doc - Debian 11 (amd64) (ID: 25041987) * Unspecified - Libghc-Cryptohash-Sha256-Doc - Debian 11 (amd64) (ID: 25041988) * Unspecified - Libghc-Diagrams-Dev - Debian 11 (amd64) (ID: 25041989) * Unspecified - Libghc-Diagrams-Doc - Debian 11 (amd64) (ID: 25041990) * Unspecified - Libghc-Diagrams-Prof - Debian 11 (amd64) (ID: 25041991) * Unspecified - Libghc-Doctemplates-Doc - Debian 11 (amd64) (ID: 25041992) * Unspecified - Libghc-Floatinghex-Doc - Debian 11 (amd64) (ID: 25041993) * Unspecified - Libghc-Hashable-Time-Doc - Debian 11 (amd64) (ID: 25041994) * Unspecified - Haskell-Hosc-Utils - Debian 11 (amd64) (ID: 25041995) * Unspecified - Libghc-Hosc-Doc - Debian 11 (amd64) (ID: 25041996) * Unspecified - Libghc-Integer-Logarithms-Doc - Debian 11 (amd64) (ID: 25041997) * Unspecified - Libghc-Lazy-Csv-Doc - Debian 11 (amd64) (ID: 25041998) * Unspecified - Libghc-Libmpd-Doc - Debian 11 (amd64) (ID: 25041999) * Unspecified - Libghc-Multiset-Comb-Doc - Debian 11 (amd64) (ID: 25042000) * Unspecified - Libghc-Murmur-Hash-Doc - Debian 11 (amd64) (ID: 25042001) * Unspecified - Libghc-Natural-Transformation-Doc - Debian 11 (amd64) (ID: 25042002) * Unspecified - Libghc-Neat-Interpolation-Doc - Debian 11 (amd64) (ID: 25042003) * Unspecified - Libghc-Quickcheck-Text-Doc - Debian 11 (amd64) (ID: 25042004) * Unspecified - Libghc-Skylighting-Doc - Debian 11 (amd64) (ID: 25042005) * Unspecified - Libghc-Src-Exts-Simple-Doc - Debian 11 (amd64) (ID: 25042006) * Unspecified - Libghc-Store-Core-Doc - Debian 11 (amd64) (ID: 25042007) * Unspecified - Libghc-Tagshare-Doc - Debian 11 (amd64) (ID: 25042008) * Unspecified - Libghc-Th-Abstraction-Doc - Debian 11 (amd64) (ID: 25042009) * Unspecified - Libghc-Th-Utilities-Doc - Debian 11 (amd64) (ID: 25042010) * Unspecified - Libghc-Tidal-Doc - Debian 11 (amd64) (ID: 25042011) * Unspecified - Libghc-Tls-Session-Manager-Doc - Debian 11 (amd64) (ID: 25042012) * Unspecified - Libghc-Uri-Bytestring-Doc - Debian 11 (amd64) (ID: 25042013) * Unspecified - Libghc-Wai-Http2-Extra-Doc - Debian 11 (amd64) (ID: 25042014) * Unspecified - Libghc-Weigh-Doc - Debian 11 (amd64) (ID: 25042015) * Unspecified - Libghc-Xmlgen-Doc - Debian 11 (amd64) (ID: 25042016) * Unspecified - Init-System-Helpers - Debian 11 (amd64) (ID: 25042017) * Unspecified - Krb5-Locales - Debian 11 (amd64) (ID: 25042019) * Unspecified - Libpixelif-Common - Debian 11 (amd64) (ID: 25042020) * Unspecified - Librt-Extension-Commandbymail-Perl - Debian 11 (amd64) (ID: 25042021) * Unspecified - Libsixel-Examples - Debian 11 (amd64) (ID: 25042022) * Unspecified - Manpages - Debian 11 (amd64) (ID: 25042023) * Unspecified - Media-Types - Debian 11 (amd64) (ID: 25042024) * Unspecified - Mime-Support - Debian 11 (amd64) (ID: 25042025) * Unspecified - Ncurses-Base - Debian 11 (amd64) (ID: 25042026) * Unspecified - Ncurses-Term - Debian 11 (amd64) (ID: 25042027) * Unspecified - Netbase - Debian 11 (amd64) (ID: 25042028) * Unspecified - Libppx-Visitors-Ocaml-Doc - Debian 11 (amd64) (ID: 25042029) * Unspecified - Libpam-Runtime - Debian 11 (amd64) (ID: 25042030) * Unspecified - Perl-Modules-5.32 - Debian 11 (amd64) (ID: 25042032) * Unspecified - Python3-Fswrap - Debian 11 (amd64) (ID: 25042033) * Unspecified - Qt5-Doc - Debian 11 (amd64) (ID: 25042034) * Unspecified - Qt5-Doc-Html - Debian 11 (amd64) (ID: 25042035) * Unspecified - Readline-Common - Debian 11 (amd64) (ID: 25042036) * Unspecified - Python3-Reportbug - Debian 11 (amd64) (ID: 25042037) * Unspecified - Reportbug - Debian 11 (amd64) (ID: 25042038) * Unspecified - Rss-Bridge - Debian 11 (amd64) (ID: 25042039) * Unspecified - Ruby-Webkit2-Gtk - Debian 11 (amd64) (ID: 25042040) * Unspecified - Wamerican - Debian 11 (amd64) (ID: 25042041) * Unspecified - Sensible-Utils - Debian 11 (amd64) (ID: 25042042) * Unspecified - Elpa-Ag - Debian 11 (amd64) (ID: 25042043) * Unspecified - Standardskriver - Debian 11 (amd64) (ID: 25042044) * Unspecified - Surf-Display - Debian 11 (amd64) (ID: 25042045) * Unspecified - Libsvgpp-Dev - Debian 11 (amd64) (ID: 25042046) * Unspecified - Tasksel-Data - Debian 11 (amd64) (ID: 25042047) * Unspecified - Python-Txtorcon-Doc - Debian 11 (amd64) (ID: 25042048) * Unspecified - Python3-Txtorcon - Debian 11 (amd64) (ID: 25042049) * Unspecified - Tzdata - Debian 11 (amd64) (ID: 25042052) * Unspecified - Ucf - Debian 11 (amd64) (ID: 25042054) * Unspecified - Vim-Common - Debian 11 (amd64) (ID: 25042056) * Unspecified - Vim-Bitbake - Debian 11 (amd64) (ID: 25042057) * Unspecified - Winff - Debian 11 (amd64) (ID: 25042058) * Unspecified - Winff-Doc - Debian 11 (amd64) (ID: 25042059) * Unspecified - Libxorg-Gtest-Data - Debian 11 (amd64) (ID: 25042060) * Unspecified - Libxorg-Gtest-Dev - Debian 11 (amd64) (ID: 25042061) * Unspecified - Libxorg-Gtest-Doc - Debian 11 (amd64) (ID: 25042062) * Unspecified - Maple-Latex - Debian 11 (amd64) (ID: 25042063) * Unspecified - R8168-Dkms - Debian 11 (amd64) (ID: 25042064) * Unspecified - Login - Debian 11 (amd64) (ID: 25042065) * Unspecified - Passwd - Debian 11 (amd64) (ID: 25042066) * DSA-5594-1 - Linux Security Update - Debian 11 (amd64) (ID: 55940101) * DSA-5596-1 - Asterisk Security Update - Debian 11 (amd64) (ID: 55960101) * DSA-5599-1 - Phpseclib Security Update - Debian 11 (amd64) (ID: 55990101) * DSA-5600-1 - Php-Phpseclib Security Update - Debian 11 (amd64) (ID: 56000101) * DSA-5602-1 - Chromium Security Update - Debian 11 (amd64) (ID: 56020101) * DSA-5608-1 - Gst-Plugins-Bad1.0 Security Update - Debian 11 (amd64) (ID: 56080101) * DSA-5614-1 - Zbar Security Update - Debian 11 (amd64) (ID: 56140101) * DSA-5615-1 - Runc Security Update - Debian 11 (amd64) (ID: 56150101) * DSA-5616-1 - Ruby-Sanitize Security Update - Debian 11 (amd64) (ID: 56160101) * DSA-5619-1 - Libgit2 Security Update - Debian 11 (amd64) (ID: 56190101) * DSA-5620-1 - Unbound Security Update - Debian 11 (amd64) (ID: 56200101) * DSA-5624-1 - Edk2 Security Update - Debian 11 (amd64) (ID: 56240101) * DSA-5625-1 - Engrampa Security Update - Debian 11 (amd64) (ID: 56250101) * DSA-5628-1 - Imagemagick Security Update - Debian 11 (amd64) (ID: 56280101) * DSA-5631-1 - Iwd Security Update - Debian 11 (amd64) (ID: 56310101) * DSA-5635-1 - Yard Security Update - Debian 11 (amd64) (ID: 56350101) * DSA-5637-1 - Squid Security Update - Debian 11 (amd64) (ID: 56370101) * DSA-5638-1 - Libuv1 Security Update - Debian 11 (amd64) (ID: 56380101) * DSA-5640-1 - Openvswitch Security Update - Debian 11 (amd64) (ID: 56400101) * DSA-5641-1 - Fontforge Security Update - Debian 11 (amd64) (ID: 56410101) * DSA-5646-1 - Cacti Security Update - Debian 11 (amd64) (ID: 56460101) * DSA-5647-1 - Samba Security Update - Debian 11 (amd64) (ID: 56470101) * DSA-5650-1 - Util-Linux Security Update - Debian 11 (amd64) (ID: 56500101) * DSA-5651-1 - Mediawiki Security Update - Debian 11 (amd64) (ID: 56510101) * DSA-5652-1 - Py7zr Security Update - Debian 11 (amd64) (ID: 56520101) * DSA-5653-1 - Gtkwave Security Update - Debian 11 (amd64) (ID: 56530101) * DSA-5657-1 - Xorg-Server Security Update - Debian 11 (amd64) (ID: 56570101) * DSA-5659-1 - Trafficserver Security Update - Debian 11 (amd64) (ID: 56590101) * DSA-5660-1 - Php7.4 Security Update - Debian 11 (amd64) (ID: 56600101) * DSA-5664-1 - Jetty9 Security Update - Debian 11 (amd64) (ID: 56640101) * DSA-5666-1 - Flatpak Security Update - Debian 11 (amd64) (ID: 56660101) * DSA-5667-1 - Tomcat9 Security Update - Debian 11 (amd64) (ID: 56670101) * DSA-5669-1 - Guix Security Update - Debian 11 (amd64) (ID: 56690101) * DSA-5678-1 - Glibc Security Update - Debian 11 (amd64) (ID: 56780101) * DSA-5679-1 - Less Security Update - Debian 11 (amd64) (ID: 56790101) * DSA-5682-2 - Glib2.0 Regression Update - Debian 11 (amd64) (ID: 56820201) * DSA-5685-1 - Wordpress Security Update - Debian 11 (amd64) (ID: 56850101) * DSA-5686-1 - Dav1d Security Update - Debian 11 (amd64) (ID: 56860101) * DSA-5688-1 - Atril Security Update - Debian 11 (amd64) (ID: 56880101) * DSA-5692-1 - Ghostscript Security Update - Debian 11 (amd64) (ID: 56920101) * DSA-5695-1 - Webkit2gtk Security Update - Debian 11 (amd64) (ID: 56950101) * DSA-5698-1 - Ruby-Rack Security Update - Debian 11 (amd64) (ID: 56980101) * DSA-5700-1 - Python-Pymysql Security Update - Debian 11 (amd64) (ID: 57000101) * DSA-5702-1 - Gst-Plugins-Base1.0 Security Update - Debian 11 (amd64) (ID: 57020101) * DSA-5704-1 - Pillow Security Update - Debian 11 (amd64) (ID: 57040101) * DSA-5707-1 - Vlc Security Update - Debian 11 (amd64) (ID: 57070101) * DSA-5713-1 - Libndp Security Update - Debian 11 (amd64) (ID: 57130101) * DSA-5715-2 - Composer Regression Update - Debian 11 (amd64) (ID: 57150201) * DSA-5718-1 - Org-Mode Security Update - Debian 11 (amd64) (ID: 57180101) * DSA-5719-1 - Emacs Security Update - Debian 11 (amd64) (ID: 57190101) * DSA-5721-1 - Ffmpeg Security Update - Debian 11 (amd64) (ID: 57210101) * DSA-5722-1 - Libvpx Security Update - Debian 11 (amd64) (ID: 57220101) * DSA-5723-1 - Plasma-Workspace Security Update - Debian 11 (amd64) (ID: 57230101) * DSA-5725-1 - Znc Security Update - Debian 11 (amd64) (ID: 57250101) * DSA-5726-1 - Krb5 Security Update - Debian 11 (amd64) (ID: 57260101) * DSA-5728-1 - Exim4 Security Update - Debian 11 (amd64) (ID: 57280101) * DSA-5729-1 - Apache2 Security Update - Debian 11 (amd64) (ID: 57290101) * DSA-5734-1 - Bind9 Security Update - Debian 11 (amd64) (ID: 57340101) * DSA-5736-1 - Openjdk-11 Security Update - Debian 11 (amd64) (ID: 57360101) * DSA-5737-1 - Libreoffice Security Update - Debian 11 (amd64) (ID: 57370101) * DSA-5738-1 - Openjdk-17 Security Update - Debian 11 (amd64) (ID: 57380101) * DSA-5739-1 - Wpa Security Update - Debian 11 (amd64) (ID: 57390101) * DSA-5740-1 - Firefox-Esr Security Update - Debian 11 (amd64) (ID: 57400101) * DSA-5742-1 - Odoo Security Update - Debian 11 (amd64) (ID: 57420101) * DSA-5743-2 - Roundcube Security Update - Debian 11 (amd64) (ID: 57430201) * DSA-5744-1 - Thunderbird Security Update - Debian 11 (amd64) (ID: 57440101) * DSA-5746-1 - Postgresql-13 Security Update - Debian 11 (amd64) (ID: 57460101) * DSA-5747-1 - Linux Security Update - Debian 11 (amd64) (ID: 57470101) Published Site Version: * Patches for Debian 11, version 116. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:11:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:11:04 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Adduser - Debian 12 (amd64) (ID: 25041901) * Unspecified - Apt-Listchanges - Debian 12 (amd64) (ID: 25041902) * Unspecified - Python3-Pyassimp - Debian 12 (amd64) (ID: 25041903) * Unspecified - Bash-Completion - Debian 12 (amd64) (ID: 25041904) * Unspecified - Python-Behave-Doc - Debian 12 (amd64) (ID: 25041905) * Unspecified - Ca-Certificates - Debian 12 (amd64) (ID: 25041906) * Unspecified - Cmake-Extras - Debian 12 (amd64) (ID: 25041907) * Unspecified - Python3-Commando - Debian 12 (amd64) (ID: 25041908) * Unspecified - Cron-Daemon-Common - Debian 12 (amd64) (ID: 25041909) * Unspecified - Debconf - Debian 12 (amd64) (ID: 25041910) * Unspecified - Debconf-I18n - Debian 12 (amd64) (ID: 25041911) * Unspecified - Debian-Archive-Keyring - Debian 12 (amd64) (ID: 25041912) * Unspecified - Debian-Faq - Debian 12 (amd64) (ID: 25041913) * Unspecified - Dhcpig - Debian 12 (amd64) (ID: 25041914) * Unspecified - Doc-Debian - Debian 12 (amd64) (ID: 25041915) * Unspecified - Freedom-Maker - Debian 12 (amd64) (ID: 25041916) * Unspecified - Libc-L10n - Debian 12 (amd64) (ID: 25041918) * Unspecified - Locales - Debian 12 (amd64) (ID: 25041920) * Unspecified - Golang-Blitiri-Go-Log-Dev - Debian 12 (amd64) (ID: 25041921) * Unspecified - Golang-Blitiri-Go-Spf-Dev - Debian 12 (amd64) (ID: 25041922) * Unspecified - Golang-Blitiri-Go-Systemd-Dev - Debian 12 (amd64) (ID: 25041923) * Unspecified - Golang-Github-Eclipse-Paho.mqtt.golang-Dev - Debian 12 (amd64) (ID: 25041924) * Unspecified - Golang-Github-Aliyun-Aliyun-Oss-Go-Sdk-Dev - Debian 12 (amd64) (ID: 25041925) * Unspecified - Golang-Github-Approvals-Go-Approval-Tests-Dev - Debian 12 (amd64) (ID: 25041926) * Unspecified - Golang-Github-Bgentry-Go-Netrc-Dev - Debian 12 (amd64) (ID: 25041927) * Unspecified - Golang-Github-Biogo-Hts-Dev - Debian 12 (amd64) (ID: 25041928) * Unspecified - Golang-Github-Cespare-Xxhash-Dev - Debian 12 (amd64) (ID: 25041929) * Unspecified - Golang-Github-Cheekybits-Is-Dev - Debian 12 (amd64) (ID: 25041930) * Unspecified - Golang-Github-Chzyer-Readline-Dev - Debian 12 (amd64) (ID: 25041931) * Unspecified - Golang-Github-Dcso-Bloom-Dev - Debian 12 (amd64) (ID: 25041932) * Unspecified - Golang-Github-Denverdino-Aliyungo-Dev - Debian 12 (amd64) (ID: 25041933) * Unspecified - Golang-Github-Erikstmartin-Go-Testdb-Dev - Debian 12 (amd64) (ID: 25041934) * Unspecified - Golang-Github-Gin-Contrib-Sse-Dev - Debian 12 (amd64) (ID: 25041935) * Unspecified - Golang-Github-Gin-Gonic-Gin-Dev - Debian 12 (amd64) (ID: 25041936) * Unspecified - Golang-Github-Gophercloud-Gophercloud-Dev - Debian 12 (amd64) (ID: 25041937) * Unspecified - Golang-Github-Hashicorp-Go-Rootcerts-Dev - Debian 12 (amd64) (ID: 25041938) * Unspecified - Golang-Github-Jasonish-Go-Idsrules-Dev - Debian 12 (amd64) (ID: 25041939) * Unspecified - Golang-Github-Jdkato-Syllables-Dev - Debian 12 (amd64) (ID: 25041940) * Unspecified - Golang-Github-Jlaffaye-Ftp-Dev - Debian 12 (amd64) (ID: 25041941) * Unspecified - Golang-Github-Kurin-Blazer-Dev - Debian 12 (amd64) (ID: 25041942) * Unspecified - Golang-Github-Matryer-Try-Dev - Debian 12 (amd64) (ID: 25041943) * Unspecified - Golang-Github-Mgutz-Ansi-Dev - Debian 12 (amd64) (ID: 25041944) * Unspecified - Golang-Github-Minio-Dsync-Dev - Debian 12 (amd64) (ID: 25041945) * Unspecified - Golang-Github-Montanaflynn-Stats-Dev - Debian 12 (amd64) (ID: 25041946) * Unspecified - Golang-Github-Olekukonko-Ts-Dev - Debian 12 (amd64) (ID: 25041947) * Unspecified - Golang-Github-Oneofone-Xxhash-Dev - Debian 12 (amd64) (ID: 25041948) * Unspecified - Golang-Github-Opencontainers-Selinux-Dev - Debian 12 (amd64) (ID: 25041949) * Unspecified - Golang-Github-Opentracing-Contrib-Go-Stdlib-Dev - Debian 12 (amd64) (ID: 25041950) * Unspecified - Golang-Github-Opentracing-Opentracing-Go-Dev - Debian 12 (amd64) (ID: 25041951) * Unspecified - Golang-Github-Rifflock-Lfshook-Dev - Debian 12 (amd64) (ID: 25041952) * Unspecified - Golang-Github-Rubyist-Tracerx-Dev - Debian 12 (amd64) (ID: 25041953) * Unspecified - Golang-Github-Shogo82148-Go-Shuffle-Dev - Debian 12 (amd64) (ID: 25041954) * Unspecified - Golang-Github-Ssor-Bom-Dev - Debian 12 (amd64) (ID: 25041955) * Unspecified - Golang-Github-Tdewolff-Minify-Dev - Debian 12 (amd64) (ID: 25041956) * Unspecified - Golang-Github-Tdewolff-Parse-Dev - Debian 12 (amd64) (ID: 25041957) * Unspecified - Golang-Github-Tdewolff-Test-Dev - Debian 12 (amd64) (ID: 25041958) * Unspecified - Golang-Github-Thomsonreuterseikon-Go-Ntlm-Dev - Debian 12 (amd64) (ID: 25041959) * Unspecified - Golang-Github-Valyala-Bytebufferpool-Dev - Debian 12 (amd64) (ID: 25041960) * Unspecified - Golang-Github-Xanzy-Ssh-Agent-Dev - Debian 12 (amd64) (ID: 25041961) * Unspecified - Golang-Github-Yuin-Gopher-Lua-Dev - Debian 12 (amd64) (ID: 25041962) * Unspecified - Golang-Go.uber-Atomic-Dev - Debian 12 (amd64) (ID: 25041963) * Unspecified - Golang-Go.uber-Multierr-Dev - Debian 12 (amd64) (ID: 25041964) * Unspecified - Golang-Golang-X-Image-Dev - Debian 12 (amd64) (ID: 25041965) * Unspecified - Golang-Gopkg-Neurosnap-Sentences.v1-Dev - Debian 12 (amd64) (ID: 25041966) * Unspecified - Golang-Pault-Go-Gecos-Dev - Debian 12 (amd64) (ID: 25041967) * Unspecified - Golang-Pault-Go-Macchanger-Dev - Debian 12 (amd64) (ID: 25041968) * Unspecified - Golang-Pault-Go-Technicolor-Dev - Debian 12 (amd64) (ID: 25041969) * Unspecified - Golang-Pault-Go-Ykpiv-Dev - Debian 12 (amd64) (ID: 25041970) * Unspecified - Golang-Github-Aviau-Gopass-Dev - Debian 12 (amd64) (ID: 25041971) * Unspecified - Libghc-Alsa-Core-Doc - Debian 12 (amd64) (ID: 25041972) * Unspecified - Libghc-Alsa-Mixer-Doc - Debian 12 (amd64) (ID: 25041973) * Unspecified - Libghc-Attoparsec-Iso8601-Doc - Debian 12 (amd64) (ID: 25041974) * Unspecified - Libghc-Base-Prelude-Doc - Debian 12 (amd64) (ID: 25041975) * Unspecified - Libghc-Cabal-Doctest-Doc - Debian 12 (amd64) (ID: 25041976) * Unspecified - Libghc-Cereal-Vector-Doc - Debian 12 (amd64) (ID: 25041977) * Unspecified - Libghc-Config-Schema-Doc - Debian 12 (amd64) (ID: 25041978) * Unspecified - Libghc-Cryptohash-Md5-Doc - Debian 12 (amd64) (ID: 25041979) * Unspecified - Libghc-Cryptohash-Sha1-Doc - Debian 12 (amd64) (ID: 25041980) * Unspecified - Libghc-Cryptohash-Sha256-Doc - Debian 12 (amd64) (ID: 25041981) * Unspecified - Libghc-Diagrams-Dev - Debian 12 (amd64) (ID: 25041982) * Unspecified - Libghc-Diagrams-Doc - Debian 12 (amd64) (ID: 25041983) * Unspecified - Libghc-Diagrams-Prof - Debian 12 (amd64) (ID: 25041984) * Unspecified - Libghc-Doctemplates-Doc - Debian 12 (amd64) (ID: 25041985) * Unspecified - Libghc-Floatinghex-Doc - Debian 12 (amd64) (ID: 25041986) * Unspecified - Libghc-Hashable-Time-Doc - Debian 12 (amd64) (ID: 25041987) * Unspecified - Haskell-Hosc-Utils - Debian 12 (amd64) (ID: 25041988) * Unspecified - Libghc-Hosc-Doc - Debian 12 (amd64) (ID: 25041989) * Unspecified - Libghc-Integer-Logarithms-Doc - Debian 12 (amd64) (ID: 25041990) * Unspecified - Libghc-Lazy-Csv-Doc - Debian 12 (amd64) (ID: 25041991) * Unspecified - Libghc-Libmpd-Doc - Debian 12 (amd64) (ID: 25041992) * Unspecified - Libghc-Multiset-Comb-Doc - Debian 12 (amd64) (ID: 25041993) * Unspecified - Libghc-Murmur-Hash-Doc - Debian 12 (amd64) (ID: 25041994) * Unspecified - Libghc-Natural-Transformation-Doc - Debian 12 (amd64) (ID: 25041995) * Unspecified - Libghc-Neat-Interpolation-Doc - Debian 12 (amd64) (ID: 25041996) * Unspecified - Libghc-Quickcheck-Text-Doc - Debian 12 (amd64) (ID: 25041997) * Unspecified - Libghc-Skylighting-Doc - Debian 12 (amd64) (ID: 25041998) * Unspecified - Libghc-Src-Exts-Simple-Doc - Debian 12 (amd64) (ID: 25041999) * Unspecified - Libghc-Store-Core-Doc - Debian 12 (amd64) (ID: 25042000) * Unspecified - Libghc-Tagshare-Doc - Debian 12 (amd64) (ID: 25042001) * Unspecified - Libghc-Th-Abstraction-Doc - Debian 12 (amd64) (ID: 25042002) * Unspecified - Libghc-Th-Utilities-Doc - Debian 12 (amd64) (ID: 25042003) * Unspecified - Libghc-Tidal-Doc - Debian 12 (amd64) (ID: 25042004) * Unspecified - Libghc-Tls-Session-Manager-Doc - Debian 12 (amd64) (ID: 25042005) * Unspecified - Libghc-Uri-Bytestring-Doc - Debian 12 (amd64) (ID: 25042006) * Unspecified - Libghc-Wai-Http2-Extra-Doc - Debian 12 (amd64) (ID: 25042007) * Unspecified - Libghc-Weigh-Doc - Debian 12 (amd64) (ID: 25042008) * Unspecified - Libghc-Xmlgen-Doc - Debian 12 (amd64) (ID: 25042009) * Unspecified - Init-System-Helpers - Debian 12 (amd64) (ID: 25042010) * Unspecified - Krb5-Locales - Debian 12 (amd64) (ID: 25042011) * Unspecified - Libpixelif-Common - Debian 12 (amd64) (ID: 25042012) * Unspecified - Librt-Extension-Commandbymail-Perl - Debian 12 (amd64) (ID: 25042013) * Unspecified - Libsixel-Examples - Debian 12 (amd64) (ID: 25042014) * Unspecified - Manpages - Debian 12 (amd64) (ID: 25042015) * Unspecified - Media-Types - Debian 12 (amd64) (ID: 25042016) * Unspecified - Mime-Support - Debian 12 (amd64) (ID: 25042017) * Unspecified - Ncurses-Base - Debian 12 (amd64) (ID: 25042018) * Unspecified - Ncurses-Term - Debian 12 (amd64) (ID: 25042019) * Unspecified - Netbase - Debian 12 (amd64) (ID: 25042020) * Unspecified - Libppx-Visitors-Ocaml-Doc - Debian 12 (amd64) (ID: 25042021) * Unspecified - Libpam-Runtime - Debian 12 (amd64) (ID: 25042022) * Unspecified - Python3-Fswrap - Debian 12 (amd64) (ID: 25042023) * Unspecified - Qt5-Doc - Debian 12 (amd64) (ID: 25042024) * Unspecified - Qt5-Doc-Html - Debian 12 (amd64) (ID: 25042025) * Unspecified - Readline-Common - Debian 12 (amd64) (ID: 25042026) * Unspecified - Python3-Reportbug - Debian 12 (amd64) (ID: 25042027) * Unspecified - Reportbug - Debian 12 (amd64) (ID: 25042028) * Unspecified - Rss-Bridge - Debian 12 (amd64) (ID: 25042029) * Unspecified - Ruby-Webkit2-Gtk - Debian 12 (amd64) (ID: 25042030) * Unspecified - Wamerican - Debian 12 (amd64) (ID: 25042031) * Unspecified - Sensible-Utils - Debian 12 (amd64) (ID: 25042032) * Unspecified - Elpa-Ag - Debian 12 (amd64) (ID: 25042033) * Unspecified - Standardskriver - Debian 12 (amd64) (ID: 25042034) * Unspecified - Surf-Display - Debian 12 (amd64) (ID: 25042035) * Unspecified - Libsvgpp-Dev - Debian 12 (amd64) (ID: 25042036) * Unspecified - Tasksel-Data - Debian 12 (amd64) (ID: 25042037) * Unspecified - Python-Txtorcon-Doc - Debian 12 (amd64) (ID: 25042038) * Unspecified - Python3-Txtorcon - Debian 12 (amd64) (ID: 25042039) * Unspecified - Tzdata - Debian 12 (amd64) (ID: 25042041) * Unspecified - Ucf - Debian 12 (amd64) (ID: 25042042) * Unspecified - Vim-Common - Debian 12 (amd64) (ID: 25042043) * Unspecified - Vim-Bitbake - Debian 12 (amd64) (ID: 25042044) * Unspecified - Winff - Debian 12 (amd64) (ID: 25042045) * Unspecified - Winff-Doc - Debian 12 (amd64) (ID: 25042046) * Unspecified - Maple-Latex - Debian 12 (amd64) (ID: 25042047) * Unspecified - R8168-Dkms - Debian 12 (amd64) (ID: 25042048) * DSA-5842-1 - Openafs Security Update - Debian 12 (amd64) (ID: 58420101) * DSA-5843-2 - Rsync Regression Update - Debian 12 (amd64) (ID: 58430201) * DSA-5847-1 - Snapcast Security Update - Debian 12 (amd64) (ID: 58470101) * DSA-5849-1 - Git-Lfs Security Update - Debian 12 (amd64) (ID: 58490101) * DSA-5850-1 - Git Security Update - Debian 12 (amd64) (ID: 58500101) * DSA-5851-1 - Openjpeg2 Security Update - Debian 12 (amd64) (ID: 58510101) * DSA-5853-1 - Pam-U2f Security Update - Debian 12 (amd64) (ID: 58530101) * DSA-5854-1 - Bind9 Security Update - Debian 12 (amd64) (ID: 58540101) * DSA-5856-1 - Redis Security Update - Debian 12 (amd64) (ID: 58560101) * DSA-5857-1 - Openjdk-17 Security Update - Debian 12 (amd64) (ID: 58570101) * DSA-5862-1 - Cacti Security Update - Debian 12 (amd64) (ID: 58620101) * DSA-5863-1 - Libtasn1-6 Security Update - Debian 12 (amd64) (ID: 58630101) * DSA-5864-1 - Pam-Pkcs11 Security Update - Debian 12 (amd64) (ID: 58640101) * DSA-5867-1 - Gnutls28 Security Update - Debian 12 (amd64) (ID: 58670101) * DSA-5868-1 - Openssh Security Update - Debian 12 (amd64) (ID: 58680101) * DSA-5870-1 - Openh264 Security Update - Debian 12 (amd64) (ID: 58700101) * DSA-5871-1 - Emacs Security Update - Debian 12 (amd64) (ID: 58710101) * DSA-5872-1 - Xorg-Server Security Update - Debian 12 (amd64) (ID: 58720101) * DSA-5873-1 - Libreoffice Security Update - Debian 12 (amd64) (ID: 58730101) * DSA-5878-1 - Php8.2 Security Update - Debian 12 (amd64) (ID: 58780101) * DSA-5879-1 - Opensaml Security Update - Debian 12 (amd64) (ID: 58790101) * DSA-5880-1 - Freetype Security Update - Debian 12 (amd64) (ID: 58800101) * DSA-5881-1 - Rails Security Update - Debian 12 (amd64) (ID: 58810101) * DSA-5883-1 - Mercurial Security Update - Debian 12 (amd64) (ID: 58830101) * DSA-5884-1 - Libxslt Security Update - Debian 12 (amd64) (ID: 58840101) * DSA-5886-1 - Ruby-Rack Security Update - Debian 12 (amd64) (ID: 58860101) * DSA-5887-1 - Exim4 Security Update - Debian 12 (amd64) (ID: 58870101) * DSA-5888-1 - Ghostscript Security Update - Debian 12 (amd64) (ID: 58880101) * DSA-5889-1 - Firefox-Esr Security Update - Debian 12 (amd64) (ID: 58890101) * DSA-5891-1 - Thunderbird Security Update - Debian 12 (amd64) (ID: 58910101) * DSA-5892-1 - Atop Security Update - Debian 12 (amd64) (ID: 58920101) * DSA-5893-1 - Tomcat10 Security Update - Debian 12 (amd64) (ID: 58930101) * DSA-5894-1 - Jetty9 Security Update - Debian 12 (amd64) (ID: 58940101) * DSA-5895-1 - Xz-Utils Security Update - Debian 12 (amd64) (ID: 58950101) * DSA-5896-1 - Trafficserver Security Update - Debian 12 (amd64) (ID: 58960101) * DSA-5897-1 - Lemonldap-Ng Security Update - Debian 12 (amd64) (ID: 58970101) * DSA-5899-1 - Webkit2gtk Security Update - Debian 12 (amd64) (ID: 58990101) * DSA-5900-1 - Linux Security Update - Debian 12 (amd64) (ID: 59000101) * DSA-5901-1 - Mediawiki Security Update - Debian 12 (amd64) (ID: 59010101) * DSA-5902-1 - Perl Security Update - Debian 12 (amd64) (ID: 59020101) * DSA-5903-1 - Chromium Security Update - Debian 12 (amd64) (ID: 59030101) * DSA-5904-1 - Libapache2-Mod-Auth-Openidc Security Update - Debian 12 (amd64) (ID: 59040101) * DSA-5905-1 - Graphicsmagick Security Update - Debian 12 (amd64) (ID: 59050101) * DSA-5906-1 - Erlang Security Update - Debian 12 (amd64) (ID: 59060101) Published Site Version: * Patches for Debian 12, version 95. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:43:46 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:43:46 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for RHEL 8 published 2025-04-21 Message-ID: Content in the Patches for RHEL 8 Extended Support site has been added: RHSA-2025:3832 Red Hat Security Advisory: kernel security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHSA-2025:3845 Red Hat Security Advisory: java-1.8.0-openjdk security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHSA-2025:3852 Red Hat Security Advisory: java-17-openjdk security update - Red Hat Enterprise Linux 8.8 EUS (x64) RHBA-2025:3877 Red Hat Bug Fix Advisory: linux-firmware bug fix update - Red Hat Enterprise Linux 8.8 EUS (x64) Content in the Patches for RHEL 8 Extended Support site has been superseded: RHBA-2025:0418 Red Hat Bug Fix Advisory: java-1.8.0-openjdk bug fix update for RHEL 8.8, 8.10, 9.2, 9.4 and 9.5 - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) RHSA-2025:0422 Red Hat Security Advisory: java-17-openjdk security update for RHEL 8.6, 8.8, 8.10, 9.4 and 9.5 - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) RHBA-2025:2187 Red Hat Bug Fix Advisory: linux-firmware bug fix update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) RHSA-2025:3216 Red Hat Security Advisory: kernel security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) Reason for Update: Red Hat released new EUS content. Actions to Take: None Published site version: Patches for RHEL 8 Extended Support, version 159 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:46:10 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:46:10 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2022, published 2025-04-15 with bugfix Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2022 *Security Benchmark:* CIS Microsoft SQL Server 2022 Benchmark, V1.1.0 *Published Sites:* CIS Checklist for MS SQL Server 2022, site version 6 (The site version is provided for air-gap customers.) *Details:* ? Fixed the checks 3.7 and 8.1 *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/10.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! * -- The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:48:40 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:48:40 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Red Hat Enterprise Linux 8 with bug fixes, published 2025-04-18 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Red Hat Enterprise Linux 8 with bug fixes. *Security Benchmark:* CIS Red Hat Enterprise Linux 8 Benchmark, v3.0.0 *Published Sites:* CIS Checklist for RHEL 8, site version 34 (The site version is provided for air-gap customers.) *Details:* ? Fixed and Improved implementation and added more remediation support for the following check: - Ensure journald is configured to compress large log files - Ensure sshd MaxAuthTries is configured - Ensure sshd MaxSessions is configured - Ensure sshd MaxStartups is configured *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 03:50:36 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 06:50:36 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Red Hat Enterprise Linux 9 with bug fixes, published 2025-04-18 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Red Hat Enterprise Linux 9 with bug fixes. *Security Benchmark:* CIS Red Hat Enterprise Linux 9 Benchmark, v2.0.0 *Published Sites:* CIS Checklist for RHEL 9, site version 9 (The site version is provided for air-gap customers.) *Details:* ? Fixed and Improved implementation and added more remediation support for the following check: - Ensure sshd MaxAuthTries is configured - Ensure sshd MaxSessions is configured - Ensure sshd MaxStartups is configured *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 06:40:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 08:40:58 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-21 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 27 Total Fixlets in Site: 449 Release Date: 2025-04-21 Updated Fixlets: 19300101 DBeaver v25.0.3.0 37300101 Argus Monitor v7.2.3.3031 55300101 K-Lite v18.9.0.0 59700101 Epic Games Launcher (MSI) v1.3.142.0 9500101 Tailscale v1.82.5 901901 AWS Command Line Interface v2 v2.26.5.0 5603601 Windows Defender Virus Definitions v1.427.353.0 25500201 Double Commander (x32) v1.1.24 45400101 Plottr v2025.4.18 59400101 Syncovery v11.3.2 61800101 ocenaudio (EXE) v3.14.11 62200101 Duplicati v2.1.0.116 73100101 Bulk Rename Utility v4.0.0.7 25500101 Double Commander (x64) v1.1.24 400201 Eclipse Temurin JRE with Hotspot v11.0.27.6 47200201 CCleaner v6.35.0.11488 54300101 Dolt v1.52.0 5801301 Firefox Developer Edition (x64 en-US) v138.0 400601 Eclipse Temurin JRE with Hotspot v8.0.452.9 11600101 XnConvert v1.105.0.0 22400101 Koodo Reader v1.9.4 29600101 Vim v9.1.1326 400101 Eclipse Temurin JDK with Hotspot v11.0.27.6 50800101 CBackup v3.4.0.0 400501 Eclipse Temurin JDK with Hotspot v8.0.452.9 64004101 Microsoft Edge WebView2 Runtime v135.0.3179.85 62400101 MicrosoftAzureCLI v2.71.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 08:29:32 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 10:29:32 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-21 Message-ID: Content in the Patches for Windows site has been modified * Major [ID:305186120] Office 2016 Version 16.0.18623.20208 Available - Current Channel - Office 2016 * Major [ID:305186116] Office 2016 Version 16.0.18623.20208 Available - Current Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305186127] Office 2016 Version 16.0.18623.20208 Available for Network Share for Office 2016 - Current Channel - Office 2016 * Major [ID:305186119] Office 2019 Version 16.0.18623.20208 Available - Current Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305186104] Office 2019 Version 16.0.18623.20208 Available - Current Channel - Office 2019 Retail * Major [ID:305186145] Office 2019 Version 16.0.18623.20208 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail * Major [ID:305186123] Office 2021 Version 16.0.18623.20208 Available - Current Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305186109] Office 2021 Version 16.0.18623.20208 Available - Current Channel - Office 2021 Retail * Major [ID:305186138] Office 2021 Version 16.0.18623.20208 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * Major [ID:305186137] Office 2024 Version 16.0.18623.20208 Available - Current Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305186107] Office 2024 Version 16.0.18623.20208 Available - Current Channel - Office 2024 Retail * Major [ID:305186128] Office 2024 Version 16.0.18623.20208 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * Major [ID:305186139] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Arabic) * Major [ID:305186143] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Bulgarian) * Major [ID:305186125] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Chinese (Simplified)) * Major [ID:305186100] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Chinese (Traditional)) * Major [ID:305186126] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Czech) * Major [ID:305186118] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Danish) * Major [ID:305186117] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Dutch) * Major [ID:305186135] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (English (United Kingdom)) * Major [ID:305186133] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (English (United States)) * Major [ID:305186103] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Finnish) * Major [ID:305186105] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (French) * Major [ID:305186130] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (German) * Major [ID:305186102] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Greek) * Major [ID:305186121] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Hebrew) * Major [ID:305186132] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Hindi) * Major [ID:305186106] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Hungarian) * Major [ID:305186144] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Indonesian) * Major [ID:305186124] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Italian) * Major [ID:305186115] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Japanese) * Major [ID:305186129] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Korean) * Major [ID:305186136] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Lithuanian) * Major [ID:305186108] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Norwegian) * Major [ID:305186122] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Polish) * Major [ID:305186112] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Portugese (Portugal)) * Major [ID:305186149] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305186146] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Russian) * Major [ID:305186113] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Serbian Latin) * Major [ID:305186101] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Slovak) * Major [ID:305186147] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Slovenian) * Major [ID:305186148] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Spanish (Mexico)) * Major [ID:305186141] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Spanish) * Major [ID:305186110] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Swedish) * Major [ID:305186134] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Thai) * Major [ID:305186111] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Turkish) * Major [ID:305186114] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Ukrainian) * Major [ID:305186131] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Update from Local Client Cache) * Major [ID:305186142] Office 365 Version 16.0.18623.20208 Available - Current Channel - Office 365 (Vietnamese) * Major [ID:305186140] Office 365 Version 16.0.18623.20208 Available for Network Share for Office 365 - Current Channel - Office 365 Reason for Update: * New update for Office 365 - Current Channel. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4530 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 21 10:45:03 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 21 Apr 2025 12:45:03 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-21 Message-ID: Total New Fixlets: 14 Total Updated Fixlets: 109 Total Fixlets in Site: 2978 Total CVEs Covered: 857 Release Date: 2025-04-21 New Fixlets: 34850 Android Kernel Remote Code Execution Vulnerability - Debian 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 37540 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2022 37510 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 10 37480 Apple Multiple Products Arbitrary Read and Write Vulnerability - Any Version of MacOS 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 37550 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2008 R2 37520 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 37490 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2016 37460 Apple Multiple Products Use-After-Free Vulnerability - Any Version of MacOS 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 37530 Apple Multiple Products Arbitrary Read and Write Vulnerability - Apple iOS 37500 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2019 37470 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS Updated Fixlets: 32770 Apple Multiple Products WebKit Memory Corruption Vulnerability - Ubuntu 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 33290 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 36370 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2016 33300 Apple Multiple Products WebKit Use-After-Free Vulnerability - RHEL 36890 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability - Any Version of Windows 33310 Apple Multiple Products WebKit Code Execution Vulnerability - RHEL 16420 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of Windows 32810 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Ubuntu 16950 Adobe Flash Player and AIR Integer Overflow Vulnerability - Any Version of Windows 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 33340 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 32830 Apple Multiple Products WebKit Type Confusion Vulnerability - Debian 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 31820 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 36430 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2019 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 32850 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Debian 34900 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability - Any Version of MacOS 33370 Apple Multiple Products WebKit Code Execution Vulnerability - RHEL 32860 Apple Multiple Products WebKit Use-After-Free Vulnerability - Debian 16990 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 34910 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 28770 Linux Kernel Use-After-Free Vulnerability - Debian 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS 16490 Sitecore XP Remote Command Execution Vulnerability - Any Version of Windows 28780 Linux Kernel Privilege Escalation Vulnerability - Debian 33390 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 32880 Apple Multiple Products WebKit Memory Corruption Vulnerability - Debian 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 33400 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - RHEL 10360 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2012 32890 Apple Multiple Products WebKit Use-After-Free Vulnerability - Debian 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 36480 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 10 32900 Apple Multiple Products WebKit Code Execution Vulnerability - Debian 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 5770 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 2700 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 7 SP1 16530 Adobe Flash Player Integer Overflow Vulnerability - Any Version of Windows 37010 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 31890 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Oracle Linux 17050 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 32410 Microsoft Publisher Protection Mechanism Failure Vulnerability - Publisher 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 15520 Oracle VirtualBox Insufficient Input Validation Vulnerability - Any Version of Windows 32930 Apple Multiple Products WebKit Type Confusion Vulnerability - Debian 37030 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 31910 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 30890 Microsoft Outlook Security Feature Bypass Vulnerability - Outlook 32940 Apple Multiple Products WebKit Memory Corruption Vulnerability - Debian 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 30390 Linux Kernel Use-After-Free Vulnerability - Debian 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 36540 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 SP2 32960 Apple Multiple Products WebKit Code Execution Vulnerability - Debian 31940 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 15570 Adobe Flash Player and AIR Use-After-Free Vulnerability - Any Version of Windows 32980 Apple Multiple Products WebKit Type Confusion Vulnerability - Debian 32470 Adobe Flash Player Double Free Vulnerablity - Any Version of Windows 7900 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 32990 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Debian 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 31970 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 33000 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Debian 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 16630 Adobe Flash Player Dereferenced Pointer Vulnerability - Any Version of Windows 31990 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 36600 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2022 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 32020 Microsoft Project Remote Code Execution Vulnerability - Project 2016 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 36640 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 R2 16690 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 6970 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 31060 Microsoft Office Outlook Privilege Escalation Vulnerability - Outlook 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 25450 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 9070 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2012 R2 15730 Adobe Flash Player Unspecified Vulnerability - Any Version of Windows 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 11650 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 4500 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2008 SP2 32670 Apple Multiple Products WebKit Type Confusion Vulnerability - Ubuntu 16820 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 1470 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 8.1 36800 Linux Kernel Use of Uninitialized Resource Vulnerability - Debian 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS 33240 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS 16870 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 31720 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Debian 23530 Microsoft MSCOMCTL.OCX Remote Code Execution Vulnerability - Microsoft BizTalk Server 33260 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - RHEL 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 33270 Apple Multiple Products WebKit Use-After-Free Vulnerability - RHEL 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 22 05:21:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 22 Apr 2025 08:21:15 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Login - Raspbian 11 (armhf) (ID: 25042001) * Unspecified - Passwd - Raspbian 11 (armhf) (ID: 25042002) Published Site Version: * Patches for Raspbian 11, version 49. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 22 05:22:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 22 Apr 2025 08:22:19 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 11 Message-ID: New content have been added to the Patches for Debian 11 site. New Fixlets: * Unspecified - Wget - Debian 11 (amd64) (ID: 25042101) Published Site Version: * Patches for Debian 11, version 117. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 22 07:08:31 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 22 Apr 2025 09:08:31 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-22 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058275 Zoom (x64) 6.4.6.64360 Available * 5058318 Zoom 6.4.6.64360 Available Modified : * 5058193 Zoom (x64) 6.4.0.62047 Available (Superseded) * 5058262 Zoom 6.4.0.62047 Available (Superseded) Reason : * New update for Zoom. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2312 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 22 11:52:31 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 22 Apr 2025 14:52:31 -0400 Subject: [BESAdmin-Announcements] Tools Updated: AIX R2 Download Plugin v1.0.1.4 Message-ID: The tool AIX R2 Download Plugin is updated. Updated Tools Version: AIX R2 Download Plugin, version 1.0.1.4 Reasons for update: Tools have been updated to address the issue related to download failure of OpenSSH and OpenSSL packages. Actions to take: AIX R2 Download Plugin v1.0.1.4 is available in the Manage Download Plugins dashboard of the Patching Support site. Published site version: Patching Support, version 1198 Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 22 11:53:36 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 22 Apr 2025 14:53:36 -0400 Subject: [BESAdmin-Announcements] Tools Updated: AIX Download Plugin v5.0.2.0 and AIX Download Cacher v8.0.0.4 Message-ID: The tools AIX Download Plugin and AIX Download Cacher have been updated. Updated Tools Version: AIX Download Plugin, version 5.0.2.0 AIX Download Cacher, version 8.0.0.4 Reasons for update: The tools now accommodate the latest TL download format and provide improved support for IPv4 proxy IP addresses. Actions to take: AIX Download Plugin v5.0.2.0 is available in the Manage Download Plugins dashboard of the Patching Support site. AIX Download Cacher v8.0.0.4 is available here - http://software.bigfix.com/download/bes/util/AIXDownloadCacher.bfarchive Published site version: Patching Support, version 1198 Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 23 03:49:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 23 Apr 2025 06:49:15 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-23 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 135.0.7049.115 Available - Mac OS X (ID: 83000202) Microsoft Office for Mac 2016 - AutoUpdate 4.79.25033028 Available (ID: 16000400) Zoom 6.4.6 (53970) Available - Mac OS X (ID: 51000123) Published site version: Updates for Mac Applications, version 747. Reasons for Update: A newer version of Microsoft Autoupdate, Zoom and Chrome for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 23 06:15:34 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 23 Apr 2025 08:15:34 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-23 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011670 Google Chrome 135.0.7049.115 Available Modified: * 14011668 Google Chrome 135.0.7049.96 Available (Superseded) Reason : * New update for Google Chrome. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2314 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 23 10:45:25 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 23 Apr 2025 12:45:25 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-23 Message-ID: Content in the Patches for Windows site has been modified * Major [ID:505067401] 5050674: Update for Exchange Server 2016 CU23 - Exchange Server 2016 CU23 - KB5050674 (x64) * Major [ID:505067301] 5050673: Update for Exchange Server 2019 CU14 - Exchange Server 2019 CU14 - KB5050673 (x64) * Major [ID:505067201] 5050672: Update for Exchange Server 2019 CU15 - Exchange Server 2019 CU15 - KB5050672 (x64) * Major [ID:505705603] 5057056: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5056578 (x64) * Major [ID:505705601] 5057056: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5056578 * Major [ID:505705607] 5057056: Cumulative Update Preview for .NET Framework 3.5 and 4.8 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8 - KB5056577 (x64) * Major [ID:505705605] 5057056: Cumulative Update Preview for .NET Framework 3.5 and 4.8 for Windows 10 Version 22H2 - Windows 10 Version 22H2 - .NET Framework 3.5/4.8 - KB5056577 * Major [ID:505658007] 5056580: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 for ARM64 - Windows 11 Version 23H2 - .NET Framework 3.5/4.8.1 - KB5056580 (arm64) * Major [ID:505658005] 5056580: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 23H2 - Windows 11 Version 23H2 - .NET Framework 3.5/4.8.1 - KB5056580 (x64) * Major [ID:505658003] 5056580: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 for ARM64 - Windows 11 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5056580 (arm64) * Major [ID:505658001] 5056580: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 - Windows 11 Version 22H2 - .NET Framework 3.5/4.8.1 - KB5056580 (x64) * Major [ID:505562907] 5055629: Cumulative Update Preview for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5055629 (arm64) * Major [ID:505562905] 5055629: Cumulative Update Preview for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5055629 (x64) * Major [ID:505562903] 5055629: Cumulative Update Preview for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5055629 (arm64) * Major [ID:505562901] 5055629: Cumulative Update Preview for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5055629 (x64) * Major [ID:505561203] 5055612: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5055612 (x64) * Major [ID:505561201] 5055612: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5055612 Reason for Update: * New updates for Exchange Server 2016 and 2019. * New preview updates for .NET Framework, Windows 10 and Windows 11. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4531 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 24 06:17:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 24 Apr 2025 08:17:55 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-24 Message-ID: Total New Fixlets: 10 Total Updated Fixlets: 28 Total Fixlets in Site: 459 Release Date: 2025-04-24 New Fixlets: 2300301 CPUID PerfMonitor Enterprise Desktop v2.04 5608001 OpenSSH v9.8.3.0 5608101 OpenSSH v9.8.3.0 55100301 ImageMagick v7.1.1.47 74400101 Ekahau v11.8.1 79000101 Datadog Agent v7.64.3.0 79100101 Druva Enterprise Desktop v7.5.6.0 79200101 DAX Studio Enterprise Desktop v3.2.1.1046 79400101 exacqVision Client Enterprise Desktop v24.12.7.0 79500101 GenesysCloud Enterprise Desktop v2.41.817.0 Updated Fixlets: 16900101 DuoConnect v2.0.7 21700101 8x8 Work v8.22.2.7 6500101 Node.js LTS v22.15.0 20700301 Logi Options v1.89.705126 21500301 SyncBackSE v11.3.99.0 5603601 Windows Defender Virus Definitions v1.427.416.0 901901 AWS Command Line Interface v2 v2.27.0.0 65100101 Obsidian v1.8.10 1800101 Bandicam v8.1.1.2518 23400101 PhonerLite v3.30 21500201 SyncBackPro v11.3.99.0 2300201 CPUID HWMonitor v1.57 39000101 CLAN v8.29.00 7000101 Opera Stable v118.0.5461.60 5601601 Microsoft Power BI Desktop v2.142.928.0 5700801 MongoDB Compass v1.46.1.0 21500101 SyncBackFree v11.3.99.0 3100101 Foxit PDF Reader v2025.1.0.27937 54300101 Dolt v1.52.1 58700101 Speedify v15.5.1.13018 4100301 Google Drive v107.0.3.0 901201 AWS VPN Client v5.2.1 5602901 Microsoft Power BI Desktop v2.142.928.0 19600101 VSCodium (x64) v1.99.32704 29600101 Vim v9.1.1340 50800101 CBackup v3.4.0.0 67900101 SteelSeries GG v85.0.0 5602001 SQL Server Management Studio 20 v20.2.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 24 07:11:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 24 Apr 2025 09:11:42 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-24 Message-ID: Content in the Patches for Windows site has been modified * Major [ID:500765102] 5007651: Update for Windows Security platform antimalware platform - Windows Security platform - KB5007651 (ARM64) * Major [ID:500765101] 5007651: Update for Windows Security platform antimalware platform - Windows Security platform - KB5007651 (x64) Reason for Update: * New update for Windows Security platform. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4532 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 24 11:39:02 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 24 Apr 2025 13:39:02 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-04-24 Message-ID: Total New Fixlets: 20 Total Updated Fixlets: 2 Total Fixlets in Site: 47 Release Date: 2025-04-24 New Fixlets: 74500101 MeetingBar v4.10.0 59800201 MakeMKV v1.18.1 10600201 VLC v3.0.21 24200201 TablePlus v6.4.4 52600201 Concept2 Utility v7.15.00 11500301 Wireshark v4.4.6 57900301 Celestia v1.6.4 19600301 VSCodium v1.99.32704 39600301 TurboVNC v3.1.4 22000201 ActivityWatch v0.13.2 64000201 Leaklog v2.3.2 59600201 Moonlight v6.1.0 902101 WorkSpaces v5.26.2.5308 74400101 CodeEdit v0.3.4 62100201 Alice 3 v3.9.0.0 19300201 DBeaver v25.0.3 2001001 Webex v45.4.0.32158 22900201 Cerebro v0.11.0 1000301 AnyDesk v9.0.1 45700201 blobsaver v3.6.0 Updated Fixlets: 58700201 Speedify v15.5 65100201 Obsidian v1.8.10 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Apr 24 12:59:48 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 24 Apr 2025 14:59:48 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-24 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 210 Total Fixlets in Site: 2978 Total CVEs Covered: 857 Release Date: 2025-04-24 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 33290 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 33300 Apple Multiple Products WebKit Use-After-Free Vulnerability - RHEL 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 33310 Apple Multiple Products WebKit Code Execution Vulnerability - RHEL 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 33340 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 36950 CrushFTP Authentication Bypass Vulnerability - Any Version of Windows 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 33370 Apple Multiple Products WebKit Code Execution Vulnerability - RHEL 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 36960 CrushFTP Authentication Bypass Vulnerability - Any Version of Linux 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 33390 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 33400 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - RHEL 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 33420 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Oracle Linux 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 33430 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 33450 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 33460 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 18110 Grafana Authentication Bypass Vulnerability - Any Version of Linux 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 33490 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 33500 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 33520 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 33530 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Oracle Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 22800 MinIO Information Disclosure Vulnerability - Any Version of Linux 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 26950 MinIO Security Feature Bypass Vulnerability - Any Version of Linux 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 37320 Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability - Any Version of Windows 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 33240 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 33260 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - RHEL 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 33270 Apple Multiple Products WebKit Use-After-Free Vulnerability - RHEL 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 25 05:32:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 25 Apr 2025 08:32:55 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Wget - Raspbian 11 (armhf) (ID: 25042201) Published Site Version: * Patches for Raspbian 11, version 50. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Apr 25 06:16:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 25 Apr 2025 08:16:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-25 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058279 Microsoft Edge Stable Build 135.0.3179.98 Available (x64) * 5058281 Microsoft Edge Stable Build 135.0.3179.98 Available Reason : * New update for Microsoft Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2315 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 25 08:37:25 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 25 Apr 2025 10:37:25 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2025-04-25 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Apache Tomcat 11 v11.0.6 - Windows (x64) - Update: Apache Tomcat 11 v11.0.6 - Windows (x32) - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Windows (x32) - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Windows (x64) - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Windows (x32) - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Windows (x64) - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Windows (x32) - Update: OracleJDK v8.451 - Windows (x64) - Update: OracleJDK v17.0.15 - Windows (x64) - Update: OracleJDK v21.0.7 - Windows (x64) - Update: OracleJDK v11.0.27 - Windows (x64) - Update: OracleJDK v8.451 - Windows (x32) - Update: MySQL Server v8.0.42 - Windows (x64) - Update: MongoDB v7.0.19 - Windows (x64) - Update: MongoDB v8.0.8 - Windows (x64) ## Modified Items: - Update: Apache Tomcat 10 v10.1.39 - Windows (x64) - Update: Apache Tomcat 10 v10.1.40 - Windows (x64) - Update: Apache Tomcat 9 v9.0.102 - Windows (x64) - Update: Apache Tomcat 9 v9.0.104 - Windows (x64) - Update: Apache Tomcat 9 v9.0.102 - Windows (x32) - Update: Apache Tomcat 9 v9.0.104 - Windows (x32) - Update: Apache Tomcat 10 v10.1.39 - Windows (x32) - Update: Apache Tomcat 10 v10.1.40 - Windows (x32) - Update: Apache Tomcat 11 v11.0.5 - Windows (x64) - Update: Apache Tomcat 11 v11.0.5 - Windows (x32) - Update: MySQL Server v8.0.41 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.102 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.102 - Windows (x32) - Update: Multi-Instance Apache Tomcat 10 v10.1.39 - Windows (x64) - Update: Multi-Instance Apache Tomcat 10 v10.1.39 - Windows (x32) - Update: Multi-Instance Apache Tomcat 11 v11.0.5 - Windows (x64) - Update: Multi-Instance Apache Tomcat 11 v11.0.5 - Windows (x32) - Update: MongoDB v7.0.18 - Windows (x64) - Update: MongoDB v8.0.6 - Windows (x64) - Update: RedHat JBoss EAP v8.0.6 - Windows (x64) - Update: RedHat JBoss EAP v8.0.7 - Windows (x64) - Update: OracleJDK v8.441 - Windows (x64) - Update: OracleJDK v17.0.14 - Windows (x64) - Update: OracleJDK v21.0.6 - Windows (x64) - Update: OracleJDK v11.0.26 - Windows (x64) - Update: OracleJDK v8.441 - Windows (x32) ## Deleted Items: - 1200208 ApacheTomcat10-Update.bes - 1200409 ApacheTomcat9-Update.bes - 1201106 ApacheTomcat9-Update.bes - 1201206 ApacheTomcat10-Update.bes - 26900902 MySQL-Update.bes - 5700705 MongoDB-Update.bes - 5701202 MongoDB-Update.bes - 575006002 RedHatJBoss8-Update-Windows.bes ## Reason for Update: - New Software Releases from Vendors - The older fixlets of Apache Tomcat 9,10, MySQL, JBoss EAP, MongoDB v7.0 and MongoDB v8.0 have been archived ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v37 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 25 08:39:47 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 25 Apr 2025 11:39:47 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance PCI Add-on: Updated PCI DSS Checklist for AIX 7.2 (PCI v4.0) with bug fixes, published 2025-04-24 Message-ID: *Product:* BigFix Compliance PCI Add-on *Title:* PCI DSS Checklist for AIX 7.2 (PCI v4.0) with bug fixes. *Category:* PCI DSS Checklist *Security Benchmark:* Payment Card Industry Data Security Standard v4.0 *Published Sites:* PCI DSS Checklist for AIX 7.2 (PCI v4.0), site version 2. PCI DSS Reporting, version 25. (The site version is provided for air-gap customers.) *Details:* ? Fixed and improved analyses for all checks. *Actions to take:* ? Use the License Overview dashboard from the BES Support site to enable and gather the said site. Note that you must be entitled to the new content, and you are using BigFix version 10 and later. ? Create a custom site for the PCI DSS Checklist for AIX 7.2 (PCI v4.0) site to display the AIX 7.2 results in the PCI DSS Policy Reports. ? If you were involved in the Beta / Early Access Program for BigFix Compliance PCI Add-on, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. *More information:* To know more about the BigFix Compliance PCI DSS checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/pci-add-on/64 ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists ? BigFix PCI Add-on User?s Guide: https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/pci.html We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance PCI Add-on team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Apr 25 08:50:51 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 25 Apr 2025 10:50:51 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2025-04-25 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Linux - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Linux - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Linux - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Solaris - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Solaris - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Solaris - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - AIX - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - AIX - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - AIX - Update: Apache Tomcat 9 v9.0.104 - Linux (SystemD-based) - Update: Apache Tomcat 10 v10.1.40 - Linux (SystemD-based) - Update: Apache Tomcat 11 v11.0.6 - Linux (SystemD-based) - Update: MySQL v9.3.0 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v9.3.0 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v9.3.0 - SUSE 15 (x64) - Update: MySQL v9.3.0 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v9.3.0 - Ubuntu 22.04 (x64) - Update: MySQL v8.0.42 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v8.0.42 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v8.0.42 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v8.0.42 - SUSE 15 (x64) - Update: MySQL v8.0.42 - Ubuntu 22.04 (x64) - Update: MySQL v8.0.42 - Ubuntu 20.04 (x64) - Update: OracleJDK v8.451 - RHEL Family (x64) - Update: OracleJDK v11.0.27 - Debian Family (x64) - Update: OracleJDK v11.0.27 - RHEL Family (x64) - Update: OracleJDK v21.0.7 - Debian Family (x64) - Update: OracleJDK v21.0.7 - RHEL Family (x64) - Update: OracleJDK v17.0.15 - Debian Family (x64) - Update: OracleJDK v17.0.15 - RHEL Family (x64) - Update: RedHat JBoss EAP v8.0.7 - Linux Unix - Update: MongoDB v7.0.19 - RedHat / CentOS 9 (x64) - Update: MongoDB v7.0.19 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.19 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.19 - SUSE 12 (x64) - Update: MongoDB v7.0.19 - SUSE 15 (x64) - Update: MongoDB v7.0.19 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.19 - Ubuntu 22.04 (x64) - Update: MongoDB v8.0.8 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.8 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.8 - SUSE 15 (x64) - Update: MongoDB v8.0.8 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.8 - Ubuntu 22.04 (x64) ## Modified Items: - Update: Apache Tomcat 9 v9.0.102 - Linux (SystemD-based) - Update: Apache Tomcat 10 v10.1.39 - Linux (SystemD-based) - Update: Apache Tomcat 11 v11.0.5 - Linux (SystemD-based) - Update: MySQL v9.1.0 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v9.2.0 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v9.1.0 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v9.2.0 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v8.0.39 - SUSE 12 (x64) - Update: MySQL v8.0.40 - SUSE 12 (x64) - Update: MySQL v9.1.0 - SUSE 15 (x64) - Update: MySQL v9.2.0 - SUSE 15 (x64) - Update: MySQL v8.0.33 - Ubuntu 18.04 (x64) - Update: MySQL v8.0.40 - Ubuntu 20.04 (x64) - Update: MySQL v8.0.41 - Ubuntu 20.04 (x64) - Update: MySQL v9.1.0 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v9.2.0 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v9.1.0 - Ubuntu 22.04 (x64) - Update: MySQL v9.2.0 - Ubuntu 22.04 (x64) - Update: MySQL v8.0.40 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v8.0.41 - RedHat / CentOS / OEL 7 (x64) - Update: MySQL v8.0.40 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v8.0.41 - RedHat / CentOS / OEL 8 (x64) - Update: MySQL v8.0.40 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v8.0.41 - RedHat / CentOS / OEL 9 (x64) - Update: MySQL v8.0.40 - SUSE 15 (x64) - Update: MySQL v8.0.41 - SUSE 15 (x64) - Update: MySQL v8.0.40 - Ubuntu 22.04 (x64) - Update: MySQL v8.0.41 - Ubuntu 22.04 (x64) - Update: MariaDB v11.3.2 - RedHat / CentOS 7 (x64) - Update: MariaDB v11.4.3 - RedHat / CentOS 7 (x64) - Update: MariaDB v11.3.2 - RedHat / CentOS 8 (x64) - Update: MariaDB v11.4.3 - RedHat / CentOS 8 (x64) - Update: MariaDB v11.4.4 - RedHat / CentOS 8 (x64) - Update: MariaDB v11.4.5 - RedHat / CentOS 8 (x64) - Update: MariaDB v11.3.2 - SUSE 12 (x64) - Update: MariaDB v11.4.3 - SUSE 12 (x64) - Update: MariaDB v11.4.4 - SUSE 12 (x64) - Update: MariaDB v11.4.5 - SUSE 12 (x64) - Update: MariaDB v11.4.3 - SUSE 15 (x64) - Update: MariaDB v11.4.4 - SUSE 15 (x64) - Update: MariaDB v11.4.5 - SUSE 15 (x64) - Update: MariaDB v10.10.2 - Ubuntu 18.04 (x64) - Update: MariaDB v11.3.2 - Ubuntu 20.04 (x64) - Update: MariaDB v11.4.3 - Ubuntu 20.04 (x64) - Update: MariaDB v11.4.4 - Ubuntu 20.04 (x64) - Update: MariaDB v11.4.5 - Ubuntu 20.04 (x64) - Update: MariaDB v11.3.2 - RedHat / CentOS 9 (x64) - Update: MariaDB v11.4.3 - RedHat / CentOS 9 (x64) - Update: MariaDB v11.4.4 - RedHat / CentOS 9 (x64) - Update: MariaDB v11.4.5 - RedHat / CentOS 9 (x64) - Update: MariaDB v11.3.2 - Ubuntu 22.04 (x64) - Update: MariaDB v11.4.3 - Ubuntu 22.04 (x64) - Update: MariaDB v11.4.4 - Ubuntu 22.04 (x64) - Update: MariaDB v11.4.5 - Ubuntu 22.04 (x64) - Update: MariaDB v10.11.9 - RedHat / CentOS 7 (x64) - Update: MariaDB v10.11.9 - RedHat / CentOS 8 (x64) - Update: MariaDB v10.11.10 - RedHat / CentOS 8 (x64) - Update: MariaDB v10.11.11 - RedHat / CentOS 8 (x64) - Update: MariaDB v10.11.9 - RedHat / CentOS 9 (x64) - Update: MariaDB v10.11.10 - RedHat / CentOS 9 (x64) - Update: MariaDB v10.11.11 - RedHat / CentOS 9 (x64) - Update: MariaDB v10.11.9 - SUSE 12 (x64) - Update: MariaDB v10.11.10 - SUSE 12 (x64) - Update: MariaDB v10.11.11 - SUSE 12 (x64) - Update: MariaDB v10.11.9 - SUSE 15 (x64) - Update: MariaDB v10.11.10 - SUSE 15 (x64) - Update: MariaDB v10.11.11 - SUSE 15 (x64) - Update: MariaDB v10.11.9 - Ubuntu 20.04 (x64) - Update: MariaDB v10.11.10 - Ubuntu 20.04 (x64) - Update: MariaDB v10.11.11 - Ubuntu 20.04 (x64) - Update: MariaDB v10.11.9 - Ubuntu 22.04 (x64) - Update: MariaDB v10.11.10 - Ubuntu 22.04 (x64) - Update: MariaDB v10.11.11 - Ubuntu 22.04 (x64) - Update: Postgresql v16.4 - RedHat / CentOS / OEL 8 (x64) - Update: Postgresql v16.6 - RedHat / CentOS / OEL 8 (x64) - Update: Postgresql v16.8 - RedHat / CentOS / OEL 8 (x64) - Update: Postgresql v16.4 - RedHat / CentOS / OEL 9 (x64) - Update: Postgresql v16.6 - RedHat / CentOS / OEL 9 (x64) - Update: Postgresql v16.8 - RedHat / CentOS / OEL 9 (x64) - Update: Postgresql v16.4 - Ubuntu 20.04 (x64) - Update: Postgresql v16.6 - Ubuntu 20.04 (x64) - Update: Postgresql v16.8 - Ubuntu 20.04 (x64) - Update: Postgresql v16.4 - Ubuntu 22.04 (x64) - Update: Postgresql v16.6 - Ubuntu 22.04 (x64) - Update: Postgresql v16.8 - Ubuntu 22.04 (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.102 - Linux - Update: Multi-Instance Apache Tomcat 10 v10.1.39 - Linux - Update: Multi-Instance Apache Tomcat 11 v11.0.5 - Linux - Update: Multi-Instance Apache Tomcat 9 v9.0.102 - Solaris - Update: Multi-Instance Apache Tomcat 10 v10.1.39 - Solaris - Update: Multi-Instance Apache Tomcat 11 v11.0.5 - Solaris - Update: Multi-Instance Apache Tomcat 9 v9.0.102 - AIX - Update: Multi-Instance Apache Tomcat 10 v10.1.39 - AIX - Update: Multi-Instance Apache Tomcat 11 v11.0.5 - AIX - Update: MongoDB v7.0.17 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.18 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.17 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.18 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.17 - SUSE 12 (x64) - Update: MongoDB v7.0.18 - SUSE 12 (x64) - Update: MongoDB v7.0.17 - SUSE 15 (x64) - Update: MongoDB v7.0.18 - SUSE 15 (x64) - Update: MongoDB v6.0.13 - Ubuntu 18.04 (x64) - Update: MongoDB v7.0.17 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.18 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.17 - Ubuntu 22.04 (x64) - Update: MongoDB v7.0.18 - Ubuntu 22.04 (x64) - Update: MongoDB v7.0.17 - RedHat / CentOS 9 (x64) - Update: MongoDB v7.0.18 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.5 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.6 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.5 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.6 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.5 - SUSE 15 (x64) - Update: MongoDB v8.0.6 - SUSE 15 (x64) - Update: MongoDB v8.0.5 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.6 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.5 - Ubuntu 22.04 (x64) - Update: MongoDB v8.0.6 - Ubuntu 22.04 (x64) - Update: RedHat JBoss EAP v8.0.6 - Linux Unix - Update: OracleJDK v17.0.14 - RHEL Family (x64) - Update: OracleJDK v17.0.14 - Debian Family (x64) - Update: OracleJDK v21.0.6 - RHEL Family (x64) - Update: OracleJDK v21.0.6 - Debian Family (x64) - Update: OracleJDK v11.0.26 - RHEL Family (x64) - Update: OracleJDK v11.0.26 - Debian Family (x64) - Update: OracleJDK v8.441 - RHEL Family (x64) ## Deleted Items: - 1200609 ApacheTomcat9-Update.bes - 1200708 ApacheTomcat10-Update.bes - 1201301 ApacheTomcat11-Update.bes - 26900102 MySQL-Update.bes - 26900202 MySQL-Update.bes - 26900402 MySQL-Update.bes - 26900602 MySQL-Update.bes - 26900702 MySQL-Update.bes - 26900802 MySQL-Update.bes - 26901002 MySQL-Update.bes - 26901102 MySQL-Update.bes - 26901202 MySQL-Update.bes - 26901302 MySQL-Update.bes - 26901402 MySQL-Update.bes - 5700105 MongoDB-Update.bes - 5700205 MongoDB-Update.bes - 5700305 MongoDB-Update.bes - 5700405 MongoDB-Update.bes - 5700605 MongoDB-Update.bes - 5701005 MongoDB-Update.bes - 5701105 MongoDB-Update.bes - 5701402 MongoDB-Update.bes - 5701502 MongoDB-Update.bes - 5701702 MongoDB-Update.bes - 5701902 MongoDB-Update.bes - 5702002 MongoDB-Update.bes - 7100703 OracleJDK-Update.bes - 7100803 OracleJDK-Update.bes - 7101002 OracleJDK-Update.bes - 7101202 OracleJDK-Update.bes - 7101303 OracleJDK-Update.bes - 7101403 OracleJDK-Update.bes - 7101503 OracleJDK-Update.bes - 575005002 RedHatJBoss8-Update-NonWindows.bes ## Reason for Update: - New Software Releases from Vendors - The older fixlets of MongoDB 7.0, MongoDB 8.0, Tomcat 9, Tomcat 10, Tomcat 11, MySQL 8.0, MySQL 9, JDK 8, JDK 11, JDK 17 and JDK 21 have been archived. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v54 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 28 06:34:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 28 Apr 2025 08:34:58 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-04-28 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 20 Total Fixlets in Site: 459 Release Date: 2025-04-28 Updated Fixlets: 64004101 Microsoft Edge WebView2 Runtime v135.0.3179.98 49300101 Numara v5.8.4 53800201 spacedesk Windows DRIVER v2.1.45.0 9400201 Tableau Reader v2025.1.1 300301 Adobe DNG Converter v17.3 901901 AWS Command Line Interface v2 v2.27.2.0 5603601 Windows Defender Virus Definitions v1.427.492.0 11000101 WinMerge v2.16.48 5601701 PowerShell v7.5.1 59400101 Syncovery v11.3.3 62200101 Duplicati v2.1.0.117 11600301 XnViewMP v1.8.8.0 9400101 Tableau Desktop v2025.1.1 2700101 Remote Desktop Manager Enterprise v2025.1.33.0 11600201 XnView v2.52.1 54300101 Dolt v1.52.2 60800201 Artweaver Plus 7 v8.0.4.3029 29600101 Vim v9.1.1343 11600101 XnConvert v1.105.0.0 60800101 Artweaver Free v8.0.4.3029 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 28 06:37:05 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 28 Apr 2025 08:37:05 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-04-28 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 1 Total Fixlets in Site: 47 Release Date: 2025-04-28 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 64004501 PowerShell v7.5.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 28 07:53:34 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 28 Apr 2025 09:53:34 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-04-28 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 25 Total Fixlets in Site: 2978 Total CVEs Covered: 857 Release Date: 2025-04-28 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 37510 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 10 35080 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 35090 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 35100 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 10 37540 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2022 35110 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 SP2 29480 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2019 37550 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2008 R2 29490 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 10 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 35130 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 35140 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 37070 Linux Kernel Out-of-Bounds Read Vulnerability - Ubuntu 35150 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 29520 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2022 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 37080 Linux Kernel Out-of-Bounds Access Vulnerability - Ubuntu 29530 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 11 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 37490 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2016 37500 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2019 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Apr 28 11:07:47 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 28 Apr 2025 13:07:47 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-04-28 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505657903] 5056579: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 24H2 for ARM64 - Windows 11 Version 24H2 - .NET Framework 3.5/4.8.1 - KB5056579 (arm64) * Major [ID:505657901] 5056579: Cumulative Update Preview for .NET Framework 3.5 and 4.8.1 for Windows 11, version 24H2 - Windows 11 Version 24H2 - .NET Framework 3.5/4.8.1 - KB5056579 (x64) * Major [ID:505562703] 5055627: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5055627 (arm64) * Major [ID:505562701] 5055627: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5055627 (x64) Modified: * Major [ID:451080702] 4510807: On-demand hotfix update package 2 for SQL Server 2016 SP2 CU7 - SQL Server 2016 SP2 - KB4510807 (x64) * Major [ID:504685601] MS24-NOV: Security Update for SQL Server 2016 Service Pack 3 CU - SQL Server 2016 SP3 - KB5046856 (x64)) Reason for Update: * New preview updates for .NET Framework and Windows 11 version 24H2. * Relevance has been modified for SQL fixlets. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4533 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 05:48:26 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 08:48:26 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Dlz-Ldap-Enum - Raspbian 11 (armhf) (ID: 25042801) * Unspecified - Gadmin-Bind-Dbg - Raspbian 11 (armhf) (ID: 25042802) * Unspecified - Ifupdown - Raspbian 11 (armhf) (ID: 25042803) * Unspecified - Isc-Dhcp-Client - Raspbian 11 (armhf) (ID: 25042804) * Unspecified - Isc-Dhcp-Common - Raspbian 11 (armhf) (ID: 25042805) Published Site Version: * Patches for Raspbian 11, version 51. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 05:52:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 08:52:52 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLBA-2024:9132 - Open-Vm-Tools Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24913201) * RLBA-2024:9225 - Crash-Gcore-Command Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24922501) * RLBA-2024:9226 - Mstflint Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24922601) * RLSA-2024:9281 - Python-Jwcrypto Security Update - RockyLinux 9 x86_64 (ID: 24928101) Published Site Version: * Patches for Rocky Linux 9, version 48. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 05:49:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 08:49:16 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5907-1 - Linux Security Update - Debian 12 (amd64) (ID: 59070101) Published Site Version: * Patches for Debian 12, version 96. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 06:55:06 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 08:55:06 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-29 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 8101888 Adobe Acrobat Reader 2025.001.20474 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 8101883 Adobe Acrobat Reader 2025.001.20474 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8101886 Adobe Acrobat Reader 2025.001.20474 Available - Adobe Acrobat Reader - Continuous Track (x64) * 8101881 Adobe Acrobat Reader 2025.001.20474 Available - Adobe Acrobat Reader - Continuous Track * 9101565 Adobe Acrobat 2025.001.20474 Available - Adobe Acrobat - Continuous Track (x64) * 9101564 Adobe Acrobat 2025.001.20474 Available - Adobe Acrobat - Continuous Track Modified : * 8101882 Adobe Acrobat Reader 2025.001.20458 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101875 Adobe Acrobat Reader 2025.001.20458 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101880 Adobe Acrobat Reader 2025.001.20458 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101873 Adobe Acrobat Reader 2025.001.20458 Available - Adobe Acrobat Reader - Continuous Track (Superseded) * 9101563 Adobe Acrobat 2025.001.20458 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 9101562 Adobe Acrobat 2025.001.20458 Available - Adobe Acrobat - Continuous Track (Superseded Reason : * New update for Adobe. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2316 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 07:47:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 10:47:27 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for RHEL 8 published 2025-04-29 Message-ID: Content in the Patches for RHEL 8 Extended Support site has been added: RHSA-2025:4029 Red Hat Security Advisory: thunderbird security update - Red Hat Enterprise Linux 8.8 EUS (x64) Content in the Patches for RHEL 8 Extended Support site has been superseded: RHSA-2025:2958 Red Hat Security Advisory: thunderbird security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) Reason for Update: Red Hat released new EUS content. Actions to Take: None Published site version: Patches for RHEL 8 Extended Support, version 160 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 07:58:11 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 09:58:11 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2025-04-29 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - OracleDB 19c on Linux - 2025-04 Precheck - ASM - OracleDB 19c on Linux - PSU 2025-04 Precheck - ASM - OracleDB 19c on Linux - PSU 2025-04 Patch - ASM - OracleDB 19c on Linux - PSU 2025-04 Rollback - RAC - OracleDB 19c on Linux - PSU 2025-04 Precheck - RAC - OracleDB 19c on Linux - PSU 2025-04 Patch - RAC - OracleDB 19c on Linux - PSU 2025-04 Rollback - SDB - OracleDB 19c on Linux - PSU 2025-04 Precheck - SDB - OracleDB 19c on Linux - PSU 2025-04 Patch - SDB - OracleDB 19c on Linux - PSU 2025-04 Rollback - OracleDB 19c on Linux - 2025-04 Patch - ASM - OracleDB 19c on Linux - OJVM 2025-04 PRECHECK - ASM - OracleDB 19c on Linux - OJVM 2025-04 Patch - ASM - OracleDB 19c on Linux - OJVM 2025-04 Rollback - RAC - OracleDB 19c on Linux - OJVM 2025-04 PRECHECK - RAC - OracleDB 19c on Linux - OJVM 2025-04 Patch - RAC - OracleDB 19c on Linux - OJVM 2025-04 Rollback - SDB - OracleDB 19c on Linux -OJVM 2025-04 PRECHECK - SDB - OracleDB 19c on Linux -OJVM 2025-04 Patch - OracleDB 19c on Linux - 2025-04 Rollback - SDB - OracleDB 19c on Linux -OJVM 2025-04 Rollback - SDB - OracleDB 19c on Linux -OJDK 2025-04 Patch - SDB - OracleDB 19c on Linux -OJDK 2025-04 Rollback - ASM - OracleDB 19c on Linux - OJDK 2025-04 Patch - ASM - OracleDB 19c on Linux - OJDK 2025-04 Rollback - ASM - OracleDB 19c on Linux - 2025-04 Precheck - RAC - OracleDB 19c on Linux - OJDK 2025-04 Patch - RAC - OracleDB 19c on Linux - OJDK 2025-04 Rollback - ASM - OracleDB 19c on Linux - 2025-04 Patch - ASM - OracleDB 19c on Linux - 2025-04 Rollback - RAC - OracleDB 19c on Linux - 2025-04 Precheck - RAC - OracleDB 19c on Linux - 2025-04 Patch - RAC - OracleDB 19c on Linux - 2025-04 Rollback ## Modified Items: - Update OracleDB Patch List and update scripts for PSU,OJVM,OJDK (NON-ASM) - Update OracleDB Patch List and update scripts for PSU,OJVM,OJDK (ASM) ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v55 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Apr 29 08:24:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 29 Apr 2025 11:24:52 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-04-29 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat DC 25.001.20476 (Continuous Track) Available - Mac OS X (ID: 10152198) Adobe Acrobat Reader DC 25.001.20476 (Continuous Track) Available - Mac OS X (ID: 10152199) Published site version: Updates for Mac Applications, version 748. Reasons for Update: A newer version of Adobe continuous for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 30 06:39:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 30 Apr 2025 08:39:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-04-30 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011672 Google Chrome 136.0.7103.49 Available * 6082311 Mozilla Firefox 138.0 Available * 6082180 Mozilla Firefox (x64) 138.0 Available * 6082315 Mozilla Firefox 128.10.0 ESR Available * 6082313 Mozilla Firefox (x64) 128.10.0 ESR Available * 6082319 Mozilla Firefox 115.23.0 ESR Available * 6082317 Mozilla Firefox (x64) 115.23.0 ESR Available * 6101742 Mozilla Thunderbird 128.10.0 ESR Available * 6101744 Mozilla Thunderbird 138.0 Available * 5058283 Webex Meetings Desktop App 45.2.2.20 Available Modified : * 14011670 Google Chrome 135.0.7049.115 Available (Superseded) * 6082309 Mozilla Firefox 137.0.2 Available (Superseded) * 6082178 Mozilla Firefox (x64) 137.0.2 Available (Superseded) * 6082301 Mozilla Firefox 128.9.0 ESR Available (Superseded) * 6082299 Mozilla Firefox (x64) 128.9.0 ESR Available (Superseded) * 6082305 Mozilla Firefox 115.22.0 ESR Available (Superseded) * 6082303 Mozilla Firefox (x64) 115.22.0 ESR Available (Superseded) * 6101738 Mozilla Thunderbird 128.9.2 ESR Available (Superseded) * 6101740 Mozilla Thunderbird 137.0.2 Available (Superseded) * 5058195 Webex Meetings Desktop App 45.2.1.2 Available (Superseded) Reason : * New update for Chrome, Firefox, Thunderbird and Webex. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2317 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 30 09:20:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 30 Apr 2025 21:50:15 +0530 Subject: [BESAdmin-Announcements] BigFix Inventory: Catalog 20250428 Update published 2025-04-30 Message-ID: BigFix Inventory Team is proud to announce the new version of BigFix Inventory Catalog. Product: BigFix Inventory Catalog update 20250428 Published site version: BigFix Inventory Discovery - version 18 Note: BigFix Inventory v10 site is deprecated and no longer used for updates. Features: Key updates in HCL BigFix Inventory Catalog 20250428: - Discovery of 140+ new software versions with the use of standard and template signatures including but not limited to the following software manufacturers like Adobe, JetBrains and Rapid7. - Delivered Idea BFINV-I-400 . To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20250428-ReleaseNotes.pdf To view the complete catalog content, use the Software Components report in BigFix Inventory. Actions needed: To apply new discovery capability, run the Server Software Catalog Update Fixlet (check new BigFix Inventory Discovery site) from the BigFix console and then wait for the next data import. If BigFix Inventory Discovery site is not visible 1. Check for License Update via BigFix License Overview (refresh if needed) License Overview dashboard 2. Enable new sites: BigFix Inventory and BigFix Inventory Discovery. Selecting Sites Starting from 20240612 release, Catalog updates are available from a new BigFix Inventory Discovery site, and BigFix Inventory server version 11.x is required for all subsequent catalog releases. For more information about how to install, maintain, and use BigFix Inventory application, refer to the user documentation: https://help.hcl-software.com/bigfix/11.0/inventory/welcome/BigFix_Inventory_welcome.html To find out more about Catalog Updates, visit: Catalog Overview We hope you find this latest release of BigFix Inventory Catalog content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 30 09:56:36 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 30 Apr 2025 12:56:36 -0400 Subject: [BESAdmin-Announcements] Availability of BigFix Compliance Analytics version 2.0 Patch 13 Message-ID: HCL BigFix is pleased to announce the release of BigFix Compliance Analytics version 2.0 Patch 13 *Product*: BigFix Compliance *Title*: Availability of BigFix Compliance Analytics version 2.0 Patch 13 *Published site:* SCM Reporting 159 BigFix Compliance Analytics version 2.0 Patch 13 includes enhancements and fixes.[AZ1] <#_msocom_1> [HRNP2] <#_msocom_2> Highlights of this release: ? Upgrade Rails to 6.1.7.9 ? Update JRE Version to 8.0.8.40 ? Update IBM WebSphere Application Server Liberty version to 25.0.0.2. Following are the Fixed Jira Tickets in this release. IBM SDK Java Technology Edition Version updated to 8.0.8.40 to address vulnerabilities: CVE-2024-10917 IBM WebSphere Liberty Package Version updated to 25.0.0.2 to address vulnerabilities: CVE-2024-40094 [BSU-16676] Incomplete compliance import still running but not processing if server restart [BSU-16409] Issue on the formatting of the CSV report from BigFix Compliance [BSU-15585] SCA import performance [BSU-17005] Compliance exceptions error [BSU-16899] Update fixlet # 1005 - Download NVD CVE Data Files and include nvdcve-1.1-2025.json.gz [BSU-16557] BigFix Compliance does not logout user when session timeout expires [BFC-7733] SCM Exceptions API to create/update an Exception [BFC-7692] Request to enhance subject line in Report Subscriptions [BFC-7691] Compliance Audit Logging Updated CSP Headers and Missing Anti-clickjacking Headers. Actions to take: 1. Upgrade BigFix Compliance Analytics to version 2.0.13 to take advantage of the fixes. For first-time installation: 1. In the License Overview Dashboard in the BigFix console (BigFix Management domain), enable the SCM Reporting site. 2. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 3. Select the Fixlet named BigFix Compliance Server 2.0 - First-time Install Fixlet under the BigFix Compliance Install/Upgrade menu tree node. 4. Follow the Fixlet instructions and take the associated action to install your BigFix Compliance deployment. For upgrade installation: Refer to the prescribed upgrade steps for the BigFix Compliance version that you are using. IMPORTANT: Before you start any upgrade process, perform a server and database backup. A. For BigFix Compliance Analytics versions 1.9.x, 1.10.x and 2.0.x: 1. Make sure that you complete the server and database backup. 2. It is recommended to stop the BigFix Compliance Server or at least disable scheduled Data Imports to ensure that Data Import is not in progress during the upgrade.[AZ3] <#_msocom_3> 3. In the Security Configuration domain in the console, open the Configuration Management navigation tree. 4. Under the BigFix Compliance Install/Upgrade menu tree item, select the BigFix Compliance Server 2.0 - Upgrade Fixlet which automatically installs and upgrades to the new version. 5. Follow the Fixlet instructions and take the associated action to upgrade your BigFix Compliance deployment. 6. Update the data schema. To do this, log in to the BigFix Compliance web interface from the host server and proceed with configuration. Upgrading the data scheme is expected and it will take some time to complete. NOTE: Automatic upgrade installation only affects installations running under the LocalSystem account. Follow the Fixlet instructions to install the update manually if this fix cannot be applied. B. For BigFix Compliance Analytics versions before 1.9: 1. Manually upgrade to version 1.10.1.48. The 1.10.1.48 installer can be found here http://software.bigfix.com/download/bfc/server/1.10/bfc-server-1.10.1.48.exe 2. After manually upgrading to version 1.10.1.48, use the BigFix Compliance Server 2.0 Upgrade Fixlet to upgrade to version 2.0 (See step A). More information: ? BigFix Compliance Guides: https://help.hcltechsw.com/bigfix/10.0/compliance/analytics.html ? BigFix Forums - Release Announcements Channel: https://forum.bigfix.com/c/release-announcements/compliance BigFix Compliance team HCL BigFix ------------------------------ Maybe we can make a dedicated section and in new features put high level description of CVE changes and SSO Banner. [AZ1] <#_msoanchor_1> [HRNP2] <#_msoanchor_2>Done [AZ3] <#_msoanchor_3>Added this. -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Apr 30 11:05:14 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 30 Apr 2025 13:05:14 -0500 Subject: [BESAdmin-Announcements] Content Release: ESXi Content published 2025-04-30 Message-ID: Content in the Patches for ESXi site has been modified. Reasons for Update: Patches for ESXi 8.0: Apr 2025 https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3e-release-notes.html ESXi_8.0.3-0.70.24674464.bes esx-update_8.0.3-0.70.24674464.bes esxio-update_8.0.3-0.70.24674464.bes Mellanox-nmlx5_4.23.6.5-1vmw.803.0.70.24674464.bes Broadcom-ntg3_4.1.15.0-4vmw.803.0.70.24674464.bes Broadcom-ELX-lpfc_14.4.0.40-35vmw.803.0.70.24674464.bes Intel-Volume-Mgmt-Device_3.0.0.1010-12vmw.803.0.70.24674464.bes VMware-NVMeoF-TCP_1.0.1.32-1vmw.803.0.70.24674464.bes VMware-vmkusb_0.1-23vmw.803.0.70.24674464.bes ESXi80U3e-24674464.bes ESXi80U3se-24659227 (Superseded).bes ESXi_8.0.3-0.65.24659227 (Superseded).bes esx-update_8.0.3-0.65.24659227 (Superseded).bes esxio-update_8.0.3-0.65.24659227 (Superseded).bes VMware-VM-Tools_12.5.1.24649672-24659227.bes Published site version: *Patches for ESXi - Site Version: 145 Actions to Take: *Gathering of the site will have the new content automatically applied HCL BigFix - Lifecycle Team -------------- next part -------------- An HTML attachment was scrubbed... URL: