From besadmin-announcements at bigmail.bigfix.com Mon Jun 2 07:49:28 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Jun 2025 09:49:28 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates fir Windows Applications Extended published 2025-06-02 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 25 Total Fixlets in Site: 468 Release Date: 2025-06-02 New Fixlets: Updated Fixlets: 19300101 DBeaver v25.1.0.0 37300101 Argus Monitor v7.2.4.3044 50500101 Juju v3.6.6 11800201 Zoom Outlook Plugin v6.4.10 60500101 Mp3tag v3.30.0.0 74100101 Rocket.Chat v4.5.0 901901 AWS Command Line Interface v2 v2.27.26.0 5603601 Windows Defender Virus Definitions v1.429.293.0 28600101 balena-cli v22.0.5.0 25500201 Double Commander (x32) v1.1.25 59400101 Syncovery v11.4.3 25500101 Double Commander (x64) v1.1.25 48300101 Bitwarden v2025.5.0 54300101 Dolt v1.54.1 6700101 OBS Studio v31.0.3 72400201 Bluebeam Revu v21.6.0 5801301 Firefox Developer Edition (x64 en-US) v140.0 29600101 Vim v9.1.1425 12400101 ShareX v17.1.0 22400101 Koodo Reader v2.0.0 4000101 GoodSync v12.9.1.1 53600101 Seq v10.0.14117.0 74100201 Rocket.Chat v4.5.0 79800101 Able2Extract Professional v20.0.3 64004101 Microsoft Edge WebView2 Runtime v137.0.3296.52 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 2 08:00:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Jun 2025 10:00:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MacOS Applications Extended published 2025-06-02 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 5 Total Fixlets in Site: 67 Release Date: 2025-06-02 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 74500101 MeetingBar v4.11.2 19300201 DBeaver v25.1.0 48300201 Bitwarden v2025.5.0 62000201 Boxdrive v2.45 9500201 Tailscale v1.84.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 2 08:27:25 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Jun 2025 11:27:25 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-02 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Firefox 139.0.1 Available - Mac OS X (ID: 20750272) Zoom 6.4.12 (56699) Available - Mac OS X (ID: 51000125) Published site version: Updates for Mac Applications, version 758. Reasons for Update: A newer version of Firefox and Zoom for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 2 09:24:35 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Jun 2025 11:24:35 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-02 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 130 Total Fixlets in Site: 3048 Total CVEs Covered: 870 Release Date: 2025-06-02 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 29700 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 36360 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2016 29710 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 R2 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 29720 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 29730 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 10280 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 29740 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 2610 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 7 SP1 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 29760 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 36420 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2019 29770 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 3670 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Vista SP2 24150 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 SP2 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 37490 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2016 38010 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2016 37500 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2019 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL 37510 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 10 28810 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability - Any Operating System 38030 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 R2 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 38040 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 37540 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2022 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 37550 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2008 R2 32430 Microsoft WinVerifyTrust function Remote Code Execution - Any Version of Windows 36530 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2008 SP2 33970 Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability - Any Operating System 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 38080 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2019 30400 OSGeo GeoServer JAI-EXT Code Injection Vulnerability - Any Operating System 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 1230 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 8.1 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36060 ProjectSend Improper Authentication Vulnerability - Any Operating System 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 19170 Webmin Command Injection Vulnerability - Any Version of Linux 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 37100 Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability - Any Operating System 36590 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2022 38130 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 10 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 37110 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability - Any Operating System 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 14090 Cacti Command Injection Vulnerability - Any Operating System 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 14610 Teclib GLPI Remote Code Execution Vulnerability - Any Operating System 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 38170 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2008 SP2 8990 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 R2 11560 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 4400 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 SP2 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 36660 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2008 R2 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 23870 Multiple SugarCRM Products Remote Code Execution Vulnerability - Any Operating System 38210 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2022 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 22340 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 8 Gold 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 28490 Atlassian Confluence Data Center and Server Template Injection Vulnerability - Any Operating System 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 36170 Craft CMS Code Injection Vulnerability - Any Operating System 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 36690 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 11 24400 Microsoft Office Uninitialized Memory Use Vulnerability - Office 15700 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Windows 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 38240 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2008 R2 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 1390 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 8.1 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 15240 WSO2 Multiple Products Unrestrictive Upload of File Vulnerability - Any Operating System 27530 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability - Any Operating System 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 38290 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 11 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 35760 Microsoft Outlook Improper Input Validation Vulnerability - Office 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 14270 Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability - Any Operating System 28100 Joomla! Improper Access Control Vulnerability - Any Operating System 27590 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability - Any Operating System 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 12750 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of Windows 28110 Apache Superset Insecure Default Initialization of Resource Vulnerability - Any Operating System 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 31200 Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability - Any Operating System 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 16360 Trihedral VTScada (formerly VTS) Denial-of-Service Vulnerability - Any Version of Windows 10220 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2012 14320 dotCMS Unrestricted Upload of File Vulnerability - Any Operating System 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 36350 SimpleHelp Path Traversal Vulnerability - Any Operating System -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 2 11:17:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Jun 2025 13:17:58 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-02 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:506217007] 5062170: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5062170 (arm64) * Major [ID:506217005] 5062170: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5062170 (x64) * Major [ID:506217003] 5062170: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5062170 (arm64) * Major [ID:506217001] 5062170: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5062170 (x64) Modified: * Major [ID:501387227] MS22-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - .NET Framework 3.5 - KB5013638 (x64) (Superseded) Reason for Update: * New OOB updates from Microsoft. * Old update has been superseded. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4549 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 05:48:11 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 08:48:11 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Raspbian 11 Message-ID: New content have been added to the Patches for Raspbian 11 site. New Fixlets: * Unspecified - Krb5-Locales - Raspbian 11 (all) (ID: 25053101) * Unspecified - Mydumper - Raspbian 11 (armhf) (ID: 25053102) * Unspecified - Libc-Bin - Raspbian 11 (armhf) (ID: 25060101) * Unspecified - Libc-L10n - Raspbian 11 (all) (ID: 25060102) * Unspecified - Locales - Raspbian 11 (all) (ID: 25060103) * Unspecified - Net-Tools - Raspbian 11 (armhf) (ID: 25060201) Published Site Version: * Patches for Raspbian 11, version 55. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 05:49:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 08:49:23 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 11 Message-ID: New content have been added to the Patches for Debian 11 site. New Fixlets: * Unspecified - Krb5-Locales - Debian 11 (amd64) (ID: 25053101) Published Site Version: * Patches for Debian 11, version 121. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 05:50:20 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 08:50:20 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Libnss-Systemd - Debian 12 (amd64) (ID: 25053001) * Unspecified - Libpam-Systemd - Debian 12 (amd64) (ID: 25053002) * Unspecified - Systemd-Sysv - Debian 12 (amd64) (ID: 25053003) * Unspecified - Systemd-Timesyncd - Debian 12 (amd64) (ID: 25053004) * Unspecified - Udev - Debian 12 (amd64) (ID: 25053005) * DSA-5929-1 - Chromium Security Update - Debian 12 (amd64) (ID: 59290101) * DSA-5930-1 - Libavif Security Update - Debian 12 (amd64) (ID: 59300101) * DSA-5931-1 - Systemd Security Update - Debian 12 (amd64) (ID: 59310101) * DSA-5932-1 - Thunderbird Security Update - Debian 12 (amd64) (ID: 59320101) * DSA-5933-1 - Tcpdf Security Update - Debian 12 (amd64) (ID: 59330101) Published Site Version: * Patches for Debian 12, version 105. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 07:00:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 09:00:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-03 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011682 Google Chrome 137.0.7151.69 Available * 5058317 Microsoft Edge Stable Build 137.0.3296.58 Available (x64) * 5058315 Microsoft Edge Stable Build 137.0.3296.58 Available * 8101892 Adobe Acrobat Reader 2025.001.20521 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 8101887 Adobe Acrobat Reader 2025.001.20521 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8101890 Adobe Acrobat Reader 2025.001.20521 Available - Adobe Acrobat Reader - Continuous Track (x64) * 8101885 Adobe Acrobat Reader 2025.001.20521 Available - Adobe Acrobat Reader - Continuous Track * 9101567 Adobe Acrobat 2025.001.20521 Available - Adobe Acrobat - Continuous Track (x64) * 9101566 Adobe Acrobat 2025.001.20521 Available - Adobe Acrobat - Continuous Track Modified : * 14011680 Google Chrome 137.0.7151.56 Available (Superseded) * 9101565 Adobe Acrobat 2025.001.20474 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 9101564 Adobe Acrobat 2025.001.20474 Available - Adobe Acrobat - Continuous Track (Superseded) * 8101888 Adobe Acrobat Reader 2025.001.20474 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101886 Adobe Acrobat Reader 2025.001.20474 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101883 Adobe Acrobat Reader 2025.001.20474 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101881 Adobe Acrobat Reader 2025.001.20474 Available - Adobe Acrobat Reader - Continuous Track (Supersede Reason : * New update for Chrome and Adobe. Important Note: * None . Published Site Version: * Updates for Windows Applications, Version: 2333 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 08:17:53 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 11:17:53 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Microsoft Edge, published 2025-06-02 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Microsoft Edge. *Security Benchmark:* Microsoft Edge STIG SCAP Benchmark V2R2. *Published Sites:* DISA STIG Checklist for Microsoft Edge, site version 7. (The site version is provided for air-gap customers.) *Details:* ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html?hl=using%2Csynchronize%2Ccustom%2Cchecks%2Cwizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! * -- The BigFix Compliance team.* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 08:57:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 11:57:56 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-03 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat DC 25.001.20521 (Continuous Track) Available - Mac OS X (ID: 10152200) Adobe Acrobat Reader DC 25.001.20521 (Continuous Track) Available - Mac OS X (ID: 10152201) Google Chrome 137.0.7151.69 Available - Mac OS X (ID: 83000207) Published site version: Updates for Mac Applications, version 759. Reasons for Update: A newer version of Adobe Continuous and Chrome for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 3 11:13:36 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Jun 2025 13:13:36 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-03 Message-ID: Content in the Patches for Windows site has been modified New: * Major [Id:500736139] 5007364: Update for Microsoft Visual Studio 2022 version 17.14.3 update - KB5007364 Reason for Update: * New Visual Studio update from Microsoft. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4550 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 4 06:53:43 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Jun 2025 08:53:43 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-04 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 6101760 Mozilla Thunderbird 139.0.1 Available * 5058339 Microsoft Edge Stable Build 137.0.3296.62 Available * 5058341 Microsoft Edge Stable Build 137.0.3296.62 Available (x64) Modified : * 5058315 Microsoft Edge Stable Build 137.0.3296.58 Available (Superseded) * 5058317 Microsoft Edge Stable Build 137.0.3296.58 Available (x64) (Superseded) * 5058309 Microsoft Edge Stable Build 137.0.3296.52 Available (Superseded) * 5058311 Microsoft Edge Stable Build 137.0.3296.52 Available (x64) (Superseded) Reason : * New update for Thunderbird and Edge. Important Note: * None . Published Site Version: * Updates for Windows Applications, Version: 2335 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 4 06:53:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Jun 2025 09:53:56 -0400 Subject: [BESAdmin-Announcements] Enhanced Security for SCM Middleware and Unix Checklists Message-ID: Product: BigFix Compliance Title: Enhanced Security for SCM Middleware and Unix Checklists At BigFix, we continuously invest in strengthening the security, consistency, and reliability of our platform. As part of this ongoing initiative, we?ve introduced key enhancements to the security of SCM Middleware and Unix checklists, along with improvements that promote more consistent compliance assessments and simplify the management of checklist content. What?s New? - We have introduced a more secure content delivery model for Middleware and Unix checklists. - With this enhancement, when the Environment Setup task Action is executed, it will securely download a sqlite_detect.db file from the external site - only after verifying the file?s integrity through a hash and SHA-256 checksum. This file contains all relevant detect scripts. - Using relevance, the agent will retrieve the IDs of all fixlets in the current checklist and extract the corresponding detect scripts for each ID, then execute them sequentially on the endpoint. - We added Desired Values for all checks across the checklists listed below in the table. - The Synchronize Custom Checks wizard is now supported for Unix and Middleware checklists. Why This Matters - This enhancement ensures that detect scripts are securely delivered at runtime and are no longer persistently stored or modifiable on endpoints. This adds an extra layer of protection by enabling compliance content to be executed in a secure, controlled, and verifiable manner, strengthening the reliability and trustworthiness of compliance checks across SCM Middleware and Unix checklists. - Inclusion of Desired Values across all checklists and support for synchronization of Middleware and Unix checklists via the Synchronize Custom Checks wizard, helps in achieving more consistent compliance assessments and streamlined content management. What?s Covered This enhancement applies to the following SCM checklists: Released Checklists SL Number Checklist Name Site Version 1 CIS Checklist for AIX 7.x 5 2 DISA STIG Checklist for AIX 7.x 11 3 CIS Checklist for Solaris 11.4 7 4 CIS Checklist for Solaris 11.1 3 5 DISA STIG Checklist for Solaris 11 20 6 CIS Checklist for MacOS 15 4 7 CIS Checklist for MacOS 14 9 8 CIS Checklist for MacOS 13 10 9 CIS Checklist for MacOS 12 9 10 DISA STIG Checklist for MacOS 15 2 11 DISA STIG Checklist for MacOS 14 5 12 DISA STIG Checklist for Mac OS 13 4 13 DISA STIG Checklist for Mac OS 12 7 14 CIS Checklist for MS SQL Server 2016 14 15 CIS Checklist for MS SQL Server 2014 7 16 CIS Checklist for MS SQL Server 2017 11 17 CIS Checklist for MS SQL Server 2019 18 18 CIS Checklist for MS SQL Server 2022 7 19 DISA STIG Checklist for MS SQL Server 2014 6 20 DISA STIG Checklist for MS SQL Server 2016 8 21 CIS Checklist for IBM DB2 11 on Linux 4 22 CIS Checklist for IBM DB2 11 on Windows 2 23 CIS Checklist for MS IIS 10 18 24 DISA STIG Checklist for MS IIS 10.0 18 25 CIS Checklist for Apache Server 2_4 on Linux 8 26 DISA STIG Checklist for Apache Server 2_4 on Windows 12 27 DISA STIG Checklist for Apache Server 2.4 on Linux 21 28 CIS Checklist for Apache Tomcat 10.1 on Linux 3 29 CIS Checklist for Apache Tomcat 10 on Linux 4 30 CIS Checklist for Apache Tomcat 9 on Linux 4 31 DISA STIG Checklist for Apache Tomcat 9 Server on Linux 7 32 CIS Checklist for Oracle 19C database on Windows 7 33 DISA STIG Checklist for Oracle Database 19c on Windows 2 34 CIS Checklist for Oracle 19C database on Linux 10 35 DISA Checklist for Oracle 19C database on Linux 6 What Stays Unchanged: - No changes to directory structures, script paths, or log file locations. - The way compliance is evaluated remains the same. - No SQLite installation is required on endpoints. Actions to take: - To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. Steps: Dashboard ?> License Overview ?> Select and Enable Site --> Gather Site - If you use custom sites, please update them to incorporate the latest content. You can do this using the Synchronize Custom Checks wizard. Note: *During the initial synchronization, you will notice that all checks are removed and then re-added.* Note: *Ensure that the Environment Setup Tasks are manually copied from the external site and remove the old environmental setup task for the first time. Starting with the next release, synchronization for these checklists will be fully seamless.* More information: To know more about the BigFix Compliance SCM checklists, please see the following resources: - BigFix Forum 1 - BigFix Compliance SCM Checklists 2 *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 4 08:57:32 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Jun 2025 11:57:32 -0400 Subject: [BESAdmin-Announcements] BigFix Patch now supports Patches for Alma Linux 9.5 on x86_64 Message-ID: BigFix Patch is pleased to announce that it has extended support to include Alma Linux 9 on x86_64 architecture. The new site called ?Patches for Alma Linux 9? uses dnf, which is the default package manager and contains content from the following channels for Alma Linux 9 systems: - Alma Linux 9.5 - BaseOS - Alma Linux 9.5 - AppStream - Alma Linux 9.5 - CodeReady Builder - Alma Linux 9.6 - BaseOS - Alma Linux 9.6 - AppStream - Alma Linux 9.6 - CodeReady Builder Actions to Take Alma Linux 9 requires BigFix Client version 11.0 Patch 4 (11.0.4.60). Subscribe to the ?Patches for Alma Linux 9? site from the License Overview Dashboard. If the site is not showing in the License Overview dashboard, update your license from the dashboard by clicking ?Check for license update?, then run the BigFix Administration Tool. Patches for Alma Linux 9 site uses CentOS R2 Download Plugin which is available in the Manage Download Plugins dashboard of the Patching Support site. Published Sites: Patches for Alma Linux 9, version 2 Patching Support, version 1213 Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 4 09:28:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Jun 2025 11:28:56 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-04 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505765301] 5057653: Update for Exchange Server 2016 CU23 - Exchange Server 2016 CU23 - KB5057653 (x64) * Major [ID:505765201] 5057652: Update for Exchange Server 2019 CU14 - Exchange Server 2019 CU14 - KB5057652 (x64) * Major [ID:505765101] 5057651: Update for Exchange Server 2019 CU15 - Exchange Server 2019 CU15 - KB5057651 (x64) * Major [ID:305188053] Office 2016 Version 16.0.18827.20140 Available - Current Channel - Office 2016 * Major [ID:305188096] Office 2016 Version 16.0.18827.20140 Available - Current Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305188099] Office 2016 Version 16.0.18827.20140 Available for Network Share for Office 2016 - Current Channel - Office 2016 * Major [ID:305188068] Office 2019 Version 16.0.18827.20140 Available - Current Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305188061] Office 2019 Version 16.0.18827.20140 Available - Current Channel - Office 2019 Retail * Major [ID:305188089] Office 2019 Version 16.0.18827.20140 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail * Major [ID:305188063] Office 2021 Version 16.0.18827.20140 Available - Current Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305188082] Office 2021 Version 16.0.18827.20140 Available - Current Channel - Office 2021 Retail * Major [ID:305188071] Office 2021 Version 16.0.18827.20140 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * Major [ID:305188093] Office 2024 Version 16.0.18827.20140 Available - Current Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305188076] Office 2024 Version 16.0.18827.20140 Available - Current Channel - Office 2024 Retail * Major [ID:305188060] Office 2024 Version 16.0.18827.20140 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * Major [ID:305188064] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Arabic) * Major [ID:305188074] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Bulgarian) * Major [ID:305188084] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Chinese (Simplified)) * Major [ID:305188062] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Chinese (Traditional)) * Major [ID:305188052] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Czech) * Major [ID:305188087] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Danish) * Major [ID:305188091] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Dutch) * Major [ID:305188077] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (English (United Kingdom)) * Major [ID:305188095] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (English (United States)) * Major [ID:305188070] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Finnish) * Major [ID:305188069] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (French) * Major [ID:305188056] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (German) * Major [ID:305188059] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Greek) * Major [ID:305188090] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hebrew) * Major [ID:305188066] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hindi) * Major [ID:305188057] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hungarian) * Major [ID:305188075] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Indonesian) * Major [ID:305188072] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Italian) * Major [ID:305188079] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Japanese) * Major [ID:305188073] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Korean) * Major [ID:305188088] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Lithuanian) * Major [ID:305188078] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Norwegian) * Major [ID:305188097] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Polish) * Major [ID:305188080] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Portugese (Portugal)) * Major [ID:305188055] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305188098] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Russian) * Major [ID:305188065] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Serbian Latin) * Major [ID:305188058] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Slovak) * Major [ID:305188051] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Slovenian) * Major [ID:305188054] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Spanish (Mexico)) * Major [ID:305188094] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Spanish) * Major [ID:305188050] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Swedish) * Major [ID:305188086] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Thai) * Major [ID:305188092] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Turkish) * Major [ID:305188081] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Ukrainian) * Major [ID:305188067] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Update from Local Client Cache) * Major [ID:305188083] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Vietnamese) * Major [ID:305188085] Office 365 Version 16.0.18827.20140 Available for Network Share for Office 365 - Current Channel - Office 365 Modified: * Major [ID:305188037] Office 2016 Version 16.0.18827.20128 Available - Current Channel - Office 2016 (Superseded) * Major [ID:305188019] Office 2016 Version 16.0.18827.20128 Available - Current Channel - Office 2016 (Update from Local Client Cache) (Superseded) * Major [ID:305188049] Office 2016 Version 16.0.18827.20128 Available for Network Share for Office 2016 - Current Channel - Office 2016 (Superseded) * Major [ID:305188016] Office 2019 Version 16.0.18827.20128 Available - Current Channel - Office 2019 (Update from Local Client Cache) (Superseded) * Major [ID:305188025] Office 2019 Version 16.0.18827.20128 Available - Current Channel - Office 2019 Retail (Superseded) * Major [ID:305188048] Office 2019 Version 16.0.18827.20128 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail (Superseded) * Major [ID:305188003] Office 2021 Version 16.0.18827.20128 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) * Major [ID:305188023] Office 2021 Version 16.0.18827.20128 Available - Current Channel - Office 2021 Retail (Superseded) * Major [ID:305188009] Office 2021 Version 16.0.18827.20128 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * Major [ID:305188033] Office 2024 Version 16.0.18827.20128 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * Major [ID:305188005] Office 2024 Version 16.0.18827.20128 Available - Current Channel - Office 2024 Retail (Superseded) * Major [ID:305188032] Office 2024 Version 16.0.18827.20128 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * Major [ID:305188018] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Arabic) (Superseded) * Major [ID:305188013] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * Major [ID:305188021] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * Major [ID:305188045] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * Major [ID:305188002] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Czech) (Superseded) * Major [ID:305188030] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Danish) (Superseded) * Major [ID:305188039] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Dutch) (Superseded) * Major [ID:305188040] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * Major [ID:305188011] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (English (United States)) (Superseded) * Major [ID:305188038] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Finnish) (Superseded) * Major [ID:305188036] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (French) (Superseded) * Major [ID:305188008] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (German) (Superseded) * Major [ID:305188041] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Greek) (Superseded) * Major [ID:305188012] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Hebrew) (Superseded) * Major [ID:305188017] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Hindi) (Superseded) * Major [ID:305188043] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Hungarian) (Superseded) * Major [ID:305188046] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Indonesian) (Superseded) * Major [ID:305188035] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Italian) (Superseded) * Major [ID:305188024] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Japanese) (Superseded) * Major [ID:305188028] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Korean) (Superseded) * Major [ID:305188044] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * Major [ID:305188004] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Norwegian) (Superseded) * Major [ID:305188047] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Polish) (Superseded) * Major [ID:305188010] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * Major [ID:305188014] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * Major [ID:305188001] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Russian) (Superseded) * Major [ID:305188027] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * Major [ID:305188031] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Slovak) (Superseded) * Major [ID:305188006] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Slovenian) (Superseded) * Major [ID:305188034] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * Major [ID:305188029] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Spanish) (Superseded) * Major [ID:305188022] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Swedish) (Superseded) * Major [ID:305188020] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Thai) (Superseded) * Major [ID:305188042] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Turkish) (Superseded) * Major [ID:305188007] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * Major [ID:305188000] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * Major [ID:305188026] Office 365 Version 16.0.18827.20128 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * Major [ID:305188015] Office 365 Version 16.0.18827.20128 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) Reason for Update: * New office fixlets from Microsoft and old office fixlets have been superseded * New updates for Exchange server from Microsoft. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4551 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:22:08 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:22:08 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2-2025-2856 - Pcs Security update - Amazon linux 2 x86_64 (ID: 2528561) * ALAS2-2025-2857 - Imagemagick Security update - Amazon linux 2 x86_64 (ID: 2528571) * ALAS2-2025-2859 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2528591) * ALAS2-2025-2860 - Libxml2 Security update - Amazon linux 2 x86_64 (ID: 2528601) * ALAS2-2025-2861 - Yelp-Xsl Security update - Amazon linux 2 x86_64 (ID: 2528611) * ALAS2-2025-2862 - Yelp Security update - Amazon linux 2 x86_64 (ID: 2528621) * ALAS2-2025-2863 - Nerdctl Security update - Amazon linux 2 x86_64 (ID: 2528631) * ALAS2-2025-2864 - Open-Vm-Tools Security update - Amazon linux 2 x86_64 (ID: 2528641) * ALAS2-2025-2865 - Kernel Security update - Amazon linux 2 x86_64 (ID: 2528651) * ALAS2-2025-2866 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 2528661) * ALAS2-2025-2867 - Ppp Security update - Amazon linux 2 x86_64 (ID: 2528671) * ALAS2-2025-2868 - Python-Requests Security update - Amazon linux 2 x86_64 (ID: 2528681) * ALAS2-2025-2869 - Webkitgtk4 Security update - Amazon linux 2 x86_64 (ID: 2528691) * ALAS2-2025-2870 - Cri-Tools Security update - Amazon linux 2 x86_64 (ID: 2528701) * ALAS2-2025-2871 - Jetty Security update - Amazon linux 2 x86_64 (ID: 2528711) * ALAS2-2025-2872 - Microcode_Ctl Security update - Amazon linux 2 x86_64 (ID: 2528721) Published Site Version: * Patches for Amazon Linux 2, version 181. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:24:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:24:52 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2-2025-2856 - Pcs Security update - Amazon linux 2 aarch64 (ID: 2528561) * ALAS2-2025-2857 - Imagemagick Security update - Amazon linux 2 aarch64 (ID: 2528571) * ALAS2-2025-2859 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2528591) * ALAS2-2025-2860 - Libxml2 Security update - Amazon linux 2 aarch64 (ID: 2528601) * ALAS2-2025-2861 - Yelp-Xsl Security update - Amazon linux 2 aarch64 (ID: 2528611) * ALAS2-2025-2862 - Yelp Security update - Amazon linux 2 aarch64 (ID: 2528621) * ALAS2-2025-2863 - Nerdctl Security update - Amazon linux 2 aarch64 (ID: 2528631) * ALAS2-2025-2864 - Open-Vm-Tools Security update - Amazon linux 2 aarch64 (ID: 2528641) * ALAS2-2025-2865 - Kernel Security update - Amazon linux 2 aarch64 (ID: 2528651) * ALAS2-2025-2866 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 2528661) * ALAS2-2025-2867 - Ppp Security update - Amazon linux 2 aarch64 (ID: 2528671) * ALAS2-2025-2868 - Python-Requests Security update - Amazon linux 2 aarch64 (ID: 2528681) * ALAS2-2025-2869 - Webkitgtk4 Security update - Amazon linux 2 aarch64 (ID: 2528691) * ALAS2-2025-2870 - Cri-Tools Security update - Amazon linux 2 aarch64 (ID: 2528701) * ALAS2-2025-2871 - Jetty Security update - Amazon linux 2 aarch64 (ID: 2528711) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 109. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:26:21 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:26:21 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALASMARIADB10.5-2025-007 - Mariadb Security update - Amazon linux 2 x86_64 (ID: 250073) * ALASPOSTGRESQL13-2025-011 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 250113) * ALASTOMCAT9-2025-018 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 250183) * ALASFIREFOX-2025-038 - Firefox Security update - Amazon linux 2 x86_64 (ID: 250381) * ALASNITRO-ENCLAVES-2025-061 - Oci-Add-Hooks Security update - Amazon linux 2 x86_64 (ID: 250614) * ALASNITRO-ENCLAVES-2025-062 - Docker Security update - Amazon linux 2 x86_64 (ID: 250624) * ALASDOCKER-2025-063 - Runfinch-Finch Security update - Amazon linux 2 x86_64 (ID: 250633) * ALASDOCKER-2025-064 - Soci-Snapshotter Security update - Amazon linux 2 x86_64 (ID: 250643) * ALASDOCKER-2025-065 - Oci-Add-Hooks Security update - Amazon linux 2 x86_64 (ID: 250652) * ALASDOCKER-2025-066 - Docker Security update - Amazon linux 2 x86_64 (ID: 250662) * ALASKERNEL-5.15-2025-072 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250721) * ALASKERNEL-5.10-2025-093 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250932) * ALASKERNEL-5.4-2025-102 - Kernel Security update - Amazon linux 2 x86_64 (ID: 251021) Published Site Version: * Patches for Amazon Linux 2 Extras, version 4. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:27:47 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:27:47 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALASMARIADB10.5-2025-007 - Mariadb Security update - Amazon linux 2 aarch64 (ID: 250073) * ALASPOSTGRESQL13-2025-011 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 250113) * ALASTOMCAT9-2025-018 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 250183) * ALASFIREFOX-2025-038 - Firefox Security update - Amazon linux 2 aarch64 (ID: 250381) * ALASNITRO-ENCLAVES-2025-061 - Oci-Add-Hooks Security update - Amazon linux 2 aarch64 (ID: 250614) * ALASNITRO-ENCLAVES-2025-062 - Docker Security update - Amazon linux 2 aarch64 (ID: 250624) * ALASDOCKER-2025-063 - Runfinch-Finch Security update - Amazon linux 2 aarch64 (ID: 250633) * ALASDOCKER-2025-064 - Soci-Snapshotter Security update - Amazon linux 2 aarch64 (ID: 250643) * ALASDOCKER-2025-065 - Oci-Add-Hooks Security update - Amazon linux 2 aarch64 (ID: 250652) * ALASDOCKER-2025-066 - Docker Security update - Amazon linux 2 aarch64 (ID: 250662) * ALASKERNEL-5.15-2025-072 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250721) * ALASKERNEL-5.10-2025-093 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250932) * ALASKERNEL-5.4-2025-102 - Kernel Security update - Amazon linux 2 aarch64 (ID: 251021) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 4. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:29:21 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:29:21 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2025-972 - Imagemagick Security update - Amazon linux 2023 x86_64 (ID: 320259721) * ALAS2023-2025-973 - Postgresql16 Security update - Amazon linux 2023 x86_64 (ID: 320259731) * ALAS2023-2025-974 - Postgresql15 Security update - Amazon linux 2023 x86_64 (ID: 320259741) * ALAS2023-2025-975 - Postgresql17 Security update - Amazon linux 2023 x86_64 (ID: 320259751) * ALAS2023-2025-976 - Firefox Security update - Amazon linux 2023 x86_64 (ID: 320259761) * ALAS2023-2025-977 - Golang Security update - Amazon linux 2023 x86_64 (ID: 320259771) * ALAS2023-2025-978 - Oci-Add-Hooks Security update - Amazon linux 2023 x86_64 (ID: 320259781) * ALAS2023-2025-979 - Runfinch-Finch Security update - Amazon linux 2023 x86_64 (ID: 320259791) * ALAS2023-2025-980 - Nerdctl Security update - Amazon linux 2023 x86_64 (ID: 320259801) * ALAS2023-2025-981 - Soci-Snapshotter Security update - Amazon linux 2023 x86_64 (ID: 320259811) * ALAS2023-2025-982 - Open-Vm-Tools Security update - Amazon linux 2023 x86_64 (ID: 320259821) * ALAS2023-2025-984 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 320259841) * ALAS2023-2025-985 - Perl-Mojolicious Security update - Amazon linux 2023 x86_64 (ID: 320259851) * ALAS2023-2025-986 - Apache-Commons-Io Security update - Amazon linux 2023 x86_64 (ID: 320259861) * ALAS2023-2025-987 - Docker Security update - Amazon linux 2023 x86_64 (ID: 320259871) * ALAS2023-2025-988 - Glibc Security update - Amazon linux 2023 x86_64 (ID: 320259881) * ALAS2023-2025-989 - Libtasn1 Security update - Amazon linux 2023 x86_64 (ID: 320259891) * ALAS2023-2025-990 - Mariadb105 Security update - Amazon linux 2023 x86_64 (ID: 320259901) * ALAS2023-2025-991 - Microcode_Ctl Security update - Amazon linux 2023 x86_64 (ID: 320259911) * ALAS2023-2025-992 - Librsvg2 Security update - Amazon linux 2023 x86_64 (ID: 320259921) Published Site Version: * Patches for Amazon Linux 2023, version 58. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 03:30:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 06:30:56 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2025-972 - Imagemagick Security update - Amazon linux 2023 aarch64 (ID: 320259721) * ALAS2023-2025-973 - Postgresql16 Security update - Amazon linux 2023 aarch64 (ID: 320259731) * ALAS2023-2025-974 - Postgresql15 Security update - Amazon linux 2023 aarch64 (ID: 320259741) * ALAS2023-2025-975 - Postgresql17 Security update - Amazon linux 2023 aarch64 (ID: 320259751) * ALAS2023-2025-976 - Firefox Security update - Amazon linux 2023 aarch64 (ID: 320259761) * ALAS2023-2025-977 - Golang Security update - Amazon linux 2023 aarch64 (ID: 320259771) * ALAS2023-2025-978 - Oci-Add-Hooks Security update - Amazon linux 2023 aarch64 (ID: 320259781) * ALAS2023-2025-979 - Runfinch-Finch Security update - Amazon linux 2023 aarch64 (ID: 320259791) * ALAS2023-2025-980 - Nerdctl Security update - Amazon linux 2023 aarch64 (ID: 320259801) * ALAS2023-2025-981 - Soci-Snapshotter Security update - Amazon linux 2023 aarch64 (ID: 320259811) * ALAS2023-2025-982 - Open-Vm-Tools Security update - Amazon linux 2023 aarch64 (ID: 320259821) * ALAS2023-2025-984 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 320259841) * ALAS2023-2025-985 - Perl-Mojolicious Security update - Amazon linux 2023 aarch64 (ID: 320259851) * ALAS2023-2025-986 - Apache-Commons-Io Security update - Amazon linux 2023 aarch64 (ID: 320259861) * ALAS2023-2025-987 - Docker Security update - Amazon linux 2023 aarch64 (ID: 320259871) * ALAS2023-2025-988 - Glibc Security update - Amazon linux 2023 aarch64 (ID: 320259881) * ALAS2023-2025-989 - Libtasn1 Security update - Amazon linux 2023 aarch64 (ID: 320259891) * ALAS2023-2025-990 - Mariadb105 Security update - Amazon linux 2023 aarch64 (ID: 320259901) * ALAS2023-2025-992 - Librsvg2 Security update - Amazon linux 2023 aarch64 (ID: 320259921) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 38. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 06:46:44 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 08:46:44 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-05 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058319 .NET SDK 8.0.116 Available * 5058321 .NET SDK (x64) 8.0.116 Available * 5058323 .NET SDK 8.0.313 Available * 5058325 .NET SDK (x64) 8.0.313 Available * 5058327 .NET SDK 8.0.410 Available * 5058329 .NET SDK (x64) 8.0.410 Available * 5058331 .NET SDK 9.0.106 Available * 5058333 .NET SDK (x64) 9.0.106 Available * 5058335 .NET SDK (x64) 9.0.204 Available * 5058337 .NET SDK 9.0.204 Available * 5058370 Microsoft Edge Extended Stable Build 136.0.3240.115 Available * 5058372 Microsoft Edge Extended Stable Build 136.0.3240.115 Available (x64) Reason : * New update for .NET SDK and Edge. Important Note: * Bigfix now supports .NET SDK. Published Site Version: * Updates for Windows Applications, Version: 2336 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 07:36:50 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 09:36:50 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-05 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 35 Total Fixlets in Site: 467 Release Date: 2025-06-05 New Fixlets: Updated Fixlets: 2000901 WebexNonLocalized (x64) v45.6.0.32536 49300101 Numara v6.0.3 1000201 AnyDesk (EXE) v9.5.5 53800201 spacedesk Windows DRIVER v2.1.48.0 67700101 Vivaldi v7.4.3684.46 7100101 Oracle VM VirtualBox v7.1.10 5603601 Windows Defender Virus Definitions v1.429.360.0 72900101 BlueJ v5.5.0 8000101 Python v3.13.4 901901 AWS Command Line Interface v2 v2.27.29.0 5604001 Microsoft Azure PowerShell (MSI) v14.1.0.39806 28600101 balena-cli v22.0.6.0 45400101 Plottr v2025.6.3 59400101 Syncovery v11.4.4 7000101 Opera Stable v119.0.5497.70 2700101 Remote Desktop Manager Enterprise v2025.2.13.1 54300101 Dolt v1.54.2 5602501 Microsoft Visual Studio Code x64 v1.100.3 58700101 Speedify v15.6.3.13136 6300101 Nextcloud v3.16.5.20250602 63200201 Pale Moon v33.7.2 4100301 Google Drive v109.0.3.0 8900101 Slack v4.44.63.0 901201 AWS VPN Client v5.2.2 5801301 Firefox Developer Edition (x64 en-US) v140.0 8700101 Beyond Compare v5.1.0 8400101 Royal TS v7.3.50602.0 29600101 Vim v9.1.1432 19600101 VSCodium (x64) v1.100.33714 52000101 Coder v2.23.0.0 62400101 Microsoft Azure CLI (32-bit) v2.74.0 63200101 Pale Moon v33.7.2 67700201 Vivaldi v7.4.3684.46 67900101 SteelSeries GG v88.0.0 64004101 Microsoft Edge WebView2 Runtime v137.0.3296.62 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 07:49:00 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 09:49:00 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-06-05 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 7 Total Fixlets in Site: 67 Release Date: 2025-06-05 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 74500101 MeetingBar v4.11.4 2001001 Webex v45.6.0.32536 58700201 Speedify v15.5 51400301 Clockify Desktop v2.11.2 11500301 Wireshark v4.4.7 19600301 VSCodium v1.100.33714 63200301 Pale Moon v33.7.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 5 09:12:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Jun 2025 11:12:55 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-05 Message-ID: Total New Fixlets: 3 Total Updated Fixlets: 205 Total Fixlets in Site: 3051 Total CVEs Covered: 873 Release Date: 2025-06-05 New Fixlets: 38550 Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability - Any Operating System 38540 Craft CMS Code Injection Vulnerability - Any Operating System 38560 ConnectWise ScreenConnect Improper Authentication Vulnerability - Any Version of Windows Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 37410 HTTP/2 Rapid Reset Attack Vulnerability - RHEL 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 37470 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 37520 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 19610 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 36010 Linux Kernel Out-of-Bounds Write Vulnerability - SLE 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 19170 Webmin Command Injection Vulnerability - Any Version of Linux 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 15180 WordPress Social Warfare Plugin Cross-Site Scripting (XSS) Vulnerability - Any Operating System 24400 Microsoft Office Uninitialized Memory Use Vulnerability - Office 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 33110 Apple Multiple Products WebKit Memory Corruption Vulnerability - SLE 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 33130 Apple Multiple Products WebKit Code Execution Vulnerability - SLE 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 33160 Apple Multiple Products WebKit Type Confusion Vulnerability - SLE 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 33170 Apple Multiple Products WebKit Memory Corruption Vulnerability - SLE 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 33190 Apple Multiple Products WebKit Code Execution Vulnerability - SLE 36780 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2025 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 38330 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2025 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 33220 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - SLE 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 29680 Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 29690 Elasticsearch Remote Code Execution Vulnerability - Any Version of Linux 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 6 05:46:30 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Jun 2025 08:46:30 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5934-1 - Roundcube Security Update - Debian 12 (amd64) (ID: 59340101) * DSA-5935-1 - Chromium Security Update - Debian 12 (amd64) (ID: 59350101) Published Site Version: * Patches for Debian 12, version 106. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 6 07:15:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Jun 2025 09:15:55 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for RHEL 8 ESU published 2025-06-06 Message-ID: Content in the Patches for RHEL 8 Extended Support site has been added: RHSA-2025:8346 Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update - Red Hat Enterprise Linux 8.8 EUS (x64) Content in the Patches for RHEL 8 Extended Support site has been superseded: RHSA-2025:3094 Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update - Red Hat Enterprise Linux 8.8 EUS (x64) (Superseded) Reason for Update: Red Hat released new EUS content. Actions to Take: None Published site version: Patches for RHEL 8 Extended Support, version 166 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 6 08:09:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Jun 2025 10:09:24 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-06 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:500736147] 5007364: Update for Microsoft Visual Studio 2022 version 17.14.4 update - KB5007364 Reason for Update: * New update for Visual Studio 2022. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4552 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 6 08:44:39 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Jun 2025 10:44:39 -0500 Subject: [BESAdmin-Announcements] Content for the Patches for ESXI Site has been modified 2025-06-06 Message-ID: Content in the Patches for ESXi site has been modified. Reasons for Update: Patches for ESXi 7.0: May 2025 https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3v-release-notes.html ESXi_7.0.3-0.145.24723872.bes esx-update_7.0.3-0.145.24723872.bes Broadcom-ntg3_4.1.15.0-4vmw.703.0.145.24723872.bes VMware-NVMeoF-TCP_1.0.0.7-1vmw.703.0.145.24723872.bes ESXi_7.0.3-0.140.24723868 (Superseded).bes esx-update_7.0.3-0.140.24723868 (Superseded).bes VMware-VM-Tools_12.5.1.24649672-24723868.bes ESXi70U3v-24723872.bes ESXi70U3sv-24723868 (Superseded).bes Published site version: *Patches for ESXi - Site Version: 146 Actions to Take: *Gathering of the site will have the new content automatically applied HCL BigFix - Lifecycle Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 9 06:01:00 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Jun 2025 09:01:00 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Solaris 11, published 2025-06-05 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Solaris 11 to support a more recent version of the benchmark *Security Benchmark:* ORACLE SOLARIS 11 X86,V3R2 ORACLE SOLARIS 11 SPARC,V3R2 *Published Sites:* DISA STIG Checklist for Solaris 11, site version 21 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 0 ? Total Deleted Fixlets: 1 ? Total Fixlets in Site: 160 ? V-216325 - Recommendation has been dropped in the latest benchmark version. ? All the source IDs have been updated from STIG ID to Vul ID. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 9 06:24:57 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Jun 2025 08:24:57 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-09 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058343 Microsoft Edge Stable Build 137.0.3296.68 Available * 5058345 Microsoft Edge Stable Build 137.0.3296.68 Available (x64) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2337 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 9 06:58:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Jun 2025 08:58:55 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-09 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 23 Total Fixlets in Site: 467 Release Date: 2025-06-09 New Fixlets: Updated Fixlets: 2000901 WebexNonLocalized (x64) v45.6.0.32551 5300101 LibreOffice v25.2.4 55300101 K-Lite v19.0.0.0 59300101 UniversalForwarder v9.4.3.0 901901 AWS Command Line Interface v2 v2.27.31.0 5603601 Windows Defender Virus Definitions v1.429.424.0 11500201 Wireshark v4.4.7 2300201 CPUID HWMonitor v1.58 25500201 Double Commander (x32) v1.1.26 3800101 Go Programming Language v1.24.4 5700801 MongoDB Compass v1.46.3.0 23500101 PhraseExpress v17.0.128 25500101 Double Commander (x64) v1.1.26 48300101 Bitwarden v2025.5.1 51000101 Clink v1.7.20 5801301 Firefox Developer Edition (x64 en-US) v140.0 7800101 Podman v5.5.1 29600101 Vim v9.1.1441 6000101 NAPS2 v8.2.0 26500201 AOMEI Backupper v7.5.0.0 71600101 GitHub Desktop v3.4.20.0 900601 AWS SAM Command Line Interface v1.140.0 64004101 Microsoft Edge WebView2 Runtime v137.0.3296.68 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 9 07:14:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Jun 2025 09:14:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-06-09 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 5 Total Fixlets in Site: 67 Release Date: 2025-06-09 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 74500101 MeetingBar v4.11.5 2001001 Webex v45.6.0.32551 20600201 Insomnia v11.2.0 48300201 Bitwarden v2025.5.1 55500301 Nitro PDF Pro v14.9 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 9 08:54:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Jun 2025 10:54:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content pubnlished 2025-06-09 Message-ID: Total New Fixlets: 3 Total Updated Fixlets: 35 Total Fixlets in Site: 3054 Total CVEs Covered: 874 Release Date: 2025-06-09 New Fixlets: 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows Updated Fixlets: 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 37520 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 16530 Adobe Flash Player Integer Overflow Vulnerability - Any Version of Windows 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 17050 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 37530 Apple Multiple Products Arbitrary Read and Write Vulnerability - Apple iOS 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 15520 Oracle VirtualBox Insufficient Input Validation Vulnerability - Any Version of Windows 37410 HTTP/2 Rapid Reset Attack Vulnerability - RHEL 16420 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of Windows 16690 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 16820 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 16950 Adobe Flash Player and AIR Integer Overflow Vulnerability - Any Version of Windows 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 37440 HTTP/2 Rapid Reset Attack Vulnerability - Oracle Linux 37060 HTTP/2 Rapid Reset Attack Vulnerability - Ubuntu 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 15570 Adobe Flash Player and AIR Use-After-Free Vulnerability - Any Version of Windows 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 32470 Adobe Flash Player Double Free Vulnerablity - Any Version of Windows 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 16990 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 37470 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 16870 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 37480 Apple Multiple Products Arbitrary Read and Write Vulnerability - Any Version of MacOS 25450 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 15730 Adobe Flash Player Unspecified Vulnerability - Any Version of Windows 16630 Adobe Flash Player Dereferenced Pointer Vulnerability - Any Version of Windows 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 08:52:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 17:52:27 +0200 Subject: [BESAdmin-Announcements] BigFix moves to My HCL Software - switchover plan update Message-ID: Hello BigFixers! Let me give an update on this topic. In alignment with HCLSoftware strategy to streamline and simplify product access and licensing for our customers, BigFix is embracing the transition to My HCL Software (MHS). MHS will replace the existing portal for software downloads, license entitlement check and license allocation. The BigFix team expects the impact on customers to be low, while the user experience is greatly improved. In particular, no upgrade in product version or product configuration change is required. The *switchover* from the current system to My HCL Software for license entitlement checks and allocations will happen *on upcoming June 13th/14th*. The current system will be made unavailable at* 3PM EDT on Friday, June 13th*. We expect the downtime will last no more than 24 hours. Once MHS Portal is set up for license entitlement check and allocation, we will send out a communication. Please note: - after 3PM EDT on Friday, June 13th, you will no longer be able to login to the current system for entitlement check and allocation - the operation of your BigFix deployment will not be impacted; you can continue to use the product and the content. In the event your license or support contract is expiring, you may not be able to download new site versions until you allocate on your renewal. If your renewal just happened or is going to happen in these days, please allocate on your renewal before the switchover to ensure full operation. - during the downtime, you may see error message like "HTTPS connection to {https://gatherer.bigfix.com/cgi-bin/LicenseServerFrontend.pl} was unsuccessful due to {HTTP Error 28: Timeout was reached}" in the BigFix server logs. This is expected, until the new service is up and running, and you should not worry As a reminder: Access to the MHS Portal Access to My HCL Software 30 is already available, and granted with the same credentials currently in use for the existing portal - you can go and test it out! Software Downloads BigFix product installers can be downloaded from MHS today. We suggest you start trying that out to familiarize with the new interface. Installer downloads will continue to be available on the previous portal for a few more weeks. The BigFix team is here to support you during this transition. Thank you for your continuing support of BigFix! -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 04:48:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Jun 2025 07:48:52 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5936-1 - Libfile-Find-Rule-Perl Security Update - Debian 12 (amd64) (ID: 59360101) * DSA-5937-1 - Webkit2gtk Security Update - Debian 12 (amd64) (ID: 59370101) * DSA-5938-1 - Python-Tornado Security Update - Debian 12 (amd64) (ID: 59380101) * DSA-5939-1 - Gimp Security Update - Debian 12 (amd64) (ID: 59390101) * DSA-5940-1 - Modsecurity-Apache Security Update - Debian 12 (amd64) (ID: 59400101) Published Site Version: * Patches for Debian 12, version 107. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 04:52:49 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Jun 2025 07:52:49 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * 2506101 - Package Rocky-Release-9.6-1.3.El9.Noarch.Rpm is Available - RockyLinux 9 noarch (ID: 25061011) Published Site Version: * Patches for Rocky Linux 9, version 54. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 05:43:33 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 08:43:33 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Apache Server 2.4 on Linux, published 2025-06-09 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Apache Server 2.4 on Linux with bug fixes *Security Benchmark:* DISA STIG Apache Server 2.4 UNIX Site V2R5_Server V3R2 *Published Sites:* DISA STIG Checklist for Apache Server 2.4 on Linux, site version 22 (The site version is provided for air-gap customers.) *Details:* ? Total Updated Fixlets:1 ? Total Fixlets in Site: 48 ? Environment Setup Task is updated to handle absolute path with wildcards in the configuration files. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 05:45:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 08:45:56 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: New CIS Checklist for Apache Tomcat 11 on Linux, published 2025-06-05 Message-ID: *Product:* BigFix Compliance *Title:* New CIS Checklist for Apache Tomcat 11 on Linux *Security Benchmark:* CIS_Apache_Tomcat_11_Benchmark_v1.0.0 *Published Sites:* CIS Checklist for Apache Tomcat 11 on Linux, site version 1 (The site version is provided for air-gap customers.) *Details:* ? Total Fixlets in Site: 58 ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 13:43:45 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 16:43:45 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for Windows 2012 published 2025-06-10 Message-ID: Content in the ESU Patching Add-on for Windows 2012 site has been added: MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5060996 (x64) MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5060996 (x64) MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5060996 (x64) (Unentitled) MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5060996 (x64) (Unentitled) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5061018 (x64) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5061018 (x64) (Unentitled) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5061059 (x64) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5061059 (x64) (Unentitled) Content in the ESU Patching Add-on for Windows 2012 site has been superseded: MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5058380 (x64) (Superseded) MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5058380 (x64) (Superseded) MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5058380 (x64) (Unentitled) (Superseded) MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5058380 (x64) (Unentitled) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5058403 (x64) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5058403 (x64) (Unentitled) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5058451 (x64) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5058451 (x64) (Unentitled) (Superseded) Reason for Update: Microsoft released Extended Support Updates on June 10th Patch Tuesday. Actions to Take: Update any baselines containing the superseded fixlets. Published site version: ESU Patching Add-on for Windows 2012, version 40 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 14:01:39 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 17:01:39 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for Windows 2008 published 2025-06-10 Message-ID: Content in the ESU Patching Add-on for Windows 2008 site has been added: MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5060996 (x64) MS25-JUN: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5060996 MS25-JUN: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5060996 (x64) MS25-JUN: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5060996 (x64) (Unentitled) MS25-JUN: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5060996 (Unentitled) MS25-JUN: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5060996 (x64) (Unentitled) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5061078 (x64) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5061078 (x64) (Unentitled) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061026 MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061026 (x64) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061026 (Unentitled) MS25-JUN: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061026 (x64) (Unentitled) MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 R2 - KB5061036 (x64) MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 R2 - KB5061036 (x64) (Unentitled) MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5061072 MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5061072 (x64) MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5061072 (Unentitled) MS25-JUN: Security Only Quality Update - Security Only - Windows Server 2008 SP2 - KB5061072 (x64) (Unentitled) Content in the ESU Patching Add-on for Windows 2008 site has been superseded: MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5061196 (x64) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 - KB5061196 (x64) (Unentitled) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061198 (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061198 (x64) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061198 (Unentitled) (Superseded) MS25-MAY: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 SP2 - KB5061198 (x64) (Unentitled) (Superseded) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (Superseded) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (x64) (Superseded) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (Unentitled) (Superseded) MS25-APR: Cumulative Security Update for Internet Explorer 9 - Windows Server 2008 SP2 - IE 9 - KB5055515 (x64) (Unentitled) (Superseded) MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5058380 (x64) (Superseded) MS25-MAY: Cumulative Security Update for Internet Explorer 11 - Windows Server 2008 R2 - IE 11 - KB5058380 (x64) (Unentitled) (Superseded) Reason for Update: Additional Extended Support Updates released by Microsoft on June 10th Patch Tuesday. (NOTE: The Windows 2008 ESU program ended 9 January 2024, but Microsoft has continued releasing patches.) Actions to Take: Update any baselines containing the superseded fixlets. Published site version: ESU Patching Add-on for Windows 2008, version 120 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 10 15:43:06 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Jun 2025 18:43:06 -0400 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows - June 2025 Security Updates Message-ID: Content in the Patches for Windows site has been released. New: * MAJOR [ID:500273101] MS25-JUN: Security Update for Microsoft SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002731 (x64) * MAJOR [ID:500268301] MS25-JUN: Security Update for Microsoft Outlook 2016 - Outlook 2016 - KB5002683 * MAJOR [ID:500736149] MS25-JUN: Security Update for Microsoft Visual Studio 2022 version 17.10.16 update - KB5007364 * MAJOR [ID:500736151] MS25-JUN: Security Update for Microsoft Visual Studio 2022 version 17.12.9 update - KB5007364 * MAJOR [ID:500736155] MS25-JUN: Security Update for Microsoft Visual Studio 2022 version 17.8.22 update - KB5007364 * MAJOR [ID:500273501] MS25-JUN: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002735 * MAJOR [ID:500272801] MS25-JUN: Security Update for Microsoft Office Online Server - Office Online Server - KB5002728 (x64) * MAJOR [ID:500272701] MS25-JUN: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002727 (x64) * MAJOR [ID:500271001] MS25-JUN: Security Update for Microsoft Word 2016 - Word 2016 - KB5002710 * MAJOR [ID:500271003] MS25-JUN: Security Update for Microsoft Word 2016 - Word 2016 - KB5002710 (x64) * MAJOR [ID:500268303] MS25-JUN: Security Update for Microsoft Outlook 2016 - Outlook 2016 - KB5002683 (x64) * MAJOR [ID:500268901] MS25-JUN: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002689 * MAJOR [ID:500736153] MS25-JUN: Security Update for Microsoft Visual Studio 2022 version 17.14.5 update - KB5007364 * MAJOR [ID:500273503] MS25-JUN: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002735 (x64) * MAJOR [ID:500268903] MS25-JUN: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002689 (x64) * MAJOR [ID:506052501] MS25-JUN: Cumulative Update for Microsoft server operating system version 2022 - Windows Server 2022 Datacenter Azure Edition - KB5060525 (x64) * MAJOR [ID:506052601] MS25-JUN: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5060526 (x64) * MAJOR [ID:506099901] MS25-JUN: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5060999 (x64) * MAJOR [ID:506099905] MS25-JUN: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5060999 (x64) * MAJOR [ID:506099907] MS25-JUN: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5060999 (arm64) * MAJOR [ID:506084205] MS25-JUN: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5060842 (x64) * MAJOR [ID:506084201] MS25-JUN: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5060842 (x64) * MAJOR [ID:506084203] MS25-JUN: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5060842 (arm64) * MAJOR [ID:506101005] MS25-JUN: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5061010 (x64) * MAJOR [ID:506053101] MS25-JUN: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5060531 * MAJOR [ID:506053305] MS25-JUN: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5060533 (x64) * MAJOR [ID:506053307] MS25-JUN: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5060533 * MAJOR [ID:506101001] MS25-JUN: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5061010 * MAJOR [ID:506101003] MS25-JUN: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5061010 (x64) * MAJOR [ID:506099801] MS25-JUN: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5060998 * MAJOR [ID:506099803] MS25-JUN: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5060998 (x64) * MAJOR [ID:506095403] MS25-JUN: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5060954 (x64) * MAJOR [ID:506095405] MS25-JUN: Servicing Stack Update for Windows Server 2016 - Windows Server 2016 - KB5060954 (x64) * MAJOR [ID:500273001] MS25-JUN: Security Update for Microsoft Office 2016 - Office 2016 - KB5002730 * MAJOR [ID:500261603] MS25-JUN: Security Update for Microsoft Office 2016 - Office 2016 - KB5002616 (x64) * MAJOR [ID:506011801] MS25-JUN: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5060118 (x64) * MAJOR [ID:500273003] MS25-JUN: Security Update for Microsoft Office 2016 - Office 2016 - KB5002730 (x64) * MAJOR [ID:500273201] MS25-JUN: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002732 (x64) * MAJOR [ID:500272901] MS25-JUN: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002729 (x64) * MAJOR [ID:500261601] MS25-JUN: Security Update for Microsoft Office 2016 - Office 2016 - KB5002616 * MAJOR [ID:506099903] MS25-JUN: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5060999 (arm64) * MAJOR [ID:506053105] MS25-JUN: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5060531 (x64) * MAJOR [ID:506053103] MS25-JUN: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5060531 (x64) * MAJOR [ID:506053301] MS25-JUN: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5060533 * MAJOR [ID:506053303] MS25-JUN: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5060533 (x64) * MAJOR [ID:500273601] MS25-JUN: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002736 (x64) * MAJOR [ID:506095401] MS25-JUN: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5060954 Superseded: * MAJOR [ID:500263201] 5002632: Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002632 (x64) (Superseded) * MAJOR [ID:500245201] 5002452: Update for Microsoft Office 2016 - Office 2016 - KB5002452 (x64) (Superseded) * MAJOR [ID:500271201] MS25-MAY: Security Update for Microsoft SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002712 (x64) (Superseded) * MAJOR [ID:500270801] MS25-MAY: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002708 (x64) (Superseded) * MAJOR [ID:500272201] MS25-MAY: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002722 (x64) (Superseded) * MAJOR [ID:500268201] MS25-APR: Security update for SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002682 (x64) (Superseded) * MAJOR [ID:500258601] MS24-AUG: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002586 (x64) (Superseded) * MAJOR [ID:500258603] MS24-AUG: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002586 (Superseded) * MAJOR [ID:500271703] MS25-MAY: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002717 (x64) (Superseded) * MAJOR [ID:500270601] MS25-MAY: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002706 (x64) (Superseded) * MAJOR [ID:500270203] MS25-APR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002702 (Superseded) * MAJOR [ID:500270201] MS25-APR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002702 (x64) (Superseded) * MAJOR [ID:500270901] MS25-MAY: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002709 (x64) (Superseded) * MAJOR [ID:500270701] MS25-MAY: Security Update for Microsoft Office Online Server - Office Online Server - KB5002707 (x64) (Superseded) * MAJOR [ID:500271103] MS25-MAY: Security Update for Microsoft Office 2016 - Office 2016 - KB5002711 (x64) (Superseded) * MAJOR [ID:506217001] 5062170: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5062170 (x64) (Superseded) * MAJOR [ID:506197907] 5061979: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061979 (x64) (Superseded) * MAJOR [ID:506176801] 5061768: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5061768 (Superseded) * MAJOR [ID:506197701] 5061977: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5061977 (x64) (Superseded) * MAJOR [ID:506217003] 5062170: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5062170 (arm64) (Superseded) * MAJOR [ID:506217005] 5062170: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5062170 (x64) (Superseded) * MAJOR [ID:506190601] 5061906: Cumulative Update Preview for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5061906 (x64) (Superseded) * MAJOR [ID:506176805] 5061768: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061768 (Superseded) * MAJOR [ID:506197905] 5061979: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061979 (Superseded) * MAJOR [ID:506197805] 5061978: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5061978 (x64) (Superseded) * MAJOR [ID:506197803] 5061978: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5061978 (x64) (Superseded) * MAJOR [ID:506197801] 5061978: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5061978 (Superseded) * MAJOR [ID:506176803] 5061768: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5061768 (x64) (Superseded) * MAJOR [ID:506197903] 5061979: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5061979 (x64) (Superseded) * MAJOR [ID:506217007] 5062170: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5062170 (arm64) (Superseded) * MAJOR [ID:506197703] 5061977: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5061977 (arm64) (Superseded) * MAJOR [ID:506197901] 5061979: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5061979 (Superseded) * MAJOR [ID:506176807] 5061768: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061768 (x64) (Superseded) * MAJOR [ID:500263203] 5002632: Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002632 (Superseded) * MAJOR [ID:500245203] 5002452: Update for Microsoft Office 2016 - Office 2016 - KB5002452 (Superseded) * MAJOR [ID:500271701] MS25-MAY: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002717 (Superseded) * MAJOR [ID:500265601] MS25-JAN: Security Update for Microsoft Outlook 2016 - Outlook 2016 - KB5002656 (Superseded) * MAJOR [ID:500265603] MS25-JAN: Security Update for Microsoft Outlook 2016 - Outlook 2016 - KB5002656 (x64) (Superseded) * MAJOR [ID:449315401] MS23-JUL: Security Update for Microsoft Office 2016 - Office 2016 - KB4493154 (x64) (Superseded) * MAJOR [ID:449315403] MS23-JUL: Security Update for Microsoft Office 2016 - Office 2016 - KB4493154 (Superseded) * MAJOR [ID:505838501] MS25-MAY: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5058385 (x64) (Superseded) * MAJOR [ID:505837901] MS25-MAY: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5058379 (Superseded) * MAJOR [ID:505838703] MS25-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5058387 (x64) (Superseded) * MAJOR [ID:505840507] MS25-MAY: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5058405 (arm64) (Superseded) * MAJOR [ID:505837903] MS25-MAY: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5058379 (Superseded) * MAJOR [ID:500271101] MS25-MAY: Security Update for Microsoft Office 2016 - Office 2016 - KB5002711 (Superseded) * MAJOR [ID:505840505] MS25-MAY: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5058405 (x64) (Superseded) * MAJOR [ID:505838303] MS25-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5058383 (Superseded) * MAJOR [ID:505839201] MS25-MAY: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5058392 (x64) (Superseded) * MAJOR [ID:505839205] MS25-MAY: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5058392 (Superseded) * MAJOR [ID:505841101] MS25-MAY: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5058411 (x64) (Superseded) * MAJOR [ID:505838305] MS25-MAY: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5058383 (x64) (Superseded) * MAJOR [ID:505838401] MS25-MAY: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5058384 (x64) (Superseded) * MAJOR [ID:505838301] MS25-MAY: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5058383 (x64) (Superseded) * MAJOR [ID:505839203] MS25-MAY: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5058392 (x64) (Superseded) * MAJOR [ID:505840501] MS25-MAY: Cumulative Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5058405 (x64) (Superseded) * MAJOR [ID:505840503] MS25-MAY: Cumulative Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5058405 (arm64) (Superseded) * MAJOR [ID:505837907] MS25-MAY: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5058379 (x64) (Superseded) * MAJOR [ID:505838701] MS25-MAY: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 LTSB - KB5058387 (Superseded) * MAJOR [ID:505837905] MS25-MAY: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5058379 (x64) (Superseded) * MAJOR [ID:505852403] MS25-MAY: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5058524 (x64) (Superseded) * MAJOR [ID:505848103] 5058481: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5058481 (x64) (Superseded) * MAJOR [ID:505852405] MS25-MAY: Servicing Stack Update for Windows Server 2016 - Windows Server 2016 - KB5058524 (x64) (Superseded) * MAJOR [ID:505852401] MS25-MAY: Servicing Stack Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5058524 (Superseded) * MAJOR [ID:505850205] 5058502: Cumulative Update Preview for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5058502 (x64) (Superseded) * MAJOR [ID:505848101] 5058481: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5058481 (Superseded) * MAJOR [ID:505849901] 5058499: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5058499 (x64) (Superseded) * MAJOR [ID:505841105] MS25-MAY: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5058411 (x64) (Superseded) * MAJOR [ID:505850201] 5058502: Cumulative Update Preview for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5058502 (x64) (Superseded) * MAJOR [ID:505841103] MS25-MAY: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5058411 (arm64) (Superseded) * MAJOR [ID:505850203] 5058502: Cumulative Update Preview for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5058502 (arm64) (Superseded) * MAJOR [ID:505850207] 5058502: Cumulative Update Preview for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5058502 (arm64) (Superseded) * MAJOR [ID:505849903] 5058499: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5058499 (arm64) (Superseded) Reason for Update: * Microsoft released June 2025 security updates. Additional Notes: * None Actions to Take: None Published site version: Patches for Windows, Version: 4553 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 11 02:27:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Jun 2025 04:27:56 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-11 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011684 Google Chrome 137.0.7151.104 Available * 8101889 Adobe Acrobat Reader 2025.001.20531 Available - Adobe Acrobat Reader - Continuous Track * 8101891 Adobe Acrobat Reader 2025.001.20531 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8101894 Adobe Acrobat Reader 2025.001.20531 Available - Adobe Acrobat Reader - Continuous Track (x64) * 8101896 Adobe Acrobat Reader 2025.001.20531 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 9101568 Adobe Acrobat 2025.001.20531 Available - Adobe Acrobat - Continuous Track * 9101569 Adobe Acrobat 2025.001.20531 Available - Adobe Acrobat - Continuous Track (x64) * 8101322 Adobe Acrobat Reader 2020.005.30774 Available (MUI Installer) - Adobe Acrobat Reader - Classic Track * 9102131 Adobe Acrobat 2020.005.30774 Available - Adobe Acrobat - Classic Track * 6082192 Mozilla Firefox (x64) 139.0.4 Available * 6082347 Mozilla Firefox 139.0.4 Available * 6101762 Mozilla Thunderbird 139.0.2 Available * 6101764 Mozilla Thunderbird 128.11.1 ESR Available * 5058351 .NET SDK 8.0.117 Available * 5058353 .NET SDK (x64) 8.0.117 Available * 5058355 .NET SDK 8.0.314 Available * 5058357 .NET SDK (x64) 8.0.314 Available * 5058359 .NET SDK 8.0.411 Available * 5058361 .NET SDK (x64) 8.0.411 Available * 5058363 .NET SDK 9.0.107 Available * 5058365 .NET SDK (x64) 9.0.107 Available * 5058369 .NET SDK 9.0.205 Available * 5058367 .NET SDK (x64) 9.0.205 Available * 5058371 .NET SDK 9.0.301 Available * 5058373 .NET SDK (x64) 9.0.301 Available * 5058382 ASP .NET Core Runtime 8.0.17 Available * 5058347 ASP .NET Core Runtime (x64) 8.0.17 Available * 5058384 ASP .NET Core Hosting Bundle Runtime 8.0.17 Available * 5058374 .NET Runtime 8.0.17 Available * 5058376 .NET Runtime (x64) 8.0.17 Available * 5058378 .NET Desktop Runtime 8.0.17 Available * 5058380 .NET Desktop Runtime (x64) 8.0.17 Available * 5058396 ASP .NET Core Runtime 9.0.6 Available * 5058349 ASP .NET Core Runtime (x64) 9.0.6 Available * 5058398 ASP .NET Core Hosting Bundle Runtime 9.0.6 Available * 5058388 .NET Runtime 9.0.6 Available * 5058390 .NET Runtime (x64) 9.0.6 Available * 5058392 .NET Desktop Runtime 9.0.6 Available * 5058394 .NET Desktop Runtime (x64) 9.0.6 Available Modified : * 14011682 Google Chrome 137.0.7151.69 Available (Superseded) * 8101885 Adobe Acrobat Reader 2025.001.20521 Available - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101887 Adobe Acrobat Reader 2025.001.20521 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101890 Adobe Acrobat Reader 2025.001.20521 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101892 Adobe Acrobat Reader 2025.001.20521 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 9101566 Adobe Acrobat 2025.001.20521 Available - Adobe Acrobat - Continuous Track (Superseded) * 9101567 Adobe Acrobat 2025.001.20521 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 8101872 Adobe Acrobat Reader 2025.001.20432 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101867 Adobe Acrobat Reader 2025.001.20432 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101870 Adobe Acrobat Reader 2025.001.20432 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101865 Adobe Acrobat Reader 2025.001.20432 Available - Adobe Acrobat Reader - Continuous Track (Superseded) * 9101555 Adobe Acrobat 2025.001.20432 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 9101558 Adobe Acrobat 2025.001.20432 Available - Adobe Acrobat - Continuous Track (Superseded) * 8101320 Adobe Acrobat Reader 2020.005.30763 Available (MUI Installer) - Adobe Acrobat Reader - Classic Track (Superseded) * 9102129 Adobe Acrobat 2020.005.30763 Available - Adobe Acrobat - Classic Track (Superseded) * 6082188 Mozilla Firefox (x64) 139.0 Available (Superseded) * 6082335 Mozilla Firefox 139.0 Available (Superseded) * 6082190 Mozilla Firefox (x64) 139.0.1 Available (Superseded) * 6082345 Mozilla Firefox 139.0.1 Available (Superseded) * 6101756 Mozilla Thunderbird 128.11.0 ESR Available (Superseded) * 6101760 Mozilla Thunderbird 139.0.1 Available (Superseded) * 5058319 .NET SDK 8.0.116 Available (Superseded) * 5058321 .NET SDK (x64) 8.0.116 Available (Superseded) * 5058323 .NET SDK 8.0.313 Available (Superseded) * 5058325 .NET SDK (x64) 8.0.313 Available (Superseded) * 5058327 .NET SDK 8.0.410 Available (Superseded) * 5058329 .NET SDK (x64) 8.0.410 Available (Superseded) * 5058331 .NET SDK 9.0.106 Available (Superseded) * 5058333 .NET SDK (x64) 9.0.106 Available (Superseded) * 5058337 .NET SDK 9.0.204 Available (Superseded) * 5058335 .NET SDK (x64) 9.0.204 Available (Superseded) * 5058348 ASP .NET Core Runtime 8.0.16 Available (Superseded) * 5058297 ASP .NET Core Runtime (x64) 8.0.16 Available (Superseded) * 5058350 ASP .NET Core Hosting Bundle Runtime 8.0.16 Available (Superseded) * 5058340 .NET Runtime 8.0.16 Available (Superseded) * 5058342 .NET Runtime (x64) 8.0.16 Available (Superseded) * 5058344 .NET Desktop Runtime 8.0.16 Available (Superseded) * 5058346 .NET Desktop Runtime (x64) 8.0.16 Available (Superseded) * 5058336 ASP .NET Core Runtime 9.0.5 Available (Superseded) * 5058295 ASP .NET Core Runtime (x64) 9.0.5 Available (Superseded) * 5058338 ASP .NET Core Hosting Bundle Runtime 9.0.5 Available (Superseded) * 5058328 .NET Runtime 9.0.5 Available (Superseded) * 5058330 .NET Runtime (x64) 9.0.5 Available (Superseded) * 5058332 .NET Desktop Runtime 9.0.5 Available (Superseded) * 5058334 .NET Desktop Runtime (x64) 9.0.5 Available (Superseded) Reason : * New update for Chrome , Adobe , Firefox, Thunderbird , .NET SDK and .NET Core. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2338 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 11 06:08:15 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Jun 2025 08:08:15 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-11 Message-ID: Content in the Patches for Windows site has been modified New: * MAJOR[ID:305188136] Office 365 Version 16.0.18827.20150 Available for Network Share for Office 365 - Current Channel - Office 365 * MAJOR[ID:305188119] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Vietnamese) * MAJOR[ID:305188141] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Update from Local Client Cache) * MAJOR[ID:305188125] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Ukrainian) * MAJOR[ID:305188124] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Turkish) * MAJOR[ID:305188114] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Thai) * MAJOR[ID:305188134] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Swedish) * MAJOR[ID:305188107] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Spanish) * MAJOR[ID:305188130] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Spanish (Mexico)) * MAJOR[ID:305188116] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Slovenian) * MAJOR[ID:305188106] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Slovak) * MAJOR[ID:305188137] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Serbian Latin) * MAJOR[ID:305188148] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Russian) * MAJOR[ID:305188123] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * MAJOR[ID:305188109] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Portugese (Portugal)) * MAJOR[ID:305188108] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Polish) * MAJOR[ID:305188120] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Norwegian) * MAJOR[ID:305188131] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Lithuanian) * MAJOR[ID:305188113] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Korean) * MAJOR[ID:305188126] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Japanese) * MAJOR[ID:305188133] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Italian) * MAJOR[ID:305188110] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Indonesian) * MAJOR[ID:305188129] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Hungarian) * MAJOR[ID:305188121] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Hindi) * MAJOR[ID:305188139] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Hebrew) * MAJOR[ID:305188104] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Greek) * MAJOR[ID:305188135] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (German) * MAJOR[ID:305188117] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (French) * MAJOR[ID:305188101] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Finnish) * MAJOR[ID:305188149] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (English (United States)) * MAJOR[ID:305188102] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (English (United Kingdom)) * MAJOR[ID:305188122] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Dutch) * MAJOR[ID:305188127] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Danish) * MAJOR[ID:305188105] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Czech) * MAJOR[ID:305188111] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Chinese (Traditional)) * MAJOR[ID:305188142] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Chinese (Simplified)) * MAJOR[ID:305188143] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Bulgarian) * MAJOR[ID:305188146] Office 365 Version 16.0.18827.20150 Available - Current Channel - Office 365 (Arabic) * MAJOR[ID:305187242] Office 365 Version 16.0.18730.20220 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 * MAJOR[ID:305187236] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * MAJOR[ID:305187206] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR[ID:305187234] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * MAJOR[ID:305187243] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Turkish) * MAJOR[ID:305187237] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Thai) * MAJOR[ID:305187226] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Swedish) * MAJOR[ID:305187212] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Spanish) * MAJOR[ID:305187201] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR[ID:305187207] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * MAJOR[ID:305187227] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Slovak) * MAJOR[ID:305187229] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * MAJOR[ID:305187222] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Russian) * MAJOR[ID:305187217] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR[ID:305187214] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR[ID:305187246] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Polish) * MAJOR[ID:305187224] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * MAJOR[ID:305187220] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * MAJOR[ID:305187211] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Korean) * MAJOR[ID:305187221] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Japanese) * MAJOR[ID:305187249] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Italian) * MAJOR[ID:305187240] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * MAJOR[ID:305187244] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * MAJOR[ID:305187233] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Hindi) * MAJOR[ID:305187210] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * MAJOR[ID:305187235] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Greek) * MAJOR[ID:305187219] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (German) * MAJOR[ID:305187209] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (French) * MAJOR[ID:305187203] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Finnish) * MAJOR[ID:305187231] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * MAJOR[ID:305187232] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR[ID:305187216] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Dutch) * MAJOR[ID:305187247] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Danish) * MAJOR[ID:305187239] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Czech) * MAJOR[ID:305187241] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR[ID:305187228] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR[ID:305187230] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * MAJOR[ID:305187248] Office 365 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 365 (Arabic) * MAJOR[ID:305185385] Office 365 Version 16.0.18526.20416 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel (Preview) - Office 365 * MAJOR[ID:305185358] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Vietnamese) * MAJOR[ID:305185366] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Update from Local Client Cache) * MAJOR[ID:305185352] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Ukrainian) * MAJOR[ID:305185353] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Turkish) * MAJOR[ID:305185374] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Thai) * MAJOR[ID:305185397] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Swedish) * MAJOR[ID:305185356] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish) * MAJOR[ID:305185399] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish (Mexico)) * MAJOR[ID:305185368] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovenian) * MAJOR[ID:305185376] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovak) * MAJOR[ID:305185379] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Serbian Latin) * MAJOR[ID:305185391] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Russian) * MAJOR[ID:305185364] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portuguese (Brazilian)) * MAJOR[ID:305185361] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portugese (Portugal)) * MAJOR[ID:305185386] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Polish) * MAJOR[ID:305185350] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Norwegian) * MAJOR[ID:305185382] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Lithuanian) * MAJOR[ID:305185378] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Korean) * MAJOR[ID:305185357] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Japanese) * MAJOR[ID:305185393] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Italian) * MAJOR[ID:305185394] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Indonesian) * MAJOR[ID:305185371] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hungarian) * MAJOR[ID:305185375] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hindi) * MAJOR[ID:305185398] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hebrew) * MAJOR[ID:305185365] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Greek) * MAJOR[ID:305185363] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (German) * MAJOR[ID:305185380] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (French) * MAJOR[ID:305185381] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Finnish) * MAJOR[ID:305185392] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United States)) * MAJOR[ID:305185354] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United Kingdom)) * MAJOR[ID:305185367] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Dutch) * MAJOR[ID:305185396] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Danish) * MAJOR[ID:305185389] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Czech) * MAJOR[ID:305185370] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Traditional)) * MAJOR[ID:305185355] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Simplified)) * MAJOR[ID:305185359] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Bulgarian) * MAJOR[ID:305185372] Office 365 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Arabic) * MAJOR[ID:305179510] Office 365 Version 16.0.17928.20572 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR[ID:305179521] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR[ID:305179514] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR[ID:305179477] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR[ID:305179475] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR[ID:305179513] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR[ID:305179501] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR[ID:305179497] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR[ID:305179522] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR[ID:305179492] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR[ID:305179517] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR[ID:305179480] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR[ID:305179483] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR[ID:305179478] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR[ID:305179500] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR[ID:305179481] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR[ID:305179502] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR[ID:305179476] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR[ID:305179485] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR[ID:305179489] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR[ID:305179508] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR[ID:305179484] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR[ID:305179505] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR[ID:305179519] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR[ID:305179496] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR[ID:305179490] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR[ID:305179494] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR[ID:305179503] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR[ID:305179491] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR[ID:305179507] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR[ID:305179495] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR[ID:305179516] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR[ID:305179506] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR[ID:305179486] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR[ID:305179515] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR[ID:305179511] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR[ID:305179509] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR[ID:305179479] Office 365 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR[ID:305173378] Office 365 Version 16.0.17328.20820 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR[ID:305173375] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR[ID:305173367] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR[ID:305173368] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR[ID:305173352] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR[ID:305173354] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR[ID:305173396] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR[ID:305173389] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR[ID:305173357] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR[ID:305173380] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR[ID:305173364] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR[ID:305173386] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR[ID:305173369] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR[ID:305173384] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR[ID:305173388] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR[ID:305173377] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR[ID:305173392] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR[ID:305173373] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR[ID:305173397] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR[ID:305173395] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR[ID:305173391] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR[ID:305173365] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR[ID:305173351] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR[ID:305173382] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR[ID:305173371] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR[ID:305173362] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR[ID:305173355] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR[ID:305173387] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR[ID:305173374] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR[ID:305173399] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR[ID:305173350] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR[ID:305173385] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR[ID:305173356] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR[ID:305173393] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR[ID:305173363] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR[ID:305173359] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR[ID:305173366] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR[ID:305173370] Office 365 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR[ID:305188112] Office 2024 Version 16.0.18827.20150 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * MAJOR[ID:305188145] Office 2024 Version 16.0.18827.20150 Available - Current Channel - Office 2024 Retail * MAJOR[ID:305188147] Office 2024 Version 16.0.18827.20150 Available - Current Channel - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305187238] Office 2024 Version 16.0.18730.20220 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * MAJOR[ID:305187202] Office 2024 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2024 Retail * MAJOR[ID:305187225] Office 2024 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305185388] Office 2024 Version 16.0.18526.20416 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * MAJOR[ID:305185369] Office 2024 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * MAJOR[ID:305185395] Office 2024 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305179473] Office 2024 Version 16.0.17932.20396 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed * MAJOR[ID:305179472] Office 2024 Version 16.0.17932.20396 Available - Perpetual Channel - Office 2024 Volume Licensed * MAJOR[ID:305179471] Office 2024 Version 16.0.17932.20396 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305179499] Office 2024 Version 16.0.17928.20572 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR[ID:305179488] Office 2024 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR[ID:305179482] Office 2024 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305173353] Office 2024 Version 16.0.17328.20820 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR[ID:305173360] Office 2024 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR[ID:305173376] Office 2024 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR[ID:305188118] Office 2021 Version 16.0.18827.20150 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * MAJOR[ID:305188128] Office 2021 Version 16.0.18827.20150 Available - Current Channel - Office 2021 Retail * MAJOR[ID:305188132] Office 2021 Version 16.0.18827.20150 Available - Current Channel - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305187223] Office 2021 Version 16.0.18730.20220 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * MAJOR[ID:305187215] Office 2021 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2021 Retail * MAJOR[ID:305187218] Office 2021 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305185362] Office 2021 Version 16.0.18526.20416 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * MAJOR[ID:305185387] Office 2021 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * MAJOR[ID:305185351] Office 2021 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305179498] Office 2021 Version 16.0.17928.20572 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR[ID:305179493] Office 2021 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR[ID:305179504] Office 2021 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305173358] Office 2021 Version 16.0.17328.20820 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR[ID:305173398] Office 2021 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR[ID:305173381] Office 2021 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305143026] Office 2021 Version 16.0.14334.20090 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed * MAJOR[ID:305143025] Office 2021 Version 16.0.14334.20090 Available - Perpetual Channel - Office 2021 Volume Licensed * MAJOR[ID:305143024] Office 2021 Version 16.0.14334.20090 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) * MAJOR[ID:305188144] Office 2019 Version 16.0.18827.20150 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail * MAJOR[ID:305188138] Office 2019 Version 16.0.18827.20150 Available - Current Channel - Office 2019 Retail * MAJOR[ID:305188140] Office 2019 Version 16.0.18827.20150 Available - Current Channel - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305187245] Office 2019 Version 16.0.18730.20220 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail * MAJOR[ID:305187205] Office 2019 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2019 Retail * MAJOR[ID:305187208] Office 2019 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305185390] Office 2019 Version 16.0.18526.20416 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * MAJOR[ID:305185384] Office 2019 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * MAJOR[ID:305185383] Office 2019 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305179512] Office 2019 Version 16.0.17928.20572 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR[ID:305179518] Office 2019 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR[ID:305179487] Office 2019 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305173372] Office 2019 Version 16.0.17328.20820 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR[ID:305173361] Office 2019 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * MAJOR[ID:305173383] Office 2019 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305104026] Office 2019 Version 16.0.10417.20020 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed * MAJOR[ID:305104025] Office 2019 Version 16.0.10417.20020 Available - Perpetual Channel - Office 2019 Volume Licensed * MAJOR[ID:305104024] Office 2019 Version 16.0.10417.20020 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) * MAJOR[ID:305188115] Office 2016 Version 16.0.18827.20150 Available for Network Share for Office 2016 - Current Channel - Office 2016 * MAJOR[ID:305188100] Office 2016 Version 16.0.18827.20150 Available - Current Channel - Office 2016 (Update from Local Client Cache) * MAJOR[ID:305188103] Office 2016 Version 16.0.18827.20150 Available - Current Channel - Office 2016 * MAJOR[ID:305187213] Office 2016 Version 16.0.18730.20220 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 * MAJOR[ID:305187204] Office 2016 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR[ID:305187200] Office 2016 Version 16.0.18730.20220 Available - Monthly Enterprise Channel - Office 2016 * MAJOR[ID:305185373] Office 2016 Version 16.0.18526.20416 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel (Preview) - Office 2016 * MAJOR[ID:305185377] Office 2016 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Update from Local Client Cache) * MAJOR[ID:305185360] Office 2016 Version 16.0.18526.20416 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 * MAJOR[ID:305179520] Office 2016 Version 16.0.17928.20572 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * MAJOR[ID:305179523] Office 2016 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR[ID:305179474] Office 2016 Version 16.0.17928.20572 Available - Semi-Annual Enterprise Channel - Office 2016 * MAJOR[ID:305173394] Office 2016 Version 16.0.17328.20820 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * MAJOR[ID:305173379] Office 2016 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * MAJOR[ID:305173390] Office 2016 Version 16.0.17328.20820 Available - Semi-Annual Enterprise Channel - Office 2016 Modified: * MAJOR[ID:305188085] Office 365 Version 16.0.18827.20140 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * MAJOR[ID:305188083] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * MAJOR[ID:305188067] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305188081] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305188092] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Turkish) (Superseded) * MAJOR[ID:305188086] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Thai) (Superseded) * MAJOR[ID:305188050] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Swedish) (Superseded) * MAJOR[ID:305188094] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Spanish) (Superseded) * MAJOR[ID:305188054] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR[ID:305188051] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305188058] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Slovak) (Superseded) * MAJOR[ID:305188065] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR[ID:305188098] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Russian) (Superseded) * MAJOR[ID:305188055] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305188080] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305188097] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Polish) (Superseded) * MAJOR[ID:305188078] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Norwegian) (Superseded) * MAJOR[ID:305188088] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305188073] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Korean) (Superseded) * MAJOR[ID:305188079] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Japanese) (Superseded) * MAJOR[ID:305188072] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Italian) (Superseded) * MAJOR[ID:305188075] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305188057] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305188066] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hindi) (Superseded) * MAJOR[ID:305188090] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Hebrew) (Superseded) * MAJOR[ID:305188059] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Greek) (Superseded) * MAJOR[ID:305188056] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (German) (Superseded) * MAJOR[ID:305188069] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (French) (Superseded) * MAJOR[ID:305188070] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Finnish) (Superseded) * MAJOR[ID:305188095] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (English (United States)) (Superseded) * MAJOR[ID:305188077] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305188091] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Dutch) (Superseded) * MAJOR[ID:305188087] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Danish) (Superseded) * MAJOR[ID:305188052] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Czech) (Superseded) * MAJOR[ID:305188062] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR[ID:305188084] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR[ID:305188074] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305188064] Office 365 Version 16.0.18827.20140 Available - Current Channel - Office 365 (Arabic) (Superseded) * MAJOR[ID:305187100] Office 365 Version 16.0.18730.20168 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * MAJOR[ID:305187143] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305187144] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305187102] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Swedish) (Superseded) * MAJOR[ID:305187131] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305187105] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Slovak) (Superseded) * MAJOR[ID:305187140] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305187132] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305187130] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Polish) (Superseded) * MAJOR[ID:305187106] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305187103] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Japanese) (Superseded) * MAJOR[ID:305187101] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Italian) (Superseded) * MAJOR[ID:305187104] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305187136] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305187133] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (French) (Superseded) * MAJOR[ID:305187139] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305187137] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Dutch) (Superseded) * MAJOR[ID:305187134] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Czech) (Superseded) * MAJOR[ID:305187138] Office 365 Version 16.0.18730.20168 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305186157] Office 365 Version 16.0.18623.20266 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 (Superseded) * MAJOR[ID:305186160] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR[ID:305186185] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305186166] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305186163] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR[ID:305186153] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR[ID:305186170] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR[ID:305186192] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR[ID:305186187] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR[ID:305186156] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305186168] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR[ID:305186150] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR[ID:305186155] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR[ID:305186158] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305186177] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305186189] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR[ID:305186180] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR[ID:305186193] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305186194] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR[ID:305186198] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR[ID:305186199] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR[ID:305186179] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305186183] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305186182] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR[ID:305186186] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR[ID:305186196] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR[ID:305186167] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (German) (Superseded) * MAJOR[ID:305186197] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (French) (Superseded) * MAJOR[ID:305186175] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR[ID:305186188] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR[ID:305186164] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305186172] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR[ID:305186161] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR[ID:305186184] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR[ID:305186178] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR[ID:305186174] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR[ID:305186152] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305186173] Office 365 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR[ID:305185342] Office 365 Version 16.0.18526.20336 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel (Preview) - Office 365 (Superseded) * MAJOR[ID:305185322] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Vietnamese) (Superseded) * MAJOR[ID:305185308] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305185321] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Turkish) (Superseded) * MAJOR[ID:305185348] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Thai) (Superseded) * MAJOR[ID:305185309] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Swedish) (Superseded) * MAJOR[ID:305185306] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish) (Superseded) * MAJOR[ID:305185327] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR[ID:305185337] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305185314] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovak) (Superseded) * MAJOR[ID:305185326] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Serbian Latin) (Superseded) * MAJOR[ID:305185315] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305185317] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305185336] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Polish) (Superseded) * MAJOR[ID:305185318] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Norwegian) (Superseded) * MAJOR[ID:305185304] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305185331] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Korean) (Superseded) * MAJOR[ID:305185302] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Japanese) (Superseded) * MAJOR[ID:305185349] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Italian) (Superseded) * MAJOR[ID:305185335] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305185343] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305185330] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hindi) (Superseded) * MAJOR[ID:305185333] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hebrew) (Superseded) * MAJOR[ID:305185312] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Greek) (Superseded) * MAJOR[ID:305185341] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (German) (Superseded) * MAJOR[ID:305185319] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (French) (Superseded) * MAJOR[ID:305185340] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Finnish) (Superseded) * MAJOR[ID:305185316] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United States)) (Superseded) * MAJOR[ID:305185303] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305185345] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Dutch) (Superseded) * MAJOR[ID:305185346] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Danish) (Superseded) * MAJOR[ID:305185328] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Czech) (Superseded) * MAJOR[ID:305185338] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR[ID:305185323] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR[ID:305185307] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305185313] Office 365 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Arabic) (Superseded) * MAJOR[ID:305179443] Office 365 Version 16.0.17928.20538 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 (Superseded) * MAJOR[ID:305179450] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR[ID:305179428] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305179449] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305179464] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR[ID:305179418] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR[ID:305179423] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR[ID:305179422] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR[ID:305179465] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR[ID:305179434] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305179467] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR[ID:305179433] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR[ID:305179453] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR[ID:305179460] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305179436] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305179461] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR[ID:305179432] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR[ID:305179420] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305179462] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR[ID:305179438] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR[ID:305179459] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR[ID:305179445] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305179458] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305179437] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR[ID:305179456] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR[ID:305179455] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR[ID:305179452] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (German) (Superseded) * MAJOR[ID:305179426] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (French) (Superseded) * MAJOR[ID:305179441] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR[ID:305179454] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR[ID:305179444] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305179451] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR[ID:305179447] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR[ID:305179425] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR[ID:305179440] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR[ID:305179429] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR[ID:305179446] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305179424] Office 365 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR[ID:305173331] Office 365 Version 16.0.17328.20794 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 (Superseded) * MAJOR[ID:305173307] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) (Superseded) * MAJOR[ID:305173300] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305173317] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) (Superseded) * MAJOR[ID:305173323] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) (Superseded) * MAJOR[ID:305173340] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) (Superseded) * MAJOR[ID:305173301] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) (Superseded) * MAJOR[ID:305173318] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) (Superseded) * MAJOR[ID:305173310] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) (Superseded) * MAJOR[ID:305173302] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) (Superseded) * MAJOR[ID:305173319] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) (Superseded) * MAJOR[ID:305173348] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) (Superseded) * MAJOR[ID:305173349] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) (Superseded) * MAJOR[ID:305173328] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * MAJOR[ID:305173306] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) (Superseded) * MAJOR[ID:305173337] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) (Superseded) * MAJOR[ID:305173330] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) (Superseded) * MAJOR[ID:305173336] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) (Superseded) * MAJOR[ID:305173327] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) (Superseded) * MAJOR[ID:305173347] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) (Superseded) * MAJOR[ID:305173324] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) (Superseded) * MAJOR[ID:305173333] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) (Superseded) * MAJOR[ID:305173325] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) (Superseded) * MAJOR[ID:305173309] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) (Superseded) * MAJOR[ID:305173329] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) (Superseded) * MAJOR[ID:305173320] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) (Superseded) * MAJOR[ID:305173341] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (German) (Superseded) * MAJOR[ID:305173334] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (French) (Superseded) * MAJOR[ID:305173304] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) (Superseded) * MAJOR[ID:305173338] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) (Superseded) * MAJOR[ID:305173345] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) (Superseded) * MAJOR[ID:305173335] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) (Superseded) * MAJOR[ID:305173315] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) (Superseded) * MAJOR[ID:305173311] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) (Superseded) * MAJOR[ID:305173313] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) (Superseded) * MAJOR[ID:305173332] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) (Superseded) * MAJOR[ID:305173346] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) (Superseded) * MAJOR[ID:305173316] Office 365 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) (Superseded) * MAJOR[ID:305188060] Office 2024 Version 16.0.18827.20140 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305188076] Office 2024 Version 16.0.18827.20140 Available - Current Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305188093] Office 2024 Version 16.0.18827.20140 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305187142] Office 2024 Version 16.0.18730.20168 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305187127] Office 2024 Version 16.0.18730.20168 Available - Current Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305187129] Office 2024 Version 16.0.18730.20168 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305186176] Office 2024 Version 16.0.18623.20266 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305186151] Office 2024 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305186169] Office 2024 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305185310] Office 2024 Version 16.0.18526.20336 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail (Superseded) * MAJOR[ID:305185334] Office 2024 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail (Superseded) * MAJOR[ID:305179468] Office 2024 Version 16.0.17932.20360 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed (Superseded) * MAJOR[ID:305179470] Office 2024 Version 16.0.17932.20360 Available - Perpetual Channel - Office 2024 Volume Licensed (Superseded) * MAJOR[ID:305179442] Office 2024 Version 16.0.17928.20538 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305179457] Office 2024 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305179427] Office 2024 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305173344] Office 2024 Version 16.0.17328.20794 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305173305] Office 2024 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2024 Retail (Superseded) * MAJOR[ID:305173314] Office 2024 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305188071] Office 2021 Version 16.0.18827.20140 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305188082] Office 2021 Version 16.0.18827.20140 Available - Current Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305188063] Office 2021 Version 16.0.18827.20140 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305187116] Office 2021 Version 16.0.18730.20168 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305187124] Office 2021 Version 16.0.18730.20168 Available - Current Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305187135] Office 2021 Version 16.0.18730.20168 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305186165] Office 2021 Version 16.0.18623.20266 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305186191] Office 2021 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305186195] Office 2021 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305185329] Office 2021 Version 16.0.18526.20336 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail (Superseded) * MAJOR[ID:305185301] Office 2021 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail (Superseded) * MAJOR[ID:305179430] Office 2021 Version 16.0.17928.20538 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305179448] Office 2021 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305179431] Office 2021 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305173322] Office 2021 Version 16.0.17328.20794 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305173326] Office 2021 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2021 Retail (Superseded) * MAJOR[ID:305173312] Office 2021 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305143019] Office 2021 Version 16.0.14332.21040 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed (Superseded) * MAJOR[ID:305143020] Office 2021 Version 16.0.14332.21040 Available - Perpetual Channel - Office 2021 Volume Licensed (Superseded) * MAJOR[ID:305143018] Office 2021 Version 16.0.14332.21040 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305188089] Office 2019 Version 16.0.18827.20140 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305188061] Office 2019 Version 16.0.18827.20140 Available - Current Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305188068] Office 2019 Version 16.0.18827.20140 Available - Current Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305187113] Office 2019 Version 16.0.18730.20168 Available for Network Share for Office 2019 - Current Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305187141] Office 2019 Version 16.0.18730.20168 Available - Current Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305186154] Office 2019 Version 16.0.18623.20266 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305186159] Office 2019 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305186190] Office 2019 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305185344] Office 2019 Version 16.0.18526.20336 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail (Superseded) * MAJOR[ID:305185325] Office 2019 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail (Superseded) * MAJOR[ID:305179439] Office 2019 Version 16.0.17928.20538 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305179421] Office 2019 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305179463] Office 2019 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305173343] Office 2019 Version 16.0.17328.20794 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305173339] Office 2019 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2019 Retail (Superseded) * MAJOR[ID:305173303] Office 2019 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305104019] Office 2019 Version 16.0.10417.20012 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed (Superseded) * MAJOR[ID:305104018] Office 2019 Version 16.0.10417.20012 Available - Perpetual Channel - Office 2019 Volume Licensed (Superseded) * MAJOR[ID:305104020] Office 2019 Version 16.0.10417.20012 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305188099] Office 2016 Version 16.0.18827.20140 Available for Network Share for Office 2016 - Current Channel - Office 2016 (Superseded) * MAJOR[ID:305188096] Office 2016 Version 16.0.18827.20140 Available - Current Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305188053] Office 2016 Version 16.0.18827.20140 Available - Current Channel - Office 2016 (Superseded) * MAJOR[ID:305187121] Office 2016 Version 16.0.18730.20168 Available for Network Share for Office 2016 - Current Channel - Office 2016 (Superseded) * MAJOR[ID:305187112] Office 2016 Version 16.0.18730.20168 Available - Current Channel - Office 2016 (Superseded) * MAJOR[ID:305186181] Office 2016 Version 16.0.18623.20266 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 (Superseded) * MAJOR[ID:305186171] Office 2016 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305186162] Office 2016 Version 16.0.18623.20266 Available - Monthly Enterprise Channel - Office 2016 (Superseded) * MAJOR[ID:305185300] Office 2016 Version 16.0.18526.20336 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Superseded) * MAJOR[ID:305185339] Office 2016 Version 16.0.18526.20336 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Superseded) * MAJOR[ID:305179419] Office 2016 Version 16.0.17928.20538 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR[ID:305179435] Office 2016 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305179466] Office 2016 Version 16.0.17928.20538 Available - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR[ID:305173342] Office 2016 Version 16.0.17328.20794 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 (Superseded) * MAJOR[ID:305173308] Office 2016 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) (Superseded) * MAJOR[ID:305173321] Office 2016 Version 16.0.17328.20794 Available - Semi-Annual Enterprise Channel - Office 2016 (Superseded) Reason for Update: * New update for the below channels * Current Channel * Monthly Enterprise Channel * Semi-Annual Enterprise Channel (Preview) * Semi-Annual Enterprise Channel * Office 2019 Volume Licensed Additional Notes : * None. Actions to Take: None Published site version: Site Name: Patches for Windows Version: 4554 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 11 08:51:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Jun 2025 11:51:52 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for MS SQL Server 2016, published 2025-06-10 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for MS SQL Server 2016 to support a more recent version of the benchmark *Security Benchmark:* U_MS_SQL_Server_2016_Y25M04_STIG *Published Sites:* DISA STIG Checklist for MS SQL Server 2016, site version 9 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:0 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 59 ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 12 07:39:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Jun 2025 10:39:42 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-12 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat 2020 (Classic Track) 20.005.30774 Available - Mac OS X (ID:30001821) Adobe Acrobat Reader 2020 (Classic Track) 20.005.30774 Available - Mac OS X (ID:30001822) Adobe Acrobat DC 25.001.20529 (Continuous Track) Available - Mac OS X (ID:10152202) Adobe Acrobat Reader DC 25.001.20529 (Continuous Track) Available - Mac OS X (ID:10152203) Google Chrome 137.0.7151.104 Available - Mac OS X (ID:83000208) Firefox 139.0.4 Available - Mac OS X (ID:20750273) Microsoft Office for Mac 2019 - Outlook 16.98.0 Available (ID: 19000518) Microsoft Office for Mac 2019 - PowerPoint 16.98.0 Available (ID: 19000519) Microsoft Office for Mac 2019 - Excel 16.98.0 Available (ID: 19000520) Microsoft Office for Mac 2019 - OneNote 16.98.0 Available (ID: 19000521) Microsoft Office for Mac 2019 - Word 16.98.0 Available (ID: 19000522) Published site version: Updates for Mac Applications, version 760. Reasons for Update: A newer version of Adobe Continuous & Classic track, Firefox, Excel, Outlook, OneNote, Word, Powerpoint and Chrome for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 12 07:44:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Jun 2025 10:44:58 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Apache Tomcat 10.1 on Linux, published 2025-06-11 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Apache Tomcat 10.1 on Linux to support a more recent version of the benchmark *Security Benchmark:* CIS Apache Tomcat 10.1 Benchmark, V1.1.0 *Published Sites:* CIS Checklist for Apache Tomcat 10.1 on Linux, site version 4 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 0 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 61 ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 12 07:47:09 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Jun 2025 10:47:09 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Windows 2016, published 2025-06-11 Message-ID: *Product:* BigFix Compliance *Title:* Updated *DISA STIG Checklist for Windows 2016* to support a more recent version of the benchmark. *Security Benchmark:* Microsoft Windows Server 2016 STIG SCAP Benchmark, V2R10 *Published Sites:* DISA STIG Checklist for Windows 2016, site version 22 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 1 ? Total New Task: 1 ? Total Updated Fixlets:39 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 218 ? *ADDED* o Windows Server 2016 must be configured for name-based strong mappings for certificates. o ?Deploy and Run? task has been implemented to validate compliance for the following rules: ? UPDATED - (L1) Ensure ?Network access: Allow anonymous SID/Name translation? is set to ?Disabled? ? UPDATED - (L1) Ensure ?Password must meet complexity requirements? is set to ?Enabled? ? UPDATED - (L1) Ensure ?Store passwords using reversible encryption? is set to ?Disabled? *Note: *This task has to be run periodically. ? *UPDATED* o Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes. o Windows Server 2016 must be configured to audit Logon/Logoff - Group Membership successes. o Windows Server 2016 must be configured to audit Detailed Tracking - Process Creation successes. o Windows Server 2016 must be configured to audit DS Access - Directory Service Access failures. o Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes. o Windows Server 2016 must be configured to audit Account Logon - Credential Validation successes. o Windows Server 2016 must be configured to audit DS Access - Directory Service Access successes. o Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes. o Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures. o Windows Server 2016 must be configured to audit Logon/Logoff - Special Logon successes. o Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes. o Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use successes. o Windows Server 2016 must be configured to audit Logon/Logoff - Account Lockout failures. o Windows Server 2016 must be configured to audit System - IPsec Driver successes. o Windows Server 2016 must be configured to audit Account Logon - Credential Validation failures. o Windows Server 2016 must be configured to audit System - Security State Change successes. o Windows Server 2016 must be configured to audit Account Management - Security Group Management successes. o Windows Server 2016 must be configured to audit Detailed Tracking - Plug and Play Events successes. o Windows Server 2016 must be configured to audit System - System Integrity successes. o Windows Server 2016 must be configured to audit Logon/Logoff - Logon successes. o Windows Server 2016 must be configured to audit Object Access - Removable Storage failures. o Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change failures. o Windows Server 2016 must be configured to audit System - Other System Events successes. o Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes. o Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes. o Windows Server 2016 must be configured to audit System - System Integrity failures. o Windows Server 2016 must be configured to audit Object Access - Removable Storage successes. o Windows Server 2016 must be configured to audit System - IPsec Driver failures. o Windows Server 2016 must be configured to audit Account Management - User Account Management failures. o Windows Server 2016 must be configured to audit System - Security System Extension successes. o Windows Server 2016 must be configured to audit Account Management - User Account Management successes. o Windows Server 2016 must be configured to audit System - Other System Events failures. o Windows Server 2016 must be configured to audit DS Access - Directory Service Changes successes. o Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures. o Windows 2016 must be configured to audit Object Access - Other Object Access Events successes. o Windows 2016 must be configured to audit Object Access - Other Object Access Events failures. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 12 10:13:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Jun 2025 12:13:04 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-12 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:505969305] 5059693: Safe OS Dynamic Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5059693 (x64) * Major [ID:506011601] 5060116: Safe OS Dynamic Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5060116 (x64) * Major [ID:506052901] 5060529: Dynamic Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5060529 * Major [ID:506052903] 5060529: Dynamic Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5060529 (x64) * Major [ID:506053001] 5060530: Dynamic Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5060530 * Major [ID:506053003] 5060530: Dynamic Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5060530 (x64) * Major [ID:506053201] 5060532: Dynamic Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5060532 * Major [ID:506053203] 5060532: Dynamic Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5060532 (x64) * Major [ID:506053205] 5060532: Dynamic Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5060532 * Major [ID:506053207] 5060532: Dynamic Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5060532 (x64) * Major [ID:506053401] 5060534: Dynamic Update for Windows 10 Version 1507 - Windows 10 Version 1507 - KB5060534 * Major [ID:506053403] 5060534: Dynamic Update for Windows 10 Version 1507 - Windows 10 Version 1507 - KB5060534 (x64) * Major [ID:506306001] 5063060: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5063060 (x64) * Major [ID:506306003] 5063060: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5063060 (arm64) Reason for Update: * New Safe OS dynamic updates from Microsoft. * New Out-of-Band updates from Microsoft. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4555 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 12 11:58:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Jun 2025 13:58:13 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-12 Message-ID: Content Modification: Updates for Kev Content published 2025-06-12 (7) Total New Fixlets: 0 Total Updated Fixlets: 1366 Total Fixlets in Site: 3054 Total CVEs Covered: 874 Release Date: 2025-06-12 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 32770 Apple Multiple Products WebKit Memory Corruption Vulnerability - Ubuntu 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 8200 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2016 32780 Apple Multiple Products WebKit Code Execution Vulnerability - Ubuntu 8210 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2016 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 8220 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 16420 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of Windows 32810 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Ubuntu 8240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 16440 Adobe Acrobat and Reader Buffer Overflow Vulnerability - Any Version of Windows 8250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2016 32830 Apple Multiple Products WebKit Type Confusion Vulnerability - Debian 8260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 32850 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Debian 8280 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 32860 Apple Multiple Products WebKit Use-After-Free Vulnerability - Debian 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 8290 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 8300 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 24690 Microsoft Excel Remote Code Execution Vulnerability - Excel 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 32890 Apple Multiple Products WebKit Use-After-Free Vulnerability - Debian 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 32900 Apple Multiple Products WebKit Code Execution Vulnerability - Debian 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8330 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 24720 Microsoft Excel Security Feature Bypass - Excel 8340 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 32930 Apple Multiple Products WebKit Type Confusion Vulnerability - Debian 8360 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2016 32940 Apple Multiple Products WebKit Memory Corruption Vulnerability - Debian 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 8370 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 8380 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 32960 Apple Multiple Products WebKit Code Execution Vulnerability - Debian 8390 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8410 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 32990 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Debian 33000 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Debian 8430 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 8440 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 8450 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2016 16650 Adobe Reader and Acrobat Use-After-Free Vulnerability - Any Version of Windows 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8470 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 8480 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2016 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 8490 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 8500 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 8520 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2016 33110 Apple Multiple Products WebKit Memory Corruption Vulnerability - SLE 8540 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2016 33120 Apple Multiple Products WebKit Use-After-Free Vulnerability - SLE 8550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 33130 Apple Multiple Products WebKit Code Execution Vulnerability - SLE 8560 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 8580 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 33160 Apple Multiple Products WebKit Type Confusion Vulnerability - SLE 8590 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 33170 Apple Multiple Products WebKit Memory Corruption Vulnerability - SLE 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 8600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2016 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 33190 Apple Multiple Products WebKit Code Execution Vulnerability - SLE 8620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2016 8630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8640 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 33220 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - SLE 25030 Progress MOVEit Transfer SQL Injection Vulnerability - Any Version of Windows 8650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2016 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 33240 Apple Multiple Products WebKit Type Confusion Vulnerability - RHEL 8670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16870 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 8680 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2016 33260 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - RHEL 8690 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 33300 Apple Multiple Products WebKit Use-After-Free Vulnerability - RHEL 25130 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 33370 Apple Multiple Products WebKit Code Execution Vulnerability - RHEL 25180 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 25190 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 8820 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 R2 17030 Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability - Any Version of Windows 8840 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2012 R2 33420 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Oracle Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 17070 Adobe Reader and Adobe Acrobat Stack-Based Buffer Overflow Vulnerability - Any Version of Windows 33460 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 33500 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 17130 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability - Any Version of Windows 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 8970 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2012 R2 25370 Adobe ColdFusion Improper Access Control Vulnerability - Any Version of Windows 9010 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2012 R2 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 9020 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 9040 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2012 R2 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 33660 Synacor Zimbra Collaboration Suite (ZCS) Command Execution Vulnerability - Any Version of Linux 33680 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 33690 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2016 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 33700 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 33710 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2019 33720 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 25530 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 10 33730 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 10 25540 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 10 33740 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2008 SP2 25550 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 33760 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2022 25570 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2008 SP2 33770 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 25580 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2008 SP2 33780 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 11 33790 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 9230 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2012 R2 17440 Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability - Any Version of Linux 9250 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 R2 33830 SolarWinds Web Help Desk Hardcoded Credential Vulnerability - Any Version of Windows 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 25650 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2019 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 25660 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2019 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 25670 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 33870 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2016 25680 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2016 33880 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2019 25690 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2016 9310 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 R2 33890 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 10 25700 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 33900 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2022 25710 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2012 R2 17520 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of Linux 33910 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 11 25720 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2012 R2 33920 Veeam Backup and Replication Deserialization Vulnerability - Any Version of Windows 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 33930 Veeam Backup and Replication Deserialization Vulnerability - Any Version of Linux 25740 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2012 33940 Veeam Backup and Replication Deserialization Vulnerability - Any Version of MacOS 25750 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2012 33960 Microsoft SharePoint Deserialization Vulnerability - SharePoint 33970 Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability - Any Operating System 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17610 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of Linux 1230 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 8.1 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 25820 Apple iOS Type Confusion Vulnerability - Apple iOS 1250 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 8.1 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 9460 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2012 R2 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 9500 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2012 R2 25920 Apple Multiple Products WebKit Use-After-Free Vulnerability - Apple iOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 1370 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 8.1 34140 Apple macOS Out-of-Bounds Read Vulnerability - Mac 10.15 9580 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 R2 34160 Apple macOS Out-of-Bounds Write Vulnerability - Mac 11 25970 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability - Apple iOS 1410 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 8.1 25990 Apple Memory Corruption Vulnerability - Apple iOS 1420 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 1440 Microsoft Windows LSA Spoofing Vulnerability - Windows 8.1 34210 Apple macOS Out-of-Bounds Read Vulnerability - Mac 11 26020 Apple Multiple Products Kernel Unspecified Vulnerability - Apple iOS 17840 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability - Any Version of Linux 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 34240 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Mac 11 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 34270 Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability - Mac 11 26080 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Apple iOS 9700 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 34280 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability - Mac 11 34290 Apple Multiple Products Kernel Unspecified Vulnerability - Mac 11 9720 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2012 R2 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 9750 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2012 R2 34330 Apple macOS Out-of-Bounds Write Vulnerability - Mac 12+ 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 34340 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ 34350 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ 26160 Apple macOS Out-of-Bounds Write Vulnerability - Apple iOS 34360 Apple Multiple Products Kernel Privilege Escalation Vulnerability - Mac 12+ 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 9790 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2012 R2 1610 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 8.1 34390 Apple Multiple Products WebKit Type Confusion Vulnerability - Mac 12+ 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 34410 Apple Multiple Products WebKit Memory Corruption Vulnerability - Mac 12+ 34420 Apple Multiple Products Improper Certificate Validation Vulnerability - Mac 12+ 26230 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Apple iOS 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 34440 Apple macOS Out-of-Bounds Read Vulnerability - Mac 12+ 1680 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 8.1 34450 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Mac 12+ 26260 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 26270 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2022 9890 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 34470 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Mac 12+ 26280 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2022 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 34480 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Mac 12+ 26290 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 11 34490 Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability - Mac 12+ 26300 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 11 9920 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 R2 34500 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability - Mac 12+ 26310 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 11 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 34530 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 34540 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Mac 12+ 34550 Apple Multiple Products Kernel Unspecified Vulnerability - Mac 12+ 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 26400 Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability - Any Version of Android 1830 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows 8.1 26420 Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability - Any Version of Windows 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 1870 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 8.1 26450 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 10 26470 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2008 SP2 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 26490 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2019 34690 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2016 18310 RARLAB UnRAR Directory Traversal Vulnerability - Any Version of Linux 10120 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 34700 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2016 26510 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2016 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 10130 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2012 34710 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2019 1950 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 8.1 34720 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2019 26530 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2012 R2 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 34730 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows 10 26540 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2012 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 34740 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows 10 34750 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2008 SP2 34770 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2022 34780 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2022 26590 Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability - Apple iOS 18400 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability - Any Version of Linux 34790 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows 11 34800 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows 11 26610 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2022 34810 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2025 34820 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2025 26630 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 11 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 26640 RARLAB WinRAR Code Execution Vulnerability - Any Version of Windows 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 10260 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2012 2070 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 34840 Android Kernel Remote Code Execution Vulnerability - Ubuntu 26650 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability - Any Version of Windows 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 34850 Android Kernel Remote Code Execution Vulnerability - Debian 26660 Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability - Any Version of Windows 2090 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 8.1 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 26680 Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability - Any Version of Linux 10300 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2012 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 10310 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 26700 Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability - Any Version of MacOS 34900 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability - Any Version of MacOS 26710 Apple iOS and iPadOS Out-of-Bounds Write Vulnerability - Apple iOS 10330 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2012 34910 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS 26720 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android 2150 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 8.1 34920 Apple Multiple Products Code Execution Vulnerability - Apple iOS 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 34930 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability - Apple iOS 18550 Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability - Any Version of Linux 26760 Google Pixel Out-of-Bounds Write Vulnerability - Any Current Service Pack of Android 34970 CyberPanel Incorrect Default Permissions Vulnerability - Ubuntu Linux 26780 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34980 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Windows 35000 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Linux 2240 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 8.1 2270 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 8.1 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 35050 CyberPanel Incorrect Default Permissions Vulnerability - Ubuntu Linux 26860 Netwrix Auditor Insecure Object Deserialization Vulnerability - Any Version of Windows 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 26870 Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 35080 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 26890 Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability - Any Version of Windows 35090 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 26900 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of Windows 10520 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2012 35100 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 10 26910 Citrix Content Collaboration ShareFile Improper Access Control Vulnerability - Any Version of Windows 26920 JetBrains TeamCity Authentication Bypass Vulnerability - Any Version of Windows 10540 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 35130 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 26940 Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability - Any Version of Windows 35140 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 26950 MinIO Security Feature Bypass Vulnerability - Any Version of Linux 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 35150 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 26970 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of Linux 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 10590 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2012 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 35190 Adobe ColdFusion Improper Access Control Vulnerability - Any Version of Windows 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 27030 Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability - Any Version of MacOS 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 27050 Apple Multiple Products WebKit Code Execution Vulnerability - Any Version of MacOS 27060 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of MacOS 2490 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 7 SP1 35260 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2016 2500 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 7 SP1 35270 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2019 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 35280 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 10 18900 Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability - Any Version of Linux 35290 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2008 SP2 27100 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 27110 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 10 35310 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2022 27120 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2008 SP2 35320 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 11 27140 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 27150 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2019 10770 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2012 27160 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 2590 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 7 SP1 27170 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2012 R2 27180 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2012 27190 Microsoft Word Information Disclosure Vulnerability - Word 27200 Apple Multiple Products WebKit Code Execution Vulnerability - Apple iOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 27210 Apple Multiple Products Improper Certificate Validation Vulnerability - Apple iOS 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 2640 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 27220 Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability - Apple iOS 2650 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 7 SP1 27230 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Apple iOS 10850 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 35430 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 10 27240 Apple Multiple Products Kernel Privilege Escalation Vulnerability - Apple iOS 2670 Microsoft Windows LSA Spoofing Vulnerability - Windows 7 SP1 35440 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 10 27250 Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability - Apple iOS 35450 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 10 27260 Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability - Apple iOS 35460 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 35470 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 27280 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2022 19090 Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability - Any Version of Linux 35480 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 11 27290 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 35490 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows Server 2025 27300 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 11 35500 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 27310 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 35510 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 27340 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of Windows 27350 Atlassian Confluence Data Center and Server Broken Access Control Vulnerability - Any Version of Linux 10970 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 35550 Jenkins Command Line Interface (CLI) Path Traversal Vulnerability - Any Version of Windows 27360 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS 27370 Microsoft WordPad Information Disclosure Vulnerability - Windows 10 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 10990 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2012 27380 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2008 SP2 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 35590 Jenkins Command Line Interface (CLI) Path Traversal Vulnerability - Any Version of Linux 27400 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2019 11020 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2012 27410 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2016 2840 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 7 SP1 27420 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2012 R2 27430 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2012 27440 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2022 35640 Apple Multiple Products Use-After-Free Vulnerability - Apple iOS 27450 Microsoft WordPad Information Disclosure Vulnerability - Windows 11 35660 VMware Tools Authentication Bypass Vulnerability - Ubuntu 27470 CWP Control Web Panel OS Command Injection Vulnerability - Any Version of CentOS 35670 VMware Tools Authentication Bypass Vulnerability - Debian 35690 7-Zip Mark of the Web Bypass Vulnerability - Any Version of Windows 35710 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2016 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 35720 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2019 27530 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability - Any Operating System 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 35730 Microsoft .NET Framework Information Disclosure Vulnerability - Windows 10 27540 Trend Micro Apex Central Arbitrary File Upload Vulnerability - Any Version of Windows 11160 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 35740 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2008 SP2 35760 Microsoft Outlook Improper Input Validation Vulnerability - Office 11190 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 27590 Atlassian Confluence Data Center and Server Improper Authorization Vulnerability - Any Operating System 35790 VMware Tools Authentication Bypass Vulnerability - SLE 35800 VMware Tools Authentication Bypass Vulnerability - RHEL 35810 VMware Tools Authentication Bypass Vulnerability - Oracle Linux 35820 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2022 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 35850 Microsoft .NET Framework Information Disclosure Vulnerability - Windows 11 27660 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 35860 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2016 27670 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 10 35870 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 27680 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 35880 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2019 27690 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 35890 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 35900 Microsoft Windows Storage Link Following Vulnerability - Windows 10 27710 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2012 R2 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 35910 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 10 35920 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 SP2 27730 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2016 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 3160 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 7 SP1 27740 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 35940 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2022 27750 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS 35950 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 27760 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2019 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 35960 Microsoft Windows Storage Link Following Vulnerability - Windows 11 27770 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2019 35970 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 11 27780 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 35980 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 27790 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 35990 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2025 27800 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2008 SP2 36000 Apple iOS and iPadOS Incorrect Authorization Vulnerability - Apple iOS 27810 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2008 SP2 19620 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of MacOS 36010 Linux Kernel Out-of-Bounds Write Vulnerability - SLE 27820 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2008 SP2 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 3270 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 3290 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 7 SP1 36060 ProjectSend Improper Authentication Vulnerability - Any Operating System 27870 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2012 19680 Apple Multiple Products WebKit Use-After-Free Vulnerability - Any Version of MacOS 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 11510 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 11520 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 36100 Dante Discovery Process Control Vulnerability - Any Version of Windows 27910 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2022 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 27920 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 27930 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 27940 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2022 27950 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 11 19760 Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability - Any Version of MacOS 27960 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 27970 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 11590 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 36170 Craft CMS Code Injection Vulnerability - Any Operating System 27980 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 11 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 28000 ownCloud graphapi Information Disclosure Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 3440 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 7 SP1 36210 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability - Any Version of Linux 28020 Apple Multiple Products WebKit Memory Corruption Vulnerability - Any Version of MacOS 36220 Progress WhatsUp Gold Path Traversal Vulnerability - Any Version of Windows 28030 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Any Version of MacOS 36230 SysAid Server Path Traversal Vulnerability - Any Version of Windows 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 3470 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 7 SP1 36240 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2012 R2 28050 Apple Multiple Products WebKit Memory Corruption Vulnerability - Apple iOS 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 36250 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2012 28060 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Apple iOS 36260 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2016 28080 Qlik Sense Path Traversal Vulnerability - Any Version of Windows 36280 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows 10 28090 Qlik Sense HTTP Tunneling Vulnerability - Any Version of Windows 36290 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2008 SP2 28100 Joomla! Improper Access Control Vulnerability - Any Operating System 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 36300 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2008 R2 SP1 28110 Apache Superset Insecure Default Initialization of Resource Vulnerability - Any Operating System 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 36310 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows 7 SP1 28120 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability - Any Version of Windows 36320 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows 8.1 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 28140 Adobe ColdFusion Deserialization of Untrusted Data Vulnerability - Any Version of Windows 36350 SimpleHelp Path Traversal Vulnerability - Any Operating System 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 36360 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2016 36370 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2016 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 36380 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2016 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 36390 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows Server 2016 28200 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS 36400 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 36410 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2016 28220 Apple Multiple Products Code Execution Vulnerability - Apple iOS 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 36420 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2019 36430 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2019 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 36440 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2019 36450 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 36460 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2019 36470 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 10 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 36480 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 10 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36490 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 10 36500 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows 10 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 36510 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 10 36520 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 10 36530 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2008 SP2 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 36540 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 SP2 36550 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2008 SP2 36560 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows Server 2008 SP2 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 36570 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 SP2 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 36590 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2022 36600 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2022 36610 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2022 12040 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2008 R2 SP1 36620 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 36630 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2022 36640 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2008 R2 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 36650 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2008 R2 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 36660 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2008 R2 28470 Spreadsheet::ParseExcel Remote Code Execution Vulnerability - Any Version of Windows 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 36670 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows Server 2008 R2 28480 Spreadsheet::ParseExcel Remote Code Execution Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36680 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 R2 28490 Atlassian Confluence Data Center and Server Template Injection Vulnerability - Any Operating System 36690 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 11 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 36710 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 11 28520 Apple Multiple Products WebKit Type Confusion Vulnerability - Any Version of MacOS 36720 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 11 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 36730 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 11 28540 Apple Multiple Products WebKit Type Confusion Vulnerability - Apple iOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36740 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 28560 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 36760 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2025 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20380 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Any Version of MacOS 36770 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2025 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36780 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2025 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 36800 Linux Kernel Use of Uninitialized Resource Vulnerability - Debian 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS 12260 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 28660 Linux Kernel Use-After-Free Vulnerability - Ubuntu 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 36910 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 36950 CrushFTP Authentication Bypass Vulnerability - Any Version of Windows 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 36960 CrushFTP Authentication Bypass Vulnerability - Any Version of Linux 28770 Linux Kernel Use-After-Free Vulnerability - Debian 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 28810 Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability - Any Operating System 37010 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 28820 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 28830 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 37030 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 28840 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2019 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 12460 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 28850 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 28860 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 10 37060 HTTP/2 Rapid Reset Attack Vulnerability - Ubuntu 28870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 37070 Linux Kernel Out-of-Bounds Read Vulnerability - Ubuntu 28880 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2022 37080 Linux Kernel Out-of-Bounds Access Vulnerability - Ubuntu 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 37100 Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability - Any Operating System 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 37110 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability - Any Operating System 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 37120 Apache Tomcat Path Equivalence Vulnerability - Any Version of Windows 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 4360 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2008 SP2 37130 Apache Tomcat Path Equivalence Vulnerability - Any Version of Linux 37140 Linux Kernel Use of Uninitialized Resource Vulnerability - SLE 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 4380 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2008 SP2 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 4430 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 4440 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2008 SP2 37210 HTTP/2 Rapid Reset Attack Vulnerability - leap 37220 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - VMware ESXi 8.0 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 4460 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2008 SP2 37230 VMware ESXi Arbitrary Write Vulnerability - VMware ESXi 8.0 37240 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - VMware ESXi 8.0 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 37250 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - VMware ESXi 7.0 37260 VMware ESXi Arbitrary Write Vulnerability - VMware ESXi 7.0 37270 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - VMware ESXi 7.0 37290 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - Any Version of Windows 37300 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability - Any Version of Windows 37320 Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability - Any Version of Windows 20940 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Any Version of MacOS 12750 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of Windows 12760 Adobe Acrobat and Reader Sandbox Bypass Vulnerability - Any Version of Windows 37340 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - Any Version of MacOS 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 29170 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 20980 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 10 29180 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 11 20990 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 10 21010 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 21020 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows 10 4640 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2008 SP2 37410 HTTP/2 Rapid Reset Attack Vulnerability - RHEL 21030 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 SP2 21040 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 SP2 4660 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 SP2 37440 HTTP/2 Rapid Reset Attack Vulnerability - Oracle Linux 29250 Microsoft Exchange Server Privilege Escalation Vulnerability - Exchange Server 2019 21060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 SP2 37450 VMware ESXi Authentication Bypass Vulnerability - VMware ESXi 8.0 37460 Apple Multiple Products Use-After-Free Vulnerability - Any Version of MacOS 21080 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 37470 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS 21090 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2008 R2 SP1 37480 Apple Multiple Products Arbitrary Read and Write Vulnerability - Any Version of MacOS 37490 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2016 37500 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2019 37510 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 10 37520 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 37530 Apple Multiple Products Arbitrary Read and Write Vulnerability - Apple iOS 21150 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 7 SP1 37540 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2022 37550 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2008 R2 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 21190 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 8.1 21220 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 21230 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 4850 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2008 SP2 29430 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2016 21240 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 29440 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2019 21250 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2019 37640 Apple iOS Type Confusion Vulnerability - Ubuntu 29450 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 10 21260 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 29460 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2022 21270 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 29470 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 11 29480 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2019 21290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 29490 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 10 21300 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2016 37690 Apple iOS Type Confusion Vulnerability - Debian 29500 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 29510 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS 21320 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 R2 29520 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2022 37720 Apple iOS Type Confusion Vulnerability - RHEL 29530 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 11 21340 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 R2 29540 JetBrains TeamCity Authentication Bypass Vulnerability - Any Version of Windows 4970 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 SP2 37750 Apple iOS Type Confusion Vulnerability - Oracle Linux 21380 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2012 37770 Apple iOS Type Confusion Vulnerability - SLE 37780 Apple iOS Type Confusion Vulnerability - leap 21400 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2012 37790 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2008 R2 29610 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Apple iOS 37810 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2008 R2 37820 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2008 R2 29630 Android Pixel Information Disclosure Vulnerability - Android with Major Version & Service Pack 13250 Apple Memory Corruption Vulnerability - Any Version of MacOS 37830 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2008 R2 29640 Android Pixel Privilege Escalation Vulnerability - Any Current Service Pack of Android 21450 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2016 37840 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 R2 29650 Android Pixel Information Disclosure Vulnerability - Any Current Service Pack of Android 37850 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2008 R2 5090 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2008 SP2 37860 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2008 R2 37870 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2008 R2 29700 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 21510 Microsoft Exchange Server Server-Side Request Forgery Vulnerability - Exchange Server 2016 29710 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2012 R2 21520 Microsoft Exchange Server Privilege Escalation Vulnerability - Exchange Server 2016 29720 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 5150 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2008 SP2 29730 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 21540 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2019 29740 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 29750 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 8.1 29760 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 13380 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 7 37960 FreeType Out-of-Bounds Write Vulnerability - Any Version of Windows 29770 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 13400 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 37980 FreeType Out-of-Bounds Write Vulnerability - Any Version of Linux 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 21600 Microsoft Exchange Server Server-Side Request Forgery Vulnerability - Exchange Server 2019 13410 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2022 37990 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 29800 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2019 21610 Microsoft Exchange Server Privilege Escalation Vulnerability - Exchange Server 2019 13420 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 38000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 29810 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 10 13430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2022 38010 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2016 29820 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2022 21630 Microsoft Exchange Server Remote Code Execution Vulnerability - Exchange Server 2013 13440 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2022 38020 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2016 29830 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 11 13450 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 38030 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 R2 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 13460 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2022 5270 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2008 SP2 38040 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 29850 CrushFTP VFS Sandbox Escape Vulnerability - Any Version of Windows 13470 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 38050 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 13480 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 38060 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 29870 CrushFTP VFS Sandbox Escape Vulnerability - Any Version of Linux 21680 Microsoft Exchange Server Server-Side Request Forgery Vulnerability - Exchange Server 2013 13490 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 5300 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2008 SP2 38070 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2019 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 21690 Microsoft Exchange Server Privilege Escalation Vulnerability - Exchange Server 2013 13500 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2022 38080 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2019 29890 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2016 13510 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 38090 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2019 29900 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2019 13520 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 38100 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 10 29910 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 10 13530 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 38110 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 29920 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2022 13540 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2022 38120 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows 10 29930 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 11 13550 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2022 38130 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 10 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 13560 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 38140 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows 10 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 13570 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 38150 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 SP2 13580 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 38160 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 SP2 13590 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2022 5400 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 38170 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2008 SP2 13600 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 5410 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows 10 38180 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 13610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 5420 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 38190 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 13620 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2022 5430 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows 10 38200 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2022 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13630 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 38210 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2022 13640 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 5450 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 10 38220 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2022 13650 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 5460 Microsoft Internet Explorer Type Confusion Vulnerability - Windows 10 38230 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2008 R2 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 13660 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2022 5470 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows 10 38240 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2008 R2 13670 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 5480 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows 10 38250 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2008 R2 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 13680 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2022 38260 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 13690 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 38270 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 30080 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2016 13700 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 38280 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows 11 30090 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2019 5520 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 38290 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 11 30100 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 10 5530 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 38300 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows 11 5540 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 10 38310 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2025 30120 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2022 38320 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 30130 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 11 5560 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows 10 38330 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2025 30140 Linux Kernel Use-After-Free Vulnerability - Ubuntu 38340 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2025 38350 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 13780 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 11 5590 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 30170 NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability - Any Version of Windows 13790 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows 11 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 13800 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 11 5610 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 30190 NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability - Any Version of Linux 13810 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 11 5620 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 13820 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 11 5630 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows 10 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 30210 NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability - Any Version of MacOS 13830 Microsoft Windows LSA Spoofing Vulnerability - Windows 11 5640 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 5650 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 38420 ZKTeco BioTime Path Traversal Vulnerability - Any Version of Windows 13850 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows 11 5660 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 10 30240 Linux Kernel Use-After-Free Vulnerability - RHEL 13860 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 38440 MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability - Any Version of Windows 5680 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 22070 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 5690 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 38460 Srimax Output Messenger Directory Traversal Vulnerability - Any Version of Windows 30270 PHP-CGI OS Command Injection Vulnerability - Any Version of Windows 13890 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 11 38470 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability - Any Version of Linux 30280 Android Pixel Privilege Escalation Vulnerability - Any Current Service Pack of Android 5710 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 13910 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 11 5720 Microsoft Windows LSA Spoofing Vulnerability - Windows 10 30300 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2016 5730 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 30310 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2019 13930 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 30320 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 10 38520 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Ubuntu 30330 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2022 5760 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL 30340 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 11 13960 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 5770 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 5780 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows 10 13980 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 11 38560 ConnectWise ScreenConnect Improper Authentication Vulnerability - Any Version of Windows 13990 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 30380 Linux Kernel Use-After-Free Vulnerability - Ubuntu 30390 Linux Kernel Use-After-Free Vulnerability - Debian 14010 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 11 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 30400 OSGeo GeoServer JAI-EXT Code Injection Vulnerability - Any Operating System 14020 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 11 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 14030 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 5840 Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 14040 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 5870 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 30450 Linux Kernel Use-After-Free Vulnerability - SLE 5880 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 5890 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 14090 Cacti Command Injection Vulnerability - Any Operating System 30480 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2008 R2 5910 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 30490 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2008 R2 5920 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 30500 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2008 R2 5940 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 10 30520 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2008 R2 30530 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2008 R2 5960 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 30540 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2008 R2 30550 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2008 R2 5980 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 30560 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 R2 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 6000 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 30580 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2008 R2 6010 Microsoft Windows Spoofing Vulnerability - Windows 10 30590 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2008 R2 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 6020 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 30600 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2008 R2 6030 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows 10 30610 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2008 R2 6040 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows 10 30620 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2008 R2 6050 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 30630 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2008 R2 6060 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows 10 30640 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2008 R2 6070 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 30650 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 R2 14270 Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability - Any Operating System 30660 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2008 R2 6090 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 30670 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 R2 22480 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 6100 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 30680 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2008 R2 6110 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows 10 30690 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2008 R2 6120 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 30700 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2008 R2 14320 dotCMS Unrestricted Upload of File Vulnerability - Any Operating System 6130 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows 10 30710 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2008 R2 6140 Microsoft Windows SMB Information Disclosure Vulnerability - Windows 10 6150 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows 10 6160 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows 10 6180 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 30760 Microsoft Skype for Business Privilege Escalation Vulnerability - Skype for Business Server 22570 Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability - Any Version of Windows 6190 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows 10 30770 Microsoft SharePoint Server Privilege Escalation Vulnerability - SharePoint 22580 IBM Aspera Faspex Code Execution Vulnerability - Any Version of Windows 6200 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 30780 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - SharePoint 6230 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows 10 6240 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 22630 Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability - Any Version of Windows 6250 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 14450 Plex Media Server Remote Code Execution Vulnerability - Any Version of Windows 6260 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 30850 Microsoft SharePoint Server Code Injection Vulnerability - SharePoint 22670 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of Windows 6290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 22680 Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability - Any Version of Windows 6300 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 30890 Microsoft Outlook Security Feature Bypass Vulnerability - Outlook 6320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows 10 6330 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 22720 Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability - Any Version of Linux 6340 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 22730 IBM Aspera Faspex Code Execution Vulnerability - Any Version of Linux 6350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 6370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 22770 Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability - Any Version of Linux 6390 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 6400 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 6410 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 10 22800 MinIO Information Disclosure Vulnerability - Any Version of Linux 14610 Teclib GLPI Remote Code Execution Vulnerability - Any Operating System 6430 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 22820 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of Linux 6440 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 6450 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows 10 6460 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 10 6470 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 6480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 6500 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 10 31090 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2012 R2 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS 31100 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 22910 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of MacOS 31110 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 6540 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 31120 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 22930 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows 10 6550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 31130 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2008 SP2 31140 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows Server 2022 6570 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 31150 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 6580 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 6590 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 31170 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows 11 6600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 31180 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 31190 OSGeo GeoServer GeoTools Eval Injection Vulnerability - Any Version of Windows 6620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows 10 31200 Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability - Any Operating System 6630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 31210 SolarWinds Serv-U Path Traversal Vulnerability - Any Version of Windows 6640 Microsoft Windows SAM Local Privilege Escalation Vulnerability - Windows 10 31220 SolarWinds Serv-U Path Traversal Vulnerability - Any Version of Linux 23030 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows Server 2016 6650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows 10 6670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 14870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 6680 Microsoft GDI Remote Code Execution Vulnerability - Windows 10 14880 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6690 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows 10 14890 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 6700 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 6710 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6720 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows Server 2019 6730 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 6740 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows Server 2019 6750 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2019 6760 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2019 6770 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2019 6780 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2019 6790 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 14990 Apple iOS Type Confusion Vulnerability - Any Version of MacOS 6800 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 31380 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 6810 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2019 31390 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2016 6820 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2019 31400 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 6830 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows Server 2019 31410 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 6840 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 31420 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2016 6850 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 31430 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 6860 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 31440 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2019 6870 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2019 31450 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6880 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 31460 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 6890 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 31470 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2019 6900 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2019 31480 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 6910 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 31490 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 10 6920 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 31500 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 15120 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 6930 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2019 31510 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 6940 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31520 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 10 15140 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 6950 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 31530 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 6960 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 31540 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2008 SP2 6970 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 6980 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2019 31560 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2022 6990 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2019 31570 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 7000 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 31580 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2022 7010 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 31590 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2022 7020 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31600 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2022 7030 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31610 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 11 7040 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 31620 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 15240 WSO2 Multiple Products Unrestrictive Upload of File Vulnerability - Any Operating System 7050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2019 31630 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 11 7060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 31640 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 11 7070 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 31650 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 11 7080 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 7090 Microsoft Windows Spoofing Vulnerability - Windows Server 2019 7100 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 7110 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2019 7120 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows Server 2019 7130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 7140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2019 7150 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 7160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 7180 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2019 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 7190 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 7200 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2019 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 7210 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2019 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 7220 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2019 15420 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability - Any Version of Windows 7230 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 15430 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of Windows 7240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 15440 Adobe Acrobat and Reader Unspecified Vulnerability - Any Version of Windows 7250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2019 15450 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of Windows 7260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 7270 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows Server 2019 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 7280 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 7290 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 7300 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 7310 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 7320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2019 7330 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 31910 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 7340 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 7350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 7360 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 31940 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 23750 Microsoft Office Publisher Security Feature Bypass Vulnerability - Any Version of Windows 7370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 23760 Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability - Any Version of Windows 7380 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 7390 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2019 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 7400 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 7410 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 31990 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 7420 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows Server 2019 32000 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2008 R2 7430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2019 15630 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of Windows 32020 Microsoft Project Remote Code Execution Vulnerability - Project 2016 15640 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of Windows 7450 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 7460 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2019 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 7470 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2019 7480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 23870 Multiple SugarCRM Products Remote Code Execution Vulnerability - Any Operating System 7490 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 32070 Kingsoft WPS Office Path Traversal Vulnerability - Any Version of Windows 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 32080 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability - Any Version of Windows 7510 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 15710 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of Windows 7520 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 7530 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 15730 Adobe Flash Player Unspecified Vulnerability - Any Version of Windows 7540 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2019 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows 7550 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 7560 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 7570 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2019 7580 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 7590 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2019 32170 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2016 7600 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows Server 2019 32180 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2016 15800 Adobe Acrobat and Reader Double Free Vulnerability - Any Version of Windows 7610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 7620 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 32200 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2019 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 32210 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2019 15830 Adobe Acrobat and Reader Universal 3D Memory Corruption Vulnerability - Any Version of Windows 7640 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 32230 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 10 32240 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 10 7670 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2016 32250 Microsoft Windows Update Use-After-Free Vulnerability - Windows 10 7680 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2016 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 7690 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2016 32270 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2008 SP2 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 7700 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 32280 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2008 SP2 7710 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 15910 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability - Any Version of Windows 7720 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2016 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 7730 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2016 32320 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2022 32330 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2022 24140 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 7760 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 24150 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2008 SP2 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 7780 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 24170 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 7790 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 24180 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2012 R2 7800 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2016 32380 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 11 24190 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2012 7810 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 32390 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 11 16010 Adobe Reader and Acrobat Input Validation Vulnerability - Any Version of Windows 7820 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 7830 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2016 32410 Microsoft Publisher Protection Mechanism Failure Vulnerability - Publisher 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 7840 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 7850 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 32440 Progress WhatsUp Gold SQL Injection Vulnerability - Any Version of Windows 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 7870 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2016 7880 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 7900 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 16100 Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability - Any Version of Windows 7910 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2016 16110 Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability - Any Version of Windows 7920 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2016 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 7970 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 32560 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 32570 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 8000 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 32580 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 8010 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 32590 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2008 SP2 8030 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 32610 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 16230 Adobe Reader Buffer Overflow Vulnerability - Any Version of Windows 32620 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 8050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2016 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 8060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 16260 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of Windows 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 8080 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 8090 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 32670 Apple Multiple Products WebKit Type Confusion Vulnerability - Ubuntu 8100 Microsoft Windows Spoofing Vulnerability - Windows Server 2016 8110 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 8120 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2016 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 8130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 8140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2016 32720 Apple Multiple Products WebKit Use-After-Free Vulnerability - Ubuntu 16340 Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability - Any Version of Windows 8160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 8170 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 8180 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2016 8190 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2016 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:07:18 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:07:18 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALASECS-2025-066 - Docker Security update - Amazon linux 2 x86_64 (ID: 250661) Published Site Version: * Patches for Amazon Linux 2, version 182. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:10:30 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:10:30 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALASECS-2025-066 - Docker Security update - Amazon linux 2 aarch64 (ID: 250661) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 110. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:12:12 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:12:12 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALASPOSTGRESQL14-2025-018 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 250184) * ALASFIREFOX-2025-039 - Firefox Security update - Amazon linux 2 x86_64 (ID: 250391) * ALASNITRO-ENCLAVES-2025-063 - Containerd Security update - Amazon linux 2 x86_64 (ID: 250634) * ALASECS-2025-065 - Ecs-Init Security update - Amazon linux 2 x86_64 (ID: 250653) * ALASECS-2025-066 - Docker Security update - Amazon linux 2 x86_64 (ID: 250663) * ALASDOCKER-2025-067 - Containerd Security update - Amazon linux 2 x86_64 (ID: 250672) * ALASECS-2025-067 - Ecs-Init Security update - Amazon linux 2 x86_64 (ID: 250673) * ALASKERNEL-5.15-2025-073 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250731) * ALASKERNEL-5.15-2025-074 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250741) * ALASKERNEL-5.10-2025-094 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250942) Published Site Version: * Patches for Amazon Linux 2 Extras, version 5. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:13:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:13:58 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALASPOSTGRESQL14-2025-018 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 250184) * ALASFIREFOX-2025-039 - Firefox Security update - Amazon linux 2 aarch64 (ID: 250391) * ALASNITRO-ENCLAVES-2025-063 - Containerd Security update - Amazon linux 2 aarch64 (ID: 250634) * ALASECS-2025-065 - Ecs-Init Security update - Amazon linux 2 aarch64 (ID: 250653) * ALASECS-2025-066 - Docker Security update - Amazon linux 2 aarch64 (ID: 250663) * ALASDOCKER-2025-067 - Containerd Security update - Amazon linux 2 aarch64 (ID: 250672) * ALASECS-2025-067 - Ecs-Init Security update - Amazon linux 2 aarch64 (ID: 250673) * ALASKERNEL-5.15-2025-073 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250731) * ALASKERNEL-5.15-2025-074 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250741) * ALASKERNEL-5.10-2025-094 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250942) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 5. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:15:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:15:52 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2025-993 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 320259931) * ALAS2023-2025-994 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 320259941) * ALAS2023-2025-995 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 320259951) * ALAS2023-2025-996 - Firefox Security update - Amazon linux 2023 x86_64 (ID: 320259961) * ALAS2023-2025-997 - Libsoup Security update - Amazon linux 2023 x86_64 (ID: 320259971) * ALAS2023-2025-998 - Libsoup3 Security update - Amazon linux 2023 x86_64 (ID: 320259981) * ALAS2023-2025-999 - Apache-Commons-Beanutils Security update - Amazon linux 2023 x86_64 (ID: 320259991) * ALAS2023-2025-1000 - Ghostscript Security update - Amazon linux 2023 x86_64 (ID: 3202510001) * ALAS2023-2025-1001 - Glibc Security update - Amazon linux 2023 x86_64 (ID: 3202510011) * ALAS2023-2025-1002 - Python-Tornado Security update - Amazon linux 2023 x86_64 (ID: 3202510021) * ALAS2023-2025-1003 - Python3.11-Setuptools Security update - Amazon linux 2023 x86_64 (ID: 3202510031) * ALAS2023-2025-1004 - Python3.12-Setuptools Security update - Amazon linux 2023 x86_64 (ID: 3202510041) * ALAS2023-2025-1005 - Python-Setuptools Security update - Amazon linux 2023 x86_64 (ID: 3202510051) * ALAS2023-2025-1006 - Screen Security update - Amazon linux 2023 x86_64 (ID: 3202510061) * ALAS2023-2025-1007 - Perl Security update - Amazon linux 2023 x86_64 (ID: 3202510071) * ALAS2023-2025-1008 - Dotnet8.0 Security update - Amazon linux 2023 x86_64 (ID: 3202510081) * ALAS2023-2025-1009 - Nodejs22 Security update - Amazon linux 2023 x86_64 (ID: 3202510091) * ALAS2023-2025-1010 - Nodejs20 Security update - Amazon linux 2023 x86_64 (ID: 3202510101) * ALAS2023-2025-1011 - Ecs-Init Security update - Amazon linux 2023 x86_64 (ID: 3202510111) * ALAS2023-2025-1012 - Cni-Plugins Security update - Amazon linux 2023 x86_64 (ID: 3202510121) * ALAS2023-2025-1013 - Amazon-Ssm-Agent Security update - Amazon linux 2023 x86_64 (ID: 3202510131) * ALAS2023-2025-1014 - Git Security update - Amazon linux 2023 x86_64 (ID: 3202510141) * ALAS2023-2025-1015 - Ecs-Init Security update - Amazon linux 2023 x86_64 (ID: 3202510151) * ALAS2023-2025-1016 - Mariadb1011 Security update - Amazon linux 2023 x86_64 (ID: 3202510161) Published Site Version: * Patches for Amazon Linux 2023, version 59. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:17:44 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:17:44 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2025-993 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 320259931) * ALAS2023-2025-994 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 320259941) * ALAS2023-2025-995 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 320259951) * ALAS2023-2025-996 - Firefox Security update - Amazon linux 2023 aarch64 (ID: 320259961) * ALAS2023-2025-997 - Libsoup Security update - Amazon linux 2023 aarch64 (ID: 320259971) * ALAS2023-2025-998 - Libsoup3 Security update - Amazon linux 2023 aarch64 (ID: 320259981) * ALAS2023-2025-999 - Apache-Commons-Beanutils Security update - Amazon linux 2023 aarch64 (ID: 320259991) * ALAS2023-2025-1000 - Ghostscript Security update - Amazon linux 2023 aarch64 (ID: 3202510001) * ALAS2023-2025-1001 - Glibc Security update - Amazon linux 2023 aarch64 (ID: 3202510011) * ALAS2023-2025-1002 - Python-Tornado Security update - Amazon linux 2023 aarch64 (ID: 3202510021) * ALAS2023-2025-1003 - Python3.11-Setuptools Security update - Amazon linux 2023 aarch64 (ID: 3202510031) * ALAS2023-2025-1004 - Python3.12-Setuptools Security update - Amazon linux 2023 aarch64 (ID: 3202510041) * ALAS2023-2025-1005 - Python-Setuptools Security update - Amazon linux 2023 aarch64 (ID: 3202510051) * ALAS2023-2025-1006 - Screen Security update - Amazon linux 2023 aarch64 (ID: 3202510061) * ALAS2023-2025-1007 - Perl Security update - Amazon linux 2023 aarch64 (ID: 3202510071) * ALAS2023-2025-1008 - Dotnet8.0 Security update - Amazon linux 2023 aarch64 (ID: 3202510081) * ALAS2023-2025-1009 - Nodejs22 Security update - Amazon linux 2023 aarch64 (ID: 3202510091) * ALAS2023-2025-1010 - Nodejs20 Security update - Amazon linux 2023 aarch64 (ID: 3202510101) * ALAS2023-2025-1011 - Ecs-Init Security update - Amazon linux 2023 aarch64 (ID: 3202510111) * ALAS2023-2025-1012 - Cni-Plugins Security update - Amazon linux 2023 aarch64 (ID: 3202510121) * ALAS2023-2025-1013 - Amazon-Ssm-Agent Security update - Amazon linux 2023 aarch64 (ID: 3202510131) * ALAS2023-2025-1014 - Git Security update - Amazon linux 2023 aarch64 (ID: 3202510141) * ALAS2023-2025-1015 - Ecs-Init Security update - Amazon linux 2023 aarch64 (ID: 3202510151) * ALAS2023-2025-1016 - Mariadb1011 Security update - Amazon linux 2023 aarch64 (ID: 3202510161) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 39. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:18:49 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:18:49 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5941-1 - Gst-Plugins-Bad1.0 Security Update - Debian 12 (amd64) (ID: 59410101) Published Site Version: * Patches for Debian 12, version 108. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:22:00 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Jun 2025 08:22:00 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-13 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 5058402 Microsoft Edge Extended Stable Build 136.0.3240.124 Available (x64) * 5058400 Microsoft Edge Extended Stable Build 136.0.3240.124 Available Modified : * 5058372 Microsoft Edge Extended Stable Build 136.0.3240.115 Available (x64) (Superseded) * 5058370 Microsoft Edge Extended Stable Build 136.0.3240.115 Available (Superseded) * 6082192 Mozilla Firefox (x64) 139.0.4 Available Reason : * New update for Edge. * Updated Sha Values for Firefox Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2339 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:25:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:25:27 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLEA-2024:3032 - Ecj Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 24303201) * RLBA-2024:3126 - Libglvnd Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 24312601) * RLBA-2024:3162 - Shadow-Utils Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 24316201) * RLBA-2024:3210 - Dmidecode Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 24321001) * RLBA-2024:3217 - Arpwatch Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 24321701) * RLSA-2024:4247 - Libuv Security Update - RockyLinux 8 x86_64 (ID: 24424701) * RLBA-2024:4254 - Kmod-Redhat-Oracleasm Bug Fix Update - RockyLinux 8 x86_64 (ID: 24425401) * RLSA-2024:4563 - Java-1.8.0-Openjdk Security Update - RockyLinux 8 x86_64 (ID: 24456301) * RLSA-2024:5524 - Bind Security Update - RockyLinux 8 x86_64 (ID: 24552401) * RLBA-2024:8853 - Cups Bug Fix Update - RockyLinux 8 x86_64 (ID: 24885301) * RLSA-2025:0288 - Bug Fix of Networkmanager - RockyLinux 8 x86_64 (ID: 25028801) * RLSA-2025:0422 - Java-17-Openjdk Security Update for Rocky Linux 8.6, 8.8, 8.10, 9.4 and 9.5 - RockyLinux 8 x86_64 (ID: 25042201) * RLSA-2025:1917 - Emacs Security Update - RockyLinux 8 x86_64 (ID: 25191701) * RLBA-2025:2591 - Autofs Bug Fix Update - RockyLinux 8 x86_64 (ID: 25259101) * RLBA-2025:2592 - Networkmanager Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 25259201) * RLBA-2025:2596 - Lvm2 Bug Fix Update - RockyLinux 8 x86_64 (ID: 25259601) * RLBA-2025:2597 - Traceroute Bug Fix Update - RockyLinux 8 x86_64 (ID: 25259701) * RLBA-2025:2604 - Valgrind Bug Fix Update - RockyLinux 8 x86_64 (ID: 25260401) * RLSA-2025:2868 - Libreoffice Security Update - RockyLinux 8 x86_64 (ID: 25286801) Published Site Version: * Patches for Rocky Linux 8, version 68. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 06:29:55 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Jun 2025 09:29:55 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLBA-2024:2154 - Liberation-Fonts Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24215401) * RLSA-2024:2211 - Tcpdump Security Update - RockyLinux 9 x86_64 (ID: 24221101) * RLBA-2024:2226 - Php-Pear Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24222601) * RLSA-2024:2290 - Mutt Security Update - RockyLinux 9 x86_64 (ID: 24229001) * RLSA-2024:2483 - Traceroute Security Update - RockyLinux 9 x86_64 (ID: 24248301) * RLBA-2024:2485 - Smartmontools Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24248501) * RLBA-2024:2492 - Make Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24249201) * RLSA-2024:4756 - Libuv Security Update - RockyLinux 9 x86_64 (ID: 24475601) * RLBA-2024:4778 - Mtr Bug Fix Update - RockyLinux 9 x86_64 (ID: 24477801) * RLSA-2025:0923 - Buildah Security Update - RockyLinux 9 x86_64 (ID: 25092301) * RLSA-2025:1915 - Emacs Security Update - RockyLinux 9 x86_64 (ID: 25191501) * RLSA-2025:2867 - Grub2 Security Update - RockyLinux 9 x86_64 (ID: 25286701) Published Site Version: * Patches for Rocky Linux 9, version 55. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 07:24:54 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Jun 2025 09:24:54 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2025-06-13 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - SDB - OracleDB 19c on AIX -OJDK 2025-04 Patch - SDB - OracleDB 19c on AIX -OJDK 2025-04 Rollback - ASM - OracleDB 19c on AIX - OJDK 2025-04 Patch - ASM - OracleDB 19c on AIX - OJDK 2025-04 Rollback - RAC - OracleDB 19c on AIX - OJDK 2025-04 Patch - RAC - OracleDB 19c on AIX - OJDK 2025-04 Rollback - Update: Apache Tomcat 9 v9.0.106 - Linux (SystemD-based) - Update: Apache Tomcat 11 v11.0.8 - Linux (SystemD-based) - Update: Apache Tomcat 10 v10.1.42 - Linux (SystemD-based) - Update: Multi-Instance Apache Tomcat 9 v9.0.106 - Linux - Update: Multi-Instance Apache Tomcat 10 v10.1.42 - Linux - Update: Multi-Instance Apache Tomcat 11 v11.0.8 - Linux - Update: Multi-Instance Apache Tomcat 9 v9.0.106 - AIX - Update: Multi-Instance Apache Tomcat 10 v10.1.42 - AIX - Update: Multi-Instance Apache Tomcat 11 v11.0.8 - AIX - Update: Multi-Instance Apache Tomcat 11 v11.0.8 - Solaris - Update: Multi-Instance Apache Tomcat 9 v9.0.106 - Solaris - Update: MongoDB v7.0.21 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.21 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.21 - SUSE 12 (x64) - Update: MongoDB v7.0.21 - SUSE 15 (x64) - Update: MongoDB v7.0.21 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.21 - Ubuntu 22.04 (x64) - Update: MongoDB v7.0.21 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.10 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.10 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.10 - SUSE 15 (x64) - Update: MongoDB v8.0.10 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.10 - Ubuntu 22.04 (x64) ## Modified Items: - Update: Apache Tomcat 9 v9.0.105 - Linux (SystemD-based) - Update: Apache Tomcat 10 v10.1.41 - Linux (SystemD-based) - Update: Apache Tomcat 11 v11.0.7 - Linux (SystemD-based) - Update: Multi-Instance Apache Tomcat 9 v9.0.105 - Linux - Update: Multi-Instance Apache Tomcat 10 v10.1.41 - Linux - Update: Multi-Instance Apache Tomcat 11 v11.0.7 - Linux - Update: Multi-Instance Apache Tomcat 9 v9.0.105 - Solaris - Update: Multi-Instance Apache Tomcat 10 v10.1.41 - Solaris - Update: Multi-Instance Apache Tomcat 11 v11.0.7 - Solaris - Update: Multi-Instance Apache Tomcat 9 v9.0.105 - AIX - Update: Multi-Instance Apache Tomcat 10 v10.1.41 - AIX - Update: Multi-Instance Apache Tomcat 11 v11.0.7 - AIX - Update: MongoDB v7.0.20 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.20 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.20 - SUSE 12 (x64) - Update: MongoDB v7.0.20 - SUSE 15 (x64) - Update: MongoDB v7.0.20 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.20 - Ubuntu 22.04 (x64) - Update: MongoDB v7.0.20 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.9 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.9 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.9 - SUSE 15 (x64) - Update: MongoDB v8.0.9 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.9 - Ubuntu 22.04 (x64) ## Deleted Items: - 1200611 ApacheTomcat9-Update.bes - 1200710 ApacheTomcat10-Update.bes - 1201303 ApacheTomcat11-Update.bes - 5101101 ApacheTomcat9-Update.bes - 5101201 ApacheTomcat10-Update.bes - 5101301 ApacheTomcat11-Update.bes - 5101401 ApacheTomcat9-Update.bes - 5101501 ApacheTomcat10-Update.bes - 5101601 ApacheTomcat11-Update.bes - 5101401 ApacheTomcat9-Update.bes - 5101501 ApacheTomcat10-Update.bes - 5101601 ApacheTomcat11-Update.bes - 5700107 MongoDB-Update.bes - 5700207 MongoDB-Update.bes - 5700307 MongoDB-Update.bes - 5700407 MongoDB-Update.bes - 5700607 MongoDB-Update.bes - 5701007 MongoDB-Update.bes - 5701107 MongoDB-Update.bes - 5701407 MongoDB-Update.bes - 5701507 MongoDB-Update.bes - 5701707 MongoDB-Update.bes - 5701907 MongoDB-Update.bes - 5702004 MongoDB-Update.bes ## Reason for Update: - New Software Releases from Vendors - The Older Fixlets of Apache Tomcat 9,10,11 and Mongodb v7 and v8 have been archived. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v61 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 07:36:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Jun 2025 09:36:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2025-06-13 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Apache Tomcat 10 v10.1.42 - Windows (x64) - Update: Apache Tomcat 10 v10.1.42 - Windows (x32) - Update: Apache Tomcat 11 v11.0.8 - Windows (x64) - Update: Apache Tomcat 11 v11.0.8 - Windows (x32) - Update: Apache Tomcat 9 v9.0.106 - Windows (x32) - Update: Apache Tomcat 9 v9.0.106 - Windows (x64) - Update: MongoDB v7.0.21 - Windows (x64) - Update: MongoDB v8.0.10 - Windows (x64) - Update: Multi-Instance Apache Tomcat 11 v11.0.8 - Windows (x32) - Update: Multi-Instance Apache Tomcat 11 v11.0.8 - Windows (x64) - Update: Multi-Instance Apache Tomcat 10 v10.1.42 - Windows (x32) - Update: Multi-Instance Apache Tomcat 10 v10.1.42 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.106 - Windows (x32) - Update: Multi-Instance Apache Tomcat 9 v9.0.106 - Windows (x64) ## Modified Items: - Update: Apache Tomcat 10 v10.1.41 - Windows (x64) - Update: Apache Tomcat 9 v9.0.105 - Windows (x64) - Update: Apache Tomcat 9 v9.0.105 - Windows (x32) - Update: Apache Tomcat 10 v10.1.41 - Windows (x32) - Update: Apache Tomcat 11 v11.0.7 - Windows (x64) - Update: Apache Tomcat 11 v11.0.7 - Windows (x32) - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.105 - Windows (x64) - Update: Multi-Instance Apache Tomcat 9 v9.0.104 - Windows (x32) - Update: Multi-Instance Apache Tomcat 9 v9.0.105 - Windows (x32) - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Windows (x64) - Update: Multi-Instance Apache Tomcat 10 v10.1.41 - Windows (x64) - Update: Multi-Instance Apache Tomcat 10 v10.1.40 - Windows (x32) - Update: Multi-Instance Apache Tomcat 10 v10.1.41 - Windows (x32) - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Windows (x64) - Update: Multi-Instance Apache Tomcat 11 v11.0.7 - Windows (x64) - Update: Multi-Instance Apache Tomcat 11 v11.0.6 - Windows (x32) - Update: Multi-Instance Apache Tomcat 11 v11.0.7 - Windows (x32) - Update: MongoDB v7.0.20 - Windows (x64) - Update: MongoDB v8.0.9 - Windows (x64) ## Deleted Items: - 1200210 ApacheTomcat10-Update.bes - 1200411 ApacheTomcat9-Update.bes - 5700707 MongoDB-Update.bes - 5701204 MongoDB-Update.bes - 5102101 ApacheTomcat11-Update.bes - 5102001 ApacheTomcat11-Update.bes - 5100801 ApacheTomcat10-Update.bes - 5100701 ApacheTomcat10-Update.bes - 5100601 ApacheTomcat9-Update.bes - 5100501 ApacheTomcat9-Update.bes - 1201502 ApacheTomcat11-Update.bes - 1201402 ApacheTomcat11-Update.bes - 1201208 ApacheTomcat10-Update.bes - 1201108 ApacheTomcat9-Update.bes ## Reason for Update: - New Software Releases from Vendors - The older fixlets of Apache Tomcat 9,10,11 MongoDB v7 and MongodB v8 have been archived. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v44 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 13 19:37:39 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Sat, 14 Jun 2025 04:37:39 +0200 Subject: [BESAdmin-Announcements] BigFix is now live on My HCLSoftware portal for license allocation! Message-ID: Hello BigFixers! I am happy to announce that the switchover to My HCLSoftware for entitlements and license allocations has been completed successfully. You can now operate on the new portal to allocate your licenses according to your needs. We are excited about the improved user experience this change brings about. As a reminder, the My HCLSoftware portal can be accessed here with the same credentials you were using for the previous portal. For reference on how to use the portal, please refer to these step by step guides: - https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0091966 - https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0094107 In case you have issues or questions the customer support team is ready to help. Thank you! Alessandro -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 16 09:30:38 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Jun 2025 11:30:38 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-16 Message-ID: Content in the Patches for Windows site has been modified Modified: * Major [ID:505841105] MS25-MAY: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5058411 (x64) (Superseded) * Major [ID:505841101] MS25-MAY: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5058411 (x64) (Superseded) * Major [ID:505841103] MS25-MAY: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5058411 (arm64) (Superseded) Reason for Update: * Modified relevance. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4556 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 16 09:44:26 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Jun 2025 11:44:26 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2025-06-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 10 Total Fixlets in Site: 67 Release Date: 2025-06-16 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 74500101 MeetingBar v4.11.6 1600201 Audacity v3.7.4 58700201 Speedify v15.5 4800201 Jabra Direct v6.23.16101 60300201 kdenlive v25.04.2 19600301 VSCodium v1.101.03933 62100201 Alice 3 v3.9.0.2 63500201 QZ Tray v2.2.5 7800201 Podman Desktop v1.19.2 64004501 PowerShell v7.4.10 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 16 11:24:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Jun 2025 13:24:42 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 33 Total Fixlets in Site: 3054 Total CVEs Covered: 874 Release Date: 2025-06-16 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 31890 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Oracle Linux 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 37150 HTTP/2 Rapid Reset Attack Vulnerability - SLE 37410 HTTP/2 Rapid Reset Attack Vulnerability - RHEL 31910 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 37440 HTTP/2 Rapid Reset Attack Vulnerability - Oracle Linux 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 37060 HTTP/2 Rapid Reset Attack Vulnerability - Ubuntu 31940 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 31820 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 37210 HTTP/2 Rapid Reset Attack Vulnerability - leap 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 31970 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 31990 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 32120 HTTP/2 Rapid Reset Attack Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 16 12:12:48 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Jun 2025 14:12:48 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 65 Total Fixlets in Site: 467 Release Date: 2025-06-16 Updated Fixlets: 11600301 XnViewMP v1.9.2.0 11700101 Yubico Authenticator v7.2.3 1200401 Apache Tomcat 9 v9.0.106 1200201 Apache Tomcat 10 v10.1.42 60300101 kdenlive v25.04.2 1600101 Audacity v3.7.4 16900201 Duo Desktop v7.8.0.0 19600101 VSCodium (x64) v1.101.03933 20700301 Logi Options v1.91.722586 21800101 PDF-Over v4.4.6 22400101 Koodo Reader v2.0.2 23700101 Prey v1.13.16 2600501 Dell Command | Configure v5.2.0.9 2700101 Remote Desktop Manager Enterprise v2025.2.14.0 28100101 AutomatedLab v5.57.16 29600101 Vim v9.1.1460 3100101 Foxit Reader v2025.1.0.27937 28600101 balena-cli v22.1.0.0 40200101 Binance v1.54.19 4100401 Google Earth Pro v7.3.6 42400101 ASAP v8.7.3 43500101 CloudApp v6.4.3 43700101 CrowdSec v1.6.8 43803901 Cryptomator (MSI) v1.16.0.5719 4800101 Jabra Direct v6.23.16101.0 4900101 TreeSize Free v4.7.3 49300101 Numara v6.0.4 50500101 Juju v3.6.7 52000101 Coder v2.23.1.0 53800201 spacedesk Windows DRIVER v2.1.51.0 54300101 Dolt v1.55.1 54900101 DownloadHelper CoApp v2.0.19.0 55000101 HeidiSQL v12.11.0.7065 55300101 K-Lite v19.0.1.0 55700101 OpenVPN Community v2.7.001 59500201 CorsixTH v0.68.0 5602901 Microsoft Power BI Desktop v2.144.679.0 5601601 Microsoft Power BI Desktop v2.144.679.0 5602501 Microsoft Visual Studio Code x64 v1.101.0 5603601 Windows Defender Virus Definitions v1.431.53.0 64004101 Microsoft Edge WebView2 Runtime v137.0.3296.83 5801301 Firefox Developer Edition (x64 en-US) v140.0 59400101 Syncovery v11.4.5 59000101 HLAE v2.185.1 58700101 Speedify v15.6.4.13147 59900101 Intel Driver && Support Assistant v25.3.24.7 61900101 AutoText Master v1.7.1 62100101 Alice 3 v3.9.0.2 6500201 Node.js v24.2.0 67000201 Cold Turkey Blocker v4.7 67700101 Vivaldi v7.4.3684.50 67700201 Vivaldi v7.4.3684.50 7000101 Opera Stable v119.0.5497.88 70200101 DisplayLink Graphics v11.7.5277.0 70400101 CMake v4.0.3 71500101 Git Extensions v5.2.1.18061 71600101 GitHub Desktop v3.4.21.0 73000101 Egnyte v3.26.0.162 7500101 PeaZip v10.5.0 8300101 R for Windows v4.5.1 8000101 Python v3.13.5 8900101 Slack v4.44.65.0 901901 AWS Command Line Interface v2 v2.27.35.0 9500101 Tailscale v1.84.2 9900101 Nessus Agent v10.9.0.20004 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 04:41:41 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Jun 2025 07:41:41 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2-2025-2873 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2528731) * ALAS2-2025-2874 - Libsoup Security update - Amazon linux 2 x86_64 (ID: 2528741) * ALAS2-2025-2875 - Ghostscript Security update - Amazon linux 2 x86_64 (ID: 2528751) * ALAS2-2025-2876 - Python-Setuptools Security update - Amazon linux 2 x86_64 (ID: 2528761) * ALAS2-2025-2877 - Python2-Setuptools Security update - Amazon linux 2 x86_64 (ID: 2528771) * ALAS2-2025-2878 - Screen Security update - Amazon linux 2 x86_64 (ID: 2528781) * ALAS2-2025-2879 - Perl Security update - Amazon linux 2 x86_64 (ID: 2528791) * ALAS2-2025-2880 - Perl-Fcgi Security update - Amazon linux 2 x86_64 (ID: 2528801) * ALAS2-2025-2881 - Openssh Security update - Amazon linux 2 x86_64 (ID: 2528811) * ALAS2-2025-2882 - Cni-Plugins Security update - Amazon linux 2 x86_64 (ID: 2528821) * ALAS2-2025-2883 - Amazon-Ssm-Agent Security update - Amazon linux 2 x86_64 (ID: 2528831) * ALAS2-2025-2884 - Git Security update - Amazon linux 2 x86_64 (ID: 2528841) * ALAS2-2025-2885 - Gnutls Security update - Amazon linux 2 x86_64 (ID: 2528851) * ALAS2-2025-2886 - Libtasn1 Security update - Amazon linux 2 x86_64 (ID: 2528861) * ALAS2-2025-2887 - Mod_Security Security update - Amazon linux 2 x86_64 (ID: 2528871) * ALAS2-2025-2888 - Python-Tornado Security update - Amazon linux 2 x86_64 (ID: 2528881) * ALAS2-2025-2889 - Python3-Tornado Security update - Amazon linux 2 x86_64 (ID: 2528891) * ALAS2-2025-2890 - Qt Security update - Amazon linux 2 x86_64 (ID: 2528901) * ALAS2-2025-2891 - Perl-File-Find-Rule Security update - Amazon linux 2 x86_64 (ID: 2528911) Published Site Version: * Patches for Amazon Linux 2, version 183. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 04:44:33 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Jun 2025 07:44:33 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2-2025-2873 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2528731) * ALAS2-2025-2874 - Libsoup Security update - Amazon linux 2 aarch64 (ID: 2528741) * ALAS2-2025-2875 - Ghostscript Security update - Amazon linux 2 aarch64 (ID: 2528751) * ALAS2-2025-2876 - Python-Setuptools Security update - Amazon linux 2 aarch64 (ID: 2528761) * ALAS2-2025-2877 - Python2-Setuptools Security update - Amazon linux 2 aarch64 (ID: 2528771) * ALAS2-2025-2878 - Screen Security update - Amazon linux 2 aarch64 (ID: 2528781) * ALAS2-2025-2879 - Perl Security update - Amazon linux 2 aarch64 (ID: 2528791) * ALAS2-2025-2880 - Perl-Fcgi Security update - Amazon linux 2 aarch64 (ID: 2528801) * ALAS2-2025-2881 - Openssh Security update - Amazon linux 2 aarch64 (ID: 2528811) * ALAS2-2025-2882 - Cni-Plugins Security update - Amazon linux 2 aarch64 (ID: 2528821) * ALAS2-2025-2883 - Amazon-Ssm-Agent Security update - Amazon linux 2 aarch64 (ID: 2528831) * ALAS2-2025-2884 - Git Security update - Amazon linux 2 aarch64 (ID: 2528841) * ALAS2-2025-2885 - Gnutls Security update - Amazon linux 2 aarch64 (ID: 2528851) * ALAS2-2025-2886 - Libtasn1 Security update - Amazon linux 2 aarch64 (ID: 2528861) * ALAS2-2025-2887 - Mod_Security Security update - Amazon linux 2 aarch64 (ID: 2528871) * ALAS2-2025-2888 - Python-Tornado Security update - Amazon linux 2 aarch64 (ID: 2528881) * ALAS2-2025-2889 - Python3-Tornado Security update - Amazon linux 2 aarch64 (ID: 2528891) * ALAS2-2025-2890 - Qt Security update - Amazon linux 2 aarch64 (ID: 2528901) * ALAS2-2025-2891 - Perl-File-Find-Rule Security update - Amazon linux 2 aarch64 (ID: 2528911) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 111. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 04:45:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Jun 2025 07:45:27 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Ca-Certificates - Debian 12 (amd64) (ID: 25061401) * DSA-5942-1 - Chromium Security Update - Debian 12 (amd64) (ID: 59420101) Published Site Version: * Patches for Debian 12, version 109. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 07:44:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Jun 2025 09:44:04 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-17 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:506315903] 5063159: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5063159 (x64) * Major [ID:506315901] 5063159: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5063159 Reason for Update: * New update for Windows 10 version 22H2. Actions to Take: * None Published site version: Site Name: Patches for Windows Version: 4557 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 08:10:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Jun 2025 10:10:16 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-17 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058375 Microsoft Edge Stable Build 137.0.3296.83 Available (x64) * 5058377 Microsoft Edge Stable Build 137.0.3296.83 Available Modified: * 5058341 Microsoft Edge Stable Build 137.0.3296.62 Available (x64) (Superseded) * 5058339 Microsoft Edge Stable Build 137.0.3296.62 Available (Superseded) * 5058345 Microsoft Edge Stable Build 137.0.3296.68 Available (x64) (Superseded) * 5058343 Microsoft Edge Stable Build 137.0.3296.68 Available (Superseded) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2340 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 10:54:14 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Jun 2025 19:54:14 +0200 Subject: [BESAdmin-Announcements] Refresh of BigFix Software Distribution site (version 123) Message-ID: The BigFix team is pleased to announce an update to the Software Distribution site to fix the following defect articles. **Fixed Defect Articles:** - KB0119138 After the identity provider migration, all the packages are orphans. - KB0121278 Cannot edit task with MSI+MST files. **Published Site Version** Software Distribution, site version 123 ? The BigFix Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 17 11:05:29 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Jun 2025 14:05:29 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: New DISA STIG Checklist for MS SQL Server 2022, published 2025-06-05 Message-ID: *Product:* BigFix Compliance *Title:* New DISA STIG Checklist for MS SQL Server 2022 *Security Benchmark:* U_MS_SQL_Server_2022_V1R0-1_STIG *Published Sites:* DISA STIG Checklist for MS SQL Server 2022, site version 1 (The site version is provided for air-gap customers.) *Details:* ? Total Fixlets in Site: 50 ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 18 06:37:32 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Jun 2025 08:37:32 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-18 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011686 Google Chrome 137.0.7151.120 Available * 5058404 Zoom 6.5.0.6118 Available * 5058379 Zoom (x64) 6.5.0.6118 Available Modified: * 14011684 Google Chrome 137.0.7151.104 Available (Superseded) * 5058368 Zoom 6.4.12.64384 Available (Superseded) * 5058313 Zoom (x64) 6.4.12.64384 Available (Superseded) Reason : * New update for Chrome and Zoom. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2341 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 18 07:24:39 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Jun 2025 10:24:39 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MacOS 15, published 2025-06-17 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MacOS 15 with bug fixes *Security Benchmark:* CIS Apple macOS 15.0 Sequoia Benchmark_v1.0.0 *Published Sites:* CIS Checklist for MacOS 15, site version 5 (The site version is provided for air-gap customers.) *Details:* ? Total Updated Fixlets:1 ? Total Fixlets in Site: 100 ? cis-5.8 - Resolved the issue to ensure proper handling of .rtfd files. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 18 08:16:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Jun 2025 11:16:19 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-18 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 137.0.7151.120 Available - Mac OS X (ID: 83000209) Zoom 6.5.0 (57940) Available - Mac OS X (ID: 51000126) Published site version: Updates for Mac Applications, version 761. Reasons for Update: A newer version of Chrome and Zoom for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 18 11:32:28 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Jun 2025 00:02:28 +0530 Subject: [BESAdmin-Announcements] BigFix Inventory: Catalog 20250615 Update published 2025-06-18 Message-ID: Product: BigFix Inventory Catalog update 20250615 Published site version: BigFix Inventory Discovery - version 21 Note: BigFix Inventory v10 site is deprecated and no longer used for updates. Features: Key updates in HCL BigFix Inventory Catalog 20250615: - Discovery of 60+ new software versions with the use of standard and template signatures including but not limited to the following software manufacturers like Alludo, BMC Software, Google and Microsoft. - Added software License type data for 128 software products. - Added software Categories data for 128 software components. - Refreshed EOS information for the Adobe(Added -4, Updated-3) Software components. To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20250615-ReleaseNotes.pdf To view the complete catalog content, use the Software Components report in BigFix Inventory. Actions needed: To apply new discovery capability, run the Server Software Catalog Update Fixlet (check new BigFix Inventory Discovery site) from the BigFix console and then wait for the next data import. If BigFix Inventory Discovery site is not visible 1. Check for License Update via BigFix License Overview (refresh if needed) License Overview dashboard 2. Enable new sites: BigFix Inventory and BigFix Inventory Discovery. Selecting Sites Starting from 20240612 release, Catalog updates are available from a new BigFix Inventory Discovery site, and BigFix Inventory server version 11.x is required for all subsequent catalog releases. For more information about how to install, maintain, and use BigFix Inventory application, refer to the user documentation: https://help.hcl-software.com/bigfix/11.0/inventory/welcome/BigFix_Inventory_welcome.html To find out more about Catalog Updates, visit: Catalog Overview We hope you find this latest release of BigFix Inventory Catalog content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 19 08:13:11 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Jun 2025 10:13:11 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-19 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 28 Total Fixlets in Site: 467 Release Date: 2025-06-19 New Fixlets: Updated Fixlets: 52600101 Concept2 Utility-x86 v7.17.00 59000101 HLAE v2.185.2 9400101 Tableau Desktop v2025.2.0 5601601 Microsoft Power BI Desktop v2.144.878.0 29600101 Vim v9.1.1471 42400101 ASAP v9.0 53600101 Seq v10.1.14192.0 43700101 CrowdSec v1.6.9 56500101 Revo Uninstaller v2.6.0 74100101 Rocket.Chat v4.6.0 9400201 Tableau Reader v2025.2.0 3400101 Git v2.50.0 59400101 Syncovery v11.5.0 54300101 Dolt v1.55.2 71600101 GitHub Desktop v3.5.0.0 74100201 Rocket.Chat v4.6.0 2000901 WebexNonLocalized (x64) v45.6.1.32593 7000101 Opera Stable v119.0.5497.110 19500101 Cyberduck v9.1.6.43284 5602901 Microsoft Power BI Desktop v2.144.878.0 73000101 Egnyte v3.26.1.163 5603501 Azure Data Studio v1.52.0 46800101 Bandizip v7.38 11300101 WinSCP v6.5.2 1000201 AnyDesk (EXE) v9.5.6 300301 Adobe DNG Converter v17.4 901901 AWS Command Line Interface v2 v2.27.38.0 5603601 Windows Defender Virus Definitions v1.431.97.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 19 09:39:11 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Jun 2025 12:39:11 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Ubuntu Linux 20.04, published 2025-06-16 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Ubuntu Linux 20.04 *Security Benchmark:* CIS Checklist for Ubuntu Linux 20.04 LTS Benchmark, v3.0.0 *Published Sites:* CIS Checklist for Ubuntu20, site version 11 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 172 ? Total Updated Fixlets: 124 ? Total Deleted Fixlets: 149 ? Total Fixlets in Site: 298 *New Items:* ? Ensure cramfs kernel module is not available ? Ensure freevxfs kernel module is not available ? Ensure hfs kernel module is not available ? Ensure hfsplus kernel module is not available ? Ensure jffs2 kernel module is not available ? Ensure overlay kernel module is not available ? Ensure squashfs kernel module is not available ? Ensure udf kernel module is not available ? Ensure usb-storage kernel module is not available ? Ensure /dev/shm is a separate partition ? Ensure latest versions of the apparmor packages are installed ? Ensure all AppArmor Profiles are not disabled ? Ensure access to bootloader config is configured ? Ensure address space layout randomization is enabled ? Ensure /etc/motd is configured ? Ensure /etc/issue is configured ? Ensure /etc/issue.net is configured ? Ensure access to /etc/motd is configured ? Ensure access to /etc/issue is configured ? Ensure access to /etc/issue.net is configured ? Ensure GDM is removed ? Ensure XDMCP is not enabled ? Ensure autofs services are not in use ? Ensure nis server services are not in use ? Ensure print server services are not in use ? Ensure rpcbind services are not in use ? Ensure rsync services are not in use ? Ensure samba file server services are not in use ? Ensure snmp services are not in use ? Ensure tftp server services are not in use ? Ensure web proxy server services are not in use ? Ensure web server services are not in use ? Ensure xinetd services are not in use ? Ensure avahi daemon services are not in use ? Ensure X window server services are not in use ? Ensure mail transfer agents are configured for local-only mode ? Ensure dhcp server services are not in use ? Ensure dns server services are not in use ? Ensure dnsmasq services are not in use ? Ensure ftp server services are not in use ? Ensure ldap server services are not in use ? Ensure message access server services are not in use ? Ensure network file system services are not in use ? Ensure nis client is not installed ? Ensure ldap client is not installed ? Ensure ftp client is not installed ? Ensure access to /etc/crontab is configured ? Ensure access to /etc/cron.hourly is configured ? Ensure access to /etc/cron.daily is configured ? Ensure access to /etc/cron.weekly is configured ? Ensure access to /etc/cron.monthly is configured ? Ensure access to /etc/cron.yearly is configured ? Ensure access to /etc/cron.d is configured ? Ensure access to crontab is configured ? Ensure access to at is configured ? Ensure wireless interfaces are not available ? Ensure bluetooth services are not in use ? Ensure dccp kernel module is not available ? Ensure tipc kernel module is not available ? Ensure rds kernel module is not available ? Ensure sctp kernel module is not available ? Ensure ip forwarding is disabled ? Ensure tcp syn cookies is enabled ? Ensure ipv6 router advertisements are not accepted ? Ensure bogus icmp responses are ignored ? Ensure broadcast icmp requests are ignored ? Ensure icmp redirects are not accepted ? Ensure secure icmp redirects are not accepted ? Ensure reverse path filtering is enabled ? Ensure a single firewall configuration utility is in use ? Ensure nftables is not in use with ufw ? Ensure nftables is not in use with iptables ? Ensure ufw is not in use with iptables ? Ensure access to /etc/ssh/sshd_config is configured ? Ensure sshd HostbasedAuthentication is disabled ? Ensure sshd IgnoreRhosts is enabled ? Ensure sshd KexAlgorithms is configured ? Ensure sshd LoginGraceTime is configured ? Ensure sshd LogLevel is configured ? Ensure sshd MACs are configured ? Ensure sshd MaxAuthTries is configured ? Ensure sshd MaxSessions is configured ? Ensure sshd MaxStartups is configured ? Ensure sshd PermitEmptyPasswords is disabled ? Ensure access to SSH private host key files is configured ? Ensure sshd PermitRootLogin is disabled ? Ensure sshd PermitUserEnvironment is disabled ? Ensure sshd UsePAM is enabled ? Ensure access to SSH public host key files is configured ? Ensure sshd access is configured ? Ensure sshd Banner is configured ? Ensure sshd Ciphers are configured ? Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured ? Ensure sshd DisableForwarding is enabled ? Ensure sshd GSSAPIAuthentication is disabled ? Ensure sudo authentication timeout is configured ? Ensure latest version of pam is installed ? Ensure latest version of libpam-modules is installed ? Ensure latest version of libpam-pwquality is installed ? Ensure pam_unix module is enabled ? Ensure pam_faillock module is enabled ? Ensure pam_pwquality module is enabled ? Ensure pam_pwhistory module is enabled ? Ensure password failed attempts lockout is configured ? Ensure password unlock time is configured ? Ensure password failed attempts lockout includes root account ? Ensure password number of changed characters is configured ? Ensure minimum password length is configured ? Ensure password complexity is configured ? Ensure password same consecutive characters is configured ? Ensure password maximum sequential characters is configured ? Ensure password dictionary check is enabled ? Ensure password quality checking is enforced ? Ensure password quality is enforced for the root user ? Ensure password history remember is configured ? Ensure password history is enforced for the root user ? Ensure pam_pwhistory includes use_authtok ? Ensure pam_unix does not include nullok ? Ensure pam_unix does not include remember ? Ensure pam_unix includes a strong password hashing algorithm ? Ensure pam_unix includes use_authtok ? Ensure password expiration is configured ? Ensure minimum password days is configured ? Ensure password expiration warning days is configured ? Ensure inactive password lock is configured ? Ensure root is the only GID 0 account ? Ensure group root is the only GID 0 group ? Ensure root account access is controlled ? Ensure root path integrity ? Ensure root user umask is configured ? Ensure system accounts do not have a valid login shell ? Ensure accounts without a valid login shell are locked ? Ensure default user umask is configured ? Ensure journald service is enabled and active ? Ensure journald log file rotation is configured ? Ensure systemd-journal-upload authentication is configured ? Ensure systemd-journal-upload is enabled and active ? Ensure systemd-journal-remote service is not in use ? Ensure journald ForwardToSyslog is disabled ? Ensure journald Compress is configured ? Ensure journald Storage is configured ? Ensure rsyslog service is enabled and active ? Ensure rsyslog log file creation mode is configured ? Ensure access to all logfiles has been configured ? Ensure auditd packages are installed ? Ensure audit_backlog_limit is configured ? Ensure system warns when audit logs are low on space ? Ensure successful and unsuccessful attempts to use the chcon command are collected ? Ensure successful and unsuccessful attempts to use the setfacl command are collected ? Ensure successful and unsuccessful attempts to use the chacl command are collected ? Ensure successful and unsuccessful attempts to use the usermod command are collected ? Ensure audit log files mode is configured ? Ensure audit tools group owner is configured ? Ensure audit log files owner is configured ? Ensure audit log files group owner is configured ? Ensure the audit log file directory mode is configured ? Ensure audit configuration files mode is configured ? Ensure audit configuration files owner is configured ? Ensure audit configuration files group owner is configured ? Ensure audit tools mode is configured ? Ensure audit tools owner is configured ? Ensure access to /etc/passwd is configured ? Ensure access to /etc/security/opasswd is configured ? Ensure no files or directories without an owner and a group exist ? Ensure access to /etc/passwd- is configured ? Ensure access to /etc/group is configured ? Ensure access to /etc/group- is configured ? Ensure access to /etc/shadow is configured ? Ensure access to /etc/shadow- is configured ? Ensure access to /etc/gshadow is configured ? Ensure access to /etc/gshadow- is configured ? Ensure access to /etc/shells is configured *Modified Items:* ? Ensure /tmp is a separate partition ? Ensure nodev option set on /tmp partition ? Ensure nosuid option set on /tmp partition ? Ensure noexec option set on /tmp partition ? Ensure nodev option set on /dev/shm partition ? Ensure nosuid option set on /dev/shm partition ? Ensure noexec option set on /dev/shm partition ? Ensure separate partition exists for /home ? Ensure nodev option set on /home partition ? Ensure nosuid option set on /home partition ? Ensure separate partition exists for /var ? Ensure nodev option set on /var partition ? Ensure nosuid option set on /var partition ? Ensure separate partition exists for /var/tmp ? Ensure nodev option set on /var/tmp partition ? Ensure nosuid option set on /var/tmp partition ? Ensure noexec option set on /var/tmp partition ? Ensure separate partition exists for /var/log ? Ensure nodev option set on /var/log partition ? Ensure nosuid option set on /var/log partition ? Ensure noexec option set on /var/log partition ? Ensure separate partition exists for /var/log/audit ? Ensure nodev option set on /var/log/audit partition ? Ensure nosuid option set on /var/log/audit partition ? Ensure noexec option set on /var/log/audit partition ? Ensure GPG keys are configured ? Ensure updates, patches, and additional security software are installed ? Ensure AppArmor is enabled in the bootloader configuration ? Ensure all AppArmor Profiles are enforcing ? Ensure ptrace\_scope is restricted ? Ensure core dumps are restricted ? Ensure prelink is not installed ? Ensure Automatic Error Reporting is not enabled ? Ensure GDM login banner is configured ? Ensure GDM disable-user-list option is enabled ? Ensure GDM screen locks when the user is idle ? Ensure GDM screen locks cannot be overridden ? Ensure GDM automatic mounting of removable media is disabled ? Ensure GDM disabling automatic mounting of removable media is not overridden ? Ensure GDM autorun-never is enabled ? Ensure GDM autorun-never is not overridden ? Ensure rsh client is not installed ? Ensure talk client is not installed ? Ensure telnet client is not installed ? Ensure a single time synchronization daemon is in use ? Ensure systemd-timesyncd configured with authorized timeserver ? Ensure systemd-timesyncd is enabled and running ? Ensure chrony is configured with authorized timeserver ? Ensure chrony is running as user \_chrony ? Ensure chrony is enabled and running ? Ensure cron daemon is enabled and active ? Ensure packet redirect sending is disabled ? Ensure source routed packets are not accepted ? Ensure suspicious packets are logged ? Ensure ufw is installed ? Ensure iptables-persistent is not installed with ufw ? Ensure ufw service is enabled ? Ensure ufw loopback traffic is configured ? Ensure ufw default deny firewall policy ? Ensure nftables is installed ? Ensure nftables rules are permanent ? Ensure ufw is uninstalled or disabled with nftables ? Ensure iptables are flushed with nftables ? Ensure a nftables table exists ? Ensure nftables base chains exist ? Ensure nftables loopback traffic is configured ? Ensure nftables default deny firewall policy ? Ensure nftables service is enabled ? Ensure iptables packages are installed ? Ensure iptables default deny firewall policy ? Ensure iptables loopback traffic is configured ? Ensure ip6tables default deny firewall policy ? Ensure ip6tables loopback traffic is configured ? Ensure sudo is installed ? Ensure sudo commands use pty ? Ensure sudo log file exists ? Ensure users must provide password for privilege escalation ? Ensure re-authentication for privilege escalation is not disabled globally ? Ensure access to the su command is restricted ? Ensure strong password hashing algorithm is configured ? Ensure all users last password change date is in the past ? Ensure root is the only UID 0 account ? Ensure nologin is not listed in /etc/shells ? Ensure default user shell timeout is configured ? Ensure AIDE is installed ? Ensure filesystem integrity is regularly checked ? Ensure cryptographic mechanisms are used to protect the integrity of audit tools ? Ensure systemd-journal-remote is installed ? Ensure rsyslog is installed ? Ensure journald is configured to send logs to rsyslog ? Ensure rsyslog is configured to send logs to a remote log host ? Ensure rsyslog is not configured to receive logs from a remote client ? Ensure auditd service is enabled and active ? Ensure auditing for processes that start prior to auditd is enabled ? Ensure audit log storage size is configured ? Ensure audit logs are not automatically deleted ? Ensure system is disabled when audit logs are full ? Ensure changes to system administration scope (sudoers) is collected ? Ensure successful file system mounts are collected ? Ensure session initiation information is collected ? Ensure login and logout events are collected ? Ensure file deletion events by users are collected ? Ensure events that modify the system's Mandatory Access Controls are collected ? Ensure kernel module loading unloading and modification is collected ? Ensure actions as another user are always logged ? Ensure the audit configuration is immutable ? Ensure the running and on disk configuration is the same ? Ensure events that modify the sudo log file are collected ? Ensure events that modify date and time information are collected ? Ensure events that modify the system's network environment are collected ? Ensure use of privileged commands are collected ? Ensure unsuccessful file access attempts are collected ? Ensure events that modify user/group information are collected ? Ensure discretionary access control permission modification events are collected ? Ensure world writable files and directories are secured ? Ensure accounts in /etc/passwd use shadowed passwords ? Ensure local interactive user dot files access is configured ? Ensure /etc/shadow password fields are not empty ? Ensure all groups in /etc/passwd exist in /etc/group ? Ensure shadow group is empty ? Ensure no duplicate UIDs exist ? Ensure no duplicate GIDs exist ? Ensure no duplicate user names exist ? Ensure no duplicate group names exist *Deleted Items:* ? Ensure mounting of cramfs filesystems is disabled ? Ensure mounting of freevxfs filesystems is disabled ? Ensure mounting of jffs2 filesystems is disabled ? Ensure mounting of hfs filesystems is disabled ? Ensure mounting of hfsplus filesystems is disabled ? Ensure mounting of squashfs filesystems is disabled ? Ensure mounting of udf filesystems is disabled ? Disable USB Storage ? Disable Automounting ? Ensure permissions on bootloader config are configured ? Ensure authentication required for single user mode ? Ensure address space layout randomization (ASLR) is enabled ? Ensure AppArmor is installed ? Ensure all AppArmor Profiles are in enforce or complain mode ? Ensure message of the day is configured properly ? Ensure local login warning banner is configured properly ? Ensure remote login warning banner is configured properly ? Ensure permissions on /etc/motd are configured ? Ensure permissions on /etc/issue are configured ? Ensure permissions on /etc/issue.net are configured ? Ensure GNOME Display Manager is removed ? Ensure XDCMP is not enabled ? Ensure ntp access control is configured ? Ensure ntp is configured with authorized timeserver ? Ensure ntp is running as user ntp ? Ensure ntp is enabled and running ? Ensure X Window System is not installed ? Ensure IMAP and POP3 server are not installed ? Ensure Samba is not installed ? Ensure HTTP Proxy Server is not installed ? Ensure SNMP Server is not installed ? Ensure NIS Server is not installed ? Ensure dnsmasq is not installed ? Ensure mail transfer agent is configured for local-only mode ? Ensure rsync service is either not installed or is masked ? Ensure Avahi Server is not installed ? Ensure CUPS is not installed ? Ensure DHCP Server is not installed ? Ensure LDAP server is not installed ? Ensure NFS is not installed ? Ensure DNS Server is not installed ? Ensure FTP Server is not installed ? Ensure HTTP server is not installed ? Ensure NIS Client is not installed ? Ensure LDAP client is not installed ? Ensure RPC is not installed ? Ensure nonessential services are removed or masked ? Ensure wireless interfaces are disabled ? Ensure bluetooth is disabled ? Ensure DCCP is disabled ? Ensure SCTP is disabled ? Ensure RDS is disabled ? Ensure TIPC is disabled ? Ensure IP forwarding is disabled ? Ensure ICMP redirects are not accepted ? Ensure secure ICMP redirects are not accepted ? Ensure broadcast ICMP requests are ignored ? Ensure bogus ICMP responses are ignored ? Ensure Reverse Path Filtering is enabled ? Ensure TCP SYN Cookies is enabled ? Ensure IPv6 router advertisements are not accepted ? Ensure nftables is not installed with iptables ? Ensure ufw is uninstalled or disabled with iptables ? Ensure permissions on /etc/crontab are configured ? Ensure permissions on /etc/cron.hourly are configured ? Ensure permissions on /etc/cron.daily are configured ? Ensure permissions on /etc/cron.weekly are configured ? Ensure permissions on /etc/cron.monthly are configured ? Ensure permissions on /etc/cron.d are configured ? Ensure cron is restricted to authorized users ? Ensure at is restricted to authorized users ? Ensure permissions on /etc/ssh/sshd_config are configured ? Ensure SSH PermitUserEnvironment is disabled ? Ensure SSH IgnoreRhosts is enabled ? Ensure SSH X11 forwarding is disabled ? Ensure only strong Ciphers are used ? Ensure only strong MAC algorithms are used ? Ensure only strong Key Exchange algorithms are used ? Ensure SSH AllowTcpForwarding is disabled ? Ensure SSH warning banner is configured ? Ensure SSH MaxAuthTries is set to 4 or less ? Ensure SSH MaxStartups is configured ? Ensure permissions on SSH private host key files are configured ? Ensure SSH LoginGraceTime is set to one minute or less ? Ensure SSH MaxSessions is set to 10 or less ? Ensure SSH Idle Timeout Interval is configured ? Ensure permissions on SSH public host key files are configured ? Ensure SSH access is limited ? Ensure SSH LogLevel is appropriate ? Ensure SSH PAM is enabled ? Ensure SSH root login is disabled ? Ensure SSH HostbasedAuthentication is disabled ? Ensure SSH PermitEmptyPasswords is disabled ? Ensure sudo authentication timeout is configured correctly ? Ensure password creation requirements are configured ? Ensure lockout for failed password attempts is configured ? Ensure password reuse is limited ? Ensure all current passwords uses the configured hashing algorithm ? Ensure minimum days between password changes is configured ? Ensure password expiration is 365 days or less ? Ensure password expiration warning days is 7 or more ? Ensure inactive password lock is 30 days or less ? Ensure the number of changed characters in a new password is configured ? Ensure preventing the use of dictionary words for passwords is configured ? Ensure system accounts are secured ? Ensure default group for the root account is GID 0 ? Ensure default user umask is 027 or more restrictive ? Ensure maximum number of same consecutive characters in a password is configured ? Ensure systemd-journal-remote is configured ? Ensure systemd-journal-remote is enabled ? Ensure journald is not configured to receive logs from a remote client ? Ensure journald service is enabled ? Ensure journald is configured to compress large log files ? Ensure journald is configured to write logfiles to persistent disk ? Ensure journald is not configured to send logs to rsyslog ? Ensure journald log rotation is configured per site policy ? Ensure journald default file permissions configured ? Ensure rsyslog service is enabled ? Ensure rsyslog default file permissions are configured ? Ensure logging is configured ? Ensure all logfiles have appropriate access configured ? Ensure auditd is installed ? Ensure audit_backlog_limit is sufficient ? Ensure successful and unsuccessful attempts to use the chcon command are recorded ? Ensure successful and unsuccessful attempts to use the setfacl command are recorded ? Ensure successful and unsuccessful attempts to use the chacl command are recorded ? Ensure successful and unsuccessful attempts to use the usermod command are recorded ? Ensure audit log files are mode 0640 or less permissive ? Ensure audit tools belong to group root ? Ensure only authorized users own audit log files ? Ensure only authorized groups are assigned ownership of audit log files ? Ensure the audit log directory is 0750 or more restrictive ? Ensure audit configuration files are 640 or more restrictive ? Ensure audit configuration files are owned by root ? Ensure audit configuration files belong to group root ? Ensure audit tools are 755 or more restrictive ? Ensure audit tools are owned by root ? Ensure permissions on /etc/passwd are configured ? Ensure permissions on /etc/opasswd are configured ? Ensure no unowned or ungrouped files or directories exist ? Ensure permissions on /etc/passwd- are configured ? Ensure permissions on /etc/group are configured ? Ensure permissions on /etc/group- are configured ? Ensure permissions on /etc/shadow are configured ? Ensure permissions on /etc/shadow- are configured ? Ensure permissions on /etc/gshadow are configured ? Ensure permissions on /etc/gshadow- are configured ? Ensure permissions on /etc/shells are configured ? Ensure root PATH Integrity *Additional details:* ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. Improved few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which requires OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: Welcome to Wikis We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 19 09:46:53 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Jun 2025 11:46:53 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-19 Message-ID: Total New Fixlets: 7 Total Updated Fixlets: 236 Total Fixlets in Site: 3061 Total CVEs Covered: 876 Release Date: 2025-06-19 New Fixlets: 38660 Linux Kernel Improper Ownership Management Vulnerability - Oracle Linux 38630 Linux Kernel Improper Ownership Management Vulnerability - Debian 38670 Apple Multiple Products Unspecified Vulnerability - Apple iOS 38640 Apple Multiple Products Unspecified Vulnerability - Any Version of MacOS 38680 Linux Kernel Improper Ownership Management Vulnerability - SLE 38650 Linux Kernel Improper Ownership Management Vulnerability - RHEL 38620 Linux Kernel Improper Ownership Management Vulnerability - Ubuntu Updated Fixlets: 12800 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Windows 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 34820 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows Server 2025 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 35960 Microsoft Windows Storage Link Following Vulnerability - Windows 11 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 32380 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 11 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 35460 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 32390 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 11 35970 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 11 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 35980 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 35470 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows 11 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 35990 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2025 35480 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows 11 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 35490 Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability - Windows Server 2025 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 34980 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 35500 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 34990 Apache Tomcat Improper Privilege Management Vulnerability - Any Version of Windows 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 32430 Microsoft WinVerifyTrust function Remote Code Execution - Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 35510 Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability - Windows Server 2025 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 18110 Grafana Authentication Bypass Vulnerability - Any Version of Linux 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 35030 Apache Tomcat Remote Code Execution Vulnerability - Any Version of Windows 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 19170 Webmin Command Injection Vulnerability - Any Version of Linux 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 37120 Apache Tomcat Path Equivalence Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 35140 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 35150 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 36690 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 11 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 36710 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 11 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 32620 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 36720 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 11 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 38260 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 36730 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 11 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38270 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 32640 Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability - SQL Server 2014 SP3 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36740 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 38280 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows 11 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 38290 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 11 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 36760 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2025 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38300 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows 11 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 36770 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2025 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38310 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2025 36780 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2025 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 38320 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 38330 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2025 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38340 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2025 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 38350 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 34790 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability - Windows 11 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 34800 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows 11 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 33780 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 11 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 34810 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability - Windows Server 2025 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 33790 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 20 02:26:41 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 20 Jun 2025 05:26:41 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2019, published 2025-06-19 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2019 to support a more recent version of the benchmark *Security Benchmark:* CIS Microsoft SQL Server 2019 Benchmark, V1.5.0 *Published Sites:* CIS Checklist for MS SQL Server 2019, site version 20 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:0 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 44 ? Applicable for MS windows server 2025. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 20 05:31:22 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Jun 2025 08:31:22 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5943-1 - Libblockdev Security Update - Debian 12 (amd64) (ID: 59430101) Published Site Version: * Patches for Debian 12, version 110. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 20 06:45:44 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 20 Jun 2025 08:45:44 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-20 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058408 Microsoft Edge Extended Stable Build 136.0.3240.131 Available (x64) * 5058406 Microsoft Edge Extended Stable Build 136.0.3240.131 Available Modified: * 5058402 Microsoft Edge Extended Stable Build 136.0.3240.124 Available (x64) (Superseded) * 5058400 Microsoft Edge Extended Stable Build 136.0.3240.124 Available (Superseded) Reason : * New update for Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2342 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 20 07:08:01 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 20 Jun 2025 10:08:01 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for RHEL 9, published 2025-06-20 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for RHEL 9*.* *Security Benchmark:* DISA STIG Checklist for RHEL 9 Benchmark, V2R4 *Published Sites:* DISA STIG Checklist for RHEL 9, site version 5 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 1 ? Total Updated Fixlets: 16 ? Total Deleted Fixlets: 2 ? Total Fixlets in Site: 445 ? *New Fixlets:* ? RHEL-09-431016 ? *Modified Fixlets:* ? RHEL-09-212020, RHEL-09-255105 - Updated Fix Text. ? RHEL-09-212045, RHEL-09-232040 - Updated Rule Title, Discussion, Check Text, and Fix Text. ? RHEL-09-213110 - Updated Discussion, Check, and Fix Text. ? RHEL-09-215060 - Updated Check Text command and output. ? RHEL-09-215101 - Added control to require the installation of Postfix. ? RHEL-09-232200, RHEL-09-232205 - Updated Check Text command to confine search to only nondirectories. ? RHEL-09-255045 - Updated Check Text finding statement. ? RHEL-09-255110 - Updated Check and Fix Text. ? RHEL-09-255115 - Updated Rule Title, Check, and Fix Text. ? RHEL-09-411045, RHEL-09-654025 - Updated Check Text. ? RHEL-09-412035 - Updated Rule Title. ? RHEL-09-671015 - Updated Check Text typo ? *Deleted Fixlets:* ? RHEL-09-611205, RHEL-09-232265 ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. ? Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which requires OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed?, and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 20 13:34:30 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 20 Jun 2025 15:34:30 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-20 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:500736171] 5007364: Update for Microsoft Visual Studio 2022 version 17.14.6 update - KB5007364 Reason for Update: * New update for Visual Studio 2022. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4560 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 06:22:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 08:22:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-23 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 32 Total Fixlets in Site: 467 Release Date: 2025-06-23 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 59700101 Epic Games Launcher (MSI) v1.3.149.0 67400101 PicPick v7.4.0 59400101 Syncovery v11.5.1 6300101 Nextcloud v3.16.6.20250618 67700201 Vivaldi v7.4.3684.55 29300201 windows_exporter v0.30.8 900601 AWS SAM Command Line Interface v1.141.0 39000101 CLAN v8.33.00 45400101 Plottr v2025.6.20 5400101 LogMeIn Hamachi v2.4.0.23 67200101 Splashtop Business v3.7.4.3 22400101 Koodo Reader v2.0.3 49300101 Numara v6.1.0 20700301 Logi Options v1.92.731496 23400101 PhonerLite v3.31 71400101 Bitvise SSH Client v9.45.0.0 5602501 Microsoft Visual Studio Code x64 v1.101.1 11900101 Zotero v7.0.16 19600101 VSCodium (x64) v1.101.14098 8400101 Royal TS v7.3.50619.0 19300101 DBeaver v25.1.1 71400201 Bitvise SSH Server v9.45.0.0 901901 AWS Command Line Interface v2 v2.27.40.0 5603601 Windows Defender Virus Definitions v1.431.161.0 28600101 balena-cli v22.1.1.0 2700101 Remote Desktop Manager Enterprise v2025.2.16.0 68300101 BlueStacks v5.22.85.1011 29600101 Vim v9.1.1475 53600101 Seq v10.1.14199.0 67700101 Vivaldi v7.4.3684.55 64004101 Microsoft Edge WebView2 Runtime v137.0.3296.93 55700101 OpenVPN Community v2.6.1402 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 07:13:45 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 09:13:45 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-23 Message-ID: Total New Fixlets: 11 Total Updated Fixlets: 4 Total Fixlets in Site: 3072 Total CVEs Covered: 878 Release Date: 2025-06-23 New Fixlets: 38720 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 R2 38690 RoundCube Webmail Cross-Site Scripting Vulnerability - Any Operating System 38790 Microsoft Windows External Control of File Name or Path Vulnerability - Windows 11 38760 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2008 SP2 38730 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 38800 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2025 38770 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2022 38740 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2019 38710 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2016 38780 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2008 R2 38750 Microsoft Windows External Control of File Name or Path Vulnerability - Windows 10 Updated Fixlets: 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 07:28:22 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 10:28:22 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for SUSE Linux 15, published 2025-06-20 Message-ID: *Product:* BigFix Compliance *Title:* New CIS Checklist for SUSE Linux 15 *Security Benchmark:* CIS Checklist for SUSE Linux 15 Benchmark, v2.0.1 *Published Sites:* CIS Checklist for SUSE Linux 15, site version 9 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 100 ? Total Updated Fixlets: 22 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 276 *New Items:* ? Ensure nosuid option set on /home partition ? Ensure nodev option set on /var partition ? Ensure nosuid option set on var partition ? Ensure nodev option set on varlog partition ? Ensure nosuid option set on varlog partition ? Ensure noexec option set on varlog partition ? Ensure nodev option set on varlogaudit partition ? Ensure nosuid option set on varlogaudit partition ? Ensure noexec option set on varlogaudit partition ? Ensure repo gpgcheck is globally activated ? Ensure crypto-policies-scripts package is installed ? Ensure system wide crypto policy is not set to legacy ? Ensure system wide crypto policy is not set in sshd configuration ? Ensure system wide crypto policy disables sha1 hash and signature support ? Ensure system wide crypto policy disables macs less than 128 bits ? Ensure system wide crypto policy disables cbc for ssh ? Ensure system wide crypto policy disables chacha20-poly1305 for ssh ? Ensure GDM login banner is configured ? Ensure GDM disable-user-list option is enabled ? Ensure GDM screen locks when the user is idle ? Ensure GDM automatic mounting of removable media is disabled ? Ensure GDM disabling automatic mounting of removable media is not overridden ? Ensure GDM autorun-never is enabled ? Ensure GDM autorun-never is not overridden ? Ensure XDMCP is not enabled ? Ensure dns server services are not in use ? Ensure dnsmasq services are not in use ? Ensure message access server services are not in use ? Ensure tftp server services are not in use ? Ensure ftp client is not installed ? Ensure tftp client is not installed ? Ensure systemd-timesyncd configured with authorized timeserver ? Ensure systemd-timesyncd is enabled and running ? Ensure chrony is enabled and running ? Ensure IPv6 status is identified ? Ensure bluetooth services are not in use ? Ensure rds kernel module is not available ? Ensure sctp kernel module is not available ? Ensure a single firewall configuration utility is in use ? Ensure sshd Banner is configured ? Ensure sshd DisableForwarding is enabled ? Ensure sshd GSSAPIAuthentication is disabled ? Ensure users must provide password for escalation ? Ensure re-authentication for privilege escalation is not disabled globally ? Ensure sudo authentication timeout is configured correctly ? Ensure latest version of pam is installed ? Ensure password failed attempts lockout is configured ? Ensure password failed attempts lockout includes root account ? Ensure password dictionary check is enabled ? Ensure password number of changed characters is configured ? Ensure password length is configured ? Ensure password complexity is configured ? Ensure password same consecutive characters is configured ? Ensure password maximum sequential characters is configured ? Ensure password quality is enforced for the root user ? Ensure password history remember is configured ? Ensure password history is enforced for the root user ? Ensure pam pwhistory includes use authtok ? Ensure pam unix does not include nullok ? Ensure pam unix does not include remember ? Ensure pam unix includes a strong password hashing algorithm ? Ensure pam unix includes use authtok ? Ensure group root is the only GID 0 group ? Ensure root account access is controlled ? Ensure root user umask is configured ? Ensure accounts without a valid login shell are locked ? Ensure nologin is not listed in etcshells ? Ensure cryptographic mechanisms are used to protect the integrity of audit tools ? Ensure journald service is enabled and active ? Ensure journald log file rotation is configured ? Ensure only one logging system is in use ? Ensure systemd-journal-remote is installed ? Ensure systemd-journal-upload authentication is configured ? Ensure systemd-journal-upload is enabled and active ? Ensure systemd-journal-remote service is not in use ? Ensure rsyslog is not configured to receive logs from a remote client ? Ensure access to all logfiles has been configured ? Ensure actions as another user are always logged ? Ensure events that modify the sudo log file are collected ? Ensure successful and unsuccessful attempts to use the chcon command are collected ? Ensure successful and unsuccessful attempts to use the setfacl command are collected ? Ensure successful and unsuccessful attempts to use the chacl command are collected ? Ensure successful and unsuccessful attempts to use the usermod command are collected ? Ensure kernel module loading unloading and modification is collected ? Ensure the running and on disk configuration is the same ? Ensure the audit log file directory mode is configured ? Ensure audit log files mode is configured ? Ensure audit log files owner is configured ? Ensure audit log files group owner is configured ? Ensure audit configuration files mode is configured ? Ensure audit configuration files owner is configured ? Ensure audit configuration files group owner is configured ? Ensure audit tools mode is configured ? Ensure audit tools owner is configured ? Ensure audit tools group owner is configured ? Ensure access to /etc/gshadow is configured ? Ensure access to /etc/gshadow- is configured ? Ensure access to etcshells is configured ? Ensure access to etcsecurityopasswd is configured ? Ensure local interactive user home directories are configured *Modified Items:* ? Ensure cramfs kernel module is not available ? Ensure freevxfs kernel module is not available ? Ensure hfs kernel module is not available ? Ensure hfsplus kernel module is not available ? Ensure jffs2 kernel module is not available ? Ensure squashfs kernel module is not available ? Ensure udf kernel module is not available ? Ensure ldap server services are not in use ? Ensure rsync services are not in use ? Ensure X window server services are not in use ? Ensure ldap client is not installed ? Ensure a single time synchronization daemon is in use ? Ensure dccp kernel module is not available ? Ensure tipc kernel module is not available ? Ensure sshd PermitUserEnvironment is disabled ? Ensure root is the only UID 0 account ? Ensure audit tools group owner is configured ? Ensure access to /etc/shadow is configured ? Ensure access to /etc/shadow- is configured ? Ensure no duplicate UIDs exist ? Ensure no duplicate user names exist ? Ensure local interactive user home directories are configured *Additional details:* ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. Improved few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which requires OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard More information: To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: This category is used by HCL to announce new releases for BigFix Compliance. ? BigFix Compliance SCM Checklists: Welcome to Wikis We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 09:32:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 11:32:24 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-23 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:405262302] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 * Major [ID:405262303] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 (x64) Reason for Update: * New update for Microsoft Defender. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4561 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 10:02:19 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 12:02:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-23 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 120 Update for Azure Connected Machine Agent Version 1.53 - Windows (x64) * 5058381 Microsoft Edge Stable Build 137.0.3296.93 Available (x64) * 5058383 Microsoft Edge Stable Build 137.0.3296.93 Available Modified: * 118 Update for Azure Connected Machine Agent Version 1.52 - Windows (x64) (Superseded) * 5058375 Microsoft Edge Stable Build 137.0.3296.83 Available (x64) (Superseded) * 5058377 Microsoft Edge Stable Build 137.0.3296.83 Available (Superseded) Reason : * New update for Edge and Azure Connected Machine Agent. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2343 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 23 10:57:04 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Jun 2025 13:57:04 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-23 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Microsoft Office for Mac 2019 - Outlook 16.98.1 Available (ID: 19000523) Published site version: Updates for Mac Applications, version 762. Reasons for Update: A newer version of MS Outlook for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 24 04:53:37 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Jun 2025 07:53:37 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5944-1 - Chromium Security Update - Debian 12 (amd64) (ID: 59440101) * DSA-5945-1 - Konsole Security Update - Debian 12 (amd64) (ID: 59450101) * DSA-5946-1 - Gdk-Pixbuf Security Update - Debian 12 (amd64) (ID: 59460101) Published Site Version: * Patches for Debian 12, version 111. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Jun 24 07:11:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Jun 2025 09:11:13 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-24 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058387 Webex Meetings Desktop App 45.6.0.166 Available * 5058410 Zoom 6.5.1.6476 Available * 5058385 Zoom (x64) 6.5.1.6476 Available Modified: * 5058283 Webex Meetings Desktop App 45.2.2.20 Available (Superseded) * 5058404 Zoom 6.5.0.6118 Available (Superseded) * 5058379 Zoom (x64) 6.5.0.6118 Available (Superseded) Reason : * New update for Webex and Zoom. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2344 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 24 09:00:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Jun 2025 12:00:23 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-24 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Webex Meetings 45.6.0.166 Available - Mac OS X (ID: 40800153) Zoom 6.5.1 (58208) Available - Mac OS X (ID: 51000127) Published site version: Updates for Mac Applications, version 763. Reasons for Update: A newer version of Webex and Zoom for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 24 10:09:21 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Jun 2025 13:09:21 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2022, published 2025-06-24 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2022 to support a more recent version of the benchmark *Security Benchmark:* CIS Microsoft SQL Server 2022 Benchmark, V1.2.0 *Published Sites:* CIS Checklist for MS SQL Server 2022, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:0 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 44 ? Applicable for MS windows server 2025. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Jun 24 10:12:26 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Jun 2025 13:12:26 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 11, published 2025-06-23 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 11* to support a more recent version of the benchmark. *Security Benchmark:* CIS Microsoft Windows 11 Enterprise Benchmark, V4.0.0 *Published Sites:* CIS Checklist for Windows 11, site version 11 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 93 ? Total Updated Fixlets:7 ? Total Deleted Fixlets: 9 ? Total Fixlets in Site: 568 ? *ADDED* o (L2) Ensure 'WinHTTP Web Proxy Auto-Discovery Service (WinHttpAutoProxySvc)' is set to 'Disabled' o (L1) Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Disabled' o (L1) Ensure 'Network security: LDAP client encryption requirements' is set to 'Negotiate sealing' or higher o (L1) Ensure 'Configure multicast DNS (mDNS) protocol' is set to 'Disabled' o (L2) Ensure 'Turn off default IPv6 DNS Servers' is set to 'Enabled' o (L1) Ensure 'Audit client does not support encryption' is set to 'Enabled' o (L1) Ensure 'Audit client does not support signing' is set to 'Enabled' o (L1) Ensure 'Audit insecure guest logon' is set to 'Enabled' o (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled' o (L1) Ensure 'Enable remote mailslots' is set to 'Disabled' o (L1) Ensure 'Mandate the minimum version of SMB' is set to 'Enabled: 3.1.1' o (L1) Ensure 'Set authentication rate limiter delay (milliseconds)' is set to 'Enabled: 2000' or more o (L1) Ensure 'Audit insecure guest logon' is set to 'Enabled' o (L1) Ensure 'Audit server does not support encryption' is set to 'Enabled' o (L1) Ensure 'Audit server does not support signing' is set to 'Enabled' o (L1) Ensure 'Enable remote mailslots' is set to 'Disabled' o (L1) Ensure 'Mandate the minimum version of SMB' is set to 'Enabled: 3.1.1' o (L2) Ensure 'Configure Windows protected print' is set to 'Enabled' o (L1) Ensure 'Configure the behavior of the sudo command' is set to 'Enabled: Disabled' o (L1) Ensure 'Block NetBIOS-based discovery for domain controller location' is set to 'Enabled' o (L1) Ensure 'Configure SAM change password RPC methods policy' is set to 'Enabled: Block all change password RPC methods'23728 o (L2) Ensure 'Turn off API Sampling' is set to 'Enabled' o (L2) Ensure 'Turn off Application Footprint' is set to 'Enabled' o (L2) Ensure 'Turn off Install Tracing' is set to 'Enabled' o (L1) Ensure 'Not allow per-user unsigned packages to install by default (requires explicitly allow per install)' is set to 'Enabled' o (L1) Ensure 'Enable App Installer Local Archive Malware Scan Override' is set to 'Disabled' o (L1) Ensure 'Enable App Installer Microsoft Store Source Certificate Validation Bypass' is set to 'Disabled' o (L2) Ensure 'Enable Windows Package Manager command line interfaces' is set to 'Disabled' o (L1) Ensure 'Do not apply the Mark of the Web tag to files copied from insecure sources' is set to 'Disabled' o (L1) Ensure 'Control whether exclusions are visible to local users' is set to 'Enabled'23754 o (L1) Ensure 'Enable EDR in block mode' is set to 'Enabled' o (L2) Ensure 'Convert warn verdict to block' is set to 'Enabled' o (L1) Ensure 'Configure real-time protection and Security Intelligence Updates during OOBE' is set to 'Enabled' o (L2) Ensure 'Configure Brute-Force Protection aggressiveness' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Configure Remote Encryption Protection Mode' is set to 'Enabled: Audit' or higher o (L2) Ensure 'Configure how aggressively Remote Encryption Protection blocks threats' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Scan excluded files and directories during quick scans' is set to 'Enabled: 1' o (L1) Ensure 'Trigger a quick scan after X days without any scans' is set to 'Enabled: 7' o (L2) Ensure 'Restrict clipboard transfer from server to client' is set to 'Enabled: Disable clipboard transfers from server to client' o (L1) Ensure 'Turn off Windows Copilot' is set to 'Enabled' o (L2) Ensure 'GameInput Service (GameInputSvc)' is set to 'Disabled' o (L1) Ensure 'Require Encryption' is set to 'Enabled' o (L2) Ensure 'Allow mapping folders into Windows Sandbox' is set to 'Disabled' o (BL) Ensure 'Allow access to BitLocker-protected fixed data drives from earlier versions of Windows' is set to 'Disabled' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Allow data recovery agent' is set to 'Enabled: False' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Key' is set to 'Enabled: Allow 256-bit recovery key' or higher o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True' o (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Save BitLocker recovery information to AD DS for removable data drives' is set to 'Enabled: False' o (BL) Ensure 'Configure use of smart cards on removable data drives: Require use of smart cards on removable data drives' is set to 'Enabled: True' o (BL) Ensure 'Deny write access to removable drives not protected by BitLocker: Do not allow write access to devices configured in another organization' is set to 'Enabled: False' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered' is set to 'Enabled' o (BL) Ensure 'Allow enhanced PINs for startup' is set to 'Enabled' o (BL) Ensure 'Configure use of hardware-based encryption for removable data drives' is set to 'Disabled' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Password' is set to 'Enabled: Allow 48-digit recovery password' or higher o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Password' is set to 'Enabled: Require 48-digit recovery password' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Save BitLocker recovery information to AD DS for operating system drives' is set to 'Enabled: True' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True' o (BL) Ensure 'Require additional authentication at startup' is set to 'Enabled' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for operating system drives' is set to 'Enabled: True' o (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All' o (BL) Ensure 'Allow access to BitLocker-protected removable data drives from earlier versions of Windows' is set to 'Disabled' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key' o (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Password' is set to 'Enabled: Do not allow 48-digit recovery password' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives' is set to 'Enabled: False' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Configure storage of BitLocker recovery information to AD DS' is set to 'Enabled: Backup recovery passwords and key packages' o (BL) Ensure 'Configure use of smart cards on removable data drives' is set to 'Enabled' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Configure storage of BitLocker recovery information to AD DS:' is set to 'Enabled: Store recovery passwords and key packages' o (BL) Ensure 'Configure use of smart cards on fixed data drives: Require use of smart cards on fixed data drives' is set to 'Enabled: True' o (BL) Ensure 'Allow standby states (S1-S3) when sleeping (on battery)' is set to 'Disabled' o (BL) Ensure 'Allow standby states (S1-S3) when sleeping (plugged in)' is set to 'Disabled' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Configure storage of BitLocker recovery information to AD DS:' is set to 'Enabled: Backup recovery passwords and key packages' o (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for removable data drives' is set to 'Enabled: False' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered' is set to 'Enabled' o (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes' is set to 'Enabled' o (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled' o (BL) Ensure 'Configure use of hardware-based encryption for fixed data drives' is set to 'Disabled' o (BL) Ensure 'Interactive logon: Machine account lockout threshold' is set to '10 or fewer invalid logon attempts, but not 0' o (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Save BitLocker recovery information to AD DS for fixed data drives' is set to 'Enabled: False' o (BL) Ensure 'Configure use of passwords for operating system drives' is set to 'Disabled' o (BL) Ensure 'Configure use of smart cards on fixed data drives' is set to 'Enabled' o (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' o (BL) Ensure 'Configure use of hardware-based encryption for operating system drives' is set to 'Disabled' o (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' o (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled' o (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' o (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered' is set to 'Enabled' o (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked) ? *UPDATED* o (L1) Ensure 'Enable Certificate Padding' is set to 'Enabled' o (L2) Ensure 'Enable App Installer' is set to 'Disabled' o (L1) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' o (L1) Ensure 'Enable optional updates' is set to 'Disabled' o (L1) Ensure 'Configure the transmission of the user's password in the content of MPR notifications sent by winlogon.' is set to 'Disabled' o (L1) Ensure 'Create symbolic links' is set to 'Administrators' o (L2) Ensure 'Log on as a service' is configured ? *DELETED* o (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled' o (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled' o (L1) Ensure 'Only display the private store within the Microsoft Store' is set to 'Enabled' o (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' o (L2) Ensure 'Peer Name Resolution Protocol (PNRPsvc)' is set to 'Disabled' o (L2) Ensure 'Peer Networking Grouping (p2psvc)' is set to 'Disabled' o (L2) Ensure 'Peer Networking Identity Manager (p2pimsvc)' is set to 'Disabled' o (L2) Ensure 'PNRP Machine Name Publication Service (PNRPAutoReg)' is set to 'Disabled' o (L1) Ensure ?Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 06:45:50 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 08:45:50 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-25 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011688 Google Chrome 138.0.7204.50 Available * 6082353 Mozilla Firefox 140.0 Available * 6082194 Mozilla Firefox (x64) 140.0 Available * 6082351 Mozilla Firefox 128.12.0 ESR Available * 6082349 Mozilla Firefox (x64) 128.12.0 ESR Available * 6082357 Mozilla Firefox 115.25.0 ESR Available * 6082355 Mozilla Firefox (x64) 115.25.0 ESR Available Modified : * 14011686 Google Chrome 137.0.7151.120 Available (Superseded) * 6082347 Mozilla Firefox 139.0.4 Available (Superseded) * 6082192 Mozilla Firefox (x64) 139.0.4 Available (Superseded) * 6082343 Mozilla Firefox 128.11.0 ESR Available (Superseded) * 6082341 Mozilla Firefox (x64) 128.11.0 ESR Available (Superseded) * 6082339 Mozilla Firefox 115.24.0 ESR Available (Superseded) * 6082337 Mozilla Firefox (x64) 115.24.0 ESR Available (Superseded) Reason : * New update for Chrome and Firefox. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2345 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 07:12:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 10:12:13 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2022, published 2025-06-24 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2022 to support a more recent version of the benchmark *Security Benchmark:* CIS Microsoft SQL Server 2022 Benchmark, V1.2.0 *Published Sites:* CIS Checklist for MS SQL Server 2022, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:5 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 44 ? Applicable for MS windows server 2025. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 07:15:44 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 10:15:44 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Apache Tomcat 9 Server on Linux, published 2025-06-24 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Apache Tomcat 9 Server on Linux to support a more recent version of the benchmark *Security Benchmark:* U_Apache_Tomcat_Application_Server_9_V3R2_STIG *Published Sites:* DISA STIG Checklist for Apache Tomcat 9 Server on Linux, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 1 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 75 ? Updated: V-222996 with check logic. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 08:07:31 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 11:07:31 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Ubuntu 22.04 LTS Server, published 2025-06-24. Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA Checklist for Ubuntu 22.04 *Security Benchmark:* DISA Canonical Ubuntu 22.04 LTS STIG SCAP Benchmark, v2r4 *Published Sites:* DISA STIG Checklist for Canonical Ubuntu 22.04 LTS, site version 4 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 3 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 175 *Updated Items :* ? Ubuntu 22.04 LTS must retain a user's session lock until that user reestablishes access using established identification and authentication procedures. ? Ubuntu 22.04 LTS must initiate a graphical session lock after 15 minutes of inactivity. ? Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords. *Additional details :* ? Both analysis and remediation checks are included. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. ? Improved few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which requires OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 9.5 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: Welcome to Wikis We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 08:21:22 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 10:21:22 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-25 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:305173423] Office 2016 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2016 * Major [ID:305173436] Office 2016 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305173431] Office 2016 Version 16.0.17328.20836 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * Major [ID:305179546] Office 2016 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2016 * Major [ID:305179567] Office 2016 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305179544] Office 2016 Version 16.0.17928.20588 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel - Office 2016 * Major [ID:305185444] Office 2016 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 * Major [ID:305185409] Office 2016 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2016 (Update from Local Client Cache) * Major [ID:305185425] Office 2016 Version 16.0.18526.20438 Available for Network Share for Office 2016 - Semi-Annual Enterprise Channel (Preview) - Office 2016 * Major [ID:305187278] Office 2016 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2016 * Major [ID:305187258] Office 2016 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2016 (Update from Local Client Cache) * Major [ID:305187291] Office 2016 Version 16.0.18730.20226 Available for Network Share for Office 2016 - Monthly Enterprise Channel - Office 2016 * Major [ID:305173439] Office 2019 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305173410] Office 2019 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * Major [ID:305173427] Office 2019 Version 16.0.17328.20836 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * Major [ID:305179539] Office 2019 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305179566] Office 2019 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2019 Retail * Major [ID:305179528] Office 2019 Version 16.0.17928.20588 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel - Office 2019 Retail * Major [ID:305185401] Office 2019 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 (Update from Local Client Cache) * Major [ID:305185431] Office 2019 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * Major [ID:305185427] Office 2019 Version 16.0.18526.20438 Available for Network Share for Office 2019 - Semi-Annual Enterprise Channel (Preview) - Office 2019 Retail * Major [ID:305187263] Office 2019 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2019 (Update from Local Client Cache) * Major [ID:305187271] Office 2019 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2019 Retail * Major [ID:305187254] Office 2019 Version 16.0.18730.20226 Available for Network Share for Office 2019 - Monthly Enterprise Channel - Office 2019 Retail * Major [ID:305143029] Office 2021 Version 16.0.14334.20116 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305143027] Office 2021 Version 16.0.14334.20116 Available - Perpetual Channel - Office 2021 Volume Licensed * Major [ID:305143028] Office 2021 Version 16.0.14334.20116 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed * Major [ID:305173438] Office 2021 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305173415] Office 2021 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * Major [ID:305173422] Office 2021 Version 16.0.17328.20836 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * Major [ID:305179542] Office 2021 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305179559] Office 2021 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * Major [ID:305179525] Office 2021 Version 16.0.17928.20588 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * Major [ID:305185403] Office 2021 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 (Update from Local Client Cache) * Major [ID:305185430] Office 2021 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * Major [ID:305185424] Office 2021 Version 16.0.18526.20438 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel (Preview) - Office 2021 Retail * Major [ID:305187251] Office 2021 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) * Major [ID:305187293] Office 2021 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2021 Retail * Major [ID:305187264] Office 2021 Version 16.0.18730.20226 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * Major [ID:305173437] Office 2024 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305173421] Office 2024 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * Major [ID:305173405] Office 2024 Version 16.0.17328.20836 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * Major [ID:305179552] Office 2024 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305179548] Office 2024 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * Major [ID:305179558] Office 2024 Version 16.0.17928.20588 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * Major [ID:305179574] Office 2024 Version 16.0.17932.20408 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305179575] Office 2024 Version 16.0.17932.20408 Available - Perpetual Channel - Office 2024 Volume Licensed * Major [ID:305179576] Office 2024 Version 16.0.17932.20408 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed * Major [ID:305185418] Office 2024 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 (Update from Local Client Cache) * Major [ID:305185439] Office 2024 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * Major [ID:305185402] Office 2024 Version 16.0.18526.20438 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel (Preview) - Office 2024 Retail * Major [ID:305187260] Office 2024 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * Major [ID:305187287] Office 2024 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 2024 Retail * Major [ID:305187268] Office 2024 Version 16.0.18730.20226 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * Major [ID:305173402] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * Major [ID:305173444] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * Major [ID:305173417] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * Major [ID:305173404] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * Major [ID:305173407] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * Major [ID:305173447] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * Major [ID:305173433] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * Major [ID:305173440] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * Major [ID:305173449] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * Major [ID:305173448] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * Major [ID:305173430] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (French) * Major [ID:305173403] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (German) * Major [ID:305173426] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * Major [ID:305173434] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * Major [ID:305173413] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * Major [ID:305173400] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * Major [ID:305173418] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * Major [ID:305173428] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * Major [ID:305173411] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * Major [ID:305173445] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * Major [ID:305173406] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * Major [ID:305173414] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * Major [ID:305173419] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * Major [ID:305173432] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * Major [ID:305173409] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305173429] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * Major [ID:305173435] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * Major [ID:305173408] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * Major [ID:305173442] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * Major [ID:305173446] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * Major [ID:305173412] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * Major [ID:305173443] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * Major [ID:305173425] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * Major [ID:305173420] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * Major [ID:305173401] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * Major [ID:305173441] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * Major [ID:305173424] Office 365 Version 16.0.17328.20836 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * Major [ID:305173416] Office 365 Version 16.0.17328.20836 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * Major [ID:305179561] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * Major [ID:305179530] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * Major [ID:305179540] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * Major [ID:305179570] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * Major [ID:305179565] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * Major [ID:305179532] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * Major [ID:305179553] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * Major [ID:305179549] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * Major [ID:305179538] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * Major [ID:305179529] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * Major [ID:305179541] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (French) * Major [ID:305179555] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (German) * Major [ID:305179535] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * Major [ID:305179569] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * Major [ID:305179536] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * Major [ID:305179543] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * Major [ID:305179537] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * Major [ID:305179545] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * Major [ID:305179562] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * Major [ID:305179573] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * Major [ID:305179564] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * Major [ID:305179560] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * Major [ID:305179554] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * Major [ID:305179572] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * Major [ID:305179524] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305179526] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * Major [ID:305179527] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * Major [ID:305179531] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * Major [ID:305179533] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * Major [ID:305179550] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * Major [ID:305179568] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * Major [ID:305179547] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * Major [ID:305179556] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * Major [ID:305179557] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * Major [ID:305179551] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * Major [ID:305179571] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * Major [ID:305179563] Office 365 Version 16.0.17928.20588 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * Major [ID:305179534] Office 365 Version 16.0.17928.20588 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * Major [ID:305185436] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Arabic) * Major [ID:305185404] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Bulgarian) * Major [ID:305185432] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Simplified)) * Major [ID:305185448] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Chinese (Traditional)) * Major [ID:305185407] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Czech) * Major [ID:305185408] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Danish) * Major [ID:305185446] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Dutch) * Major [ID:305185419] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United Kingdom)) * Major [ID:305185423] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (English (United States)) * Major [ID:305185416] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Finnish) * Major [ID:305185440] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (French) * Major [ID:305185417] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (German) * Major [ID:305185400] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Greek) * Major [ID:305185415] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hebrew) * Major [ID:305185421] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hindi) * Major [ID:305185413] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Hungarian) * Major [ID:305185437] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Indonesian) * Major [ID:305185420] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Italian) * Major [ID:305185434] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Japanese) * Major [ID:305185433] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Korean) * Major [ID:305185429] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Lithuanian) * Major [ID:305185406] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Norwegian) * Major [ID:305185447] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Polish) * Major [ID:305185435] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portugese (Portugal)) * Major [ID:305185443] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Portuguese (Brazilian)) * Major [ID:305185422] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Russian) * Major [ID:305185438] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Serbian Latin) * Major [ID:305185405] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovak) * Major [ID:305185414] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Slovenian) * Major [ID:305185412] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish (Mexico)) * Major [ID:305185410] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Spanish) * Major [ID:305185428] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Swedish) * Major [ID:305185426] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Thai) * Major [ID:305185442] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Turkish) * Major [ID:305185449] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Ukrainian) * Major [ID:305185411] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Update from Local Client Cache) * Major [ID:305185445] Office 365 Version 16.0.18526.20438 Available - Semi-Annual Enterprise Channel (Preview) - Office 365 (Vietnamese) * Major [ID:305185441] Office 365 Version 16.0.18526.20438 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel (Preview) - Office 365 * Major [ID:305187286] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Arabic) * Major [ID:305187262] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * Major [ID:305187282] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * Major [ID:305187297] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * Major [ID:305187295] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Czech) * Major [ID:305187294] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Danish) * Major [ID:305187253] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Dutch) * Major [ID:305187252] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * Major [ID:305187284] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * Major [ID:305187288] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Finnish) * Major [ID:305187275] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (French) * Major [ID:305187250] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (German) * Major [ID:305187270] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Greek) * Major [ID:305187256] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * Major [ID:305187255] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Hindi) * Major [ID:305187276] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * Major [ID:305187279] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * Major [ID:305187281] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Italian) * Major [ID:305187277] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Japanese) * Major [ID:305187296] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Korean) * Major [ID:305187283] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * Major [ID:305187285] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * Major [ID:305187273] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Polish) * Major [ID:305187292] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * Major [ID:305187265] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:305187272] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Russian) * Major [ID:305187259] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * Major [ID:305187298] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Slovak) * Major [ID:305187261] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * Major [ID:305187274] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * Major [ID:305187289] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Spanish) * Major [ID:305187299] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Swedish) * Major [ID:305187269] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Thai) * Major [ID:305187266] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Turkish) * Major [ID:305187257] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * Major [ID:305187290] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * Major [ID:305187267] Office 365 Version 16.0.18730.20226 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * Major [ID:305187280] Office 365 Version 16.0.18730.20226 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 Reason for Update: * New updates for the below Office 365 channels: * Monthly Enterprise Channel * Semi-Annual Enterprise Channel (Preview) * Semi-Annual Enterprise Channel * Office LTSC 2021 Volume Licensed * Office LTSC 2024 Volume Licensed Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4563 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Jun 25 09:33:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Jun 2025 12:33:42 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2022, published 2025-06-24 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2022 to support a more recent version of the benchmark *Security Benchmark:* CIS Microsoft SQL Server 2022 Benchmark, V1.2.0 *Published Sites:* CIS Checklist for MS SQL Server 2022, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:5 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 44 ? *Updated:* o 3.5 Ensure the SQL Server?s MSSQL Service Account is Not an Administrator o 3.13 Ensure membership in admin roles in MSDB database is limited o 5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12' o 7.3 Ensure Database Backups are Encrypted o 7.4 Ensure Network Encryption is Configured and Enabled ? Applicable for MS windows server 2025. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 07:35:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 10:35:16 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance PCI Add-on: New PCI DSS Checklist for Windows Server (PCI v4.0), published 2025-06-25 Message-ID: *Product:* BigFix Compliance PCI Add-on *Title: *PCI DSS Checklist for Windows Server (PCI v4.0) *Category: *PCI DSS Checklist *Security Benchmark: *Payment Card Industry Data Security Standard v4.0.1 *Published Sites: *PCI DSS Checklist for Windows Server (PCI v4.0), site version 1. PCI DSS Reporting, version 26. (The site version is provided for air-gap customers.) *Details:* Total Fixlets in site: 476 Total Requirements covered: 9 Total Milestones covered: 5 ? The BigFix Compliance PCI Add-on team is pleased to announce the availability of the new checklist for BigFix Compliance PCI Add-on: PCI DSS Checklist for Windows Server (PCI v4.0) which includes coverage for Windows Server 2016, Windows Server 2019, Windows Server 2022 and Windows Server 2025. ? This new checklist is based on the guidance provided by the Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 and contains security configuration checks that evaluate the security settings of your Windows Server endpoints according to the PCI DSS standard. ? As with most of the existing PCI DSS contents in the BigFix Compliance PCI Add-on library, this checklist includes checks with: ? Corresponding analyses properties to report actual values. ? Standardized titles, descriptions, and measured values for enhanced readability and consistency. ? The ability to ensure correctness of compliance data. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. ? Most of the checks also support remediation that allows BigFix operators to efficiently remediate a non-compliance issue with a single action. ? List of checks whose rules are not automatically assessed: 1. ID: 214131327 Title: Ensure PCI DSS Requirement 9 requirements are being operated (Rule not automatically assessed). 2. ID: 214131328 Title: Ensure PCI DSS Requirement 11 requirements are being operated (Rule not automatically assessed). 3. ID: 214131329 Title: Ensure PCI DSS Requirement 12 requirements are being operated (Rule not automatically assessed). ? The following PCI DSS Policies are refreshed with the latest content from the PCI DSS Checklist for Windows Server (PCI v4.0) site: ? PCI DSS Checklists ? PCI DSS Milestones View ? PCI DSS Requirements View *Actions to take:* ? Use the License Overview dashboard from the BES Support site to enable and gather the said site. Note that you must be entitled to the new content, and you are using BigFix version 10.0 and later. ? Create a custom site for the PCI DSS Checklist for Windows Server (PCI v4.0) site to display the Windows Server results in the PCI DSS Policy Reports. ? If you were involved in the Beta / Early Access Program for BigFix Compliance PCI Add-on, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. *More information: * To know more about the BigFix Compliance PCI DSS checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/pci-add-on ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists ? BigFix PCI Add-on User?s Guide: *https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/pci.html * We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance PCI Add-on team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 07:38:38 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 10:38:38 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance PCI Add-on: New PCI DSS Checklist for Solaris 11 (PCI v4.0), published 2025-06-25 Message-ID: *Product:* BigFix Compliance PCI Add-on *Title: * PCI DSS Checklist for Solaris 11 (PCI v4.0) *Category: * PCI DSS Checklist *Security Benchmark: * Payment Card Industry Data Security Standard v4.0.1 *Published Sites: * PCI DSS Checklist for Solaris 11 (PCI v4.0), site version 2. PCI DSS Reporting, version 26. (The site version is provided for air-gap customers.) *Details:* Total Fixlets in site: 213 Total Requirements covered: 7 Total Milestones covered: 4 ? The BigFix Compliance PCI Add-on team is pleased to announce the availability of the new checklist for BigFix Compliance PCI Add-on: PCI DSS Checklist for Solaris 11 (PCI v4.0). ? This new checklist is based on the guidance provided by the Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 and contains security configuration checks that evaluate the security settings of your Solaris 11 endpoints according to the PCI DSS standard. ? As with most of the existing PCI DSS contents in the BigFix Compliance PCI Add-on library, this checklist includes checks with: ? Corresponding analyses properties to report actual values. ? Standardized titles, descriptions, and measured values for enhanced readability and consistency. ? The ability to ensure correctness of compliance data. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. ? Most of the checks also support remediation that allows BigFix operators to efficiently remediate a non-compliance issue with a single action. ? List of checks whose rules are not automatically assessed: 1. ID: 214132927 Title: Ensure PCI DSS Requirement 3 requirements are being operated (Rule not automatically assessed). 2. ID: 214132929 Title: Ensure PCI DSS Requirement 5 requirements are being operated (Rule not automatically assessed). 3. ID: 214132928 Title: Ensure PCI DSS Requirement 9 requirements are being operated (Rule not automatically assessed). 4. ID: 214132930 Title: Ensure PCI DSS Requirement 11 requirements are being operated (Rule not automatically assessed). 5. ID: 214132931 Title: Ensure PCI DSS Requirement 12 requirements are being operated (Rule not automatically assessed). ? The following PCI DSS Policies are refreshed with the latest content from the PCI DSS Checklist for Solaris 11 (PCI v4.0) site: ? PCI DSS Checklists ? PCI DSS Milestones View ? PCI DSS Requirements View *Actions to take:* ? Use the License Overview dashboard from the BES Support site to enable and gather the said site. Note that you must be entitled to the new content, and you are using BigFix version 10.0 and later. ? Create a custom site for the PCI DSS Checklist for Solaris 11 (PCI v4.0) site to display the Solaris 11 results in the PCI DSS Policy Reports. ? If you were involved in the Beta / Early Access Program for BigFix Compliance PCI Add-on, unsubscribe from the beta sites to avoid any conflicting issues with the production sites. If you do not unsubscribe from the beta sites, the content in the production sites will fail. *More information: * To know more about the BigFix Compliance PCI DSS checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/pci-add-on/64 ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists ? BigFix PCI Add-on User?s Guide: https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/pci.html We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance PCI Add-on team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 11:22:21 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 13:22:21 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-26 Message-ID: Total New Fixlets: 02 Total Updated Fixlets: 41 Total Fixlets in Site: 469 Release Date: 2025-06-26 New Fixlets: 84000101 NVS v1.7.1 80200201 C-Organizer v10.0.1.3 Updated Fixlets: 23500101 PhraseExpress v17.0.129 5801301 Firefox Developer Edition (x64 en-US) v141.0 29600101 Vim v9.1.1481 6500201 Node.js v24.3.0 37300101 Argus Monitor v7.2.5.3050 5601701 PowerShell v7.5.2 59400101 Syncovery v11.5.2 9800101 Camtasia v25.1.3 47200201 CCleaner v6.37.0.11523 54300101 Dolt v1.55.3 5604301 Microsoft Azure Storage Explorer v1.39.0 10500101 UltraEdit v32.0.0.24 28100101 AutomatedLab v5.58.5 7000101 Opera Stable v119.0.5497.131 1500201 Atlassian Companion (Machine) v2.3.0.0 19500101 Cyberduck v9.1.7.43306 9900101 Nessus Agent v10.9.0.20004 5602901 Microsoft Power BI Desktop v2.144.1155.0 11200101 WinRAR v7.12.0 9600101 TeamViewer v15.67.3 58900101 Advanced Installer v22.8 61800101 ocenaudio (EXE) v3.15.1 7400101 PDF24 Creator v11.27.0 9600701 TeamViewer Host v15.67.3 5700801 MongoDB Compass v1.46.4.0 5602501 Microsoft Visual Studio Code x64 v1.101.2 67900101 SteelSeries GG v89.0.0 9600201 TeamViewer v15.67.3 67600101 ScreenConnect v25.4.20.9295 43803901 Cryptomator (MSI) v1.17.0.5789 6500101 Node.js LTS v22.17.0 5800201 SeaMonkey v2.53.21 901901 AWS Command Line Interface v2 v2.27.43.0 5603601 Windows Defender Virus Definitions v1.431.230.0 62200101 Duplicati v2.1.0.120 22200101 Anaconda v2025.06.0 70200101 DisplayLink Graphics v11.7.5493.0 7800101 Podman v5.5.2 5601601 Microsoft Power BI Desktop v2.144.1155.0 5800301 Thunderbird-v139.0.2 - Windows (x64) 11500101 Wireshark-v4.2.12 - Windows (x64) -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 11:38:09 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 13:38:09 -0500 Subject: [BESAdmin-Announcements] Content Publication: Software Installer Library for Windows published 2025-06-26 Message-ID: Total New Fixlets: 330 Total Updated Fixlets: 0 Total Fixlets in Site: 330 Release Date: 2025-06-26 New Fixlets: 16900102 DuoConnect v2.0.7.0 2000902 WebexNonLocalized (x64) v45.6.1.32593 29700102 YACReader v9.15.0 4100102 Backup and Sync from Google v3.56.3802.7766 1800202 Bandicut v4.1.0.2527 68100102 LAN v1.2.39 8200202 RealVNC Viewer v7.13.1 48900102 Android11React v0.0.3 12300302 PuTTY 32-bit v0.83.0.0 61700102 Attendant Pro (MSI) v1.0.7394.19963 600102 AirServer v5.6.4 19800102 Airtame v4.13.1 39000102 CLAN v8.33.00 45400102 Plottr v2025.6.20 28000302 Autodesk Design Review v14.0.0.177 22700102 Beeftext v16.0 41900102 Clipto v7.2.17 48300102 Bitwarden v2025.5.1 9900102 Nessus Agent v10.9.0.20004 1200202 Apache Tomcat 10 v10.1.42 39600202 TurboVNC (x86) v3.1 901202 AWS VPN Client v5.2.2 44800102 Chocolatey GUI v2.1.1.0 64000102 Leaklog v2.3.2 70400102 CMake v4.0.3 16900202 Duo Desktop v7.8.0.0 23300202 SoundCheck v2.1 48900202 Win11React v0.2.9 28500102 AxCrypt v2.1.1693.0 41300102 FutureRestore GUI v1.98.3 63400102 Proton VPN v4.1.13 18600102 SecureZIP for Windows v14.50.0030 57000102 UniPDF v1.3.5 67500202 Puppet Agent v8.10.0 1200302 Apache Tomcat 8 v8.5.100 5603502 Azure Data Studio v1.52.0 901302 Amazon WorkSpaces v5.27.1.5420 2300102 CPUID CPU-Z v2.15 21500102 SyncBackFree v11.3.106.0 27900102 R6RC v0.4.6 59900102 Intel Driver && Support Assistant v25.3.24.7 8700102 Beyond Compare v5.1.0 16900302 Duo Authentication for Epic v1.2.0.95 4100302 Google Drive v109.0.3.0 62800102 Greenshot v1.2.10.6 11600102 XnConvert v1.105.0.0 50000102 BumpTop v2.5.6268 46500102 CloneSpy v3.43 59300102 UniversalForwarder v9.4.3.0 1200402 Apache Tomcat 9 v9.0.106 901402 Amazon WorkSpaces v3.1.10.2252 11000102 WinMerge v2.16.48 23800102 Qalculate v5.5.2 4600102 ImgBurn v2.5.8.0 49400102 win-capture-audio v2.2.3 21500202 SyncBackPro v11.3.106.0 2300202 CPUID HWMonitor v1.58 62200102 Duplicati v2.1.0.119 4100402 Google Earth Pro v7.3.6 46600502 AAS WorldWide Telescope v6.1.2 5601602 Microsoft Power BI Desktop v2.144.878.0 71500102 Git Extensions v5.2.1.18061 45900102 PowerArchiver v22.00.11 58700102 Speedify v15.6.4.13147 29600102 Vim v9.1.1476 4000102 GoodSync v12.9.1.1 42400102 ASAP v9.0 5800302 Mozilla Thunderbird (x64 en-US) v139.0.2 1200502 OpenOffice v4.1.15 6900102 OpenShot v3.3.0 500102 Advanced Renamer v3.95 58100102 Connectify v23.0.1.40175 21500302 SyncBackSE v11.3.106.0 5601702 PowerShell v7.4.10 80200102 Interactive Calendar v2.2.0.1 41800102 Circuit Diagram v3.1 54600102 dupeGuru v4.3.1 22600102 RenderDoc v1.38.0 26700202 Power Manager v2.2.2.0 3400102 Git v2.50.0 67400102 PicPick v7.4.0 11600302 XnView MP v1.9.2.0 9800102 Camtasia v25.1.2 25500102 Double Commander (x64) v1.1.26 44700102 Jira StopWatch v2.3.0 51100102 Auto Start Confirm v1.1.8368.36236 73200102 ZeroTier v1.14.2 22000102 ActivityWatch v0.13.2 2800102 Docker Desktop v4.41.2 47600102 BiglyBT-x86 v3.8.0.2 9200102 Sublime Text v4200 12100102 HandBrake v1.9.2 50500102 Juju v3.6.7 63300102 Altova MissionKit v2025.00.00.01 5601802 PowerToys v0.91.1 47000102 NETworkManager v2024.4.21.0 21400102 GadgetPack v38.0.0 8600102 Sandboxie Classic v5.70.12 25500202 Double Commander (x32) v1.1.26 11500102 Wireshark v4.4.7 43500102 CloudApp v6.4.3 62700102 SFTPGo v2.6.6 5100102 KeePass v2.58 47600202 BiglyBT v3.6.0.0 60400202 WizTree v4.25 9200202 Sublime Merge v2102 1600102 Audacity v3.7.4 46400102 Cyotek Spriter v1.9.0.247 8000102 Python v3.13.5 23700102 Prey v1.13.16 49300102 Numara v6.1.0 4500102 IconViewer v3.02.147.0 55700102 OpenVPN Community v2.7.001 8600202 Sandboxie Plus v1.15.12 5604002 Microsoft Azure PowerShell (MSI) v14.1.0.39806 67900102 SteelSeries GG v88.0.0 48700102 FlashBack Pro v5.61.0.4843 23100102 LastPass v4.133.2.811 10300102 Total Commander v11.51 46400202 Cyotek WebCopy v1.9.1.872 58000102 Notepanda v0.1.4 19600102 VSCodium (x64) v1.101.14098 38800102 Path Copy Copy v20.0 51600102 Semanta Modeler v6.7.3.5307 55700202 OpenVPN Connect v3.7.2 67300102 Greenfoot v3.9.0 22500102 AuthPass v1.9.11 3300102 GIMP v3.0.4.0 901902 AWS Command Line Interface v2 v2.27.41.0 6200102 S3 Browser v12.6.1 70200102 DisplayLink Graphics v11.7.5277.0 38200102 AppCheck v2.5.57.2 44600102 Altap Salamander v4.0 51000102 Clink v1.7.20 48200502 Process Lasso v15.1.1.26 60300102 kdenlive v25.04.2 21900102 0patch v22.11.11.10550 2700102 Remote Desktop Manager Enterprise v2025.2.16.0 41100102 C-Dogs SDL v2.3.0 51600202 Donkey v24.1.12.0 73100102 Bulk Rename Utility v4.0.0.8 53900102 Deskfiler v1.2.6 37600102 WSL Disk Shrinker v0.2.2 63200102 Pale Moon v33.7.2 2100102 Citrix Receiver v14.12.0 27700102 Find and Mount v2.32 53300102 Win10Pcap v10.2.5002 17800102 Garmin v7.25.0.0 24200102 TablePlus v6.5.8 62600102 Aircall v3.1.66.14840 7900102 Plantronics Hub Software v3.25.54307.37251 71900102 DisplayFusion v11.1.1.0 1500102 Sourcetree v3.4.23 46300102 NewsLeecher v7.0 63200202 Pale Moon v33.7.2 52700102 RecentX v5.0 5604302 Microsoft Azure Storage Explorer v1.38.0 68400102 BarTender v11.4.1.240978 62000102 Box v2.45.187 10800102 Everything v1.4.1.1027 17200102 Axure RP v11.0.0.4131 4400102 Huddle v4.5.0.0 46400502 Cyotek CopyTools v1.4.5.215 52100102 TeraCopy v3.17 900102 Amazon Corretto 8 (x64) v1.8.0.452 42200102 Araxis Merge v75.0.0 10200102 TortoiseGit v2.17.0.2 3800102 Go Programming Language v1.24.4 74200102 SumatraPDF v3.5.2 1500202 Atlassian Companion (Machine) v2.3.0.0 20700202 Logitech SetPoint v6.90.66 55000102 HeidiSQL v12.11.0.7065 61400102 copytranslator (EXE) v11.0.2 45800502 Core Temp v1.18.0.0 19500102 Cyberduck v9.1.6.43284 300102 Adobe Digital Editions v4.5.12 38700102 haveibeenpwned v1.0.0 6700102 OBS Studio v31.0.3 22400102 Koodo Reader v2.0.3 28800102 Betaflight Configurator v10.10.0 54400102 usbipd-win v5.1.0 67200102 Splashtop Business v3.7.4.3 900202 Amazon Corretto JRE 8 (x64) v1.8.0.452 9600102 TeamViewer v15.66.5 25300102 Spek v0.8.5 12500102 Evernote v10.64.3 38100102 ChatZilla v0.9.92 44500102 Linkage v3.16.42.0 10200202 TortoiseHg v7.0.1 57300102 Liberica JDK v19.0.2.9 70100102 ConEmu v230724 20700302 Logi Options v1.92.731496 73000102 Egnyte v3.26.1.163 53800102 spacedesk Windows VIEWER v0.9.4500.0 21800102 PDF-Over v4.4.6 28200102 Simplenote v2.23.2 66600102 dev-sidecar v2.0.0 57900202 Celestia (EXE) v1.6.4 60200102 Unified Remote v3.13.0 9000102 AirParrot v3.1.8 5700802 MongoDB Compass v1.46.3.0 50300102 Markdown Viewer v3.2.0 63100102 FreeCAD v0.21.2 11900102 Zotero v7.0.16 5602502 Microsoft Visual Studio Code x64 v1.101.1 9600202 TeamViewer v15.66.5 900302 Amazon Corretto (x64) v11.0.27.6 72400102 Bluebeam Revu v20.3.30 2000102 Cisco Jabber v15.1.0.59843 27600102 Key Manager v1.15.0.460 46800102 Bandizip v7.38 8400102 Royal TS v7.3.50619.0 20700402 Logitech Unifying v2.52.33 43803902 Cryptomator (MSI) v1.16.0.5719 11300102 WinSCP v6.5.2 4900102 TreeSize Free v4.7.3 28200202 WordPress v8.0.4 53800202 spacedesk Windows DRIVER v2.1.51.0 9000202 Reflector v4.1.2 300302 Adobe DNG Converter v17.4 59000102 HLAE v2.185.2 52600102 Concept2 Utility-x86 v7.17.00 39800102 File Converter v2.1 7800102 Podman v5.5.1 900402 Amazon Corretto (x64) v17.0.15.6 55500102 Nitro PDF Pro (MSI) v14.37.2.0 61900102 AutoText Master v1.7.1 17100102 Certbot v2.9.0 23500102 PhraseExpress v17.0.129 27600202 Key Remapper v1.13.0.480 29900102 nGlide v2.10 72400202 Bluebeam Revu v21.6.0 5801302 Firefox Developer Edition (x64 en-US) v140.0 52000102 Coder v2.23.1.0 7200102 Paint.NET v5.1.8 26400102 Ant Renamer v2.13.0 80500102 Mirth Connect Administrator Launcher v1.4.2 61300102 AbaClient v3.3.1039 74100102 Rocket.Chat v4.6.0 54900102 DownloadHelper CoApp v2.0.19.0 22900102 Cerebro v0.11.0 45700502 blobsaver v3.6.0 45000102 Cent Browser v5.1.1130.129 19400102 Meld v3.22.2 25800102 Corkscrew v1.1.0 55500202 Nitro PDF Pro Enterprise (MSI) v14.37.2.0 27600302 Text Paster v1.12.0.250 3100102 Foxit PDF Reader v2025.1.0.27937 41500102 srt-align v0.6.1 67100102 Parallels Client v19.4.25221 9500102 Tailscale v1.84.2 50800102 CBackup v3.4.0.0 63600102 X-Mouse Button Control v2.20.5 57200102 Auto Dark Mode v10.4.2.29 74100202 Rocket.Chat v4.6.0 3700202 TightVNC Viewer v2.8.85.0 900602 AWS SAM Command Line Interface v1.141.0 21700102 8x8 Work v8.23.2.2 2500102 DB Browser for SQLite v3.13.1 28100102 AutomatedLab v5.58.5 24600102 GraphiQL v0.7.2 2600502 Dell Command | Configure v5.2.0.9 46700102 Abyss Overlay v2.0.3 27500102 Spyglass v24.11.1 8300102 R for Windows v4.5.1 72300102 Boxcryptor v2.55.2774 5602902 Microsoft Power BI Desktop v2.144.878.0 11200102 WinRAR v7.11.0 4800102 Jabra Direct v6.23.16101.0 62400102 Microsoft Azure CLI (32-bit) v2.74.0 21700202 8x8 Quality Management v6.3.0 46100102 Logbert v1.6.3.2 58900102 Advanced Installer v22.7 11800202 Zoom Outlook Plugin v6.4.10 2600602 DELL System Update v2.1.1.0 68200102 FlashGet v3.7.0.1195 10600102 VLC v3.0.21 23400102 PhonerLite v3.31 29800102 Yarn v1.22.22 59500202 CorsixTH v0.68.0 42600102 Firebird v5.0.2.1613 55400102 Launchy v2.5 900802 Amazon Kindle v2.7.1.70978 45500102 Stellar Photo Recovery v11.8.0.4 58300102 Kinovea v2023.1.2 7100102 Oracle VM VirtualBox v7.1.10 26300102 Tad v0.14.0.1 10700502 VMware Horizon Client v8.13.1.16218 22800102 Belgium e-ID middleware v5.1.6030 3600102 GlassWire v3.5.821 80400102 Windscribe v2.15.8 57700102 Lepton v1.10.0 6500102 Node.js LTS v22.16.0 25700102 RepoZ v5.5 44900102 CCom v1.6.0 28600102 balena-cli v22.1.1.0 900902 Amazon Corretto (x64) v21.0.7.6 5900102 mRemoteNG v1.76.20 12300102 PuTTY 64-bit v0.83.0.0 37900102 Spike v4.1.4 50700102 Fundels v3.2.8 60000102 SugarSync v4.1.3.2 21600102 3CXPhone for Windows v16.3.0.264 2400102 CutePDF Writer v4.0 47200102 Speccy v1.33.0.75 44900202 Compose Generator v1.9.0 6500202 Node.js v24.2.0 53600102 Seq v10.1.14199.0 56500102 Revo Uninstaller v2.6.0 11700102 Yubico Authenticator v7.2.3 24500102 4t Tray Minimizer v6.7.0.0 37300102 Argus Monitor v7.2.4.3044 43700102 CrowdSec v1.6.9 67000202 Cold Turkey Blocker v4.7 901002 Amazon Corretto 8 (x86) v1.8.0.452 59400102 Syncovery v11.5.2 8200102 RealVNC Server v7.13.1 40200102 Binance v1.54.19 1800102 Bandicam v8.1.1.2518 53000102 Corda Node Explorer v0.1.2 23900102 RealPlayer v22.0.6.305 4700102 Inkscape v1.4.2 62300102 Gpg4win v4.4.1.63067 47200202 CCleaner v6.36.0.11508 7600102 Pidgin v2.14.14 71600102 GitHub Desktop v3.5.0.0 39600102 TurboVNC (x64) v3.1 46000102 NVM for Windows v1.2.2 11700202 YubiKey Manager v1.2.6 901102 Amazon Corretto JRE 8 (x86) v1.8.0.452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 11:41:53 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 13:41:53 -0500 Subject: [BESAdmin-Announcements] Content Publication: Software Installer Library for Mac OS published 2025-06-26 Message-ID: Total New Fixlets: 62 Total Updated Fixlets: 0 Total Fixlets in Site: 62 Release Date: 2025-06-26 New Fixlets: 9500202 Tailscale v1.84.1 67300102 Rectangle v0.88 74500102 MeetingBar v4.11.6 10600202 VLC v3.0.21 17800202 Garmin Express v7.25.0 24200202 TablePlus v6.6.4 20600202 Insomnia v11.2.0 11500302 Wireshark v4.4.7 43800202 Cryptomator v1.17.0 5100302 KeePassXC v2.7.10 52600202 Concept2 Utility v7.17.00 54600202 dupeguru v4.3.1 55500302 Nitro PDF Pro v14.9 57900302 Celestia v1.6.4 59500302 CorsixTH v0.68.0 64004502 PowerShell v7.5.2 61800202 ocenaudio v3.15.1 7100702 MySQLWorkbench v8.0.42 65100202 Obsidian v1.8.10 11900202 Zotero v7.0.17 41900202 Clipto v7.2.17 45500202 StellarPhotoRecovery v12.4.0.0 48300202 Bitwarden v2025.5.1 39600302 TurboVNC v3.1.4 19600302 VSCodium v1.101.14098 47200302 CCleaner v2.09.187 50300202 Markdown Viewer v3.2.0 55900202 ZAP v2.16.1 58700202 Speedify v15.5 60300202 kdenlive v25.04.2 63200302 Pale Moon v33.7.2 9200302 Sublime Text v4200 22000202 ActivityWatch v0.13.2 1600202 Audacity v3.7.4 4800202 Jabra Direct v6.23.16101 5200202 krita v5.2.9 11700302 YubiKey Manager v1.2.5 20500302 GoTo-Connect v4.15.0 21700302 8x8 Work v8.23 55700302 OpenVPN v3.7.1 59600202 Moonlight v6.1.0 62000202 Boxdrive v2.46 63500202 QZ Tray v2.2.5 45100502 NoMachine v9.0.188 902102 WorkSpaces v5.27.1.5420 7800202 Podman Desktop v1.19.2 6900202 OpenShot Video Editor v3.3.0 74400102 CodeEdit v0.3.4 22900202 Cerebro v0.11.0 19300202 DBeaver v25.1.1 2001002 Webex v45.6.1.32593 22100202 Thonny v4.1.7 1000302 AnyDesk v9.0.2 45700202 blobsaver v3.6.0 54900202 net.downloadhelper.coapp v2.0.19 57700202 Lepton v1.10.0 3100402 Foxit PDF Reader v2025.1.0.27937 62100202 Alice 3 v3.9.0.2 67300202 Greenfoot v3.9.0 902002 AWS VPN Client v5.2.1 600202 AirServer v7.2.7 64000202 Leaklog v2.3.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 13:14:22 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 15:14:22 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-26 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 241 Total Fixlets in Site: 3072 Total CVEs Covered: 878 Release Date: 2025-06-26 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 7180 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2019 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 33350 Apple Multiple Products WebKit Memory Corruption Vulnerability - RHEL 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 22670 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of Windows 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 19610 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 36010 Linux Kernel Out-of-Bounds Write Vulnerability - SLE 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 17600 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Linux 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 22800 MinIO Information Disclosure Vulnerability - Any Version of Linux 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 26950 MinIO Security Feature Bypass Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 26970 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of Linux 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 22910 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 29690 Elasticsearch Remote Code Execution Vulnerability - Any Version of Linux 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 22930 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows 10 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 27060 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of MacOS 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 10690 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2012 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 6110 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows 10 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 23020 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows Server 2019 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 29680 Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 23030 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows Server 2016 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Jun 26 14:13:13 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Jun 2025 16:13:13 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-26 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:506108703] 5061087: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061087 (x64) * Major [ID:506108701] 5061087: Cumulative Update Preview for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5061087 * Major [ID:500736173] 5007364: Update for Microsoft Visual Studio 2022 version 17.14.7 update - KB5007364 Reason for Update: * New updates for Windows 10 version 22H2 and Visual Studio 2022. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4564 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:20:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:20:23 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALASECS-2025-068 - Runc Security update - Amazon linux 2 x86_64 (ID: 250681) * ALASECS-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 x86_64 (ID: 250691) * ALASECS-2025-070 - Containerd Security update - Amazon linux 2 x86_64 (ID: 250701) * ALAS2-2025-2892 - Kernel Security update - Amazon linux 2 x86_64 (ID: 2528921) * ALAS2-2025-2893 - Libxml2 Security update - Amazon linux 2 x86_64 (ID: 2528931) * ALAS2-2025-2894 - Udisks2 Security update - Amazon linux 2 x86_64 (ID: 2528941) * ALAS2-2025-2895 - Libblockdev Security update - Amazon linux 2 x86_64 (ID: 2528951) * ALAS2-2025-2896 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2528961) * ALAS2-2025-2897 - Libvpx Security update - Amazon linux 2 x86_64 (ID: 2528971) * ALAS2-2025-2898 - Aws-Kinesis-Agent Security update - Amazon linux 2 x86_64 (ID: 2528981) * ALAS2-2025-2899 - Apache-Commons-Beanutils Security update - Amazon linux 2 x86_64 (ID: 2528991) * ALAS2-2025-2900 - Golang Security update - Amazon linux 2 x86_64 (ID: 2529001) * ALAS2-2025-2901 - Ipa Security update - Amazon linux 2 x86_64 (ID: 2529011) * ALAS2-2025-2902 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 2529021) * ALAS2-2025-2903 - Qt5-Qt3D Security update - Amazon linux 2 x86_64 (ID: 2529031) * ALAS2-2025-2904 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2 x86_64 (ID: 2529041) * ALAS2-2025-2905 - Rclone Security update - Amazon linux 2 x86_64 (ID: 2529051) * ALAS2-2025-2906 - Python3-Requests Security update - Amazon linux 2 x86_64 (ID: 2529061) * ALAS2-2025-2907 - Python-Requests Security update - Amazon linux 2 x86_64 (ID: 2529071) * ALAS2-2025-2908 - Perl-File-Find-Rule-Perl Security update - Amazon linux 2 x86_64 (ID: 2529081) Published Site Version: * Patches for Amazon Linux 2, version 184. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:23:00 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:23:00 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALASECS-2025-068 - Runc Security update - Amazon linux 2 aarch64 (ID: 250681) * ALASECS-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 aarch64 (ID: 250691) * ALASECS-2025-070 - Containerd Security update - Amazon linux 2 aarch64 (ID: 250701) * ALAS2-2025-2892 - Kernel Security update - Amazon linux 2 aarch64 (ID: 2528921) * ALAS2-2025-2893 - Libxml2 Security update - Amazon linux 2 aarch64 (ID: 2528931) * ALAS2-2025-2894 - Udisks2 Security update - Amazon linux 2 aarch64 (ID: 2528941) * ALAS2-2025-2895 - Libblockdev Security update - Amazon linux 2 aarch64 (ID: 2528951) * ALAS2-2025-2896 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2528961) * ALAS2-2025-2897 - Libvpx Security update - Amazon linux 2 aarch64 (ID: 2528971) * ALAS2-2025-2898 - Aws-Kinesis-Agent Security update - Amazon linux 2 aarch64 (ID: 2528981) * ALAS2-2025-2899 - Apache-Commons-Beanutils Security update - Amazon linux 2 aarch64 (ID: 2528991) * ALAS2-2025-2900 - Golang Security update - Amazon linux 2 aarch64 (ID: 2529001) * ALAS2-2025-2901 - Ipa Security update - Amazon linux 2 aarch64 (ID: 2529011) * ALAS2-2025-2902 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 2529021) * ALAS2-2025-2903 - Qt5-Qt3D Security update - Amazon linux 2 aarch64 (ID: 2529031) * ALAS2-2025-2904 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2 aarch64 (ID: 2529041) * ALAS2-2025-2905 - Rclone Security update - Amazon linux 2 aarch64 (ID: 2529051) * ALAS2-2025-2906 - Python3-Requests Security update - Amazon linux 2 aarch64 (ID: 2529061) * ALAS2-2025-2907 - Python-Requests Security update - Amazon linux 2 aarch64 (ID: 2529071) * ALAS2-2025-2908 - Perl-File-Find-Rule-Perl Security update - Amazon linux 2 aarch64 (ID: 2529081) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 112. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:24:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:24:24 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALASTOMCAT9-2025-019 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 250192) * ALASNITRO-ENCLAVES-2025-064 - Runc Security update - Amazon linux 2 x86_64 (ID: 250644) * ALASNITRO-ENCLAVES-2025-065 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 x86_64 (ID: 250654) * ALASDOCKER-2025-068 - Runc Security update - Amazon linux 2 x86_64 (ID: 250682) * ALASECS-2025-068 - Runc Security update - Amazon linux 2 x86_64 (ID: 250683) * ALASDOCKER-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 x86_64 (ID: 250692) * ALASECS-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 x86_64 (ID: 250693) * ALASECS-2025-070 - Containerd Security update - Amazon linux 2 x86_64 (ID: 250702) * ALASKERNEL-5.15-2025-075 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250751) * ALASKERNEL-5.15-2025-077 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250772) * ALASKERNEL-5.10-2025-095 - Kernel Security update - Amazon linux 2 x86_64 (ID: 250952) * ALASKERNEL-5.4-2025-103 - Kernel Security update - Amazon linux 2 x86_64 (ID: 251031) Published Site Version: * Patches for Amazon Linux 2 Extras, version 6. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:25:50 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:25:50 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALASTOMCAT9-2025-019 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 250192) * ALASNITRO-ENCLAVES-2025-064 - Runc Security update - Amazon linux 2 aarch64 (ID: 250644) * ALASNITRO-ENCLAVES-2025-065 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 aarch64 (ID: 250654) * ALASDOCKER-2025-068 - Runc Security update - Amazon linux 2 aarch64 (ID: 250682) * ALASECS-2025-068 - Runc Security update - Amazon linux 2 aarch64 (ID: 250683) * ALASDOCKER-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 aarch64 (ID: 250692) * ALASECS-2025-069 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 aarch64 (ID: 250693) * ALASECS-2025-070 - Containerd Security update - Amazon linux 2 aarch64 (ID: 250702) * ALASKERNEL-5.15-2025-075 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250751) * ALASKERNEL-5.15-2025-077 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250772) * ALASKERNEL-5.10-2025-095 - Kernel Security update - Amazon linux 2 aarch64 (ID: 250952) * ALASKERNEL-5.4-2025-103 - Kernel Security update - Amazon linux 2 aarch64 (ID: 251031) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 6. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:27:23 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:27:23 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2025-1017 - Java-1.8.0-Amazon-Corretto Security update - Amazon linux 2023 x86_64 (ID: 3202510171) * ALAS2023-2025-1019 - Libxml2 Security update - Amazon linux 2023 x86_64 (ID: 3202510191) * ALAS2023-2025-1020 - Libblockdev Security update - Amazon linux 2023 x86_64 (ID: 3202510201) * ALAS2023-2025-1021 - Udisks2 Security update - Amazon linux 2023 x86_64 (ID: 3202510211) * ALAS2023-2025-1022 - Libarchive Security update - Amazon linux 2023 x86_64 (ID: 3202510221) * ALAS2023-2025-1023 - Libvpx Security update - Amazon linux 2023 x86_64 (ID: 3202510231) * ALAS2023-2025-1024 - Aws-Kinesis-Agent Security update - Amazon linux 2023 x86_64 (ID: 3202510241) * ALAS2023-2025-1025 - Valkey Security update - Amazon linux 2023 x86_64 (ID: 3202510251) * ALAS2023-2025-1026 - Mod_Security Security update - Amazon linux 2023 x86_64 (ID: 3202510261) * ALAS2023-2025-1027 - Javapackages-Bootstrap Security update - Amazon linux 2023 x86_64 (ID: 3202510271) * ALAS2023-2025-1028 - Golang Security update - Amazon linux 2023 x86_64 (ID: 3202510281) * ALAS2023-2025-1029 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2023 x86_64 (ID: 3202510291) * ALAS2023-2025-1030 - Tomcat9 Security update - Amazon linux 2023 x86_64 (ID: 3202510301) * ALAS2023-2025-1031 - Tomcat10 Security update - Amazon linux 2023 x86_64 (ID: 3202510311) * ALAS2023-2025-1033 - Python3.9 Security update - Amazon linux 2023 x86_64 (ID: 3202510331) * ALAS2023-2025-1034 - Freerdp Security update - Amazon linux 2023 x86_64 (ID: 3202510341) * ALAS2023-2025-1035 - Perl-Cryptx Security update - Amazon linux 2023 x86_64 (ID: 3202510351) * ALAS2023-2025-1036 - Perl-Yaml-Libyaml Security update - Amazon linux 2023 x86_64 (ID: 3202510361) * ALAS2023-2025-1037 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 3202510371) * ALAS2023-2025-1038 - Openssh Security update - Amazon linux 2023 x86_64 (ID: 3202510381) * ALAS2023-2025-1039 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2023 x86_64 (ID: 3202510391) * ALAS2023-2025-1040 - Containerd Security update - Amazon linux 2023 x86_64 (ID: 3202510401) * ALAS2023-2025-1041 - Runc Security update - Amazon linux 2023 x86_64 (ID: 3202510411) * ALAS2023-2025-1042 - Abseil-Cpp Security update - Amazon linux 2023 x86_64 (ID: 3202510421) * ALAS2023-2025-1043 - Curl Security update - Amazon linux 2023 x86_64 (ID: 3202510431) * ALAS2023-2025-1044 - Python3.12 Security update - Amazon linux 2023 x86_64 (ID: 3202510441) * ALAS2023-2025-1045 - Python3.11 Security update - Amazon linux 2023 x86_64 (ID: 3202510451) * ALAS2023-2025-1046 - Python3.9 Security update - Amazon linux 2023 x86_64 (ID: 3202510461) * ALAS2023-2025-1047 - Perl-File-Find-Rule-Perl Security update - Amazon linux 2023 x86_64 (ID: 3202510471) * ALAS2023-2025-1048 - Perl-File-Find-Rule Security update - Amazon linux 2023 x86_64 (ID: 3202510481) Published Site Version: * Patches for Amazon Linux 2023, version 60. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:28:56 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:28:56 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2025-1017 - Java-1.8.0-Amazon-Corretto Security update - Amazon linux 2023 aarch64 (ID: 3202510171) * ALAS2023-2025-1019 - Libxml2 Security update - Amazon linux 2023 aarch64 (ID: 3202510191) * ALAS2023-2025-1020 - Libblockdev Security update - Amazon linux 2023 aarch64 (ID: 3202510201) * ALAS2023-2025-1021 - Udisks2 Security update - Amazon linux 2023 aarch64 (ID: 3202510211) * ALAS2023-2025-1022 - Libarchive Security update - Amazon linux 2023 aarch64 (ID: 3202510221) * ALAS2023-2025-1023 - Libvpx Security update - Amazon linux 2023 aarch64 (ID: 3202510231) * ALAS2023-2025-1024 - Aws-Kinesis-Agent Security update - Amazon linux 2023 aarch64 (ID: 3202510241) * ALAS2023-2025-1025 - Valkey Security update - Amazon linux 2023 aarch64 (ID: 3202510251) * ALAS2023-2025-1026 - Mod_Security Security update - Amazon linux 2023 aarch64 (ID: 3202510261) * ALAS2023-2025-1027 - Javapackages-Bootstrap Security update - Amazon linux 2023 aarch64 (ID: 3202510271) * ALAS2023-2025-1028 - Golang Security update - Amazon linux 2023 aarch64 (ID: 3202510281) * ALAS2023-2025-1029 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2023 aarch64 (ID: 3202510291) * ALAS2023-2025-1030 - Tomcat9 Security update - Amazon linux 2023 aarch64 (ID: 3202510301) * ALAS2023-2025-1031 - Tomcat10 Security update - Amazon linux 2023 aarch64 (ID: 3202510311) * ALAS2023-2025-1033 - Python3.9 Security update - Amazon linux 2023 aarch64 (ID: 3202510331) * ALAS2023-2025-1034 - Freerdp Security update - Amazon linux 2023 aarch64 (ID: 3202510341) * ALAS2023-2025-1035 - Perl-Cryptx Security update - Amazon linux 2023 aarch64 (ID: 3202510351) * ALAS2023-2025-1036 - Perl-Yaml-Libyaml Security update - Amazon linux 2023 aarch64 (ID: 3202510361) * ALAS2023-2025-1037 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 3202510371) * ALAS2023-2025-1038 - Openssh Security update - Amazon linux 2023 aarch64 (ID: 3202510381) * ALAS2023-2025-1039 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2023 aarch64 (ID: 3202510391) * ALAS2023-2025-1040 - Containerd Security update - Amazon linux 2023 aarch64 (ID: 3202510401) * ALAS2023-2025-1041 - Runc Security update - Amazon linux 2023 aarch64 (ID: 3202510411) * ALAS2023-2025-1042 - Abseil-Cpp Security update - Amazon linux 2023 aarch64 (ID: 3202510421) * ALAS2023-2025-1043 - Curl Security update - Amazon linux 2023 aarch64 (ID: 3202510431) * ALAS2023-2025-1044 - Python3.12 Security update - Amazon linux 2023 aarch64 (ID: 3202510441) * ALAS2023-2025-1045 - Python3.11 Security update - Amazon linux 2023 aarch64 (ID: 3202510451) * ALAS2023-2025-1046 - Python3.9 Security update - Amazon linux 2023 aarch64 (ID: 3202510461) * ALAS2023-2025-1047 - Perl-File-Find-Rule-Perl Security update - Amazon linux 2023 aarch64 (ID: 3202510471) * ALAS2023-2025-1048 - Perl-File-Find-Rule Security update - Amazon linux 2023 aarch64 (ID: 3202510481) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 40. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:29:51 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:29:51 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-5947-1 - Xorg-Server Security Update - Debian 12 (amd64) (ID: 59470101) * DSA-5948-1 - Trafficserver Security Update - Debian 12 (amd64) (ID: 59480101) * DSA-5949-1 - Libxml2 Security Update - Debian 12 (amd64) (ID: 59490101) * DSA-5950-1 - Firefox-Esr Security Update - Debian 12 (amd64) (ID: 59500101) Published Site Version: * Patches for Debian 12, version 112. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:35:16 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:35:16 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2024:11185 - Edk2:20220126Gitbb1Bba3D77 Security Update - RockyLinux 8 x86_64 (ID: 24111851) * RLSA-2024:3095 - Vorbis-Tools Security Update - RockyLinux 8 x86_64 (ID: 24309501) Published Site Version: * Patches for Rocky Linux 8, version 69. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 05:38:42 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Jun 2025 08:38:42 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLEA-2024:2343 - Ruby:3.3 Bug Fix and Enhancement Update - RockyLinux 9 x86_64 (ID: 24234301) Published Site Version: * Patches for Rocky Linux 9, version 56. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 06:38:52 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Jun 2025 09:38:52 -0400 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-on for Microsoft Applications published 2025-06-27 Message-ID: BigFix Patch is pleased to announce the publication of a new BigFix External Site that will include fixlets to patch Microsoft Applications that are included in the Extended Security Update (ESU) program. What is included Currently the published site includes the following: 1. Analysis for ESU SQL Server Configuration on Azure, Azure Arc and On-premises Environments. 2. Audit Fixlet for SQL Server 2014. Reason for Update: Initial Site propagation of the new BigFix add-on for Microsoft Applications Extended Security Updates (ESU). This update includes the content for getting visibility on Azure Arc ESU, Azure and On-premises licenses on Microsoft SQL Server 2014. Who Gets Access? This new site is available to all existing customers with the following BigFix licenses: HCL BigFix Enterprise / Enterprise+ HCL BigFix Patch Add-On for Win Server ESU Actions to Take: Subscribe to the ?ESU Patching for Microsoft Applications? site from the License Overview Dashboard. If the site is not showing in the License Overview dashboard, update your license from the dashboard by clicking ?Check for license update?, then run the BigFix Administration Tool. Published site version: ESU Patching Add-on for Microsoft Applications, version 1 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 06:45:07 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Jun 2025 08:45:07 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2025-06-27 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 6082359 Mozilla Firefox 140.0.1 Available * 6082196 Mozilla Firefox (x64) 140.0.1 Available * 5058391 Microsoft Edge Stable Build 138.0.3351.55 Available (x64) * 5058389 Microsoft Edge Stable Build 138.0.3351.55 Available * 5058414 Microsoft Edge Extended Stable Build 138.0.3351.55 Available (x64) * 5058412 Microsoft Edge Extended Stable Build 138.0.3351.55 Available Modified : * 5058381 Microsoft Edge Stable Build 137.0.3296.93 Available (x64) (Superseded) * 5058383 Microsoft Edge Stable Build 137.0.3296.93 Available (Superseded) * 5058408 Microsoft Edge Extended Stable Build 136.0.3240.131 Available (x64) (Superseded) * 5058406 Microsoft Edge Extended Stable Build 136.0.3240.131 Available (Superseded) Reason : * New update for Firefox and Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2346 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 08:22:05 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Jun 2025 11:22:05 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Oracle Database 19c on Linux, published 2025-06-26 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Oracle Database 19c on Linux to support a more recent version of the benchmark *Security Benchmark:* Oracle Database 19c STIG V1R1 *Published Sites:* DISA STIG Checklist for Oracle Database 19c on Linux, site version 7 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 57 ? Total Updated Fixlets:0 ? Total Fixlets in Site: 57 ? DISA has released an independent checklist specifically for Oracle 19c, version V1R1. Until now, the combined benchmark for Oracle 12c was being used for Oracle 19c as well. ? With this new release, we have moved to the dedicated Oracle 19c checklist (V1R1). This should be considered a completely new checklist, as all check IDs have changed, and many of the titles, descriptions, and validation logics have been significantly revised. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html ? Note: *During the synchronization, you will notice that all checks are removed and then re-added. Due to changes in the ID of all the checks.* *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 10:03:40 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Jun 2025 13:03:40 -0400 Subject: [BESAdmin-Announcements] https://forum.bigfix.com/t/content-release-software-installer-library-for-windows-and-mac-os-published-2025-06-26/52104 Message-ID: BigFix Patch is pleased to announce the publication of a new BigFix External Site that will include task to install 3rd party Applications on Mac and Windows devices. This is an extension to the Software Distribution capabilities, that provides out of the box content that can be easily deployed as tasks on the endpoints to install the software. All of the content that is available as installer will also be supported for patching, using the dedicated External Sites for Updates for Windows (and Mac) Application Extended **What is included** Currently we have published two new sites, as follows: 1- Install Task for Windows 3rd party software applications - this site includes installer for 330 different Apps for Windows OS 2- Install Task for Mac 3rd party software applications - this site includes installer for 62 different Apps for Mac OS **Reason for Update:** Initial Site propagation of the new BigFix add-on for 3rd party Applications Task for Mac and Windows. **Who Gets Access?** This new site is available to all existing customers with the following BigFix licenses: BigFix Lifecycle BigFix StarterKit for Lifecycle BigFix Workspace BigFix Workspace+ BigFix Enterprise BigFix Enterprise+ **Actions to Take:** Subscribe to the ?Software Installer Library for Windows? and 'Software Installer Library for Mac' site from the License Overview Dashboard. If the site is not showing in the License Overview dashboard, update your license from the dashboard by clicking ?Check for license update?, then run the BigFix Administration Tool. **Published site version:** Software Installer Library for Windows, version 1 Software Installer Library for Mac, version 1 Additional links: List of apps - 1. Software Installer Library for Windows : https://forum.bigfix.com/t/content-publication-software-installer-library-for-windows-published-2025-06-26/52092 2. Software Installer Library for Mac : https://forum.bigfix.com/t/content-publication-software-installer-library-for-mac-os-published-2025-06-26/52093 *Application Engineering Team* *BigFix* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Jun 27 12:06:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Jun 2025 14:06:24 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2025-06-27 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:506109007] 5061090: Safe OS Dynamic Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5061090 (arm64) * Major [ID:506109005] 5061090: Safe OS Dynamic Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5061090 (x64) * Major [ID:506109003] 5061090: Safe OS Dynamic Update for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5061090 (arm64) * Major [ID:506109001] 5061090: Safe OS Dynamic Update for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5061090 (x64) * Major [ID:506084303] 5060843: Safe OS Dynamic Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5060843 (arm64) * Major [ID:506084301] 5060843: Safe OS Dynamic Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5060843 (x64) * Major [ID:506082901] 5060829: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5060829 (arm64) * Major [ID:506082903] 5060829: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5060829 (x64) * Major [ID:506082607] 5060826: Cumulative Update Preview for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5060826 (arm64) * Major [ID:506082605] 5060826: Cumulative Update Preview for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5060826 (x64) * Major [ID:506082603] 5060826: Cumulative Update Preview for Windows 11 Version 22H2 for ARM64 - Windows 11 Version 22H2 - KB5060826 (arm64) * Major [ID:506082601] 5060826: Cumulative Update Preview for Windows 11 Version 22H2 - Windows 11 Version 22H2 - KB5060826 (x64) Reason for Update: * New preview and dynamic updates for Windows 11. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4565 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 06:43:31 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 08:43:31 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2025-06-30 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: OracleJRE v8.441 - RHEL Family (x64) - Update: IBM WebSphere Application Server v9.0.5024.20250528 - Linux Unix ## Modified Items: - Update: IBM WebSphere Application Server v9.0.5023.20250327 - Linux Unix ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v62 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 07:06:24 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 09:06:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2025-06-30 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: IBM WebSphere Application Server v9.0.5024.20250528 - Windows (x64) - Update: OracleJRE v8.441 - Windows (x64) ## Modified Items: - Update: IBM WebSphere Application Server v9.0.5023.20250307 - Windows (x64) ## Deleted Items: - 57401601 Update: IBM WebSphere Application Server v9.0.5021.20240823 - Windows (x64) ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v44 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 07:23:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 09:23:27 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Solaris 11.4, published 2025-06-25 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Solaris 11.4 with bug fixes. *Security Benchmark:* CIS Oracle Solaris 11.4 Benchmark v1.1.0 *Published Sites:* CIS Checklist for Solaris 11.4, site version 8 (The site version is provided for air-gap customers.) *Details:* - Total Updated Fixlets: 2 - Total Fixlets in Site: 83 - cis-4.5 ? The audit logic has been updated. - cis-7.1 ? The audit logic has been updated and check has been parameterized. - Both analysis and remediation checks are included - Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* - To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10.0 and later. - If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: - BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance - BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 07:50:38 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 09:50:38 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2025-06-30 Message-ID: Total New Fixlets: 00 Total Updated Fixlets: 22 Total Fixlets in Site: 469 Release Date: 2025-06-30 Updated Fixlets: 22600101 RenderDoc v1.39.0 59400101 Syncovery v11.5.3 55500201 Nitro PDF Pro Enterprise (MSI) v14.39.0.18 10800101 Everything v1.4.1.1028 55300101 K-Lite v19.0.5.0 7000101 Opera Stable v119.0.5497.141 48300101 Bitwarden v2025.6.0 22400101 Koodo Reader v2.0.4 49300101 Numara v6.2.0 63700101 Twingate v20.25.175.4098 73000101 Egnyte v3.26.2.164 11900101 Zotero v7.0.19 64004101 MicrosoftEdgeWebView2Runtime-Update 4100301 Google Drive v110.0.2.0 19600101 VSCodium (x64) v1.101.24242 300301 Adobe DNG Converter v17.4.1 901901 AWS Command Line Interface v2 v2.27.45.0 5603601 Windows Defender Virus Definitions v1.431.300.0 55500101 Nitro PDF Pro (MSI) v14.39.0.18 2700101 Remote Desktop Manager Enterprise v2025.2.17.0 5801301 Firefox Developer Edition (x64 en-US) v141.0 29600101 Vim v9.1.1497 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 09:32:27 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 11:32:27 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2025-06-30 Message-ID: Total New Fixlets: 3 Total Updated Fixlets: 68 Total Fixlets in Site: 3075 Total CVEs Covered: 880 Release Date: 2025-06-30 New Fixlets: 38820 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability - Any Version of Linux 38810 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability - Any Version of Windows 38700 Wazuh Server Deserialization of Untrusted Data Vulnerability - Any Version of Linux Updated Fixlets: 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 33530 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Oracle Linux 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 26640 RARLAB WinRAR Code Execution Vulnerability - Any Version of Windows 36880 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Oracle Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 33430 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 38650 Linux Kernel Improper Ownership Management Vulnerability - RHEL 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 14120 WinRAR Absolute Path Traversal Vulnerability - Any Version of Windows 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 33450 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL 33460 Apple Multiple Products WebKit Use-After-Free Vulnerability - Oracle Linux 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 34870 Android Kernel Remote Code Execution Vulnerability - RHEL 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 15700 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Windows 33490 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 33500 Apple Multiple Products WebKit Memory Corruption Vulnerability - Oracle Linux 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 29420 ConnectWise ScreenConnect Authentication Bypass Vulnerability - Any Version of Windows 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 33520 Apple Multiple Products WebKit Type Confusion Vulnerability - Oracle Linux 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 37750 Apple iOS Type Confusion Vulnerability - Oracle Linux 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Jun 30 10:15:58 2025 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Jun 2025 13:15:58 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2025-06-30 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 138.0.7204.50 Available - Mac OS X (ID: 83000210) Firefox 140.0.2 Available - Mac OS X (ID: 20750278) Firefox 128.12.0 ESR Available - Mac OS X (ID: 20750276) Firefox 115.25.0 ESR Available - Mac OS X (ID: 20750277) Published site version: Updates for Mac Applications, version 764. Reasons for Update: A newer version of Chrome and Firefox for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: