From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 06:34:05 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 15:34:05 +0100 Subject: [BESAdmin-Announcements] Removal of obsolete fixlets and tasks from BES Support Message-ID: Hello, in one of the upcoming updates to BES Support site we plan to make some clean-up and remove a set of tasks and fixlets that have been determined to be no longer used or useful. The aim is to streamline the publishing and gathering process and reduce the amount of content that agents must evaluate. This is mainly content to deploy and manage BigFix components at release 9.5 (different patch versions). Please note BigFix v9.5 went end of support on June 30th, 2024. BESSupport will continue to include the content to deploy and manage the last patch of BigFix 9.5- version 9.5.25. Attached to this thread you find the list of tasks and fixlets and tasks that will be removed. Please let us know if you think some of these objects should be retained. For further communication please contact alessandro.dinia at hcl-software.com -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: BES_Support_Fixlets_being_removed.pdf Type: application/pdf Size: 51426 bytes Desc: not available URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 06:46:05 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 09:46:05 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2019 with bugfix, published 2026-02-26 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2019 with bug fixes *Security Benchmark:* CIS Microsoft SQL Server 2019 Benchmark v1.5.2 *Published Sites:* CIS Checklist for MS SQL Server 2019, site version 25 (The site version is provided for air-gap customers.) *Details:* ? Updated compliance logic for 2.12, 3.3, 6.2 ? Enhanced and optimized Fixlet relevance to provide accurate validation of results, including improved handling of file-related exceptions. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 07:28:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 09:28:21 -0600 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-02 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:50725325] 5072533: Update for Microsoft Visual Studio 2026 version 18.3.2 - KB5072533 Reason for Update: * New fixlet for Visual Studio from Microsoft. Actions to Take: None Published site version: Patches for Windows, Version: 4683 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 09:39:34 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 11:39:34 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-02 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 17 Total Fixlets in Site: 3320 Total CVEs Covered: 972 Release Date: 2026-03-02 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 39490 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Windows 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 15700 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Windows 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 38810 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 09:54:32 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 11:54:32 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-02 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 23 Total Fixlets in Site: 549 Release Date: 2026-03-02 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 2800101 Docker Desktop v4.63.0 49300101 Numara v6.6.9 5300101 LibreOffice v26.2.1 59300101 UniversalForwarder v10.2.1.0 901901 AWS Command Line Interface v2 v2.34.0.0 5603601 Windows Defender Virus Definitions v1.445.309.0 28600101 balena-cli v24.0.3.0 22600101 RenderDoc v1.43.0 55000101 HeidiSQL v12.15.0.7220 65000101 Logtalk v3.98.0 1500201 Atlassian Companion (Machine) v3.0.0.0 79000101 Datadog Agent v7.76.1.0 7000101 Opera Stable v128.0.5807.25 2900401 Beats winlogbeat v9.3.1 5604401 Microsoft Edge WebView2 Runtime (Standalone) v145.0.3800.82 65100101 Obsidian v1.12.4 2700101 Remote Desktop Manager Enterprise v2025.3.32.0 54300101 Dolt v1.83.0 85600201 Tera Term v5.6.0 901201 AWS VPN Client v5.3.3 29600101 Vim v9.2.0078 85600101 Tera Term v5.6.0 43803901 Cryptomator (MSI) v1.18.1.5964 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 10:08:56 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 12:08:56 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-02 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 15 Total Fixlets in Site: 216 Release Date: 2026-03-02 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 74600801 JetBrains Toolbox (Intel) v3.3.0.74186 74600901 JetBrains Toolbox (arm64) v3.3.0.74186 85000101 Notion v7.6.1 86600101 Arc v1.136.0 87100101 CotEditor v6.2.4 19300201 DBeaver (Intel) v26.0.0 28600201 Balena CLI (Intel) v24.0.3 49300201 Numara (Intel) v6.6.9 5300201 LibreOffice (Intel) v26.2.1 19300301 DBeaver (arm64) v26.0.0 28600301 BalenaCLI (arm64) v24.0.3 5300301 LibreOffice (arm64) v26.2.1 65000201 logtalk v3.98.0 65100201 Obsidian v1.12.4 67800201 calibre v9.4.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 10:25:55 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 12:25:55 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended Installers published 2026-03-02 Message-ID: Total New Fixlets: 8 Total Updated Fixlets: 152 Total Fixlets in Site: 501 Release Date: 2026-03-02 New Fixlets: 87000102 ProfiCAD (EXE) v13.4.2 87600102 foobar (EXE) v2.25.7 64900102 Sigil v2.7.0 87700102 Glary Utilities (EXE) v6.38.0.42 87600202 foobar (EXE) v2.25.7 87800102 IObit Uninstaller (EXE) v15.3.0.1 84200302 AnyBurnPro v6.7.0.0 5607102 Microsoft OLE DB Driver (MSI) v19.4.1.0 Updated Fixlets: 2000902 WebexNonLocalized (x64) v46.2.1.34187 21700102 8x8 Work v8.31.3.1 29700102 YACReader v9.16.3 400902 Eclipse Temurin JDK with Hotspot 25 v25.0.2.10 5601802 PowerToys v0.97.2 1800202 Bandicut v4.2.5.2562 200202 7-Zip (EXE) v26.00 55300102 K-Lite v19.5.0.0 10700302 VMware Tools v13.0.10.0 85700102 Wasmer v7.0.1 9800202 Snagit v26.0.1.9849 400402 Eclipse Temurin JDK with Hotspot v17.0.18.8 39000102 CLAN v8.51.00 3800102 Go Programming Language v1.26.0 55000102 HeidiSQL v12.15.0.7219 11800102 Zoom v6.7.30439 1500202 Atlassian Companion (Machine) v3.0.0.0 61400102 copytranslator (EXE) v12.1.0 79000102 Datadog Agent v7.76.1.0 8600102 Sandboxie Classic v5.72.2 5604402 Microsoft Edge WebView2 Runtime (Standalone) v145.0.3800.82 5800502 Mozilla Firefox (x64 en-US) v148.0.0 19500102 Cyberduck v9.4.0.44341 77100102 Bitrix24 v21.0.28.90 85100102 pgAdmin 4 (EXE) v9.12 9900102 Nessus Agent v11.1.2.20013 9200202 Sublime Merge v2123 901202 AWS VPN Client v5.3.3 11200102 WinRAR v7.20.0 4800102 Jabra Direct v6.27.3702.0 62400102 Microsoft Azure CLI (32-bit) v2.83.0 67200102 Splashtop Business v3.8.0.4 401002 Eclipse Temurin JRE with Hotspot 25 v25.0.2.10 8000102 Python v3.14.3 9600102 TeamViewer v15.75.4 200302 7-Zip (MSI) v26.00 400502 Eclipse Temurin JDK with Hotspot v8.0.482.8 23700102 Prey v1.13.27 49300102 Numara v6.6.9 55700102 OpenVPN Community v2.7.017 60500102 Mp3tag v3.33 63700102 Twingate v20.26.36.4338 84500102 Waterfox v6.6.9 8600202 Sandboxie Plus v1.17.2 20700302 Logi Options v1.99.834046 301202 Adobe Acrobat Reader v25.1.21223.0 5800602 Mozilla Firefox ESR (x64 en-US) v140.8.0 5604002 Microsoft Azure PowerShell (MSI) v15.3.0.40553 23400102 PhonerLite v3.37 61800102 ocenaudio (EXE) v3.17.2 63400102 Proton VPN v4.3.11 71400102 Bitvise SSH Client v9.59.0.0 7400102 PDF24 Creator v11.29.1 79400102 exacqVision Client Enterprise Desktop v26.0.3.0 85800102 Window Inspector (EXE) v3.9.1 7100602 Oracle Java(TM) SE Development Kit 21 v21.0.10.0 9600702 TeamViewer Host v15.75.4 5700802 MongoDB Compass v1.49.2.0 900802 Amazon Kindle v2.8.3.70995 5602502 Microsoft Visual Studio Code x64 v1.109.5 11900102 Zotero v8.0.3 64700102 Joplin v3.5.13 67900102 SteelSeries GG v105.0.0 74300102 Free Download Manager v6.33.1.6648 8700102 Beyond Compare v5.2.0 9600202 TeamViewer v15.75.4 4100302 Google Drive v121.0.1.0 200402 7-Zip (EXE) v26.00 400602 Eclipse Temurin JRE with Hotspot v8.0.482.8 19600102 VSCodium (x64) v1.109.51242 3600102 GlassWire v3.8.1030 400102 Eclipse Temurin JDK with Hotspot v11.0.30.7 80400102 Windscribe v2.20.7 11800302 Zoom VDI Workplace v6.6.26920 5605102 Azure Cosmos DB Emulator (MSI) v2.14.27 5604602 Azure Connected Machine Agent v1.61.03319.2737 43803902 Cryptomator (MSI) v1.18.1.5964 19300102 DBeaver v25.3.4 3300102 GIMP v3.0.8.2 59300102 UniversalForwarder v10.2.1.0 6500102 Node.js LTS v24.14.0 1000202 AnyDesk (EXE) v9.6.11 53800202 spacedesk Windows DRIVER v2.2.17.0 71400202 Bitvise SSH Server v9.59.0.0 300302 Adobe DNG Converter v18.2 901902 AWS Command Line Interface v2 v2.34.0.0 28600102 balena-cli v24.0.3.0 39800102 File Converter v2.2 51000102 Clink v1.9.17 7800102 Podman v5.8.0 2300202 CPUID HWMonitor v1.62 84600102 gcompris (MSI) v26.0 9400102 Tableau Desktop v2025.3.3 9600302 TeamViewer Host v15.75.4.0 400702 Eclipse Temurin JDK with Hotspot v21.0.10.7 5601602 Microsoft Power BI Desktop v2.151.1182.0 23500102 PhraseExpress v18.0.61 2700102 Remote Desktop Manager Enterprise v2025.3.32.0 58700102 Speedify v16.4.1.13840 60300102 kdenlive v25.12.2 29200202 CrystalDiskInfo (EXE) v9.8.0 400202 Eclipse Temurin JRE with Hotspot v11.0.30.7 65100102 Obsidian v1.12.4 84300102 Notepad++ v8.9.2.0 5801302 Firefox Developer Edition (x64 en-US) v149.0 52000102 Coder v2.30.2.0 42400102 ASAP v9.2 29600102 Vim v9.2.0078 4000102 GoodSync v12.9.25.5 64800102 Inno Setup v6.7.1 6500202 Node.js v25.7.0 74400102 Ekahau v11.8.9 85600102 Tera Term v5.6.0 5800302 Mozilla Thunderbird (x64 en-US) v148.0.0 5300102 LibreOffice v26.2.1 51700102 Cockatrice v2.10.3 56500102 Revo Uninstaller v2.6.8 59700102 Epic Games Launcher (MSI) v1.3.173.0 74100102 Rocket.Chat v4.12.0 84600202 GCompris Educational Software (EXE) v26.0 85300102 Cloudflare WARP v26.1.150.0 86900102 MediaInfo (EXE) v26.01.0.0 9400202 Tableau Reader v2025.3.3 400802 Eclipse Temurin JRE with Hotspot v21.0.10.7 200102 7-Zip (MSI) v26.00 22600102 RenderDoc v1.43.0 24200102 TablePlus v6.9.2 3400102 Git v2.53.0 59400102 Syncovery v11.13.4 64200102 LLVM v22.1.0 85000102 MobaXterm Home Edition v26.0 9800102 Camtasia v26.0.3 11600302 XnView MP v1.10.1.0 2900402 Beats winlogbeat v9.3.1 5604802 SQL Server Management Studio 22 v22.3.2 1500102 Sourcetree v3.4.29 4700102 Inkscape v1.4.3 54300102 Dolt v1.83.0 71900102 DisplayFusion v12.0.2.0 85600202 Tera Term v5.6.0 9500102 Tailscale v1.94.2 5604302 Microsoft Azure Storage Explorer v1.41.1 300502 Adobe Acrobat v25.001.21223 2800102 Docker Desktop v4.63.0 62000102 Box v2.49.257 71600102 GitHub Desktop v3.5.5.0 81200102 Cato Client v5.21.5.8548 2100202 Citrix Workspace(USB) v25.11.10 74100202 Rocket.Chat v4.12.0 86000102 TeXworks v0.6.11 86900202 MediaInfo (EXE) v26.01.0.0 900602 AWS SAM Command Line Interface v1.154.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 2 10:51:14 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 2 Mar 2026 13:51:14 -0500 Subject: [BESAdmin-Announcements] BigFix Patch now supports Rocky Linux 10 on x86_64 Message-ID: BigFix Patch is pleased to announce that it has extended support to include Rocky Linux 10 on x86_64 architecture. The new site called ?Patches for Rocky Linux 10? uses dnf, which is Rocky 10?s default package manager, and contains content from the following channels for Rocky Linux 10 systems: ? RockyLinux 10 - BaseOS ? RockyLinux 10 - AppStream Actions to Take Rocky Linux 10 requires BigFix Client version 11.0 Patch 3 (11.0.3.82). Subscribe to the ?Patches for Rocky Linux 10? site from the License Overview dashboard. If the site is not showing in the License Overview dashboard, update your license from the dashboard by clicking ?Check for license update?, then run the BigFix Administration Tool. The patch content support for Rocky Linux 10 is delivered together with the Download Plugin and Download Cacher tools. Rocky Linux Download Plugin v1.0.2.0 is available in the Manage Download Plugins dashboard of the latest Patching Support site. Rocky Linux Download Cacher v1.0.2.0 is available here: Windows: http://software.bigfix.com/download/bes/util/RockyDownloadCacher.exe Linux: http://software.bigfix.com/download/bes/util/RockyDownloadCacher-linux.tar Published Sites Patches for Rocky Linux 10, site version 3 Patching Support, site version 1294 Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:09:42 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:09:42 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALAS2DOCKER-2026-097 - Runfinch-Finch Security update - Amazon linux 2 x86_64 (ID: 260972) * ALAS2DOCKER-2026-098 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 x86_64 (ID: 260981) * ALAS2DOCKER-2026-099 - Containerd Security update - Amazon linux 2 x86_64 (ID: 260991) * ALAS2DOCKER-2026-100 - Soci-Snapshotter Security update - Amazon linux 2 x86_64 (ID: 261001) * ALAS2DOCKER-2026-101 - Docker Security update - Amazon linux 2 x86_64 (ID: 261011) * ALAS2DOCKER-2026-102 - Oci-Add-Hooks Security update - Amazon linux 2 x86_64 (ID: 261021) Published Site Version: * Patches for Amazon Linux 2 Extras, version 26. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:11:51 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:11:51 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALAS2DOCKER-2026-097 - Runfinch-Finch Security update - Amazon linux 2 aarch64 (ID: 260972) * ALAS2DOCKER-2026-098 - Amazon-Ecr-Credential-Helper Security update - Amazon linux 2 aarch64 (ID: 260981) * ALAS2DOCKER-2026-099 - Containerd Security update - Amazon linux 2 aarch64 (ID: 260991) * ALAS2DOCKER-2026-100 - Soci-Snapshotter Security update - Amazon linux 2 aarch64 (ID: 261001) * ALAS2DOCKER-2026-101 - Docker Security update - Amazon linux 2 aarch64 (ID: 261011) * ALAS2DOCKER-2026-102 - Oci-Add-Hooks Security update - Amazon linux 2 aarch64 (ID: 261021) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 26. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:20:11 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:20:11 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLEA-2025:3114 - Important:Microcode_Ctl Bug Fix and Enhancement Update - RockyLinux 8 x86_64 (ID: 25311401) * RLSA-2026:2720 - Kernel Security Update - RockyLinux 8 x86_64 (ID: 26272001) * RLSA-2026:3187 - Grafana-Pcp Security Update - RockyLinux 8 x86_64 (ID: 26318701) * RLSA-2026:3188 - Grafana Security Update - RockyLinux 8 x86_64 (ID: 26318801) * RLSA-2026:3334 - Freerdp Security Update - RockyLinux 8 x86_64 (ID: 26333401) * RLSA-2026:3338 - Firefox Security Update - RockyLinux 8 x86_64 (ID: 26333801) * RLSA-2026:3428 - Container-Tools:Rhel8 Security Update - RockyLinux 8 x86_64 (ID: 26342801) Published Site Version: * Patches for Rocky Linux 8, version 105. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:26:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:26:07 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:3189 - 389-Ds-Base Security Update - RockyLinux 9 x86_64 (ID: 26318901) * RLSA-2026:3291 - Runc Security Update - RockyLinux 9 x86_64 (ID: 26329101) * RLSA-2026:3298 - Buildah Security Update - RockyLinux 9 x86_64 (ID: 26329801) * RLSA-2026:3337 - Podman Security Update - RockyLinux 9 x86_64 (ID: 26333701) * RLSA-2026:3339 - Firefox Security Update - RockyLinux 9 x86_64 (ID: 26333901) * RLSA-2026:3340 - Skopeo Security Update - RockyLinux 9 x86_64 (ID: 26334001) * RLSA-2026:3341 - Containernetworking-Plugins Security Update - RockyLinux 9 x86_64 (ID: 26334101) * RLSA-2026:3359 - Python-Pyasn1 Security Update - RockyLinux 9 x86_64 (ID: 26335901) * RLSA-2026:3405 - Libpng Security Update - RockyLinux 9 x86_64 (ID: 26340501) Published Site Version: * Patches for Rocky Linux 9, version 87. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:27:12 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:27:12 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:2782 - Nodejs:22 Security Update - AlmaLinux 9 x86_64 (ID: 26278201) * ALSA-2026:2783 - Nodejs:20 Security Update - AlmaLinux 9 x86_64 (ID: 26278301) * ALSA-2026:3031 - Libpng15 Security Update - AlmaLinux 9 x86_64 (ID: 26303101) * ALSA-2026:3034 - Munge Security Update - AlmaLinux 9 x86_64 (ID: 26303401) * ALSA-2026:3067 - Freerdp Security Update - AlmaLinux 9 x86_64 (ID: 26306701) * ALSA-2026:3095 - Protobuf Security Update - AlmaLinux 9 x86_64 (ID: 26309501) * ALSA-2026:3189 - 389-Ds-Base Security Update - AlmaLinux 9 x86_64 (ID: 26318901) * ALSA-2026:3291 - Runc Security Update - AlmaLinux 9 x86_64 (ID: 26329101) * ALSA-2026:3298 - Buildah Security Update - AlmaLinux 9 x86_64 (ID: 26329801) * ALSA-2026:3337 - Podman Security Update - AlmaLinux 9 x86_64 (ID: 26333701) * ALSA-2026:3339 - Firefox Security Update - AlmaLinux 9 x86_64 (ID: 26333901) Published Site Version: * Patches for Alma Linux 9, version 63. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 06:30:06 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 3 Mar 2026 09:30:06 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260225 - SUSE-OU-2026:0622-1 - Optional update for go1.26 - leap15.6 - (x86-64) (ID: 26022501) * 260225 - SUSE-RU-2026:0637-1 - Recommended update for grub2 - leap15.6 - (x86-64) (ID: 26022502) * 260225 - SUSE-RU-2026:0638-1 - Recommended update for squid - leap15.6 - (x86-64) (ID: 26022503) * 260225 - SUSE-SU-2026:0611-1 - Security update for MozillaFirefox - leap15.6 - (x86-64) (ID: 26022504) * 260226 - SUSE-RU-2026:0651-1 - Recommended update for sssd - leap15.6 - (x86-64) (ID: 26022601) * 260226 - SUSE-RU-2026:0654-1 - Recommended update for libgit2 - leap15.6 - (x86-64) (ID: 26022602) * 260226 - SUSE-RU-2026:0671-1 - Recommended update for adcli - leap15.6 - (x86-64) (ID: 26022603) * 260226 - SUSE-SU-2026:0643-1 - Security update for python39 - leap15.6 - (x86-64) (ID: 26022604) * 260226 - SUSE-SU-2026:0644-1 - Security update for python312 - leap15.6 - (x86-64) (ID: 26022605) * 260226 - SUSE-SU-2026:0649-1 - Security update for freerdp - leap15.6 - (x86-64) (ID: 26022606) * 260226 - SUSE-SU-2026:0650-1 - Security update for redis - leap15.6 - (x86-64) (ID: 26022607) * 260226 - SUSE-SU-2026:0657-1 - Security update for libsoup2 - leap15.6 - (x86-64) (ID: 26022608) * 260226 - SUSE-SU-2026:0659-1 - Security update for docker-stable - leap15.6 - (x86-64) (ID: 26022609) * 260226 - SUSE-SU-2026:0661-1 - Security update for erlang - leap15.6 - (x86-64) (ID: 26022610) * 260226 - SUSE-SU-2026:0664-1 - Security update for python3 - leap15.6 - (x86-64) (ID: 26022611) * 260226 - SUSE-SU-2026:0666-1 - Security update for docker - leap15.6 - (x86-64) (ID: 26022612) * 260226 - SUSE-SU-2026:0667-1 - Security update for redis7 - leap15.6 - (x86-64) (ID: 26022613) * 260226 - SUSE-SU-2026:0668-1 - Security update for ucode-intel - leap15.6 - (x86-64) (ID: 26022614) * 260227 - SUSE-OU-2026:0679-1 - Optional update for 7zip - leap15.6 - (x86-64) (ID: 26022701) * 260227 - SUSE-RU-2026:0676-1 - Recommended update for makedumpfile - leap15.6 - (x86-64) (ID: 26022702) * 260227 - SUSE-RU-2026:0682-1 - Recommended update for fence-agents - leap15.6 - (x86-64) (ID: 26022703) * 260227 - SUSE-SU-2026:0684-1 - Security update for gimp - leap15.6 - (x86-64) (ID: 26022704) * 260227 - SUSE-SU-2026:0685-1 - Security update for valkey - leap15.6 - (x86-64) (ID: 26022705) * 260227 - SUSE-SU-2026:0690-1 - Security update for libsoup - leap15.6 - (x86-64) (ID: 26022706) * 260227 - SUSE-SU-2026:0692-1 - Security update for MozillaThunderbird - leap15.6 - (x86-64) (ID: 26022707) Published Site Version: * Patches for openSUSE Leap 15, version 134. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 07:21:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 09:21:19 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-03 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 9101613 Adobe Acrobat 2025.001.21265 Available - Adobe Acrobat - Continuous Track (x64) * 9101612 Adobe Acrobat 2025.001.21265 Available - Adobe Acrobat - Continuous Track * 8102003 Adobe Acrobat Reader 2025.001.21265 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8102002 Adobe Acrobat Reader 2025.001.21265 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 8102001 Adobe Acrobat Reader 2025.001.21265 Available - Adobe Acrobat Reader - Continuous Track * 8102000 Adobe Acrobat Reader 2025.001.21265 Available - Adobe Acrobat Reader - Continuous Track (x64) Modified: * 9101611 Adobe Acrobat 2025.001.21223 Available - Adobe Acrobat - Continuous Track (x64) (Superseded) * 9101610 Adobe Acrobat 2025.001.21223 Available - Adobe Acrobat - Continuous Track (Superseded) * 8101999 Adobe Acrobat Reader 2025.001.21223 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101998 Adobe Acrobat Reader 2025.001.21223 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) * 8101997 Adobe Acrobat Reader 2025.001.21223 Available - Adobe Acrobat Reader - Continuous Track (Superseded) * 8101996 Adobe Acrobat Reader 2025.001.21223 Available - Adobe Acrobat Reader - Continuous Track (x64) (Superseded) Reason for Update: * New update for Adobe Acrobat and Reader. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2453 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 07:34:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 10:34:58 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-03 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat DC 25.001.21265 (Continuous Track) Available - Mac OS X (ID: 10152246) Adobe Acrobat Reader DC 25.001.21265 (Continuous Track) Available - Mac OS X (ID: 10152247) Microsoft Office for Mac 2019 - Excel 16.106.2 Available (ID: 19000661) Microsoft Office for Mac 2019 - OneNote 16.106.2 Available (ID: 19000662) Microsoft Office for Mac 2019 - Outlook 16.106.2 Available (ID: 19000663) Microsoft Office for Mac 2019 - PowerPoint 16.106.2 Available (ID: 19000664) Microsoft Office for Mac 2019 - Word 16.106.2 Available (ID: 19000665) Published site version: Updates for Mac Applications, version 830. Reasons for Update: A newer version of Adobe and MS Office for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 08:20:02 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 11:20:02 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2022, published 2026-03-02 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2022 to support a more recent version of the benchmark *Security Benchmark:* CIS Microsoft SQL Server 2022 Benchmark v1.2.1 *Published Sites:* CIS Checklist for MS SQL Server 2022, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:1 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 46 ? Updated checks ? 3.13 ? Updated the query logic ? Optimized the code and improved the exception handling ? Enhanced and optimized Fixlet relevance to provide accurate validation of results, including improved handling of file-related exceptions. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 08:22:03 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 10:22:03 -0600 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-03 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:508231401] - 5082314: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5082314 (x64) Reason for Update: * New Out-of-Band update from Microsoft. Actions to Take: None Published site version: Patches for Windows, Version: 4684 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 08:35:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 17:35:58 +0100 Subject: [BESAdmin-Announcements] Support for Microsoft Windows Secure Boot Certificate Updates In-Reply-To: References: Message-ID: The BigFix Patch Team is pleased to announce the release of new content in the *Patches for Windows* site to support the assessment and renewal of Microsoft Secure Boot Certificates. *Background* Starting in June 2026, the three original Certificate Authorities (CAs) provided by Microsoft for Secure Boot (KEK CA 2011, Windows Production PCA 2011, and UEFI CA 2011) will begin to expire. To maintain Secure Boot functionality and ensure devices can continue to receive security updates for boot components, systems must be updated to the new 2023 certificates. *What is Included* 1. Assessment: Microsoft Windows Secure Boot Inventory Data - Analysis ID: 660 - Site: Patches for Windows - Details: This analysis allows you to monitor the transition and verify the Secure Boot status across your environment. It retrieves critical data points including UEFI CA 2023 Status, Error codes, Secure Boot enablement, and OEM-specific firmware details. 2. Remediation: Windows Secure Boot certificate expiration and CA updates - Fixlet ID: 506820201 (KB5068202) - Site: Patches for Windows - Details: This Fixlet automates the registry configuration (`AvailableUpdates` set to `0x5944`) required to signal Windows to execute the certificate update. - Action: The Fixlet includes two actions, both of which require a **reboot** to complete the firmware-level update process. *Important Deployment Notes* - *Test Before Mass Deployment*: Because this process involves firmware/UEFI variables, we strongly recommend testing this content on representative hardware models in your environment before a broad rollout. - *OEM Compatibility*: Please consult your Original Equipment Manufacturer (OEM) documentation to ensure your hardware supports these Secure Boot updates. - *Success Criteria*: Once the Fixlet is applied and the system is rebooted, the `UEFICA2023Status` (tracked via Analysis 660) should transition from `NotStarted` to `Updated`. For full technical details, please refer to the official KB article: [KB0129014 - BigFix Support for Windows Secure Boot Certificate Updates]( https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0129014 ) *Published site version:* Patches for Windows, version 4680 *Additional Links:* Microsoft Secure Boot Certificate updates: Guidance for IT professionals and organizations -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 08:23:06 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 11:23:06 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MS SQL Server 2017, published 2026-03-02 with Bugfix Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MS SQL Server 2017 with Bugfix *Security Benchmark:* CIS Microsoft SQL Server 2017 Benchmark, V1.3.0 *Published Sites:* CIS Checklist for MS SQL Server 2017, site version 12 (The site version is provided for air-gap customers). *Details:* ? Total Updated Fixlets:45 ? Total Fixlets in Site: 45 ? This checklist applies to AAG and Failover Clusters. ? The code has been optimized to identify and bypass non-running instances. ? The Applicability Fixlet now includes additional validation, ensuring that the Environment Setup Task log file exists, is not older than 90 days, and that results files are present. This ensures Fixlets are reported as Not Applicable and that the Measured Value (MV) correctly indicates that the Environment Setup Task has not been executed ? Enhanced and optimized Fixlet relevance to provide accurate validation of results, including improved handling of file-related exceptions. ? Both analysis and remediation checks are included. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 3 08:25:34 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 3 Mar 2026 11:25:34 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for MacOS 15, published 2026-03-02 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for MacOS 15 to support a more recent version of the benchmark *Security Benchmark:* CIS Apple macOS 15.0 Sequoia Benchmark, v2.0.0 *Published Sites:* CIS Checklist for MacOS 15, site version 7 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 2 ? Total Updated Fixlets:2 ? Total Deleted Fixlets: 4 ? Total Fixlets in Site: 106 *New Fixlets* *: *cis-2.1.1.6 Audit Find My Mac. cis-6.3.8 Audit AutoFill. *Updated Fixlets* *: *cis-1.1 Ensure Apple-provided Software Updates Are Installed. cis-2.3.3.4 Ensure Remote Login Is Disabled. *Deleted Fixlets* *: *cis-1.1 Ensure All Apple-provided Software Is Current. cis-1.7 Ensure the System is Managed by a Mobile Device Management (MDM) Software. cis-2.4.1 Ensure Show Wi-Fi status in Menu Bar Is Enabled. cis-2.4.2 Ensure Show Bluetooth Status in Menu Bar Is Enabled. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 11 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 4 07:48:26 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Mar 2026 09:48:26 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-04 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011764 Google Chrome 145.0.7632.160 Available Modified: * 14011762 Google Chrome 145.0.7632.117 Available Reason for Update: * New update for Chrome. Important Note: * There are no CVE details available for the latest Chrome update; therefore, it has been released as an Update. The previous Security Update has been modified to use Manual Cache. Published Site Version: * Updates for Windows Applications, Version: 2454 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 4 08:05:17 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Mar 2026 11:05:17 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Ubuntu Linux 22.04 LTS Server, published 2026-03-04 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Ubuntu Linux 22.04. *Security Benchmark:* CIS Ubuntu Linux 22.04 LTS Benchmark, V3.0.0 *Published Sites:* CIS Checklist for Ubuntu Linux 22.04, site version 8. (The site version is provided for air-gap customers.) *Details:* Total New Fixlets: 30 Total Updated Fixlets: 17 Total Deleted Fixlets: 0 Total Fixlets in Site: 302 *New Fixlets:* ? Ensure net.ipv6.conf.all.forwarding is configured ? Ensure net.ipv4.conf.default.forwarding is configured ? Ensure ufw incoming default is configured ? Ensure overlay kernel module is not available ? Ensure logrotate is configured ? Ensure net.ipv6.conf.default.forwarding is configured ? Ensure net.ipv4.conf.all.rp_filter is configured ? Ensure rsyslog logging is configured ? Ensure unused filesystems kernel modules are not available ? Ensure ufw routed default is configured ? Ensure net.ipv4.conf.default.accept_redirects is configured ? Ensure net.ipv4.conf.default.accept_source_route is configured ? Ensure net.ipv4.conf.default.secure_redirects is configured ? Ensure journald log file access is configured ? Ensure core file size is configured ? Ensure access to /etc/cron.yearly is configured ? Ensure net.ipv6.conf.all.accept_source_route is configured ? Ensure net.ipv4.conf.all.forwarding is configured ? Ensure net.ipv4.conf.default.log_martians is configured ? Ensure net.ipv6.conf.all.accept_redirects is configured ? Ensure ufw outgoing default is configured ? Ensure net.ipv4.icmp_echo_ignore_broadcasts is configured ? Ensure net.ipv6.conf.default.accept_redirects is configured ? Ensure net.ipv4.conf.default.send_redirects is configured ? Ensure net.ipv6.conf.default.accept_source_route is configured ? Ensure Xwayland is configured ? Ensure net.ipv6.conf.all.accept_ra is configured ? Ensure net.ipv6.conf.default.accept_ra is configured ? Ensure access to SSH public host key files is configured ? Ensure firewire-core kernel module is not available *Updated Fixlets:* ? Ensure sshd Ciphers are configured ? Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured ? Ensure sshd DisableForwarding is enabled ? Ensure sshd GSSAPIAuthentication is disabled ? Ensure sshd HostbasedAuthentication is disabled ? Ensure sshd IgnoreRhosts is enabled ? Ensure sshd KexAlgorithms is configured ? Ensure sshd LoginGraceTime is configured ? Ensure sshd LogLevel is configured ? Ensure sshd MACs are configured ? Ensure sshd MaxAuthTries is configured ? Ensure sshd MaxSessions is configured ? Ensure sshd MaxStartups is configured ? Ensure sshd PermitEmptyPasswords is disabled ? Ensure sshd PermitRootLogin is disabled ? Ensure sshd PermitUserEnvironment is disabled ? Ensure sshd UsePAM is enabled *Additional details: *? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which require OS reboot. ? The check will show relevant for those endpoints until they are rebooted. *? *Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take: *? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 10.0.7 and later. ?If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information: *To know more about the BigFix Compliance SCM checklists, please see the following resources: *? BigFix Forum: * *https://forum.bigfix.com/c/release-announcements/compliance* *? BigFix Compliance SCM Checklists: **Welcome to Wikis* We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 4 08:08:25 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Mar 2026 11:08:25 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Windows 10, published 2026-03-03 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Windows 10. *Security Benchmark:* Microsoft Windows 10 STIG SCAP Benchmark, V3R7. *Published Sites:* DISA STIG Checklist for Windows 10, site version 32. (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 7 ? Total Updated Fixlets:0 ? Total Deleted Fixlets: 2 ? Total Fixlets in Site: 239 ? *NEW FIXLET* o Windows 10 systems must block consumer account user authentication. o Windows 10 must be configured to audit file system failures. o Windows 10 must be configured to audit file system successes. o Windows 10 must be configured to audit handle manipulation failures. o Windows 10 must be configured to audit handle manipulation successes. o Windows 10 must be configured to audit registry failures. o Windows 10 must be configured to audit registry successes. ? *DELETED FIXLET* ? Data Execution Prevention (DEP) must be configured to at least OptOut. ? The built-in administrator account must be disabled. ? Metadata has been incorporated into all the checks. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html?hl=using%2Csynchronize%2Ccustom%2Cchecks%2Cwizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 4 09:29:26 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 4 Mar 2026 11:29:26 -0600 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-04 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:304197099] Office 365 Version 16.0.19725.20152 Available for Network Share for Office 365 - Current Channel - Office 365 * Major [ID:304197097] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Vietnamese) * Major [ID:304197105] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Update from Local Client Cache) * Major [ID:304197114] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Ukrainian) * Major [ID:304197096] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Turkish) * Major [ID:304197121] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Thai) * Major [ID:304197126] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Swedish) * Major [ID:304197119] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Spanish) * Major [ID:304197094] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Spanish (Mexico)) * Major [ID:304197109] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Slovenian) * Major [ID:304197117] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Slovak) * Major [ID:304197103] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Serbian Latin) * Major [ID:304197125] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Russian) * Major [ID:304197113] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:304197090] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Portugese (Portugal)) * Major [ID:304197116] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Polish) * Major [ID:304197085] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Norwegian) * Major [ID:304197115] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Lithuanian) * Major [ID:304197107] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Korean) * Major [ID:304197092] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Japanese) * Major [ID:304197088] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Italian) * Major [ID:304197118] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Indonesian) * Major [ID:304197122] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hungarian) * Major [ID:304197108] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hindi) * Major [ID:304197127] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hebrew) * Major [ID:304197091] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Greek) * Major [ID:304197086] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (German) * Major [ID:304197106] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (French) * Major [ID:304197112] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Finnish) * Major [ID:304197098] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (English (United States)) * Major [ID:304197093] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (English (United Kingdom)) * Major [ID:304197102] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Dutch) * Major [ID:304197101] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Danish) * Major [ID:304197104] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Czech) * Major [ID:304197110] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Chinese (Traditional)) * Major [ID:304197095] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Chinese (Simplified)) * Major [ID:304197124] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Bulgarian) * Major [ID:304197111] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Arabic) * Major [ID:304197100] Office 2024 Version 16.0.19725.20152 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * Major [ID:304197123] Office 2024 Version 16.0.19725.20152 Available - Current Channel - Office 2024 Retail * Major [ID:304197084] Office 2024 Version 16.0.19725.20152 Available - Current Channel - Office 2024 (Update from Local Client Cache) * Major [ID:304197087] Office 2021 Version 16.0.19725.20152 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * Major [ID:304197120] Office 2021 Version 16.0.19725.20152 Available - Current Channel - Office 2021 Retail * Major [ID:304197089] Office 2021 Version 16.0.19725.20152 Available - Current Channel - Office 2021 (Update from Local Client Cache) Modified: * Major [ID:304197040] Office 365 Version 16.0.19725.20126 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * Major [ID:304197029] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * Major [ID:304197036] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * Major [ID:304197030] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * Major [ID:304197010] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Turkish) (Superseded) * Major [ID:304197017] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Thai) (Superseded) * Major [ID:304197018] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Swedish) (Superseded) * Major [ID:304197003] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Spanish) (Superseded) * Major [ID:304197019] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * Major [ID:304197007] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Slovenian) (Superseded) * Major [ID:304197026] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Slovak) (Superseded) * Major [ID:304197023] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * Major [ID:304197020] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Russian) (Superseded) * Major [ID:304197001] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * Major [ID:304197027] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * Major [ID:304197013] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Polish) (Superseded) * Major [ID:304197031] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Norwegian) (Superseded) * Major [ID:304197024] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * Major [ID:304197025] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Korean) (Superseded) * Major [ID:305197000] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Japanese) (Superseded) * Major [ID:304197034] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Italian) (Superseded) * Major [ID:304197039] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Indonesian) (Superseded) * Major [ID:304197015] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Hungarian) (Superseded) * Major [ID:304197016] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Hindi) (Superseded) * Major [ID:304197037] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Hebrew) (Superseded) * Major [ID:304197021] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Greek) (Superseded) * Major [ID:304197004] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (German) (Superseded) * Major [ID:304197033] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (French) (Superseded) * Major [ID:304197005] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Finnish) (Superseded) * Major [ID:304197008] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (English (United States)) (Superseded) * Major [ID:304197043] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * Major [ID:304197012] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Dutch) (Superseded) * Major [ID:304197028] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Danish) (Superseded) * Major [ID:304197006] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Czech) (Superseded) * Major [ID:304197002] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * Major [ID:304197038] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * Major [ID:304197009] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * Major [ID:304197022] Office 365 Version 16.0.19725.20126 Available - Current Channel - Office 365 (Arabic) (Superseded) * Major [ID:304197014] Office 2024 Version 16.0.19725.20126 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * Major [ID:304197041] Office 2024 Version 16.0.19725.20126 Available - Current Channel - Office 2024 Retail (Superseded) * Major [ID:304197032] Office 2024 Version 16.0.19725.20126 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * Major [ID:304197035] Office 2021 Version 16.0.19725.20126 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * Major [ID:304197042] Office 2021 Version 16.0.19725.20126 Available - Current Channel - Office 2021 Retail (Superseded) * Major [ID:304197011] Office 2021 Version 16.0.19725.20126 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) Reason for Update: * New Office updates from Microsoft. * Old Office updates have been superseded. Actions to Take: None Published site version: Patches for Windows, Version: 4685 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 07:27:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 09:27:08 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-05 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 37 Total Fixlets in Site: 549 Release Date: 2026-03-05 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 11700101 Yubico Authenticator v7.3.2 2000901 WebexNonLocalized (x64) v46.3.0.34324 55300101 K-Lite v19.5.5.0 67700101 Vivaldi v7.8.3925.76 8900101 Slack v4.48.99.0 9400201 Tableau Reader v2026.1.0 901901 AWS Command Line Interface v2 v2.34.2.0 5603601 Windows Defender Virus Definitions v1.445.356.0 2600601 DELL System Update v2.2.0.1 5604001 Microsoft Azure PowerShell (MSI) v15.4.0.40597 55000101 HeidiSQL v12.15.0.7223 39000101 CLAN v8.52.00 7000101 Opera Stable v128.0.5807.37 87000101 ProfiCAD (EXE) v13.4.6 9400101 Tableau Desktop v2026.1.0 11600301 XnView MP v1.10.3.0 4100401 Google Earth Pro v7.3.7 48200501 Process Lasso v17.1.0.50 9600701 TeamViewer Host v15.75.5 1500101 Sourcetree v3.4.30 19500101 Cyberduck v9.4.1.44384 23500101 PhraseExpress v18.0.63 2700101 Remote Desktop Manager Enterprise v2026.1.10.0 11600201 XnView v2.52.5 5100101 KeePass v2.61 54300101 Dolt v1.83.1 5602501 Microsoft Visual Studio Code x64 v1.110.0 60400201 WizTree v4.29 63200201 Pale Moon v34.1.0 29600101 Vim v9.2.0106 3600101 GlassWire v3.8.1033 52000101 Coder v2.31.2.0 62400101 Microsoft Azure CLI (32-bit) v2.84.0 63200101 Pale Moon v34.1.0 6500201 Node.js v25.8.0 67700201 Vivaldi v7.8.3925.76 9600101 TeamViewer v15.75.5 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 07:41:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 09:41:21 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-05 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 15 Total Fixlets in Site: 216 Release Date: 2026-03-05 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 9600601 TeamViewer v15.75.5 74600801 JetBrains Toolbox (Intel) v3.3.1.75249 8900201 Slack v4.48.99 74600901 JetBrains Toolbox (arm64) v3.3.1.75249 85000101 Notion v7.7.0 2001001 Webex (Intel) v46.3.0.34324 20600201 Insomnia v12.4.0 24200201 TablePlus v6.8.2 2800201 Docker v4.63.0 2001101 Webex (arm64) v46.3.0.34324 19500301 Cyberduck v9.4.1.44384 63200301 Pale Moon (Intel) v34.1.0 11600401 XnViewMP v1.10.3 63200401 Pale Moon (arm64) v34.1.0 79500301 Genesys Cloud v2.48.680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 07:53:50 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 09:53:50 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-05 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 27 Total Fixlets in Site: 123 Release Date: 2026-03-05 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 86500101 redisinsight (deb) v3.2.0 87600901 logstash (deb) v9.3.1 2003601 clamav (rpm) v1.5.2 19300501 dbeaver-ce (rpm) v26.0.0 67700501 vivaldi-stable (deb) v7.8.3925.76 87300501 MinBrowser (deb) v1.35.4 87601301 metricbeat (deb) v9.3.1 87600801 kibana (rpm) v9.3.1 86200101 discord (deb) v0.0.127 2003501 clamav (deb) v1.5.2 85300401 kubectl (ubuntu-22.04) v1.35.1 87601201 filebeat (rpm) v9.3.1 87600701 kibana (deb) v9.3.1 85100101 syncthing (deb) v2.0.15 2800201 docker-desktop (rpm) v4.63.0 87601101 filebeat (deb) v9.3.1 87600601 elasticsearch (rpm) v9.3.1 5600601 microsoft-edge-stable (rpm) v145.0.3800.82-1 4101601 google-chrome-stable (rpm) v145.0.7632.159 2800101 docker-desktop (deb) v4.63.0 87601401 metricbeat (rpm) v9.3.1 84900201 brave-browser (rpm) v1.87.192 87601001 logstash (rpm) v9.3.1 5600501 microsoft-edge-stable (deb) v145.0.3800.82-1 87600501 elasticsearch (deb) v9.3.1 67700601 vivaldi-stable (rpm) v7.8.3925.76 4101501 google-chrome-stable (deb) v145.0.7632.159 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 09:07:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 12:07:30 -0500 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Oracle Linux 8, published 2026-03-05 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Oracle Linux 8. *Security Benchmark:* Disa Oracle Linux 8 STIG SCAP Benchmark, V2R7 *Published Sites:* DISA STIG Checklist for Oracle Linux 8, site version 12. (The site version is provided for air-gap customers.) *Details:* Total New Fixlets: 2 Total Updated Fixlets: 4 Total Deleted Fixlets: 1 Total Fixlets in Site: 366 *New Fixlets:* ? OL 8 must automatically exit interactive command shell user sessions after 10 minutes of inactivity. ? OL 8 must not install packages from the Extra Packages for Enterprise Linux (EPEL) repository *Updated Fixlets:* ? The OL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections ? The OL 8 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections. ? The OL 8 operating system must implement DOD-approved encryption in the OpenSSL package. ? The OL 8 file system automounter must be disabled. *Deleted Fixlets:* ? Local OL 8 initialization files must not execute world-writable programs. *Additional details:* ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which require OS reboot. ? The check will show relevant for those endpoints until they are rebooted. *? *Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take: *? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 10.0.2 and later. ?If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information: *To know more about the BigFix Compliance SCM checklists, please see the following resources: *? BigFix Forum: * *https://forum.bigfix.com/c/release-announcements/compliance* *? BigFix Compliance SCM Checklists: **Welcome to Wikis* We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 09:40:17 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 11:40:17 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-05 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 266 Total Fixlets in Site: 3320 Total CVEs Covered: 972 Release Date: 2026-03-05 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 36870 Linux Kernel Use of Uninitialized Resource Vulnerability - Oracle Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38950 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Windows 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 38960 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 34880 Android Kernel Remote Code Execution Vulnerability - Oracle Linux 24130 WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 38980 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of MacOS 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL 37440 HTTP/2 Rapid Reset Attack Vulnerability - Oracle Linux 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 31820 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 19550 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of MacOS 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 41580 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 41070 Notepad++ Download of Code Without Integrity Check Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 40560 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20080 Adobe Reader Buffer Overflow Vulnerability - Any Version of MacOS 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 40570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 40580 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 41610 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Linux 20110 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 31890 Linux Kernel Heap-Based Buffer Overflow Vulnerability - Oracle Linux 41620 Google Chromium CSS Use-After-Free Vulnerability - Any Version of MacOS 20630 Adobe Flash Player Memory Corruption Vulnerability - Any Version of MacOS 19610 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 31910 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 30380 Linux Kernel Use-After-Free Vulnerability - Ubuntu 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19640 Adobe Flash Player Unspecified Vulnerability - Any Version of MacOS 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 22710 Jenkins Stapler Web Framework Deserialization of Untrusted Data Vulnerability - Any Version of Linux 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 20160 Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability - Any Version of MacOS 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 31940 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 37070 Linux Kernel Out-of-Bounds Read Vulnerability - Ubuntu 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 37080 Linux Kernel Out-of-Bounds Access Vulnerability - Ubuntu 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 24060 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 38620 Linux Kernel Improper Ownership Management Vulnerability - Ubuntu 40670 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Windows 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 27360 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS 31970 Linux Kernel Privilege Escalation Vulnerability - Oracle Linux 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 20210 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of MacOS 40690 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31990 Linux Kernel Use-After-Free Vulnerability - Oracle Linux 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 35580 Jenkins User Interface (UI) Information Disclosure Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 19710 Adobe Acrobat and Reader Double Free Vulnerability - Any Version of MacOS 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 28930 Linux Kernel Use-After-Free Vulnerability - RHEL 20230 Adobe Acrobat and Reader Buffer Overflow Vulnerability - Any Version of MacOS 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 35590 Jenkins Command Line Interface (CLI) Path Traversal Vulnerability - Any Version of Linux 30470 Linux Kernel Use-After-Free Vulnerability - RHEL 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 20750 Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability - Any Version of MacOS 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 25360 Apple Multiple Products Type Confusion Vulnerability - Any Version of Windows 40720 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 39700 Linux Kernel Heap Out-of-Bounds Write Vulnerability - RHEL 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19740 Adobe Reader and Acrobat Universal 3D Memory Corruption Vulnerability - Any Version of MacOS 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 37190 Linux Kernel Out-of-Bounds Read Vulnerability - Oracle Linux 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 20810 Adobe Reader and Adobe Acrobat Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS 19790 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 37200 Linux Kernel Out-of-Bounds Access Vulnerability - Oracle Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 39260 Meta Platforms WhatsApp Incorrect Authorization Vulnerability - Any Version of MacOS 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 23920 WebKitGTK Memory Corruption Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 39280 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - RHEL 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 39290 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - Oracle Linux 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 19350 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability - Any Version of MacOS 23960 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 27030 Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability - Any Version of MacOS 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38810 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability - Any Version of Windows 38650 Linux Kernel Improper Ownership Management Vulnerability - RHEL 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 19360 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of MacOS 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19370 Adobe Acrobat and Reader Unspecified Vulnerability - Any Version of MacOS 39850 Jenkins Remote Code Execution Vulnerability - Any Version of Linux 39340 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 19890 Adobe Reader and Acrobat Input Validation Vulnerability - Any Version of MacOS 19380 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS 39350 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 36790 Linux Kernel Use of Uninitialized Resource Vulnerability - Ubuntu 38840 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20410 Adobe Reader and Acrobat Use-After-Free Vulnerability - Any Version of MacOS 30140 Linux Kernel Use-After-Free Vulnerability - Ubuntu 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 39360 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 38850 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 19950 Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability - Any Version of MacOS 29680 Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL 28660 Linux Kernel Use-After-Free Vulnerability - Ubuntu 19960 Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability - Any Version of MacOS 29690 Elasticsearch Remote Code Execution Vulnerability - Any Version of Linux 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 10:00:56 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 12:00:56 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2026-03-05 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: PostgreSQL v16.13 - Windows (x64) - Update: PostgreSQL v17.9 - Windows (x64) ## Modified Items: - Update: PostgreSQL v16.11 - Windows (x64) (Superseded) - Update: PostgreSQL v17.7 - Windows (x64) (Superseded) ## Deleted Items: - 37200605 PostgreSQL-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v72 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 10:15:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 12:15:09 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2026-03-05 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Postgresql v16.13 - Ubuntu 22.04 (x64) - Update: Postgresql v16.13 - RedHat / CentOS / OEL 8.10 (x64) - Update: Postgresql v16.13 - RedHat / CentOS / OEL 9.7 (x64) - Update: Postgresql v17.9 - RedHat / CentOS / OEL 8.10 (x64) - Update: Postgresql v17.9 - RedHat / CentOS / OEL 9.7 (x64) ## Modified Items: - Update: Postgresql v16.11 - Ubuntu 22.04 (x64) (Superseded) ## Deleted Items: - 37200505 Postgresql-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v97 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 5 12:32:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 5 Mar 2026 15:32:30 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-05 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 145.0.7632.160 Available - Mac OS X (ID: 83000247) Microsoft Office for Mac 2019 - Excel 16.106.3 Available (ID: 19000666) Microsoft Office for Mac 2019 - OneNote 16.106.3 Available (ID: 19000667) Microsoft Office for Mac 2019 - Outlook 16.106.3 Available (ID: 19000668) Microsoft Office for Mac 2019 - PowerPoint 16.106.3 Available (ID: 19000669) Microsoft Office for Mac 2019 - Word 16.106.3 Available (ID: 19000670) Zoom 6.7.7 (76486) Available - Mac OS X (ID: 51000145) Published site version: Updates for Mac Applications, version 831. Reasons for Update: A newer version of Chrome, Zoom and MS office for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 05:57:13 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 6 Mar 2026 08:57:13 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2026:3464 - Kernel Security Update - RockyLinux 8 x86_64 (ID: 26346401) * RLSA-2026:3515 - Thunderbird Security Update - RockyLinux 8 x86_64 (ID: 26351501) Published Site Version: * Patches for Rocky Linux 8, version 106. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 06:02:25 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 6 Mar 2026 09:02:25 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:3516 - Thunderbird Security Update - RockyLinux 9 x86_64 (ID: 26351601) Published Site Version: * Patches for Rocky Linux 9, version 88. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 06:03:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 6 Mar 2026 09:03:30 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:3340 - Skopeo Security Update - AlmaLinux 9 x86_64 (ID: 26334001) * ALSA-2026:3341 - Containernetworking-Plugins Security Update - AlmaLinux 9 x86_64 (ID: 26334101) * ALSA-2026:3405 - Libpng Security Update - AlmaLinux 9 x86_64 (ID: 26340501) * ALSA-2026:3507 - Valkey Security Update - AlmaLinux 9 x86_64 (ID: 26350701) * ALSA-2026:3516 - Thunderbird Security Update - AlmaLinux 9 x86_64 (ID: 26351601) * ALSA-2026:3638 - Nginx:1.24 Security Update - AlmaLinux 9 x86_64 (ID: 26363801) * ALSA-2026:3668 - Go-Rpm-Macros Security Update - AlmaLinux 9 x86_64 (ID: 26366801) Published Site Version: * Patches for Alma Linux 9, version 64. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 06:06:25 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 6 Mar 2026 09:06:25 -0500 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260302 - SUSE-RU-2026:0695-1 - Recommended update for evolution - leap15.6 - (x86-64) (ID: 26030201) * 260302 - SUSE-RU-2026:0747-1 - Recommended update for rmt-server - leap15.6 - (x86-64) (ID: 26030202) * 260302 - SUSE-SU-2026:0741-1 - Security update for shim - leap15.6 - (x86-64) (ID: 26030203) * 260303 - SUSE-SU-2026:0758-1 - Security update for busybox - leap15.6 - (x86-64) (ID: 26030301) * 260303 - SUSE-SU-2026:0760-1 - Security update for go1.25-openssl - leap15.6 - (x86-64) (ID: 26030302) * 260303 - SUSE-SU-2026:0761-1 - Security update for freerdp - leap15.6 - (x86-64) (ID: 26030303) * 260303 - SUSE-SU-2026:0766-1 - Security update for gnome-remote-desktop - leap15.6 - (x86-64) (ID: 26030304) * 260303 - SUSE-SU-2026:0767-1 - Security update for python311 - leap15.6 - (x86-64) (ID: 26030305) * 260303 - SUSE-SU-2026:0771-1 - Security update for postgresql15 - leap15.6 - (x86-64) (ID: 26030306) * 260303 - SUSE-SU-2026:0774-1 - Security update for python - leap15.6 - (x86-64) (ID: 26030307) * 260303 - SUSE-SU-2026:0775-1 - Security update for evolution-data-server - leap15.6 - (x86-64) (ID: 26030308) * 260303 - SUSE-SU-2026:0777-1 - Security update for cosign - leap15.6 - (x86-64) (ID: 26030309) * 260303 - SUSE-SU-2026:0779-1 - Security update for libssh - leap15.6 - (x86-64) (ID: 26030310) * 260303 - SUSE-SU-2026:0780-1 - Security update for tracker-miners - leap15.6 - (x86-64) (ID: 26030311) * 260303 - SUSE-SU-2026:0781-1 - Security update for patch - leap15.6 - (x86-64) (ID: 26030312) * 260303 - SUSE-SU-2026:0783-1 - Security update for zlib - leap15.6 - (x86-64) (ID: 26030313) * 260303 - SUSE-SU-2026:0786-1 - Security update for postgresql14 - leap15.6 - (x86-64) (ID: 26030314) * 260303 - SUSE-SU-2026:0788-1 - Security update for libsoup - leap15.6 - (x86-64) (ID: 26030315) * 260303 - SUSE-SU-2026:0789-1 - Security update for go1.24-openssl - leap15.6 - (x86-64) (ID: 26030316) * 260304 - SUSE-RU-2026:0791-1 - Recommended update for gcc15 - leap15.6 - (x86-64) (ID: 26030401) * 260304 - SUSE-RU-2026:0798-1 - Recommended update for cvs - leap15.6 - (x86-64) (ID: 26030402) * 260304 - SUSE-SU-2026:0801-1 - Security update for libxslt - leap15.6 - (x86-64) (ID: 26030403) * 260304 - SUSE-SU-2026:0803-1 - Security update for util-linux - leap15.6 - (x86-64) (ID: 26030404) Published Site Version: * Patches for openSUSE Leap 15, version 135. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 07:12:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Mar 2026 09:12:36 -0600 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2026-03-06 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - ASM - OracleDB 19c on AIX - PSU 2026-01 Precheck - ASM - OracleDB 19c on AIX - PSU 2026-01 Patch - ASM - OracleDB 19c on AIX - PSU 2026-01 Rollback - RAC - OracleDB 19c on AIX - PSU 2026-01 Precheck - RAC - OracleDB 19c on AIX - PSU 2026-01 Patch - RAC - OracleDB 19c on AIX - PSU 2026-01 Rollback - SDB - OracleDB 19c on AIX - PSU 2026-01 Precheck - SDB - OracleDB 19c on AIX - PSU 2026-01 Patch - SDB - OracleDB 19c on AIX - PSU 2026-01 Rollback - ASM - OracleDB 19c on AIX - OJVM 2026-01 PRECHECK - ASM - OracleDB 19c on AIX - OJVM 2026-01 Patch - ASM - OracleDB 19c on AIX - OJVM 2026-01 Rollback - RAC - OracleDB 19c on AIX - OJVM 2026-01 PRECHECK - RAC - OracleDB 19c on AIX - OJVM 2026-01 Patch - RAC - OracleDB 19c on AIX - OJVM 2026-01 Rollback - SDB - OracleDB 19c on AIX -OJVM 2026-01 PRECHECK - SDB - OracleDB 19c on AIX -OJVM 2026-01 Patch - SDB - OracleDB 19c on AIX -OJVM 2026-01 Rollback - SDB - OracleDB 19c on AIX -OJDK 2026-01 Patch - SDB - OracleDB 19c on AIX -OJDK 2026-01 Rollback - ASM - OracleDB 19c on AIX - OJDK 2026-01 Patch - ASM - OracleDB 19c on AIX - OJDK 2026-01 Rollback - RAC - OracleDB 19c on AIX - OJDK 2026-01 Patch - RAC - OracleDB 19c on AIX - OJDK 2026-01 Rollback - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Precheck - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Patch - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Rollback - RAC - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Precheck - RAC - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Patch - RAC - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Rollback - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Precheck - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Patch - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Rollback - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 PRECHECK - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Patch - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Rollback - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 PRECHECK - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Patch - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Rollback - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 PRECHECK - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 Patch - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 Rollback - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2026-01 Patch - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2026-01 Rollback - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Patch - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Rollback - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Patch - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Rollback - ASM - OracleDB 19c on AIX - OJDK 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on AIX - OJDK 2026-01 Rollback - ContainerDB - ASM - OracleDB 19c on AIX - OJVM 2026-01 PRECHECK - ContainerDB - ASM - OracleDB 19c on AIX - OJVM 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on AIX - OJVM 2026-01 Rollback - ContainerDB - ASM - OracleDB 19c on AIX - PSU 2026-01 Precheck - ContainerDB - ASM - OracleDB 19c on AIX - PSU 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on AIX - PSU 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on AIX -OJDK 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on AIX -OJDK 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on AIX -OJVM 2026-01 PRECHECK - ContainerDB - SDB - OracleDB 19c on AIX -OJVM 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on AIX -OJVM 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on AIX - PSU 2026-01 Precheck - ContainerDB - SDB - OracleDB 19c on AIX - PSU 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on AIX - PSU 2026-01 Rollback - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2026-01 Rollback - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 PRECHECK - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2026-01 Rollback - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Precheck - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Patch - ContainerDB - ASM - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 PRECHECK - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2026-01 Rollback - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Precheck - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Solaris-SPARC - PSU 2026-01 Rollback - ContainerDB ## Modified Items: - SDB - OracleDB 19c on Solaris-x86 -OJDK 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Solaris-x86 -OJDK 2026-01 Patch - SDB - OracleDB 19c on Linux -OJDK 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Linux -OJDK 2026-01 Patch - SDB - OracleDB 21c on Linux -OJDK 2026-01 Patch - ContainerDB - SDB - OracleDB 19c on Linux -OJDK 2025-07 Patch (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-07 Patch (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - OJDK 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-07 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-07 Patch (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Patch (Superseded) - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 21c on Linux -OJDK 2025-10 Patch - ContainerDB (Superseded) ## Deleted Items: - 619225210 Oracle 2025-04 ASM-PSU AIX 19c PRECHECK - 619225211 Oracle 2025-04 ASM-PSU AIX 19c PATCH - 619225212 Oracle 2025-04 ASM-PSU AIX 19c ROLLBACK - 619225213 Oracle 2025-04 RAC-PSU AIX 19c PRECHECK - 619225214 Oracle 2025-04 RAC-PSU AIX 19c PATCH - 619225215 Oracle 2025-04 RAC-PSU AIX 19c ROLLBACK - 619225216 Oracle 2025-04 SDB-PSU AIX 19c PRECHECK - 619225217 Oracle 2025-04 SDB-PSU AIX 19c PATCH - 619225218 Oracle 2025-04 SDB-PSU AIX 19c ROLLBACK - 619225222 Oracle 2025-04 ASM-OJVM AIX 19c PRECHECK - 619225223 Oracle 2025-04 ASM-OJVM AIX 19c PATCH - 619225224 Oracle 2025-04 ASM-OJVM AIX 19c ROLLBACK - 619225225 Oracle 2025-04 RAC-OJVM AIX 19c PRECHECK - 619225226 Oracle 2025-04 RAC-OJVM AIX 19c PATCH - 619225227 Oracle 2025-04 RAC-OJVM AIX 19c ROLLBACK - 619225228 Oracle 2025-04 SDB-OJVM AIX 19c PRECHECK - 619225229 Oracle 2025-04 SDB-OJVM AIX 19c PATCH - 619225230 Oracle 2025-04 SDB-OJVM AIX 19c ROLLBACK - 619225235 Oracle 2025-04 SDB-OJDK AIX 19c PATCH - 619225236 Oracle 2025-04 SDB-OJDK AIX 19c ROLLBACK - 619225238 Oracle 2025-04 ASM-OJDK AIX 19c PATCH - 619225239 Oracle 2025-04 ASM-OJDK AIX 19c ROLLBACK - 619225241 Oracle 2025-04 RAC-OJDK AIX 19c PATCH - 619225242 Oracle 2025-04 RAC-OJDK AIX 19c ROLLBACK - 619325210 Oracle 2025-04 ASM-PSU Solaris-SPARC 19c PRECHECK - 619325211 Oracle 2025-04 ASM-PSU Solaris-SPARC 19c PATCH - 619325212 Oracle 2025-04 ASM-PSU Solaris-SPARC 19c ROLLBACK - 619325213 Oracle 2025-04 RAC-PSU Solaris-SPARC 19c PRECHECK - 619325214 Oracle 2025-04 RAC-PSU Solaris-SPARC 19c PATCH - 619325215 Oracle 2025-04 RAC-PSU Solaris-SPARC 19c ROLLBACK - 619325216 Oracle 2025-04 SDB-PSU Solaris-SPARC 19c PRECHECK - 619325217 Oracle 2025-04 SDB-PSU Solaris-SPARC 19c PATCH - 619325218 Oracle 2025-04 SDB-PSU Solaris-SPARC 19c ROLLBACK - 619325222 Oracle 2025-04 ASM-OJVM Solaris-SPARC 19c PRECHECK - 619325223 Oracle 2025-04 ASM-OJVM Solaris-SPARC 19c PATCH - 619325224 Oracle 2025-04 ASM-OJVM Solaris-SPARC 19c ROLLBACK - 619325225 Oracle 2025-04 RAC-OJVM Solaris-SPARC 19c PRECHECK - 619325226 Oracle 2025-04 RAC-OJVM Solaris-SPARC 19c PATCH - 619325227 Oracle 2025-04 RAC-OJVM Solaris-SPARC 19c ROLLBACK - 619325228 Oracle 2025-04 SDB-OJVM Solaris-SPARC 19c PRECHECK - 619325229 Oracle 2025-04 SDB-OJVM Solaris-SPARC 19c PATCH - 619325230 Oracle 2025-04 SDB-OJVM Solaris-SPARC 19c ROLLBACK - 619325235 Oracle 2025-04 SDB-OJDK Solaris-SPARC 19c PATCH - 619325236 Oracle 2025-04 SDB-OJDK Solaris-SPARC 19c ROLLBACK - 619325238 Oracle 2025-04 ASM-OJDK Solaris-SPARC 19c PATCH - 619325239 Oracle 2025-04 ASM-OJDK Solaris-SPARC 19c ROLLBACK - 619325241 Oracle 2025-04 RAC-OJDK Solaris-SPARC 19c PATCH - 619325242 Oracle 2025-04 RAC-OJDK Solaris-SPARC 19c ROLLBACK - 619425210 Oracle 2025-04 ASM-PSU Solaris-x86 19c PRECHECK - 619425211 Oracle 2025-04 ASM-PSU Solaris-x86 19c PATCH - 619425212 Oracle 2025-04 ASM-PSU Solaris-x86 19c ROLLBACK - 619425213 Oracle 2025-04 RAC-PSU Solaris-x86 19c PRECHECK - 619425214 Oracle 2025-04 RAC-PSU Solaris-x86 19c PATCH - 619425215 Oracle 2025-04 RAC-PSU Solaris-x86 19c ROLLBACK - 619425216 Oracle 2025-04 SDB-PSU Solaris-x86 19c PRECHECK - 619425217 Oracle 2025-04 SDB-PSU Solaris-x86 19c PATCH - 619425218 Oracle 2025-04 SDB-PSU Solaris-x86 19c ROLLBACK - 619425222 Oracle 2025-04 ASM-OJVM Solaris-x86 19c PRECHECK - 619425223 Oracle 2025-04 ASM-OJVM Solaris-x86 19c PATCH - 619425224 Oracle 2025-04 ASM-OJVM Solaris-x86 19c ROLLBACK - 619425225 Oracle 2025-04 RAC-OJVM Solaris-x86 19c PRECHECK - 619425226 Oracle 2025-04 RAC-OJVM Solaris-x86 19c PATCH - 619425227 Oracle 2025-04 RAC-OJVM Solaris-x86 19c ROLLBACK - 619425228 Oracle 2025-04 SDB-OJVM Solaris-x86 19c PRECHECK - 619425229 Oracle 2025-04 SDB-OJVM Solaris-x86 19c PATCH - 619425230 Oracle 2025-04 SDB-OJVM Solaris-x86 19c ROLLBACK - 619425235 Oracle 2025-04 SDB-OJDK Solaris-x86 19c PATCH - 619425236 Oracle 2025-04 SDB-OJDK Solaris-x86 19c ROLLBACK - 619425238 Oracle 2025-04 ASM-OJDK Solaris-x86 19c PATCH - 619425239 Oracle 2025-04 ASM-OJDK Solaris-x86 19c ROLLBACK - 619425241 Oracle 2025-04 RAC-OJDK Solaris-x86 19c PATCH - 619425242 Oracle 2025-04 RAC-OJDK Solaris-x86 19c ROLLBACK - 711922521 Oracle 2025-04 SDB AIX 19c PRECHECK - 711922522 Oracle 2025-04 SDB AIX 19c PATCH - 711922523 Oracle 2025-04 SDB AIX 19c ROLLBACK - 711922524 Oracle 2025-04 ASM AIX 19c PRECHECK - 711922525 Oracle 2025-04 ASM AIX 19c PATCH - 711922526 Oracle 2025-04 ASM AIX 19c ROLLBACK - 711922527 Oracle 2025-04 RAC AIX 19c PRECHECK - 711922528 Oracle 2025-04 RAC AIX 19c PATCH - 711922529 Oracle 2025-04 RAC AIX 19c ROLLBACK - 711932521 Oracle 2025-04 SDB Solaris-SPARC 19c PRECHECK - 711932522 Oracle 2025-04 SDB Solaris-SPARC 19c PATCH - 711932523 Oracle 2025-04 SDB Solaris-SPARC 19c ROLLBACK - 711932524 Oracle 2025-04 ASM Solaris-SPARC 19c PRECHECK - 711932525 Oracle 2025-04 ASM Solaris-SPARC 19c PATCH - 711932526 Oracle 2025-04 ASM Solaris-SPARC 19c ROLLBACK - 711932527 Oracle 2025-04 RAC Solaris-SPARC 19c PRECHECK - 711932528 Oracle 2025-04 RAC Solaris-SPARC 19c PATCH - 711932529 Oracle 2025-04 RAC Solaris-SPARC 19c ROLLBACK - 711942521 Oracle 2025-04 SDB Solaris-x86 19c PRECHECK - 711942522 Oracle 2025-04 SDB Solaris-x86 19c PATCH - 711942523 Oracle 2025-04 SDB Solaris-x86 19c ROLLBACK - 711942524 Oracle 2025-04 ASM Solaris-x86 19c PRECHECK - 711942525 Oracle 2025-04 ASM Solaris-x86 19c PATCH - 711942526 Oracle 2025-04 ASM Solaris-x86 19c ROLLBACK - 711942527 Oracle 2025-04 RAC Solaris-x86 19c PRECHECK - 711942528 Oracle 2025-04 RAC Solaris-x86 19c PATCH - 711942529 Oracle 2025-04 RAC Solaris-x86 19c ROLLBACK ## Reason for Update: - New Software Releases from Vendors - Minor issue fixes ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v98 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 6 11:13:22 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 6 Mar 2026 14:13:22 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-06 Message-ID: BigFix Patch Team is pleased to announce the availability of a new Console Dashboard to support Windows Drivers updates, in BigFix Console. Historically, managing drivers required disparate tools or manual workarounds. With the new *Windows Drivers Management Dashboard*, you can now orchestrate driver updates with the same precision and scale you?ve come to expect from BigFix OS and application patching. *What?s new* This dashboard provides a dedicated, centralized interface within the BigFix Console to handle the complexities of hardware drivers. It streamlines the entire process?from discovery to deployment?ensuring your fleet stays stable and secure. Key Features ? *Centralized Visibility:* View all available and required drivers across your entire Windows environment in one place. ? *Granular Selection & Deployment:* Select specific drivers for targeted hardware groups, ensuring compatibility before you hit "deploy." ? *Real-Time Monitoring:* Track the progress of driver installations as they happen across your endpoints. ? *Historical Tracking:* Maintain a clear audit trail of driver versions and deployment history for compliance and troubleshooting. *Who Gets Access?* The *Windows Drivers Management Dashboard* is published under the External site ?Updates for Windows Application Extended? and it require one of the following licenses: - BigFix Remediate - BigFix Lifecycle - BigFix Compliance - BigFix Workspace / Workspace+ - BigFix Enterprise / Enterprise+ *Actions to take* Subscribe to the ?Updates for Windows Applications Extended? site from the License Overview dashboard. If the site is not showing in the License Overview dashboard, update your license from the dashboard by clicking ?Check for license update?, then run the BigFix Administration Tool. To enable the Windows Drivers Management Dashboard: 1. Open HCL BigFix Console 2. Navigate to License Overview 3. Locate and gather the latest version of the site: a. Updates for Windows Applications Extended 4. Ensure the site version is: a. Version *337* 5. Once gathered, the dashboard will be available in the dhasboard section of the external site. No additional configuration is required. *Published Sites* Updates for Windows Applications Extended, site version 336 *Application Engineering Team* BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 07:19:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 10:19:30 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-09 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Mozilla Firefox 148.0 Available - Mac OS X (ID: 20750313) Mozilla Firefox 140.8.0 ESR Available - Mac OS X (ID: 20750314) Published site version: Updates for Mac Applications, version 832. Reasons for Update: A newer version of Firefox and Firefox ESR for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 07:19:44 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 09:19:44 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-09 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058818 Microsoft Edge Extended Stable Build 144.0.3719.162 Available * 5058820 Microsoft Edge Extended Stable Build 144.0.3719.162 Available (x64) * 5058799 Microsoft Edge Stable Build 145.0.3800.97 Available * 5058801 Microsoft Edge Stable Build 145.0.3800.97 Available (x64) * 2061217 Apple iTunes 12.13.10 Available - Win10 Modified: * 2061215 Apple iTunes 12.13.9 Available - Win10 (Superseded) * 5058816 Microsoft Edge Extended Stable Build 144.0.3719.151 Available (Superseded) * 5058814 Microsoft Edge Extended Stable Build 144.0.3719.151 Available (x64) (Superseded) * 5058797 Microsoft Edge Stable Build 145.0.3800.82 Available (Superseded) * 5058795 Microsoft Edge Stable Build 145.0.3800.82 Available (x64) (Superseded) * 5058552 ASP .NET Core Hosting Bundle Runtime 8.0.20 Available (Superseded) * 5058550 ASP .NET Core Runtime 8.0.20 Available (Superseded) * 5058548 .NET Desktop Runtime (x64) 8.0.20 Available (Superseded) * 5058546 .NET Desktop Runtime 8.0.20 Available (Superseded) * 5058544 .NET Runtime (x64) 8.0.20 Available (Superseded) * 5058542 .NET Runtime 8.0.20 Available (Superseded) * 5058519 ASP .NET Core Runtime (x64) 8.0.20 Available (Superseded) Reason for Update: * New updates for Edge and iTunes. * Superseded .NET 8.0.20 updates. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2455 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 07:20:13 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 10:20:13 -0400 Subject: [BESAdmin-Announcements] Content Release: Patches for Mac OS X published 2026-03-09 Message-ID: Content in Patches for Mac OS X has been modified. New Fixlets: UPDATE- macOS Tahoe 26.3.1 Available via Nudge (ID: 26100005) UPDATE- macOS Tahoe 26.3.1 Available for Apple Silicon (ARM64) (ID: 26000010) UPDATE- macOS Tahoe 26.3.1 Available (ID: 26000009) Published site version: Updates for Mac OS X, version 623. Reasons for Update: A newer version of Tahoe for MAC has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 07:27:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 10:27:40 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Oracle Database 19c on Linux, published 2026-03-05 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Oracle Database 19c on Linux to support a more recent version of the benchmark *Security Benchmark: *U_Oracle_Database_19c_V1R4_STIG *Published Sites:* DISA STIG Checklist for Oracle Database 19c on Linux, site version 10 (The site version is provided for air-gap customers) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets:6 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 58 ? Updated query for the following (V-270495, V-270496, V-270497, V-270501, V-270502, V-270504) as per benchmark. ? The Applicability Fixlet now includes additional validation, ensuring that the Environment Setup Task log file exists, is not older than 90 days, and that results files are present. This ensures Fixlets are reported as Not Applicable and that the Measured Value (MV) correctly indicates that the Environment Setup Task has not been executed. ? Enhanced and optimized Fixlet relevance to provide accurate validation of results, including improved handling of file-related exceptions. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 09:12:27 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 11:12:27 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-09 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 11 Total Fixlets in Site: 123 Release Date: 2026-03-09 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 84900101 brave-browser (deb) v1.87.192 85000101 rclone (deb) v1.73.2 86800101 rustdesk (deb) v1.4.6 85000201 rclone (rpm) v1.73.2 48300301 bitwarden (deb) v2026.2.1 86800301 rustdesk (rpm) v1.4.6 48300401 bitwarden (rpm) v2026.2.1 5600501 microsoft-edge-stable (deb) v145.0.3800.97-1 87500501 DBVisualizer (deb) v26.1 87500601 DBVisualizer (rpm) v26.1 5600601 microsoft-edge-stable (rpm) v145.0.3800.97-1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 10:42:20 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 12:42:20 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-09 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 32 Total Fixlets in Site: 549 Release Date: 2026-03-09 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 37300101 Argus Monitor v7.3.5.3150 12100101 HandBrake v1.11.0 74100101 Rocket.Chat v4.13.0 8900101 Slack v4.48.100.0 20700301 Logi Options v2.0.840907 55100301 ImageMagick v7.1.2.16 901901 AWS Command Line Interface v2 v2.34.4.0 5603601 Windows Defender Virus Definitions v1.445.426.0 3800101 Go Programming Language v1.26.1 61800101 ocenaudio (EXE) v3.17.3 55000101 HeidiSQL v12.15.0.7227 7000101 Opera Stable v128.0.5807.52 79000101 Datadog Agent v7.76.2.0 85000101 MobaXterm Home Edition v26.1 9600301 TeamViewer Host v15.75.5.0 5604401 Microsoft Edge WebView2 Runtime (Standalone) v145.0.3800.97 5602501 Microsoft Visual Studio Code x64 v1.110.1 11900101 Zotero v8.0.4 48300101 Bitwarden v2026.2.1 50300101 Markdown Viewer v4.0.1 60400201 WizTree v4.30 54300101 Dolt v1.83.4 85100101 pgAdmin 4 (EXE) v9.13 9600201 TeamViewer v15.75.5 29600101 Vim v9.2.0119 4000101 GoodSync v12.9.26.6 52000101 Coder v2.31.3.0 64400101 RustDesk v1.4.6.29544831 7200101 Paint.NET v5.1.12 74100201 Rocket.Chat v4.13.0 79600101 UltiMaker Cura v5.12.0 900601 AWS SAM Command Line Interface v1.155.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 9 12:37:46 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 9 Mar 2026 14:37:46 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-09 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 17 Total Fixlets in Site: 216 Release Date: 2026-03-09 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 8900201 Slack v4.48.100 81400101 Spark Desktop v3.28.2.133442 86600101 Arc v1.137.0 87000101 Ulaa (Intel) v145.0.7632.160 11900201 Zotero v8.0.4 12100201 HandBrake v1.11.0 45500201 StellarPhotoRecovery v12.6.0.0 48300201 Bitwarden v2026.2.1 19600301 VSCodium (Intel) v1.110.11631 50300201 Markdown Viewer (Intel) v4.0.1 50300301 Markdown Viewer (arm64) v4.0.1 61800201 ocenaudio v3.17.3 19600401 VSCodium (arm64) v1.110.11631 64400201 RustDesk (Intel) v1.4.6 64400301 RustDesk (arm64) v1.4.6 74100301 Rocket.Chat v4.13.0 87000201 Ulaa (arm64) v145.0.7632.160 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:10:47 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:10:47 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2ECS-2026-098 - Containerd Security update - Amazon linux 2 x86_64 (ID: 260981) * ALAS2ECS-2026-099 - Runc Security update - Amazon linux 2 x86_64 (ID: 260991) * ALAS2-2026-3176 - Vsftpd Security update - Amazon linux 2 x86_64 (ID: 2631761) * ALAS2-2026-3178 - Libxml2 Security update - Amazon linux 2 x86_64 (ID: 2631781) * ALAS2-2026-3179 - Evolution-Data-Server Security update - Amazon linux 2 x86_64 (ID: 2631791) * ALAS2-2026-3180 - Python-Pillow Security update - Amazon linux 2 x86_64 (ID: 2631801) * ALAS2-2026-3181 - Freerdp Security update - Amazon linux 2 x86_64 (ID: 2631811) * ALAS2-2026-3182 - Qemu Security update - Amazon linux 2 x86_64 (ID: 2631821) * ALAS2-2026-3183 - Gegl Security update - Amazon linux 2 x86_64 (ID: 2631831) * ALAS2-2026-3184 - Python3 Security update - Amazon linux 2 x86_64 (ID: 2631841) * ALAS2-2026-3185 - Python Security update - Amazon linux 2 x86_64 (ID: 2631851) * ALAS2-2026-3186 - Aide Security update - Amazon linux 2 x86_64 (ID: 2631861) * ALAS2-2026-3187 - Qt5-Qt3D Security update - Amazon linux 2 x86_64 (ID: 2631871) * ALAS2-2026-3188 - Rust Security update - Amazon linux 2 x86_64 (ID: 2631881) * ALAS2-2026-3189 - Libpng Security update - Amazon linux 2 x86_64 (ID: 2631891) * ALAS2-2026-3190 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2631901) Published Site Version: * Patches for Amazon Linux 2, version 201. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:14:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:14:40 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2ECS-2026-098 - Containerd Security update - Amazon linux 2 aarch64 (ID: 260981) * ALAS2ECS-2026-099 - Runc Security update - Amazon linux 2 aarch64 (ID: 260991) * ALAS2-2026-3176 - Vsftpd Security update - Amazon linux 2 aarch64 (ID: 2631761) * ALAS2-2026-3178 - Libxml2 Security update - Amazon linux 2 aarch64 (ID: 2631781) * ALAS2-2026-3179 - Evolution-Data-Server Security update - Amazon linux 2 aarch64 (ID: 2631791) * ALAS2-2026-3180 - Python-Pillow Security update - Amazon linux 2 aarch64 (ID: 2631801) * ALAS2-2026-3181 - Freerdp Security update - Amazon linux 2 aarch64 (ID: 2631811) * ALAS2-2026-3182 - Qemu Security update - Amazon linux 2 aarch64 (ID: 2631821) * ALAS2-2026-3183 - Gegl Security update - Amazon linux 2 aarch64 (ID: 2631831) * ALAS2-2026-3184 - Python3 Security update - Amazon linux 2 aarch64 (ID: 2631841) * ALAS2-2026-3185 - Python Security update - Amazon linux 2 aarch64 (ID: 2631851) * ALAS2-2026-3186 - Aide Security update - Amazon linux 2 aarch64 (ID: 2631861) * ALAS2-2026-3187 - Qt5-Qt3D Security update - Amazon linux 2 aarch64 (ID: 2631871) * ALAS2-2026-3188 - Rust Security update - Amazon linux 2 aarch64 (ID: 2631881) * ALAS2-2026-3189 - Libpng Security update - Amazon linux 2 aarch64 (ID: 2631891) * ALAS2-2026-3190 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2631901) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 129. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:16:44 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:16:44 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALAS2GIMP-2026-011 - Gimp Security update - Amazon linux 2 x86_64 (ID: 260111) * ALAS2POSTGRESQL14-2026-022 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 260222) * ALAS2FIREFOX-2026-053 - Firefox Security update - Amazon linux 2 x86_64 (ID: 260531) * ALAS2ECS-2026-097 - Ecs-Init Security update - Amazon linux 2 x86_64 (ID: 260973) * ALAS2ECS-2026-098 - Containerd Security update - Amazon linux 2 x86_64 (ID: 260982) * ALAS2KERNEL-5.15-2026-098 - Kernel Security update - Amazon linux 2 x86_64 (ID: 260983) * ALAS2ECS-2026-099 - Runc Security update - Amazon linux 2 x86_64 (ID: 260992) Published Site Version: * Patches for Amazon Linux 2 Extras, version 27. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:18:46 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:18:46 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALAS2POSTGRESQL14-2026-022 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 260222) * ALAS2FIREFOX-2026-053 - Firefox Security update - Amazon linux 2 aarch64 (ID: 260531) * ALAS2ECS-2026-097 - Ecs-Init Security update - Amazon linux 2 aarch64 (ID: 260973) * ALAS2ECS-2026-098 - Containerd Security update - Amazon linux 2 aarch64 (ID: 260982) * ALAS2KERNEL-5.15-2026-098 - Kernel Security update - Amazon linux 2 aarch64 (ID: 260983) * ALAS2ECS-2026-099 - Runc Security update - Amazon linux 2 aarch64 (ID: 260992) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 27. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:21:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:21:30 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2026-1446 - Libxml2 Security update - Amazon linux 2023 x86_64 (ID: 322614461) * ALAS2023-2026-1447 - Python3.11 Security update - Amazon linux 2023 x86_64 (ID: 322614471) * ALAS2023-2026-1448 - Assertj-Core Security update - Amazon linux 2023 x86_64 (ID: 322614481) * ALAS2023-2026-1449 - Javapackages-Bootstrap Security update - Amazon linux 2023 x86_64 (ID: 322614491) * ALAS2023-2026-1450 - Wireshark Security update - Amazon linux 2023 x86_64 (ID: 322614501) * ALAS2023-2026-1451 - Evolution-Data-Server Security update - Amazon linux 2023 x86_64 (ID: 322614511) * ALAS2023-2026-1452 - Python-Pillow Security update - Amazon linux 2023 x86_64 (ID: 322614521) * ALAS2023-2026-1453 - Munge Security update - Amazon linux 2023 x86_64 (ID: 322614531) * ALAS2023-2026-1454 - Freerdp Security update - Amazon linux 2023 x86_64 (ID: 322614541) * ALAS2023-2026-1455 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 322614551) * ALAS2023-2026-1456 - Postgresql15 Security update - Amazon linux 2023 x86_64 (ID: 322614561) * ALAS2023-2026-1457 - Postgresql17 Security update - Amazon linux 2023 x86_64 (ID: 322614571) * ALAS2023-2026-1458 - Postgresql16 Security update - Amazon linux 2023 x86_64 (ID: 322614581) * ALAS2023-2026-1459 - Jpegxl Security update - Amazon linux 2023 x86_64 (ID: 322614591) * ALAS2023-2026-1460 - Libsoup3 Security update - Amazon linux 2023 x86_64 (ID: 322614601) * ALAS2023-2026-1461 - Libssh Security update - Amazon linux 2023 x86_64 (ID: 322614611) * ALAS2023-2026-1462 - Aide Security update - Amazon linux 2023 x86_64 (ID: 322614621) * ALAS2023-2026-1463 - Libpng Security update - Amazon linux 2023 x86_64 (ID: 322614631) * ALAS2023-2026-1464 - Nodejs20 Security update - Amazon linux 2023 x86_64 (ID: 322614641) * ALAS2023-2026-1465 - Nodejs22 Security update - Amazon linux 2023 x86_64 (ID: 322614651) * ALAS2023-2026-1466 - Nodejs24 Security update - Amazon linux 2023 x86_64 (ID: 322614661) * ALAS2023-2026-1467 - Python-Jwt Security update - Amazon linux 2023 x86_64 (ID: 322614671) * ALAS2023-2026-1468 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 322614681) * ALAS2023-2026-1469 - Firefox Security update - Amazon linux 2023 x86_64 (ID: 322614691) * ALAS2023-2026-1471 - Valkey Security update - Amazon linux 2023 x86_64 (ID: 322614711) Published Site Version: * Patches for Amazon Linux 2023, version 78. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:24:11 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:24:11 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2026-1446 - Libxml2 Security update - Amazon linux 2023 aarch64 (ID: 322614461) * ALAS2023-2026-1447 - Python3.11 Security update - Amazon linux 2023 aarch64 (ID: 322614471) * ALAS2023-2026-1448 - Assertj-Core Security update - Amazon linux 2023 aarch64 (ID: 322614481) * ALAS2023-2026-1449 - Javapackages-Bootstrap Security update - Amazon linux 2023 aarch64 (ID: 322614491) * ALAS2023-2026-1450 - Wireshark Security update - Amazon linux 2023 aarch64 (ID: 322614501) * ALAS2023-2026-1451 - Evolution-Data-Server Security update - Amazon linux 2023 aarch64 (ID: 322614511) * ALAS2023-2026-1452 - Python-Pillow Security update - Amazon linux 2023 aarch64 (ID: 322614521) * ALAS2023-2026-1453 - Munge Security update - Amazon linux 2023 aarch64 (ID: 322614531) * ALAS2023-2026-1454 - Freerdp Security update - Amazon linux 2023 aarch64 (ID: 322614541) * ALAS2023-2026-1455 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 322614551) * ALAS2023-2026-1456 - Postgresql15 Security update - Amazon linux 2023 aarch64 (ID: 322614561) * ALAS2023-2026-1457 - Postgresql17 Security update - Amazon linux 2023 aarch64 (ID: 322614571) * ALAS2023-2026-1458 - Postgresql16 Security update - Amazon linux 2023 aarch64 (ID: 322614581) * ALAS2023-2026-1459 - Jpegxl Security update - Amazon linux 2023 aarch64 (ID: 322614591) * ALAS2023-2026-1460 - Libsoup3 Security update - Amazon linux 2023 aarch64 (ID: 322614601) * ALAS2023-2026-1461 - Libssh Security update - Amazon linux 2023 aarch64 (ID: 322614611) * ALAS2023-2026-1462 - Aide Security update - Amazon linux 2023 aarch64 (ID: 322614621) * ALAS2023-2026-1463 - Libpng Security update - Amazon linux 2023 aarch64 (ID: 322614631) * ALAS2023-2026-1464 - Nodejs20 Security update - Amazon linux 2023 aarch64 (ID: 322614641) * ALAS2023-2026-1465 - Nodejs22 Security update - Amazon linux 2023 aarch64 (ID: 322614651) * ALAS2023-2026-1466 - Nodejs24 Security update - Amazon linux 2023 aarch64 (ID: 322614661) * ALAS2023-2026-1467 - Python-Jwt Security update - Amazon linux 2023 aarch64 (ID: 322614671) * ALAS2023-2026-1468 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 322614681) * ALAS2023-2026-1469 - Firefox Security update - Amazon linux 2023 aarch64 (ID: 322614691) * ALAS2023-2026-1471 - Valkey Security update - Amazon linux 2023 aarch64 (ID: 322614711) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 58. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:25:37 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:25:37 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6094-1 - Libsodium Security Update - Debian 12 (amd64) (ID: 60940101) * DSA-6096-1 - Vlc Security Update - Debian 12 (amd64) (ID: 60960101) * DSA-6098-1 - Net-Snmp Security Update - Debian 12 (amd64) (ID: 60980101) * DSA-6102-2 - Python-Urllib3 Regression Update - Debian 12 (amd64) (ID: 61020201) * DSA-6105-1 - Modsecurity-Crs Security Update - Debian 12 (amd64) (ID: 61050101) * DSA-6106-1 - Inetutils Security Update - Debian 12 (amd64) (ID: 61060101) * DSA-6107-1 - Bind9 Security Update - Debian 12 (amd64) (ID: 61070101) * DSA-6110-1 - Openjdk-17 Security Update - Debian 12 (amd64) (ID: 61100101) * DSA-6111-1 - Imagemagick Security Update - Debian 12 (amd64) (ID: 61110101) * DSA-6113-1 - Openssl Security Update - Debian 12 (amd64) (ID: 61130101) * DSA-6114-1 - Pyasn1 Security Update - Debian 12 (amd64) (ID: 61140101) * DSA-6120-1 - Tomcat10 Security Update - Debian 12 (amd64) (ID: 61200101) * DSA-6123-1 - Xrdp Security Update - Debian 12 (amd64) (ID: 61230101) * DSA-6125-1 - Usbmuxd Security Update - Debian 12 (amd64) (ID: 61250101) * DSA-6127-1 - Linux Security Update - Debian 12 (amd64) (ID: 61270101) * DSA-6128-1 - Shaarli Security Update - Debian 12 (amd64) (ID: 61280101) * DSA-6129-1 - Munge Security Update - Debian 12 (amd64) (ID: 61290101) * DSA-6131-1 - Nginx Security Update - Debian 12 (amd64) (ID: 61310101) * DSA-6132-1 - Postgresql-15 Security Update - Debian 12 (amd64) (ID: 61320101) * DSA-6137-1 - Roundcube Security Update - Debian 12 (amd64) (ID: 61370101) * DSA-6138-1 - Libpng1.6 Security Update - Debian 12 (amd64) (ID: 61380101) * DSA-6140-1 - Gnutls28 Security Update - Debian 12 (amd64) (ID: 61400101) * DSA-6142-1 - Gegl Security Update - Debian 12 (amd64) (ID: 61420101) * DSA-6143-1 - Libvpx Security Update - Debian 12 (amd64) (ID: 61430101) * DSA-6145-1 - Nova Security Update - Debian 12 (amd64) (ID: 61450101) * DSA-6148-1 - Firefox-Esr Security Update - Debian 12 (amd64) (ID: 61480101) * DSA-6149-1 - Nss Security Update - Debian 12 (amd64) (ID: 61490101) * DSA-6150-1 - Python-Django Security Update - Debian 12 (amd64) (ID: 61500101) * DSA-6152-1 - Thunderbird Security Update - Debian 12 (amd64) (ID: 61520101) * DSA-6153-1 - Lxd Security Update - Debian 12 (amd64) (ID: 61530101) * DSA-6154-1 - Php8.2 Security Update - Debian 12 (amd64) (ID: 61540101) * DSA-6156-1 - Gimp Security Update - Debian 12 (amd64) (ID: 61560101) * DSA-6157-1 - Chromium Security Update - Debian 12 (amd64) (ID: 61570101) Published Site Version: * Patches for Debian 12, version 160. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:31:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:31:09 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:3488 - Kernel Security Update - RockyLinux 9 x86_64 (ID: 26348801) * RLSA-2026:3507 - Valkey Security Update - RockyLinux 9 x86_64 (ID: 26350701) * RLSA-2026:3638 - Nginx:1.24 Security Update - RockyLinux 9 x86_64 (ID: 26363801) * RLSA-2026:3668 - Go-Rpm-Macros Security Update - RockyLinux 9 x86_64 (ID: 26366801) * RLSA-2026:3896 - Postgresql:15 Security Update - RockyLinux 9 x86_64 (ID: 26389601) Published Site Version: * Patches for Rocky Linux 9, version 89. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:32:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:32:15 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:3928 - Git-Lfs Security Update - AlmaLinux 9 x86_64 (ID: 26392801) Published Site Version: * Patches for Alma Linux 9, version 65. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 05:35:05 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 10 Mar 2026 08:35:05 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260305 - SUSE-RU-2026:0564-2 - Recommended update for s390-tools - leap15.6 - (x86-64) (ID: 26030501) * 260305 - SUSE-SU-2026:0810-1 - Security update for wireshark - leap15.6 - (x86-64) (ID: 26030502) * 260305 - SUSE-SU-2026:0811-1 - Security update for libsoup2 - leap15.6 - (x86-64) (ID: 26030503) * 260305 - SUSE-SU-2026:0813-1 - Security update for mozilla-nss - leap15.6 - (x86-64) (ID: 26030504) * 260305 - SUSE-SU-2026:0816-1 - Security update for virtiofsd - leap15.6 - (x86-64) (ID: 26030505) * 260305 - SUSE-SU-2026:0826-1 - Security update for expat - leap15.6 - (x86-64) (ID: 26030506) * 260305 - SUSE-SU-2026:0829-1 - Security update for gnutls - leap15.6 - (x86-64) (ID: 26030507) * 260305 - SUSE-SU-2026:0830-1 - Security update for ocaml - leap15.6 - (x86-64) (ID: 26030508) * 260305 - SUSE-SU-2026:0831-1 - Security update for openvpn - leap15.6 - (x86-64) (ID: 26030509) * 260306 - SUSE-RU-2026:0836-1 - Recommended update for apache2 - leap15.6 - (x86-64) (ID: 26030601) * 260306 - SUSE-RU-2026:0837-1 - Recommended update for syslogd - leap15.6 - (x86-64) (ID: 26030602) * 260306 - SUSE-RU-2026:0844-1 - Recommended update for glibc - leap15.6 - (x86-64) (ID: 26030603) Published Site Version: * Patches for openSUSE Leap 15, version 136. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 07:45:44 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 09:45:44 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-10 Message-ID: Total New Fixlets: 2 Total Updated Fixlets: 3 Total Fixlets in Site: 3322 Total CVEs Covered: 973 Release Date: 2026-03-10 New Fixlets: 41670 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Windows Server 2008 41690 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Windows Vista Updated Fixlets: 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 15700 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 13:02:51 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 15:02:51 -0500 Subject: [BESAdmin-Announcements] Content Release: ESU Patching Add-On for Windows 2012 published 2026-03-10 Message-ID: Content in the ESU Patching Add-on for Windows 2012 site has been added: MS26-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5078738 (x64) MS26-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5078738 (x64) MS26-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5078738 (x64) (Unentitled) MS26-MAR: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5078738 (x64) (Unentitled) MS26-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5078774 (x64) MS26-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5078774 (x64) (Unentitled) MS26-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5078775 (x64) MS26-MAR: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5078775 (x64) (Unentitled) MS26-MAR: Servicing Stack Update - Windows Server 2012 R2 - KB5079233 (x64) MS26-MAR: Servicing Stack Update - Windows Server 2012 - KB5079234 (x64) Content in the ESU Patching Add-on for Windows 2012 site has been superseded: MS25-NOV: Servicing Stack Update - Windows Server 2012 R2 - KB5068783 (x64) (Superseded) MS25-NOV: Servicing Stack Update - Windows Server 2012 - KB5071813 (x64) (Superseded) MS26-FEB: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5075944 (x64) (Superseded) MS26-FEB: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5075944 (x64) (Superseded) MS26-FEB: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 - IE 11 - KB5075944 (x64) (Unentitled) (Superseded) MS26-FEB: Cumulative Security Update for Internet Explorer 11 - Windows Server 2012 R2 - IE 11 - KB5075944 (x64) (Unentitled) (Superseded) MS26-FEB: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5075970 (x64) (Superseded) MS26-FEB: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB5075970 (x64) (Unentitled) (Superseded) MS26-FEB: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5075971 (x64) (Superseded) MS26-FEB: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB5075971 (x64) (Unentitled) (Superseded) Reason for Update: Microsoft released Extended Support Updates on March 10th Patch Tuesday. Actions to Take: Update any baselines containing the superseded fixlets. Published site version: ESU Patching Add-on for Windows 2012, version 51 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 13:16:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 15:16:15 -0500 Subject: [BESAdmin-Announcements] Content Release: PESU Patching Add-On for Windows 10 22H2 published 2026-03-10 Message-ID: Content in the ESU Patching for Windows 10 22H2 site has been added. MS26-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5078885 (x64) MS26-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5078885 MS26-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5078885 (x64) (Unentitled) MS26-MAR: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5078885 (Unentitled) Content in the ESU Patching for Windows 10 22H2 site has been superseded: MS26-FEB: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5075912 (x64) (Superseded) MS26-FEB: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5075912 (Superseded) MS26-FEB: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5075912 (x64) (Unentitled) (Superseded) MS26-FEB: Cumulative Update for Windows 10 Version 22H2 - Windows 10 Version 22H2 - KB5075912 (Unentitled) (Superseded) Reason for Update: Microsoft released Extended Support Updates on March 10th Patch Tuesday. Actions to Take: None Published site version: ESU Patching for Windows 10 22H2, version 12 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 14:12:10 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 16:12:10 -0500 Subject: [BESAdmin-Announcements] Content Release: March 2026 Security Updates published 2026-03-10 Message-ID: Content in the Patches for Windows site has been released. New: * MAJOR (ID:507873701) MS26-MAR: Cumulative Update for Microsoft server operating system version 2022 - Windows Server 2022 Datacenter Azure Edition - KB5078737 (x64) * MAJOR (ID:507873601) MS26-MAR: Hotpatch Update for Microsoft server operating system version 2025 - Windows Server 2025 - KB5078736 (x64) * MAJOR (ID:500283801) MS26-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002838 * MAJOR (ID:500283803) MS26-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002838 (x64) * MAJOR (ID:500285001) MS26-MAR: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002850 (x64) * MAJOR (ID:500285101) MS26-MAR: Security Update for Microsoft SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002851 (x64) * MAJOR (ID:500284501) MS26-MAR: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002845 (x64) * MAJOR (ID:500284701) MS26-MAR: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002847 (x64) * MAJOR (ID:500284301) MS26-MAR: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002843 (x64) * MAJOR (ID:500284801) MS26-MAR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002848 * MAJOR (ID:500284803) MS26-MAR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002848 (x64) * MAJOR (ID:507876601) MS26-MAR: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5078766 (x64) * MAJOR (ID:507874001) MS26-MAR: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5078740 (x64) * MAJOR (ID:507893801) MS26-MAR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5078938 * MAJOR (ID:507893803) MS26-MAR: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5078938 (x64) * MAJOR (ID:507875201) MS26-MAR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5078752 * MAJOR (ID:507875203) MS26-MAR: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5078752 (x64) * MAJOR (ID:507888501) MS26-MAR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5078885 * MAJOR (ID:507888503) MS26-MAR: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5078885 (x64) * MAJOR (ID:507888301) MS26-MAR: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5078883 (x64) * MAJOR (ID:507888303) MS26-MAR: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5078883 (arm64) * MAJOR (ID:507947305) MS26-MAR: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5079473 (x64) * MAJOR (ID:507947307) MS26-MAR: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5079473 (arm64) * MAJOR (ID:507947301) MS26-MAR: Cumulative Update for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5079473 (x64) * MAJOR (ID:507947303) MS26-MAR: Cumulative Update for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5079473 (arm64) * MAJOR (ID:507893805) MS26-MAR: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5078938 (x64) * MAJOR (ID:507875205) MS26-MAR: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5078752 (x64) * MAJOR (ID:507873401) MS26-MAR: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5078734 (x64) * MAJOR (ID:500284901) MS26-MAR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002849 * MAJOR (ID:500284903) MS26-MAR: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002849 (x64) * MAJOR (ID:500271803) MS26-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002718 * MAJOR (ID:500271801) MS26-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002718 (x64) * MAJOR (ID:500284601) MS26-MAR: Security Update for Microsoft Office Online Server - Office Online Server - KB5002846 (x64) * MAJOR (ID:45763395) MS26-MAR: Security Update for Microsoft Visual Studio 2019 version 16.11.54 - KB4576339 * MAJOR (ID:500736367) MS26-MAR: Security Update for Microsoft Visual Studio 2022 version 17.12.18 - KB5007364 * MAJOR (ID:500736369) MS26-MAR: Security Update for Microsoft Visual Studio 2022 version 17.14.28 - KB5007364 * MAJOR (ID:50725331) MS26-MAR: Security Update for Microsoft Visual Studio 2026 version 18.3.3 - KB5072533 * MAJOR (ID:507747301) MS26-MAR: Security Update for SQL Server 2016 Service Pack 3 CU - SQL Server 2016 SP3 - KB5077473 (x64) * MAJOR (ID:507747401) MS26-MAR: Security Update for SQL Server 2016 Service Pack 3 GDR - SQL Server 2016 SP3 - KB5077474 (x64) * MAJOR (ID:507747101) MS26-MAR: Security Update for SQL Server 2017 RTM CU - SQL Server 2017 - KB5077471 (x64) * MAJOR (ID:507747201) MS26-MAR: Security Update for SQL Server 2017 RTM GDR - SQL Server 2017 - KB5077472 (x64) * MAJOR (ID:507746901) MS26-MAR: Security Update for SQL Server 2019 RTM CU - SQL Server 2019 - KB5077469 (x64) * MAJOR (ID:507747001) MS26-MAR: Security Update for SQL Server 2019 RTM GDR - SQL Server 2019 - KB5077470 (x64) * MAJOR (ID:507746401) MS26-MAR: Security Update for SQL Server 2022 RTM CU - SQL Server 2022 - KB5077464 (x64) * MAJOR (ID:507746501) MS26-MAR: Security Update for SQL Server 2022 RTM GDR - SQL Server 2022 - KB5077465 (x64) * MAJOR (ID:507746601) MS26-MAR: Security Update for SQL Server 2025 RTM CU - SQL Server 2025 - KB5077466 (x64) * MAJOR (ID:507746801) MS26-MAR: Security Update for SQL Server 2025 RTM GDR - SQL Server 2025 - KB5077468 (x64) Superseded: * MAJOR (ID:507724105) 5077241: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5077241 (x64) (Superseded) * MAJOR (ID:507724107) 5077241: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5077241 (arm64) (Superseded) * MAJOR (ID:507724101) 5077241: Cumulative Update Preview for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5077241 (x64) (Superseded) * MAJOR (ID:507724103) 5077241: Cumulative Update Preview for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5077241 (arm64) (Superseded) * MAJOR (ID:508231401) 5082314: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5082314 (x64) (Superseded) * MAJOR (ID:448443203) MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB4484432 (Superseded) * MAJOR (ID:448443201) MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB4484432 (x64) (Superseded) * MAJOR (ID:506840001) MS25-NOV: Security Update for SQL Server 2016 Service Pack 3 CU - SQL Server 2016 SP3 - KB5068400 (x64) (Superseded) * MAJOR (ID:506840101) MS25-NOV: Security Update for SQL Server 2016 Service Pack 3 GDR - SQL Server 2016 SP3 - KB5068401 (x64) (Superseded) * MAJOR (ID:506840201) MS25-NOV: Security Update for SQL Server 2017 RTM CU - SQL Server 2017 - KB5068402 (x64) (Superseded) * MAJOR (ID:506840301) MS25-NOV: Security Update for SQL Server 2017 RTM GDR - SQL Server 2017 - KB5068403 (x64) (Superseded) * MAJOR (ID:506840401) MS25-NOV: Security Update for SQL Server 2019 RTM CU - SQL Server 2019 - KB5068404 (x64) (Superseded) * MAJOR (ID:506840501) MS25-NOV: Security Update for SQL Server 2019 RTM GDR - SQL Server 2019 - KB5068405 (x64) (Superseded) * MAJOR (ID:506840701) MS25-NOV: Security Update for SQL Server 2022 RTM GDR - SQL Server 2022 - KB5068407 (x64) (Superseded) * MAJOR (ID:507594301) MS26-FEB: Cumulative Update for Microsoft server operating system version 2022 - Windows Server 2022 Datacenter Azure Edition - KB5075943 (x64) (Superseded) * MAJOR (ID:507590601) MS26-FEB: Cumulative Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5075906 (x64) (Superseded) * MAJOR (ID:507589901) MS26-FEB: Cumulative Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5075899 (x64) (Superseded) * MAJOR (ID:507599901) MS26-FEB: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5075999 (Superseded) * MAJOR (ID:507599903) MS26-FEB: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 LTSB - KB5075999 (x64) (Superseded) * MAJOR (ID:507590401) MS26-FEB: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5075904 (Superseded) * MAJOR (ID:507590403) MS26-FEB: Cumulative Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5075904 (x64) (Superseded) * MAJOR (ID:507591201) MS26-FEB: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5075912 (Superseded) * MAJOR (ID:507591203) MS26-FEB: Cumulative Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5075912 (x64) (Superseded) * MAJOR (ID:507594101) MS26-FEB: Cumulative Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5075941 (x64) (Superseded) * MAJOR (ID:507594103) MS26-FEB: Cumulative Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5075941 (arm64) (Superseded) * MAJOR (ID:507718105) MS26-FEB: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5077181 (x64) (Superseded) * MAJOR (ID:507718107) MS26-FEB: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5077181 (arm64) (Superseded) * MAJOR (ID:507718101) MS26-FEB: Cumulative Update for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5077181 (x64) (Superseded) * MAJOR (ID:507718103) MS26-FEB: Cumulative Update for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5077181 (arm64) (Superseded) * MAJOR (ID:507599905) MS26-FEB: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB5075999 (x64) (Superseded) * MAJOR (ID:507590405) MS26-FEB: Cumulative Update for Windows Server 2019 - Windows Server 2019 - KB5075904 (x64) (Superseded) * MAJOR (ID:507589701) MS26-FEB: Cumulative Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5075897 (x64) (Superseded) * MAJOR (ID:507594201) MS26-FEB: Hotpatch Update for Microsoft server operating system version 2025 - Windows Server 2025 - KB5075942 (x64) (Superseded) * MAJOR (ID:500283701) MS26-FEB: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002837 (Superseded) * MAJOR (ID:500283703) MS26-FEB: Security Update for Microsoft Excel 2016 - Excel 2016 - KB5002837 (x64) (Superseded) * MAJOR (ID:500283501) MS26-FEB: Security Update for Microsoft Office Online Server - Office Online Server - KB5002835 (x64) (Superseded) * MAJOR (ID:500284101) MS26-FEB: Security Update for Microsoft SharePoint Enterprise Server 2016 - SharePoint Server 2016 - KB5002841 (x64) (Superseded) * MAJOR (ID:500284001) MS26-FEB: Security Update for Microsoft SharePoint Enterprise Server 2016 Language Pack - SharePoint Server 2016 - KB5002840 (x64) (Superseded) * MAJOR (ID:500283401) MS26-FEB: Security Update for Microsoft SharePoint Server 2019 Core - SharePoint Server 2019 - KB5002834 (x64) (Superseded) * MAJOR (ID:500283601) MS26-FEB: Security Update for Microsoft SharePoint Server 2019 Language Pack - SharePoint Server 2019 - KB5002836 (x64) (Superseded) * MAJOR (ID:500283301) MS26-FEB: Security Update for Microsoft SharePoint Server Subscription Edition - Microsoft SharePoint Server Subscription Edition - KB5002833 (x64) (Superseded) * MAJOR (ID:500283901) MS26-FEB: Security Update for Microsoft Word 2016 - Word 2016 - KB5002839 (Superseded) * MAJOR (ID:500283903) MS26-FEB: Security Update for Microsoft Word 2016 - Word 2016 - KB5002839 (x64) (Superseded) * MAJOR (ID:507293601) MS26-JAN: Security Update for SQL Server 2022 RTM CU - SQL Server 2022 - KB5072936 (x64) (Superseded) * MAJOR (ID:507303101) MS26-JAN: Security Update for SQL Server 2022 RTM GDR - SQL Server 2022 - KB5073031 (x64) (Superseded) * MAJOR (ID:507317701) MS26-JAN: Security Update for SQL Server 2025 RTM GDR - SQL Server 2025 - KB5073177 (x64) (Superseded) Reason for Update: * Microsoft released March security updates. Additional Notes: * For content that includes associated CVEs, BigFix aligns the reported severity with the source severity published on the Microsoft Security Response Center (MSRC). Actions to Take: None Published site version: Patches for Windows, Version: 4686 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 14:17:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 17:17:07 -0400 Subject: [BESAdmin-Announcements] Content in the BES Inventory and License site has been added. Message-ID: Content in the BES Inventory and License site has been added. New: 607 Run: pac4j-jwt-scan v3.0.2 - Universal JAR - Download JRE - SCAN only. 608 pac4j-jwt-scan results. Reason for Update: BigFix has produced the content to detect the pac4j-jwt library Vulnerability (CVE-2026-29000). The content consumes the pac4j-jwt-scanner package version 3.0.2 from the published artifact URL. No additional operator action is required beyond normal site content synchronization. Published site version: BES Inventory and License, version 206 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 10 14:19:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 10 Mar 2026 16:19:19 -0500 Subject: [BESAdmin-Announcements] Content Release: BES Inventory and License published 2026-03-10 Message-ID: Content in the BES Inventory and License site has been added. New: 607 Run: pac4j-jwt-scan v3.0.2 - Universal JAR - Download JRE - SCAN only. 608 pac4j-jwt-scan results. Reason for Update:BigFix has produced the content to detect the pac4j-jwt library Vulnerability (CVE-2026-29000). The content consumes the pac4j-jwt-scanner package version 3.0.2 from thepublished artifact URL.No additional operator action is required beyond normal site content synchronization. Published site version: BES Inventory and License, version 206 Additional links: None Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 11 03:38:25 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Mar 2026 05:38:25 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-11 Message-ID: Content in the Patches for Windows site has been modified New: * MAJOR [ID:304197215] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304197214] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304197213] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304197212] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304197211] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304197210] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304197209] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304197208] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304197207] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304197206] Office 2024 Version 16.0.19725.20170 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:304197205] Office 2021 Version 16.0.19725.20170 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:304197204] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304197203] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304197202] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (German) * MAJOR [ID:304197201] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304197200] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304197199] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304197198] Office 2024 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:304197197] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304197196] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304197195] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304197194] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304197193] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304197192] Office 2021 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304197191] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304197190] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304197189] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304197188] Office 2021 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:304197187] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304197186] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304197185] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304197184] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (French) * MAJOR [ID:304197183] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304197182] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304197181] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304197180] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304197179] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304197178] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304197177] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304197176] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304197175] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304197174] Office 365 Version 16.0.19725.20170 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 * MAJOR [ID:304197173] Office 2024 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304197172] Office 365 Version 16.0.19725.20170 Available - Monthly Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304197171] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Hungarian) * MAJOR [ID:304197170] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304197169] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Czech) * MAJOR [ID:304197168] Office 2024 Version 16.0.19725.20172 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * MAJOR [ID:304197167] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Polish) * MAJOR [ID:304197166] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (English (United States)) * MAJOR [ID:304197165] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304197164] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Slovak) * MAJOR [ID:304197163] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304197162] Office 2021 Version 16.0.19725.20172 Available - Current Channel - Office 2021 Retail * MAJOR [ID:304197161] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Lithuanian) * MAJOR [ID:304197160] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (French) * MAJOR [ID:304197159] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Italian) * MAJOR [ID:304197158] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Greek) * MAJOR [ID:304197157] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Danish) * MAJOR [ID:304197156] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304197155] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304197154] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Ukrainian) * MAJOR [ID:304197153] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Bulgarian) * MAJOR [ID:304197152] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Swedish) * MAJOR [ID:304197151] Office 2021 Version 16.0.19725.20172 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * MAJOR [ID:304197150] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Spanish) * MAJOR [ID:304197149] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Vietnamese) * MAJOR [ID:304197148] Office 365 Version 16.0.19725.20172 Available for Network Share for Office 365 - Current Channel - Office 365 * MAJOR [ID:304197147] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Finnish) * MAJOR [ID:304197146] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304197145] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304197144] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Serbian Latin) * MAJOR [ID:304197143] Office 2024 Version 16.0.19725.20172 Available - Current Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304197142] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Turkish) * MAJOR [ID:304197141] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Arabic) * MAJOR [ID:304197140] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Norwegian) * MAJOR [ID:304197139] Office 2021 Version 16.0.19725.20172 Available - Current Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304197138] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Hindi) * MAJOR [ID:304197137] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Thai) * MAJOR [ID:304197136] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Korean) * MAJOR [ID:304197135] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Russian) * MAJOR [ID:304197134] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (German) * MAJOR [ID:304197133] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Dutch) * MAJOR [ID:304197132] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Slovenian) * MAJOR [ID:304197131] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Hebrew) * MAJOR [ID:304197130] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Japanese) * MAJOR [ID:304197129] Office 365 Version 16.0.19725.20172 Available - Current Channel - Office 365 (Indonesian) * MAJOR [ID:304197128] Office 2024 Version 16.0.19725.20172 Available - Current Channel - Office 2024 Retail * MAJOR [ID:304191146] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304191145] Office 2021 Version 16.0.19127.20570 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304191144] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304191143] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304191142] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304191141] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304191140] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304191139] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304191138] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304191137] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304191136] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304191135] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304191134] Office 365 Version 16.0.19127.20570 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:304191133] Office 2024 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304191132] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304191131] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304191130] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304191129] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304191128] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304191127] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304191126] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304191125] Office 2024 Version 16.0.19127.20570 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304191124] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304191123] Office 2021 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304191122] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304191121] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304191120] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:304191119] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304191118] Office 2021 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304191117] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304191116] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304191115] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304191114] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304191113] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304191112] Office 2024 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304191111] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304191110] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304191109] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304191108] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304191107] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304191106] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:304191105] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304191104] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304191103] Office 365 Version 16.0.19127.20570 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304185132] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304185131] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304185130] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304185129] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304185128] Office 2021 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304185127] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304185126] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304185125] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304185124] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304185123] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304185122] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304185121] Office 2024 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304185120] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304185119] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304185118] Office 365 Version 16.0.18526.20726 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:304185117] Office 2021 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304185116] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304185115] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304185114] Office 2024 Version 16.0.18526.20726 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304185113] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304185112] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:304185111] Office 2021 Version 16.0.18526.20726 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304185110] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304185109] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304185108] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304185107] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:304185106] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304185105] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304185104] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304185103] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304185102] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304185101] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304185100] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304185099] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304185098] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304185097] Office 2024 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304185096] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304185095] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304185094] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304185093] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304185092] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304185091] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304185090] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304185089] Office 365 Version 16.0.18526.20726 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304179050] Office 2024 Version 16.0.17932.20700 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:304179049] Office 2024 Version 16.0.17932.20700 Available - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:304179048] Office 2024 Version 16.0.17932.20700 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304143006] Office 2021 Version 16.0.14334.20570 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304143005] Office 2021 Version 16.0.14334.20570 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:304143004] Office 2021 Version 16.0.14334.20570 Available - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:304104009] Office 2019 Version 16.0.10417.20108 Available - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:304104008] Office 2019 Version 16.0.10417.20108 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:304104007] Office 2019 Version 16.0.10417.20108 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) Modified: * MAJOR [ID:304104005] Office 2019 Version 16.0.10417.20097 Available - Perpetual Channel - Office 2019 (Update from Local Client Cache) * MAJOR [ID:304104006] Office 2019 Version 16.0.10417.20097 Available - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:304104004] Office 2019 Version 16.0.10417.20097 Available for Network Share for Office 2019 - Perpetual Channel - Office 2019 Volume Licensed * MAJOR [ID:304143003] Office 2021 Version 16.0.14334.20522 Available - Perpetual Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304143001] Office 2021 Version 16.0.14334.20522 Available - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:304143002] Office 2021 Version 16.0.14334.20522 Available for Network Share for Office 2021 - Perpetual Channel - Office 2021 Volume Licensed * MAJOR [ID:304185067] Office 2021 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304185045] Office 2021 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304185046] Office 2021 Version 16.0.18526.20714 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304191088] Office 2021 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304191070] Office 2021 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304191050] Office 2021 Version 16.0.19127.20532 Available for Network Share for Office 2021 - Semi-Annual Enterprise Channel - Office 2021 Retail * MAJOR [ID:304195091] Office 2021 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304195103] Office 2021 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:304195116] Office 2021 Version 16.0.19530.20226 Available for Network Share for Office 2021 - Monthly Enterprise Channel - Office 2021 Retail * MAJOR [ID:304196151] Office 2021 Version 16.0.19628.20204 Available - Current Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304196149] Office 2021 Version 16.0.19628.20204 Available - Current Channel - Office 2021 Retail * MAJOR [ID:304196138] Office 2021 Version 16.0.19628.20204 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * MAJOR [ID:304197089] Office 2021 Version 16.0.19725.20152 Available - Current Channel - Office 2021 (Update from Local Client Cache) * MAJOR [ID:304197120] Office 2021 Version 16.0.19725.20152 Available - Current Channel - Office 2021 Retail * MAJOR [ID:304197087] Office 2021 Version 16.0.19725.20152 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * MAJOR [ID:304179047] Office 2024 Version 16.0.17932.20670 Available - Perpetual Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304179046] Office 2024 Version 16.0.17932.20670 Available - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:304179045] Office 2024 Version 16.0.17932.20670 Available for Network Share for Office 2024 - Perpetual Channel - Office 2024 Volume Licensed * MAJOR [ID:304185080] Office 2024 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304185049] Office 2024 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304185047] Office 2024 Version 16.0.18526.20714 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304191064] Office 2024 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304191049] Office 2024 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304191083] Office 2024 Version 16.0.19127.20532 Available for Network Share for Office 2024 - Semi-Annual Enterprise Channel - Office 2024 Retail * MAJOR [ID:304195117] Office 2024 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304195111] Office 2024 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:304195098] Office 2024 Version 16.0.19530.20226 Available for Network Share for Office 2024 - Monthly Enterprise Channel - Office 2024 Retail * MAJOR [ID:304196152] Office 2024 Version 16.0.19628.20204 Available - Current Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304196137] Office 2024 Version 16.0.19628.20204 Available - Current Channel - Office 2024 Retail * MAJOR [ID:304196155] Office 2024 Version 16.0.19628.20204 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * MAJOR [ID:304197084] Office 2024 Version 16.0.19725.20152 Available - Current Channel - Office 2024 (Update from Local Client Cache) * MAJOR [ID:304197123] Office 2024 Version 16.0.19725.20152 Available - Current Channel - Office 2024 Retail * MAJOR [ID:304197100] Office 2024 Version 16.0.19725.20152 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * MAJOR [ID:304185058] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304185081] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304185054] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304185057] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304185070] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304185088] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304185076] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304185074] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304185079] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304185055] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304185050] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:304185051] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:304185085] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304185075] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304185056] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304185053] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304185068] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304185082] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304185059] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304185078] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304185052] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304185073] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304185083] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304185061] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304185066] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304185086] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304185060] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304185063] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304185087] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304185072] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304185065] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304185064] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304185062] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304185071] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304185077] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304185084] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304185069] Office 365 Version 16.0.18526.20714 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304185048] Office 365 Version 16.0.18526.20714 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:304191072] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304191045] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304191055] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304191068] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304191058] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304191080] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304191051] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304191059] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304191065] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304191079] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304191057] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (French) * MAJOR [ID:304191056] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (German) * MAJOR [ID:304191063] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304191061] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304191073] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304191067] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304191087] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304191082] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304191062] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304191081] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304191069] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304191078] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304191046] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304191076] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304191074] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304191075] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304191053] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304191048] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304191085] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304191054] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304191060] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304191071] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304191066] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304191077] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304191052] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304191047] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304191086] Office 365 Version 16.0.19127.20532 Available - Semi-Annual Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304191084] Office 365 Version 16.0.19127.20532 Available for Network Share for Office 365 - Semi-Annual Enterprise Channel - Office 365 * MAJOR [ID:304195104] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Arabic) * MAJOR [ID:304195092] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Bulgarian) * MAJOR [ID:304195102] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304195090] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304195099] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Czech) * MAJOR [ID:304195107] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Danish) * MAJOR [ID:304195089] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Dutch) * MAJOR [ID:304195124] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304195086] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (English (United States)) * MAJOR [ID:304195114] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Finnish) * MAJOR [ID:304195128] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (French) * MAJOR [ID:304195118] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (German) * MAJOR [ID:304195101] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Greek) * MAJOR [ID:304195115] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Hebrew) * MAJOR [ID:304195100] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Hindi) * MAJOR [ID:304195109] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Hungarian) * MAJOR [ID:304195125] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Indonesian) * MAJOR [ID:304195087] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Italian) * MAJOR [ID:304195123] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Japanese) * MAJOR [ID:304195126] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Korean) * MAJOR [ID:304195110] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Lithuanian) * MAJOR [ID:304195113] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Norwegian) * MAJOR [ID:304195106] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Polish) * MAJOR [ID:304195094] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304195122] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304195093] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Russian) * MAJOR [ID:304195095] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Serbian Latin) * MAJOR [ID:304195119] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Slovak) * MAJOR [ID:304195120] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Slovenian) * MAJOR [ID:304195121] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304195088] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Spanish) * MAJOR [ID:304195097] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Swedish) * MAJOR [ID:304195096] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Thai) * MAJOR [ID:304195085] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Turkish) * MAJOR [ID:304195112] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Ukrainian) * MAJOR [ID:304195127] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304195108] Office 365 Version 16.0.19530.20226 Available - Monthly Enterprise Channel - Office 365 (Vietnamese) * MAJOR [ID:304195105] Office 365 Version 16.0.19530.20226 Available for Network Share for Office 365 - Monthly Enterprise Channel - Office 365 * MAJOR [ID:304196132] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Arabic) * MAJOR [ID:304196175] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Bulgarian) * MAJOR [ID:304196171] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304196168] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304196166] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Czech) * MAJOR [ID:304196154] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Danish) * MAJOR [ID:304196147] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Dutch) * MAJOR [ID:304196159] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304196161] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (English (United States)) * MAJOR [ID:304196165] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Finnish) * MAJOR [ID:304196157] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (French) * MAJOR [ID:304196167] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (German) * MAJOR [ID:304196172] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Greek) * MAJOR [ID:304196174] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Hebrew) * MAJOR [ID:304196139] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Hindi) * MAJOR [ID:304196146] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Hungarian) * MAJOR [ID:304196134] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Indonesian) * MAJOR [ID:304196140] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Italian) * MAJOR [ID:304196141] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Japanese) * MAJOR [ID:304196144] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Korean) * MAJOR [ID:304196164] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Lithuanian) * MAJOR [ID:304196158] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Norwegian) * MAJOR [ID:304196162] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Polish) * MAJOR [ID:304196145] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304196163] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304196136] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Russian) * MAJOR [ID:304196160] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Serbian Latin) * MAJOR [ID:304196173] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Slovak) * MAJOR [ID:304196148] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Slovenian) * MAJOR [ID:304196133] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304196150] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Spanish) * MAJOR [ID:304196142] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Swedish) * MAJOR [ID:304196156] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Thai) * MAJOR [ID:304196170] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Turkish) * MAJOR [ID:304196143] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Ukrainian) * MAJOR [ID:304196169] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304196153] Office 365 Version 16.0.19628.20204 Available - Current Channel - Office 365 (Vietnamese) * MAJOR [ID:304196135] Office 365 Version 16.0.19628.20204 Available for Network Share for Office 365 - Current Channel - Office 365 * MAJOR [ID:304197111] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Arabic) * MAJOR [ID:304197124] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Bulgarian) * MAJOR [ID:304197095] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Chinese (Simplified)) * MAJOR [ID:304197110] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Chinese (Traditional)) * MAJOR [ID:304197104] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Czech) * MAJOR [ID:304197101] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Danish) * MAJOR [ID:304197102] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Dutch) * MAJOR [ID:304197093] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (English (United Kingdom)) * MAJOR [ID:304197098] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (English (United States)) * MAJOR [ID:304197112] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Finnish) * MAJOR [ID:304197106] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (French) * MAJOR [ID:304197086] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (German) * MAJOR [ID:304197091] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Greek) * MAJOR [ID:304197127] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hebrew) * MAJOR [ID:304197108] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hindi) * MAJOR [ID:304197122] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Hungarian) * MAJOR [ID:304197118] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Indonesian) * MAJOR [ID:304197088] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Italian) * MAJOR [ID:304197092] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Japanese) * MAJOR [ID:304197107] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Korean) * MAJOR [ID:304197115] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Lithuanian) * MAJOR [ID:304197085] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Norwegian) * MAJOR [ID:304197116] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Polish) * MAJOR [ID:304197090] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Portugese (Portugal)) * MAJOR [ID:304197113] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * MAJOR [ID:304197125] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Russian) * MAJOR [ID:304197103] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Serbian Latin) * MAJOR [ID:304197117] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Slovak) * MAJOR [ID:304197109] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Slovenian) * MAJOR [ID:304197094] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Spanish (Mexico)) * MAJOR [ID:304197119] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Spanish) * MAJOR [ID:304197126] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Swedish) * MAJOR [ID:304197121] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Thai) * MAJOR [ID:304197096] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Turkish) * MAJOR [ID:304197114] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Ukrainian) * MAJOR [ID:304197105] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Update from Local Client Cache) * MAJOR [ID:304197097] Office 365 Version 16.0.19725.20152 Available - Current Channel - Office 365 (Vietnamese) * MAJOR [ID:304197099] Office 365 Version 16.0.19725.20152 Available for Network Share for Office 365 - Current Channel - Office 365 Reason for Update: * New update for the below channels * Current Channel * Monthly Enterprise Channel * Semi-Annual Enterprise Channel (Preview) * Semi-Annual Enterprise Channel Additional Notes : * None. Actions to Take: None Published site version: Site Name: Patches for Windows Version: 4687 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 11 05:18:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Mar 2026 07:18:58 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-11 Message-ID: Site published. Version **2456** -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 11 08:51:13 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 11 Mar 2026 21:21:13 +0530 Subject: [BESAdmin-Announcements] BigFix Inventory: Catalog 20260308 Update published 2026-03-11 Message-ID: BigFix Inventory Team is proud to announce the new version of BigFix Inventory Catalog. Product: BigFix Inventory Catalog update 20260308. Published site version: BigFix Inventory Discovery - version 37 Features: Key updates in HCL BigFix Inventory Catalog 20260308: - Discovery of 230+ new software versions including but not limited to the following software manufacturers like Anthropic, AutoDesk, Cisco, Citrix, Hewlett-Packard, Micro Focus, Microsoft, Open Text, OpenAI & Oracle. - Provided discovery for AI desktop applications like ?Claude?, ?ChatGPT? and ?LM Studio?. - Delivered Ideas BFINV-I-487 , BFINV-I-498 , BFINV-I-499 - Added 11 new Publishers ?1099Express.com ?, ?Anthropic?, ?Databricks?, ?Disig a.s.? ,?DITEC, a.s.?, ?LM Studio?, ?Malvern Panalytical?, ?Nielsen Consumer LLC?, ?OpenAI?, ?SETCCE? , ?Simba Technologies? to the Catalog. - Optimization for Catalog processing by removing old software signatures from BigFix Inventory main Catalog. Deleted 5+ signatures - New bundle definitions for the BigFix Platform Agent to the BigFix Platform product have been incorporated. For previously discovered SWID tags, the bundling information will appear after some time. Review release notes for details. To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20260308-ReleaseNotes.pdf To view the complete catalog content, use the Software Components report in BigFix Inventory. Actions needed: To apply new discovery capability, run the Server Software Catalog Update Fixlet ( BigFix Inventory Discovery site) from the BigFix console and then wait for the next data import. For more information about how to install, maintain, and use BigFix Inventory application, refer to the user documentation: BigFix 11 Inventory Documentation To find out more about Catalog Updates, visit: Catalog Overview We hope you find this latest release of BigFix Inventory Catalog content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 07:09:20 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 10:09:20 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 2016 with bugfixes, published 2026-03-11 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 2016* with bug fixes. *Security Benchmark:* CIS Microsoft Windows Server 2016 Benchmark, V3.0.0 *Published Sites:* CIS Checklist for Windows 2016 DC, site version 21 (The site version is provided for air-gap customers.) *Details:* *Modified measured value relevance for the checks below:* ? (L1) Configure ?Accounts: Rename administrator account? ? (L1) Configure ?Accounts: Rename guest account? *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 07:11:41 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 10:11:41 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 2019 with bugfixes, published 2026-03-11 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 2019* with bug fixes. *Security Benchmark:* CIS Microsoft Windows Server 2019 Benchmark, V4.0.0 *Published Sites:* CIS Checklist for Windows Server 2019 DC, site version 29 (The site version is provided for air-gap customers.) *Details:* *Modified measured value relevance for the checks below:* ? (L1) Configure ?Accounts: Rename administrator account? ? (L1) Configure ?Accounts: Rename guest account? *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 07:14:34 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 10:14:34 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 2022 with bugfixes, published 2026-03-11 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 2022* with bug fixes. *Security Benchmark:* CIS Microsoft Windows Server 2022 Benchmark, V4.0.0 *Published Sites:* CIS Checklist for Windows 2022 DC, site version 14 (The site version is provided for air-gap customers.) *Details:* *Modified measured value relevance for the checks below:* ? (L1) Configure ?Accounts: Rename administrator account? ? (L1) Configure ?Accounts: Rename guest account? *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 07:16:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 09:16:08 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-12 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:507947103] 5079471: Safe OS Dynamic Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5079471 (arm64) * Major [ID:507947101] 5079471: Safe OS Dynamic Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5079471 (x64) * Major [ID:507888403] 5078884: Dynamic Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5078884 (x64) * Major [ID:507888401] 5078884: Dynamic Update for Windows 10 Version 21H2 - Windows 10 Version 21H2 - KB5078884 * Major [ID:507888203] 5078882: Safe OS Dynamic Update for Windows 11 Version 23H2 for ARM64 - Windows 11 Version 23H2 - KB5078882 (arm64) * Major [ID:507888201] 5078882: Safe OS Dynamic Update for Windows 11 Version 23H2 - Windows 11 Version 23H2 - KB5078882 (x64) * Major [ID:507882201] 5078822: Dynamic Update for Microsoft server operating system version 21H2 - Windows Server 2022 - KB5078822 (x64) * Major [ID:507880503] 5078805: Dynamic Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5078805 (x64) * Major [ID:507880501] 5078805: Dynamic Update for Windows 10 Version 1809 - Windows 10 Version 1809 LTSC - KB5078805 * Major [ID:507880103] 5078801: Dynamic Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5078801 (x64) * Major [ID:507880101] 5078801: Dynamic Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB5078801 * Major [ID:507879401] 5078794: Safe OS Dynamic Update for Microsoft server operating system version 24H2 - Windows Server 2025 - KB5078794 (x64) * Major [ID:507878501] 5078785: Safe OS Dynamic Update for Windows Server, version 23H2 - Windows Server version 23H2 - KB5078785 (x64) Modified: * Major [ID:1861101] SQL ODBC Driver for SQL Server - 18.6.1.1 (x64) * Major [ID:1861103] SQL ODBC Driver for SQL Server - 18.6.1.1 * Major [ID:405262303] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 (x64) * Major [ID:405262302] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 Reason for Update: * New dynamic updates from Microsoft. * Category has been modified for SQL ODBC fixlets. * Source Release date has been updated for Microsoft Defender fixlets. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4688 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 07:44:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 09:44:07 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-12 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 6101842 Mozilla Thunderbird 148.0.1 Available * 5058829 Zoom (x64) 6.7.8.32670 Available Modified : * 14011766 Google Chrome 146.0.7680.72 Available * 14011764 Google Chrome 145.0.7632.160 Available (Superseded) * 5058755 Zoom (x64) 6.7.5.30439 Available (Superseded) Reason : * New update for Zoom and thunderbird * Added CVE details for Chrome and superseded previous update. Important Note: * None Published Site Version: * Updates for Windows Applications, Version: 2457 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 08:54:24 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 10:54:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-12 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 37 Total Fixlets in Site: 549 Release Date: 2026-03-12 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 59700101 Epic Games Launcher (MSI) v1.3.175.0 63300101 Altova MissionKit v2026.00.00.01 64900101 Sigil v2.7.5 84600201 GCompris Educational Software (EXE) v26.1 901901 AWS Command Line Interface v2 v2.34.7.0 5603601 Windows Defender Virus Definitions v1.445.483.0 2100501 ShareFile v26.3.1 21800101 PDF-Over v4.4.8 55000101 HeidiSQL v12.16.0.7229 64200101 LLVM v22.1.1 7000101 Opera Stable v128.0.5807.66 5100201 KeePassXC v2.7.12 7800101 Podman v5.8.1 79000101 Datadog Agent v7.76.3.0 81000101 UVtools v6.0.0 84600101 gcompris (MSI) v26.1 9800101 Camtasia v26.0.4 5604801 SQL Server Management Studio 22 v22.3.3 5700801 MongoDB Compass v1.49.4.0 5602501 Microsoft Visual Studio Code x64 v1.111.0 23500101 PhraseExpress v18.0.65 2700101 Remote Desktop Manager Enterprise v2026.1.11.0 60300101 kdenlive v25.12.3 6300101 Nextcloud v4.0.7.20260310 67900101 SteelSeries GG v106.0.0 4100301 Google Drive v122.0.1.0 19600101 VSCodium (x64) v1.110.11631 17200101 Axure RP v11.0.0.4137 2800101 Docker Desktop v4.64.0 29600101 Vim v9.2.0136 52000101 Coder v2.31.4.0 6500201 Node.js v25.8.1 71600101 GitHub Desktop v3.5.6.0 74400101 Ekahau v11.8.10 8400101 Royal TS v7.04.50306.0 2100601 XenCenter v26.1.0 43803901 Cryptomator (MSI) v1.19.0.6266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 09:22:56 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 11:22:56 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-12 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 15 Total Fixlets in Site: 216 Release Date: 2026-03-12 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 85000101 Notion v7.7.1 81000201 UVtools (arm64) v6.0.0 67900201 SteelSeries GG (Intel)) v106.0.0 2800201 Docker v4.64.0 22400201 Koodo Reader (Intel) v2.3.0 23500201 PhraseExpress v7.0.38 43800201 Cryptomator (Intel) v1.19.0 22400301 Koodo Reader (arm64) v2.3.0 43800301 Cryptomator (arm64) v1.19.0 5100301 KeePassXC (Intel) v2.7.12 6300201 Nextcloud v4.0.7 5100401 KeePassXC (arm64) v2.7.12 64900301 Sigil (arm64) v2.7.5 81000301 UVtools (Intel) v6.0.0 4100701 Google Drive v121.0.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 09:33:43 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 11:33:43 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-12 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 17 Total Fixlets in Site: 123 Release Date: 2026-03-12 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 4101601 google-chrome-stable (rpm) v146.0.7680.71 2800101 docker-desktop (deb) v4.64.0 71600101 GitHub_CLI (deb) v2.88.0 84900101 brave-browser (deb) v1.88.127 86200101 discord (deb) v0.0.128 2800201 docker-desktop (rpm) v4.64.0 71600201 GitHub_CLI (deb) v2.88.0 84900201 brave-browser (rpm) v1.88.127 86300101 1password (deb) v8.12.8 71600301 GitHub_CLI (rpm) v2.88.0 86300201 1password (rpm) v8.12.8 86600101 mongodb-compass (deb) v1.49.4 71600401 GitHub_CLI (rpm) v2.88.0 22400501 koodo-reader (deb) v2.3.0 6700501 obs-studio (deb) v32.1.0 22400601 koodo-reader (rpm) v2.3.0 4101501 google-chrome-stable (deb) v146.0.7680.71 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 12 13:17:28 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 12 Mar 2026 16:17:28 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-12 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat DC 25.001.21288 (Continuous Track) Available - Mac OS X (ID: 10152248) Adobe Acrobat Reader DC 25.001.21288 (Continuous Track) Available - Mac OS X (ID: 10152249) Google Chrome 146.0.7680.72 Available - Mac OS X (ID: 83000248) Mozilla Firefox 148.0.2 Available - Mac OS X (ID: 20750315) Microsoft Office for Mac 2019 - Outlook 16.107.0 Available (ID: 19000671) Microsoft Office for Mac 2019 - Excel 16.107.0 Available (ID: 19000672) Microsoft Office for Mac 2019 - OneNote 16.107.0 Available (ID: 19000673) Microsoft Office for Mac 2019 - PowerPoint 16.107.0 Available (ID: 19000674) Microsoft Office for Mac 2019 - Word 16.107.0 Available (ID: 19000675) Published site version: Updates for Mac Applications, version 833. Reasons for Update: A newer version of Adobe, Chrome, Firefox, MS Office for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 05:04:13 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Mar 2026 08:04:13 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6159-1 - Imagemagick Security Update - Debian 12 (amd64) (ID: 61590101) * DSA-6160-1 - Netty Security Update - Debian 12 (amd64) (ID: 61600101) Published Site Version: * Patches for Debian 12, version 161. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 05:13:17 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Mar 2026 08:13:17 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2023:5264 - Virt:Rhel and Virt-Devel:Rhel Security and Bug Fix Update - RockyLinux 8 x86_64 (ID: 23526401) * RLSA-2026:3938 - Nfs-Utils Security Update - RockyLinux 8 x86_64 (ID: 26393801) * RLSA-2026:3967 - Libvpx Security Update - RockyLinux 8 x86_64 (ID: 26396701) * RLSA-2026:3985 - Git-Lfs Security Update - RockyLinux 8 x86_64 (ID: 26398501) * RLSA-2026:4024 - Postgresql:13 Security Update - RockyLinux 8 x86_64 (ID: 26402401) * RLSA-2026:4059 - Postgresql:15 Security Update - RockyLinux 8 x86_64 (ID: 26405901) * RLSA-2026:4063 - Postgresql:16 Security Update - RockyLinux 8 x86_64 (ID: 26406301) * RLSA-2026:4064 - Postgresql:12 Security Update - RockyLinux 8 x86_64 (ID: 26406401) * RLSA-2026:4146 - Python-Pyasn1 Security Update - RockyLinux 8 x86_64 (ID: 26414601) Published Site Version: * Patches for Rocky Linux 8, version 107. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 05:19:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Mar 2026 08:19:15 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:3730 - Postgresql Security Update - RockyLinux 9 x86_64 (ID: 26373001) * RLSA-2026:3842 - Delve Security Update - RockyLinux 9 x86_64 (ID: 26384201) * RLSA-2026:3928 - Git-Lfs Security Update - RockyLinux 9 x86_64 (ID: 26392801) * RLSA-2026:3940 - Nfs-Utils Security Update - RockyLinux 9 x86_64 (ID: 26394001) * RLSA-2026:4110 - Postgresql:16 Security Update - RockyLinux 9 x86_64 (ID: 26411001) * RLSA-2026:4165 - Python3.12 Security Update - RockyLinux 9 x86_64 (ID: 26416501) * RLSA-2026:4168 - Python3.9 Security Update - RockyLinux 9 x86_64 (ID: 26416801) * RLSA-2026:4173 - Gimp Security Update - RockyLinux 9 x86_64 (ID: 26417301) * RLSA-2026:4177 - Opentelemetry-Collector Security Update - RockyLinux 9 x86_64 (ID: 26417701) * RLSA-2026:4188 - Gnutls Security Update - RockyLinux 9 x86_64 (ID: 26418801) * RLSA-2026:4235 - Nginx:1.26 Security Update - RockyLinux 9 x86_64 (ID: 26423501) Published Site Version: * Patches for Rocky Linux 9, version 90. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 05:22:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 13 Mar 2026 08:22:36 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260309 - SUSE-SU-2026:0852-1 - Security update for ImageMagick - leap15.6 - (x86-64) (ID: 26030901) * 260310 - SUSE-SU-2026:0858-1 - Security update for python-aiohttp - leap15.6 - (x86-64) (ID: 26031001) * 260311 - SUSE-RU-2026:0863-1 - Recommended update for openldap2 - leap15.6 - (x86-64) (ID: 26031101) * 260311 - SUSE-RU-2026:0867-1 - Recommended update for libvirt - leap15.6 - (x86-64) (ID: 26031102) * 260311 - SUSE-SU-2026:0860-1 - Security update for python-maturin - leap15.6 - (x86-64) (ID: 26031103) Published Site Version: * Patches for openSUSE Leap 15, version 137. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 08:29:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 10:29:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2026-03-13 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: IBM DB2 v12.1.4.0 (Scanner based) - Linux - Update: IBM DB2 v12.1.4.0 (Scanner based) - AIX - Update: RedHat JBoss EAP v8.0.12 (Scanner based) - linux (x64) - Update: RedHat JBoss EAP v8.0.12 (Scanner based) - solaris - Update: RedHat JBoss EAP v8.0.12 (Scanner based) - AIX - Update: IBM MQ v9.2.0.41 - AIX - Update: IBM MQ v9.3.0.37 - AIX - Update: IBM MQ v9.2.0.41 - RHEL Family - Update: IBM MQ v9.3.0.37 - RHEL Family - Update: IBM MQ v9.4.0.20 - RHEL Family - Update: IBM MQ v9.4.0.20 - AIX ## Modified Items: - Update: IBM DB2 v12.1.3.0 (Scanner based) - Linux (Superseded) - Update: IBM DB2 v12.1.3.0 (Scanner based) - AIX (Superseded) - Update: RedHat JBoss EAP v8.0.11 (Scanner based) - linux (x64) (Superseded) - Update: RedHat JBoss EAP v8.0.11 (Scanner based) - solaris (Superseded) - Update: RedHat JBoss EAP v8.0.11 (Scanner based) - AIX (Superseded) - Update: IBM MQ v9.2.0.40 - AIX (Superseded) - Update: IBM MQ v9.3.0.36 - AIX (Superseded) - Update: IBM MQ v9.2.0.40 - RHEL Family (Superseded) - Update: IBM MQ v9.3.0.36 - RHEL Family (Superseded) - Update: IBM MQ v9.4.0.17 - RHEL Family (Superseded) - Update: IBM MQ v9.4.0.17 - AIX (Superseded) ## Deleted Items: - 57400807 IBM-MQ-Fixpack-AIX-Update - 57400907 IBM-MQ-Fixpack-AIX-Update - 57401107 IBM-MQ-Fixpack-RHEL-Update - 57401207 IBM-MQ-Fixpack-RHEL-Update - 57402201 IBM-MQ-Fixpack-RHEL-Update - 57402301 IBM-MQ-Fixpack-AIX-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v99 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 08:43:03 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 10:43:03 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2026-03-13 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: RedHat JBoss EAP v8.0.12 (Scanner based) - Windows (x64) - Update: IBM MQ v9.2.0.41 - Windows (x64) - Update: IBM MQ v9.3.0.37 - Windows (x64) - Update: IBM MQ v9.4.0.20 - Windows (x64) ## Modified Items: - Update: RedHat JBoss EAP v8.0.11 (Scanner based) - Windows (x64) (Superseded) - Update: IBM MQ v9.2.0.40 - Windows (x64) (Superseded) - Update: IBM MQ v9.3.0.36 - Windows (x64) (Superseded) - Update: IBM MQ v9.4.0.17 - Windows (x64) (Superseded) ## Deleted Items: - 57401307 IBM-MQ-Fixpack-Windows-Update - 57401407 IBM-MQ-Fixpack-Windows-Update - 57402101 IBM-MQ-Fixpack-Windows-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v73 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 10:16:01 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 12:16:01 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-13 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011768 Google Chrome 146.0.7680.76 Available * 9103005 Adobe Acrobat 2024.001.30356 Available - Adobe Acrobat - Classic Track (x64) * 5058864 .NET Desktop Runtime (x64) 10.0.5 Available * 5058862 .NET Desktop Runtime 10.0.5 Available * 5058860 .NET Runtime (x64) 10.0.5 Available * 5058858 .NET Runtime 10.0.5 Available * 5058868 ASP .NET Core Hosting Bundle Runtime 10.0.5 Available * 5058831 ASP .NET Core Runtime (x64) 10.0.5 Available * 5058866 ASP .NET Core Runtime 10.0.5 Available * 5058835 .NET SDK (x64) 10.0.105 Available * 5058833 .NET SDK 10.0.105 Available * 5058839 .NET SDK 10.0.201 Available * 5058837 .NET SDK (x64) 10.0.201 Available Modified: * 14011766 Google Chrome 146.0.7680.72 Available (Superseded) * 9103003 Adobe Acrobat 2024.001.30307 Available - Adobe Acrobat - Classic Track (x64) (Superseded) Reason for Update: * New updates Adobe Acrobat, Chrome, .NET Core and .NET SDK. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2458 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 10:34:38 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 18:34:38 +0100 Subject: [BESAdmin-Announcements] Deprecation of Dynamic Bandwidth Throttling Message-ID: The BigFix team has made the decision to deprecate the Dynamic Bandwidth Throttling feature in the BigFix Platform. In complex and varied networking environments, which is increasingly frequent nowadays, dynamic bandwidth calculations are not always reliable or even predictable. Because of this, enabling dynamic throttling in BigFix may lead to unexpected results. Dynamic throttling usage within BigFix has been discouraged for a long time, in favor of Static Throttling. Also with the advent of features like PeerNest, that is being improved release after release for efficiency and reliability, bandwidth needs are better managed, and we think Dynamic Bandwidth Throttling is no longer a relevant feature for the product. Because of the above, the fixlets to configure Dynamic Bandwidth Throttling will be removed from BES Support site shortly, and the product documentation updated. If you want to report any feedback on this, please reach out directly to alessandro.dinia at hcl-software.com. Thank you -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 11:14:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 13:14:09 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-13 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:50725337] 5072533: Feature Pack for Microsoft Visual Studio 2026 version 18.4.0 - KB5072533 * Major [ID:507789601] 5077896: SQL Server 2025 RTM Cumulative Update (CU) 3 - SQL Server 2025 - KB5077896 (x64) * Major [ID:508099901] 5080999: SQL Server 2022 RTM Cumulative Update (CU) 24 - SQL Server 2022 - KB5080999 (x64) Reason for Update: * New updates for Visual Studio and SQL Server. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4689 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 13 15:01:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 13 Mar 2026 17:01:15 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-13 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 585 Total Deleted Fixlets: 0 Total Fixlets in Site: 3322 Total CVEs Covered: 973 Release Date: 2026-03-12 New Fixlets: Updated Fixlets: New Content Feature 41120 Apple Multiple Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2026-20700) New Content Feature 39230 Android Runtime Use-After-Free Vulnerability - Any Current Service Pack of Android (CVE-2025-48543) New Content Feature 37340 VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability - Any Version of MacOS (CVE-2025-22226) kev_version_checks Changed - 1 - 1 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows (CVE-2019-13720) New Content Feature 19370 Adobe Acrobat and Reader Unspecified Vulnerability - Any Version of MacOS (CVE-2008-0655) New Content Feature 19500 Adobe Flash Player and AIR Use-After-Free Vulnerability - Any Version of MacOS (CVE-2016-0984) kev_version_checks Changed - 2 - 2 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2022-4135) kev_version_checks Changed - 1 - 1 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2022-4135) New Content Feature 25960 Apple iOS and iPadOS Buffer Overflow Vulnerability - Apple iOS (CVE-2021-30983) New Content Feature 15050 Microsoft Office Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2009-0563) kev_required_patches Changed - 6 - 6 40900 Microsoft Windows Information Disclosure Vulnerability - Windows 10 (CVE-2026-20805) New Content Feature 20170 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2012-4681) New Content Feature 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS (CVE-2017-5030) New Content Feature 26160 Apple macOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2022-22675) New Content Feature 34410 Apple Multiple Products WebKit Memory Corruption Vulnerability - Mac 12+ (CVE-2023-42917) kev_version_checks Changed - 1 - 1 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows (CVE-2018-6065) New Content Feature 25470 Apple Multiple Products WebKit Memory Corruption Vulnerability - Any Version of MacOS (CVE-2023-32435) New Content Feature 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2024-5274) New Content Feature 19560 Apache CouchDB Insecure Default Initialization of Resource Vulnerability - Any Version of MacOS (CVE-2022-24706) New Content Feature 40770 Apple Multiple Products Use-After-Free WebKit Vulnerability - Apple iOS (CVE-2025-43529) New Content Feature 40100 Apple Multiple Products Unspecified Vulnerability - Apple iOS (CVE-2022-48503) New Content Feature 32520 Adobe Flash Player Code Execution Vulnerability - Any Version of MacOS (CVE-2013-0648) New Content Feature 14980 Microsoft PowerPoint Memory Corruption Vulnerability - Any Version of MacOS (CVE-2015-2424) New Content Feature 24130 WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2022-2294) kev_required_patches Changed - 2 - 2 38530 Linux Kernel Out-of-Bounds Read Vulnerability - RHEL (CVE-2024-53150) kev_version_checks Changed - 4 - 4 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows (CVE-2016-9079) New Content Feature 25440 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS (CVE-2018-4344) kev_version_checks Changed - 1 - 1 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-37973) New Content Feature 39970 Apple Multiple Products Unspecified Vulnerability - Any Version of MacOS (CVE-2022-48503) New Content Feature 27200 Apple Multiple Products WebKit Code Execution Vulnerability - Apple iOS (CVE-2023-41993) New Content Feature 27250 Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability - Apple iOS (CVE-2023-41061) kev_version_checks Changed - 4 - 4 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux (CVE-2016-9079) New Content Feature 27550 Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability - Any Current Service Pack of Android (CVE-2020-0069) New Content Feature 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS (CVE-2024-9680) New Content Feature 20560 Apple macOS Use-After-Free Vulnerability - Any Version of MacOS (CVE-2019-8526) kev_version_checks Changed - 1 - 1 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-4102) New Content Feature 20450 Adobe Flash Player Memory Corruption Vulnerability - Any Version of MacOS (CVE-2012-2034) New Content Feature 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS (CVE-2021-21220) New Content Feature 34550 Apple Multiple Products Kernel Unspecified Vulnerability - Mac 12+ (CVE-2023-38606) kev_version_checks Changed - 2 - 2 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux (CVE-2019-5786) kev_version_checks Changed - 6 - 6 18110 Grafana Authentication Bypass Vulnerability - Any Version of Linux (CVE-2021-39226) New Content Feature 13190 Apple iOS and macOS Group Facetime Vulnerability - Any Version of MacOS (CVE-2019-6223) New Content Feature 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS (CVE-2019-5786) New Content Feature 27000 MinIO Security Feature Bypass Vulnerability - Any Version of MacOS (CVE-2023-28434) New Content Feature 27240 Apple Multiple Products Kernel Privilege Escalation Vulnerability - Apple iOS (CVE-2023-41992) kev_version_checks Changed - 2 - 2 41580 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Windows (CVE-2026-2441) New Content Feature 32160 ImageMagick Improper Input Validation Vulnerability - Any Version of MacOS (CVE-2016-3714) New Content Feature 25110 Apple OS X Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2014-4404) New Content Feature 20590 Microsoft Office Outlook Security Feature Bypass Vulnerability - Any Version of MacOS (CVE-2017-11774) New Content Feature 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS (CVE-2019-11707) kev_required_patches Changed - 6 - 6 41320 Microsoft Windows Improper Privilege Management Vulnerability - Windows 10 (CVE-2026-21533) New Content Feature 19820 Adobe Flash Player ASLR Bypass Vulnerability - Any Version of MacOS (CVE-2015-0310) New Content Feature 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2020-15999) kev_version_checks Changed - 4 - 4 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2023-5217) kev_version_checks Changed - 2 - 2 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux (CVE-2022-0609) kev_version_checks Changed - 1 - 1 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows (CVE-2022-0609) kev_version_checks Changed - 1 - 1 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2020-15999) New Content Feature 26220 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2021-30883) New Content Feature 20750 Adobe Reader and Acrobat Arbitrary Integer Overflow Vulnerability - Any Version of MacOS (CVE-2013-2729) New Content Feature 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS (CVE-2024-0519) New Content Feature 38850 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2025-6554) New Content Feature 26030 Apple iOS, iPadOS, and watchOS Memory Corruption Vulnerability - Apple iOS (CVE-2020-9819) New Content Feature 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2022-4262) kev_version_checks Changed - 3 - 3 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux (CVE-2013-1675) New Content Feature 34340 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ (CVE-2022-48618) New Content Feature 26780 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2023-35674) New Content Feature 13210 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS (CVE-2021-30807) New Content Feature 25950 Apple Multiple Products Race Condition Vulnerability - Apple iOS (CVE-2021-1782) New Content Feature 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS (CVE-2020-16013) kev_version_checks Changed - 1 - 1 40560 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2025-13223) kev_version_checks Changed - 1 - 1 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows (CVE-2018-17463) kev_version_checks Changed - 2 - 2 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux (CVE-2022-3038) New Content Feature 20390 Adobe Flash Player Dereferenced Pointer Vulnerability - Any Version of MacOS (CVE-2014-8439) kev_required_patches Changed - 5 - 5 40740 Microsoft Windows Use After Free Vulnerability - Windows 10 (CVE-2025-62221) New Content Feature 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-21193) kev_required_patches Changed - 1 - 1 38720 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 R2 (CVE-2025-33053) New Content Feature 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS (CVE-2020-6572) New Content Feature 30110 Apple Multiple Products WebKit Integer Overflow Vulnerability - Apple iOS (CVE-2021-30663) New Content Feature 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS (CVE-2020-6819) kev_version_checks Changed - 1 - 1 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-30554) kev_version_checks Changed - 4 - 4 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows (CVE-2013-1690) kev_required_patches Changed - 6 - 6 41340 Microsoft Windows Type Confusion Vulnerability - Windows 10 (CVE-2026-21519) New Content Feature 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS (CVE-2019-17026) New Content Feature 25930 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2018-4344) New Content Feature 26000 Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability - Apple iOS (CVE-2021-31010) kev_version_checks Changed - 2 - 2 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux (CVE-2018-17480) New Content Feature 32530 Adobe Flash Player Integer Underflow Vulnerablity - Any Version of MacOS (CVE-2014-0497) kev_version_checks Changed - 2 - 2 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux (CVE-2020-16013) New Content Feature 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS (CVE-2020-6820) kev_required_patches Changed - 1 - 1 38730 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 (CVE-2025-33053) kev_version_checks Changed - 1 - 1 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows (CVE-2020-16017) New Content Feature 19710 Adobe Acrobat and Reader Double Free Vulnerability - Any Version of MacOS (CVE-2018-4990) New Content Feature 34380 Apple Multiple Products Integer Overflow Vulnerability - Mac 12+ (CVE-2023-32434) New Content Feature 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-37975) New Content Feature 26180 Apple iOS, iPadOS, and watchOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2020-9818) New Content Feature 22860 Microsoft Office Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2013-1331) New Content Feature 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2021-30551) New Content Feature 29640 Android Pixel Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2024-29748) New Content Feature 19380 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-28550) New Content Feature 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS (CVE-2019-18426) New Content Feature 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2021-30632) kev_required_patches Changed - 1 - 1 41240 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2012 R2 (CVE-2026-21513) New Content Feature 26040 Apple Multiple Products Type Confusion Vulnerability - Apple iOS (CVE-2020-27932) New Content Feature 26080 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2022-32893) kev_required_patches Changed - 2 - 2 28930 Linux Kernel Use-After-Free Vulnerability - RHEL (CVE-2023-0266) kev_version_checks Changed - 2 - 2 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux (CVE-2025-4664) New Content Feature 20700 Adobe Flash Player Memory Corruption Vulnerability - Any Version of MacOS (CVE-2012-0754) New Content Feature 20620 Microsoft Excel Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2019-1297) kev_required_patches Changed - 2 - 2 36810 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Debian (CVE-2025-24201) New Content Feature 39260 Meta Platforms WhatsApp Incorrect Authorization Vulnerability - Any Version of MacOS (CVE-2025-55177) New Content Feature 20210 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2011-0611) New Content Feature 26720 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2023-20963) kev_version_checks Changed - 2 - 2 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux (CVE-2021-30533) kev_version_checks Changed - 1 - 1 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows (CVE-2024-4671) New Content Feature 13240 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS (CVE-2020-9859) New Content Feature 19690 TIBCO JasperReports Server Information Disclosure Vulnerability - Any Version of MacOS (CVE-2018-5430) New Content Feature 25520 Apple Multiple Products WebKit Type Confusion Vulnerability - Any Version of MacOS (CVE-2023-32439) kev_version_checks Changed - 2 - 2 18270 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of Linux (CVE-2016-3715) New Content Feature 25980 Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability - Apple iOS (CVE-2021-1871) kev_required_patches Changed - 1 - 1 40300 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2012 R2 (CVE-2025-59287) New Content Feature 20000 Oracle Java SE Unspecified Vulnerability - Any Version of MacOS (CVE-2013-2465) New Content Feature 19470 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2016-7892) New Content Feature 19680 Apple Multiple Products WebKit Use-After-Free Vulnerability - Any Version of MacOS (CVE-2023-28205) New Content Feature 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2023-2033) kev_version_checks Changed - 1 - 1 38830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2025-6554) New Content Feature 20240 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2016-4171) kev_version_checks Changed - 3 - 3 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux (CVE-2020-6819) kev_version_checks Changed - 1 - 1 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2020-6418) New Content Feature 20550 Oracle Java SE Integrity Check Vulnerability - Any Version of MacOS (CVE-2015-4902) New Content Feature 27060 Ignite Realtime Openfire Path Traversal Vulnerability - Any Version of MacOS (CVE-2023-32315) New Content Feature 25800 Apple Multiple Products WebKit Memory Corruption Vulnerability - Apple iOS (CVE-2021-30665) New Content Feature 25850 Apple OS X Heap-Based Buffer Overflow Vulnerability - Apple iOS (CVE-2014-4404) kev_version_checks Changed - 2 - 2 40570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2025-13223) New Content Feature 28520 Apple Multiple Products WebKit Type Confusion Vulnerability - Any Version of MacOS (CVE-2024-23222) kev_version_checks Changed - 1 - 1 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows (CVE-2016-5198) kev_required_patches Changed - 6 - 6 37090 HTTP/2 Rapid Reset Attack Vulnerability - Debian (CVE-2023-44487) New Content Feature 27220 Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability - Apple iOS (CVE-2023-42824) kev_version_checks Changed - 1 - 1 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows (CVE-2020-16013) kev_required_patches Changed - 1 - 1 41260 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2012 R2 (CVE-2026-21525) kev_version_checks Changed - 2 - 2 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2021-30563) New Content Feature 25810 Apple Multiple Products Use-After-Free Vulnerability - Apple iOS (CVE-2019-8605) New Content Feature 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS (CVE-2016-5198) kev_version_checks Changed - 1 - 1 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2024-4947) kev_required_patches Changed - 2 - 2 36850 Linux Kernel Use of Uninitialized Resource Vulnerability - RHEL (CVE-2024-50302) kev_version_checks Changed - 2 - 2 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-37975) kev_required_patches Changed - 1 - 1 41220 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2012 (CVE-2026-21525) New Content Feature 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS (CVE-2015-4495) kev_version_checks Changed - 3 - 3 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows (CVE-2020-6819) kev_version_checks Changed - 1 - 1 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2021-30563) kev_version_checks Changed - 2 - 2 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux (CVE-2025-5419) New Content Feature 19740 Adobe Reader and Acrobat Universal 3D Memory Corruption Vulnerability - Any Version of MacOS (CVE-2011-2462) New Content Feature 20230 Adobe Acrobat and Reader Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2007-5659) New Content Feature 34330 Apple macOS Out-of-Bounds Write Vulnerability - Mac 12+ (CVE-2022-22675) kev_version_checks Changed - 1 - 1 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2022-1364) New Content Feature 20770 Apache Airflow's Experimental API Authentication Bypass - Any Version of MacOS (CVE-2020-13927) kev_version_checks Changed - 1 - 1 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2022-4262) New Content Feature 26070 Apple Multiple Products WebKit Type Confusion Vulnerability - Apple iOS (CVE-2023-23529) kev_version_checks Changed - 1 - 1 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows (CVE-2024-0519) New Content Feature 30210 NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability - Any Version of MacOS (CVE-2023-43208) kev_required_patches Changed - 1 - 1 38030 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 R2 (CVE-2025-30397) kev_version_checks Changed - 2 - 2 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux (CVE-2021-30632) kev_version_checks Changed - 1 - 1 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2023-7024) kev_version_checks Changed - 2 - 2 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2020-6418) New Content Feature 26590 Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2023-28206) New Content Feature 14260 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS (CVE-2020-3837) New Content Feature 24110 WebKitGTK Memory Corruption Vulnerability - Any Version of MacOS (CVE-2019-8720) kev_version_checks Changed - 3 - 3 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows (CVE-2019-17026) New Content Feature 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2020-16009) kev_version_checks Changed - 3 - 3 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows (CVE-2013-1675) kev_version_checks Changed - 3 - 3 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux (CVE-2019-17026) New Content Feature 28020 Apple Multiple Products WebKit Memory Corruption Vulnerability - Any Version of MacOS (CVE-2023-42917) New Content Feature 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS (CVE-2025-5419) New Content Feature 19410 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2012-1535) New Content Feature 20110 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS (CVE-2009-4324) kev_version_checks Changed - 1 - 1 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2023-2033) New Content Feature 29650 Android Pixel Information Disclosure Vulnerability - Any Current Service Pack of Android (CVE-2024-29745) kev_required_patches Changed - 2 - 2 37180 Linux Kernel Out-of-Bounds Access Vulnerability - RHEL (CVE-2024-53197) kev_version_checks Changed - 2 - 2 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-30633) New Content Feature 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS (CVE-2022-2856) New Content Feature 22850 Microsoft Excel Featheader Record Memory Corruption Vulnerability - Any Version of MacOS (CVE-2009-3129) New Content Feature 26190 Apple iOS Memory Corruption Vulnerability - Apple iOS (CVE-2016-4656) New Content Feature 26200 Apple Multiple Products Integer Overflow Vulnerability - Apple iOS (CVE-2021-30860) New Content Feature 40610 Android Framework Information Disclosure Vulnerability - Any Current Service Pack of Android (CVE-2025-48633) kev_required_patches Changed - 1 - 1 40870 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2012 R2 (CVE-2026-20805) New Content Feature 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2023-4762) New Content Feature 19400 Adobe Flash Player Integer Overflow Vulnerability - Any Version of MacOS (CVE-2012-5054) New Content Feature 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-4102) New Content Feature 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-30554) New Content Feature 32540 Adobe Flash Player Incorrect Default Permissions Vulnerability - Any Version of MacOS (CVE-2013-0643) kev_version_checks Changed - 2 - 2 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux (CVE-2024-0519) New Content Feature 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS (CVE-2021-30533) New Content Feature 26750 Android Kernel Use-After-Free Vulnerability - Any Current Service Pack of Android (CVE-2019-2215) New Content Feature 25090 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Any Version of MacOS (CVE-2023-28204) New Content Feature 34420 Apple Multiple Products Improper Certificate Validation Vulnerability - Mac 12+ (CVE-2023-41991) kev_version_checks Changed - 2 - 2 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux (CVE-2024-4761) kev_version_checks Changed - 1 - 1 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows (CVE-2019-5786) kev_version_checks Changed - 1 - 1 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows (CVE-2021-38003) New Content Feature 38640 Apple Multiple Products Unspecified Vulnerability - Any Version of MacOS (CVE-2025-43200) New Content Feature 40580 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2025-13223) New Content Feature 13250 Apple Memory Corruption Vulnerability - Any Version of MacOS (CVE-2022-22587) kev_version_checks Changed - 2 - 2 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2023-3079) New Content Feature 33670 Motion Spell GPAC Null Pointer Dereference Vulnerability - Any Version of MacOS (CVE-2021-4043) kev_version_checks Changed - 2 - 2 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux (CVE-2021-21166) New Content Feature 27210 Apple Multiple Products Improper Certificate Validation Vulnerability - Apple iOS (CVE-2023-41991) New Content Feature 15100 Microsoft Office Memory Corruption Vulnerability - Any Version of MacOS (CVE-2016-7193) kev_version_checks Changed - 2 - 2 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2024-5274) 41660 Microsoft Windows Kernel Exception Handler Vulnerability - Windows Server 2008 (CVE-2010-0232) New Content Feature 25880 Apple Multiple Products WebKit Use-After-Free Vulnerability - Apple iOS (CVE-2023-32373) kev_version_checks Changed - 3 - 3 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux (CVE-2019-11707) New Content Feature 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-30633) New Content Feature 20780 Adobe Flash Player Memory Corruption Vulnerability - Any Version of MacOS (CVE-2015-3043) kev_required_patches Changed - 1 - 1 36800 Linux Kernel Use of Uninitialized Resource Vulnerability - Debian (CVE-2024-50302) New Content Feature 20040 PHP-CGI Query String Parameter Vulnerability - Any Version of MacOS (CVE-2012-1823) kev_version_checks Changed - 2 - 2 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux (CVE-2021-21220) New Content Feature 28560 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2022-48618) New Content Feature 36830 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2025-24201) kev_version_checks Changed - 2 - 2 16730 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of Windows (CVE-2016-3718) New Content Feature 20490 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of MacOS (CVE-2016-3718) kev_version_checks Changed - 2 - 2 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-21206) New Content Feature 34350 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ (CVE-2024-23296) New Content Feature 19880 Adobe Flash Player Cross-Site Scripting (XSS) Vulnerability - Any Version of MacOS (CVE-2012-0767) kev_version_checks Changed - 3 - 3 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux (CVE-2022-26485) New Content Feature 26110 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2020-9907) New Content Feature 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2023-7024) New Content Feature 39360 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2025-10585) kev_version_checks Changed - 2 - 2 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2023-4762) kev_version_checks Changed - 2 - 2 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux (CVE-2015-4495) New Content Feature 20950 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2012-1723) kev_version_checks Changed - 1 - 1 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows (CVE-2021-21220) kev_version_checks Changed - 2 - 2 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux (CVE-2021-38003) kev_version_checks Changed - 2 - 2 24060 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2022-2294) New Content Feature 27230 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Apple iOS (CVE-2022-22620) New Content Feature 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS (CVE-2021-37976) kev_version_checks Changed - 5 - 5 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2023-5217) New Content Feature 19350 Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2021-21017) kev_version_checks Changed - 1 - 1 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2023-3079) New Content Feature 39160 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2025-43300) kev_version_checks Changed - 1 - 1 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows (CVE-2024-7965) New Content Feature 27030 Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2023-26369) New Content Feature 26170 Apple iOS WebKit Memory Corruption Vulnerability - Apple iOS (CVE-2021-30761) New Content Feature 34370 Apple Multiple Products WebKit Code Execution Vulnerability - Mac 12+ (CVE-2023-37450) New Content Feature 34520 Apple Multiple Products WebKit Sandbox Escape Vulnerability - Mac 12+ (CVE-2023-32409) kev_version_checks Changed - 1 - 1 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows (CVE-2025-2783) New Content Feature 19640 Adobe Flash Player Unspecified Vulnerability - Any Version of MacOS (CVE-2011-0609) New Content Feature 35700 Apple OS X Authentication Bypass Vulnerability - Any Version of MacOS (CVE-2015-1130) kev_required_patches Changed - 1 - 1 38040 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 (CVE-2025-30397) New Content Feature 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS (CVE-2019-13720) New Content Feature 40600 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2025-48572) New Content Feature 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS (CVE-2022-26485) kev_version_checks Changed - 1 - 1 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows (CVE-2025-4664) New Content Feature 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2021-21148) New Content Feature 20900 Microsoft Silverlight Double Dereference Vulnerability - Any Version of MacOS (CVE-2013-0074) New Content Feature 19810 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2018-4878) New Content Feature 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2024-7971) New Content Feature 39170 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2025-43300) New Content Feature 24870 Oracle Java SE and JRockit Unspecified Vulnerability - Any Version of MacOS (CVE-2016-3427) kev_version_checks Changed - 1 - 1 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2023-4762) New Content Feature 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS (CVE-2024-7965) New Content Feature 27260 Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability - Apple iOS (CVE-2023-41064) New Content Feature 19980 Oracle JRE Unspecified Vulnerability - Any Version of MacOS (CVE-2013-2423) New Content Feature 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2018-17480) New Content Feature 26100 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2021-30807) kev_version_checks Changed - 2 - 2 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux (CVE-2021-37976) New Content Feature 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2023-5217) New Content Feature 19360 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of MacOS (CVE-2013-3346) kev_version_checks Changed - 1 - 1 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows (CVE-2023-2136) New Content Feature 25830 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2020-27930) New Content Feature 19420 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2015-5123) New Content Feature 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2022-1364) cve_data Changed - version_checks Changed - 7 - 8 16650 Adobe Reader and Acrobat Use-After-Free Vulnerability - Any Version of Windows (CVE-2014-0496) New Content Feature 20920 VMware Multiple Products Privilege Escalation Vulnerability - Any Version of MacOS (CVE-2020-3950) kev_version_checks Changed - 1 - 1 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows (CVE-2021-37976) New Content Feature 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS (CVE-2022-3038) New Content Feature 20680 Adobe Flash Player and AIR Integer Overflow Vulnerability - Any Version of MacOS (CVE-2016-1010) kev_version_checks Changed - 2 - 2 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux (CVE-2022-3075) New Content Feature 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2023-4863) New Content Feature 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2021-30563) New Content Feature 39890 Grafana Path Traversal Vulnerability - Any Version of MacOS (CVE-2021-43798) kev_required_patches Changed - 2 - 2 31810 Linux Kernel Heap-Based Buffer Overflow Vulnerability - RHEL (CVE-2022-0185) 41670 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Windows Server 2008 (CVE-2008-0015) kev_version_checks Changed - 7 - 7 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux (CVE-2023-4863) New Content Feature 15000 Microsoft Office Security Feature Bypass Vulnerability - Any Version of MacOS (CVE-2016-7262) kev_version_checks Changed - 1 - 1 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2024-7971) New Content Feature 20250 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2018-15982) New Content Feature 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS (CVE-2018-6065) New Content Feature 20800 Apple Multiple Products WebKit Storage Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-30661) New Content Feature 25970 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability - Apple iOS (CVE-2022-32917) kev_version_checks Changed - 140 - 140 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux (CVE-2023-7028) kev_version_checks Changed - 2 - 2 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2022-1364) kev_version_checks Changed - 1 - 1 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows (CVE-2024-4761) kev_version_checks Changed - 1 - 1 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows (CVE-2021-30533) New Content Feature 25890 Apple Multiple Products WebKit Storage Use-After-Free Vulnerability - Apple iOS (CVE-2021-30661) New Content Feature 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2019-5825) New Content Feature 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS (CVE-2013-1690) New Content Feature 27050 Apple Multiple Products WebKit Code Execution Vulnerability - Any Version of MacOS (CVE-2023-41993) kev_required_patches Changed - 1 - 1 41200 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2012 (CVE-2026-21513) kev_version_checks Changed - 3 - 3 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows (CVE-2019-11708) New Content Feature 33940 Veeam Backup and Replication Deserialization Vulnerability - Any Version of MacOS (CVE-2024-40711) New Content Feature 19510 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2015-0311) kev_version_checks Changed - 1 - 1 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows (CVE-2020-6572) New Content Feature 26150 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2021-30900) kev_version_checks Changed - 2 - 2 38960 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Linux (CVE-2025-6558) New Content Feature 34390 Apple Multiple Products WebKit Type Confusion Vulnerability - Mac 12+ (CVE-2024-23222) New Content Feature 34360 Apple Multiple Products Kernel Privilege Escalation Vulnerability - Mac 12+ (CVE-2023-41992) New Content Feature 20460 Apple iOS, iPadOS, macOS Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-30858) kev_version_checks Changed - 2 - 2 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux (CVE-2016-5198) kev_required_patches Changed - 1 - 1 41230 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2012 R2 (CVE-2026-21533) New Content Feature 20430 Oracle Java SE Sandbox Bypass Vulnerability - Any Version of MacOS (CVE-2012-5076) New Content Feature 37520 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2025-31200) kev_version_checks Changed - 1 - 1 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-37975) kev_version_checks Changed - 60 - 60 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux (CVE-2021-22205) New Content Feature 20300 Adobe Flash Player Integer Overflow Vulnerability - Any Version of MacOS (CVE-2015-8651) New Content Feature 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS (CVE-2016-1646) New Content Feature 15080 Microsoft Office Stack-based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2010-3333) New Content Feature 20160 Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability - Any Version of MacOS (CVE-2009-1862) New Content Feature 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2022-1096) 41640 Microsoft Windows Remote Code Execution Vulnerability - Windows Server 2008 (CVE-2010-2568) kev_version_checks Changed - 2 - 2 32090 ImageMagick Improper Input Validation Vulnerability - Any Version of Windows (CVE-2016-3714) kev_version_checks Changed - 2 - 2 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2023-2033) kev_required_patches Changed - 1 - 1 41190 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2012 (CVE-2026-21533) New Content Feature 25910 Apple iOS Information Disclosure Vulnerability - Apple iOS (CVE-2016-4655) New Content Feature 26570 Apple iOS, iPadOS, macOS Use-After-Free Vulnerability - Apple iOS (CVE-2021-30858) New Content Feature 25870 Apple Multiple Products WebKit Code Execution Vulnerability - Apple iOS (CVE-2023-37450) kev_required_patches Changed - 3 - 3 38650 Linux Kernel Improper Ownership Management Vulnerability - RHEL (CVE-2023-0386) kev_required_patches Changed - 1 - 1 39270 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - Debian (CVE-2025-38352) kev_required_patches Changed - 1 - 1 41210 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2012 (CVE-2026-21510) New Content Feature 38670 Apple Multiple Products Unspecified Vulnerability - Apple iOS (CVE-2025-43200) kev_required_patches Changed - 1 - 1 40880 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2012 (CVE-2026-20805) kev_version_checks Changed - 2 - 2 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-4102) New Content Feature 20410 Adobe Reader and Acrobat Use-After-Free Vulnerability - Any Version of MacOS (CVE-2014-0496) kev_version_checks Changed - 1 - 1 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows (CVE-2019-5825) kev_version_checks Changed - 2 - 2 32140 ImageMagick Improper Input Validation Vulnerability - Any Version of Linux (CVE-2016-3714) kev_version_checks Changed - 2 - 2 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2023-7024) kev_version_checks Changed - 2 - 2 16310 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of Windows (CVE-2016-3715) New Content Feature 29610 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Apple iOS (CVE-2023-5217) New Content Feature 34540 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Mac 12+ (CVE-2022-22620) New Content Feature 13100 Apple Multiple Products Use-After-Free Vulnerability - Any Version of MacOS (CVE-2019-8605) kev_version_checks Changed - 2 - 2 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux (CVE-2020-16017) New Content Feature 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2021-21224) kev_version_checks Changed - 2 - 2 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux (CVE-2018-6065) New Content Feature 26560 Apple Multiple Products Type Confusion Vulnerability - Apple iOS (CVE-2019-8506) New Content Feature 25860 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2020-3837) New Content Feature 34450 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Mac 12+ (CVE-2022-32894) kev_version_checks Changed - 3 - 3 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux (CVE-2019-11708) New Content Feature 25790 Apple Multiple Products WebKit Sandbox Escape Vulnerability - Apple iOS (CVE-2023-32409) New Content Feature 20330 TIBCO JasperReports Library Directory Traversal Vulnerability - Any Version of MacOS (CVE-2018-18809) New Content Feature 28220 Apple Multiple Products Code Execution Vulnerability - Apple iOS (CVE-2023-41990) New Content Feature 19580 Oracle JRE Sandbox Bypass Vulnerability - Any Version of MacOS (CVE-2013-0431) kev_version_checks Changed - 5 - 5 39490 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Windows (CVE-2010-3765) New Content Feature 38980 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of MacOS (CVE-2025-6558) New Content Feature 20310 Artifex Ghostscript Type Confusion Vulnerability - Any Version of MacOS (CVE-2017-8291) kev_version_checks Changed - 2 - 2 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2017-5070) kev_version_checks Changed - 1 - 1 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2024-5274) New Content Feature 26230 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2022-32894) kev_version_checks Changed - 1 - 1 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows (CVE-2025-5419) kev_version_checks Changed - 2 - 2 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2021-21224) New Content Feature 15070 Microsoft Excel Security Feature Bypass - Any Version of MacOS (CVE-2021-42292) kev_required_patches Changed - 4 - 4 39290 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - Oracle Linux (CVE-2025-38352) kev_version_checks Changed - 2 - 2 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux (CVE-2023-6345) New Content Feature 36000 Apple iOS and iPadOS Incorrect Authorization Vulnerability - Apple iOS (CVE-2025-24200) New Content Feature 20850 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2016-7855) 41690 Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability - Windows Vista (CVE-2008-0015) kev_version_checks Changed - 1 - 1 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows (CVE-2021-21166) New Content Feature 19610 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of MacOS (CVE-2019-18988) kev_version_checks Changed - 3 - 3 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows (CVE-2020-6820) New Content Feature 20470 Oracle Java SE and Java SE Embedded Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2015-2590) New Content Feature 26700 Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability - Any Version of MacOS (CVE-2023-27532) kev_version_checks Changed - 4 - 4 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux (CVE-2013-1690) New Content Feature 20380 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2022-32893) New Content Feature 29510 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2024-23296) kev_required_patches Changed - 6 - 6 41360 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows 10 (CVE-2026-21525) New Content Feature 13130 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS (CVE-2019-7286) New Content Feature 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS (CVE-2020-16017) kev_required_patches Changed - 6 - 6 41330 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows 10 (CVE-2026-21513) kev_version_checks Changed - 1 - 1 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2020-16009) New Content Feature 35020 Apache Airflow Command Injection - Any Version of MacOS (CVE-2020-11978) New Content Feature 20080 Adobe Reader Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2013-0641) New Content Feature 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS (CVE-2023-2136) New Content Feature 29500 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2024-23225) New Content Feature 26010 Apple iOS, iPadOS, and watchOS WebKit Cross-Site Scripting (XSS) Vulnerability - Apple iOS (CVE-2021-1879) New Content Feature 20830 Apple Multiple Products WebKit Type Confusion Vulnerability - Any Version of MacOS (CVE-2023-23529) New Content Feature 22900 MinIO Information Disclosure Vulnerability - Any Version of MacOS (CVE-2023-28432) New Content Feature 32310 Apple iOS, iPadOS, and macOS Type Confusion Vulnerability - Apple iOS (CVE-2021-30869) New Content Feature 28200 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS (CVE-2023-41990) kev_version_checks Changed - 2 - 2 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2022-1096) New Content Feature 19890 Adobe Reader and Acrobat Input Validation Vulnerability - Any Version of MacOS (CVE-2008-2992) kev_version_checks Changed - 2 - 2 39350 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2025-10585) New Content Feature 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-37973) New Content Feature 28050 Apple Multiple Products WebKit Memory Corruption Vulnerability - Apple iOS (CVE-2023-42917) New Content Feature 19550 Adobe Reader and Acrobat Memory Corruption Vulnerability - Any Version of MacOS (CVE-2013-0640) New Content Feature 19930 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2012-0507) 13710 Microsoft Windows Kernel Exception Handler Vulnerability - Windows Vista (CVE-2010-0232) kev_required_patches Changed - 1 - 1 41250 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2012 R2 (CVE-2026-21510) kev_version_checks Changed - 1 - 1 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-30633) New Content Feature 20010 Grafana Authentication Bypass Vulnerability - Any Version of MacOS (CVE-2021-39226) New Content Feature 28060 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Apple iOS (CVE-2023-42916) kev_version_checks Changed - 1 - 1 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2021-21224) New Content Feature 25120 Apple Multiple Products WebKit Sandbox Escape Vulnerability - Any Version of MacOS (CVE-2023-32409) New Content Feature 32550 Adobe Flash Player Double Free Vulnerablity - Any Version of MacOS (CVE-2014-0502) New Content Feature 34500 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability - Mac 12+ (CVE-2022-32917) New Content Feature 26710 Apple iOS and iPadOS Out-of-Bounds Write Vulnerability - Apple iOS (CVE-2022-42827) New Content Feature 20600 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2016-4117) New Content Feature 40780 Google Chromium Out of Bounds Memory Access Vulnerability - Apple iOS (CVE-2025-14174) kev_version_checks Changed - 2 - 2 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux (CVE-2019-5825) New Content Feature 24120 Apple Multiple Products Type Confusion Vulnerability - Any Version of MacOS (CVE-2019-8506) New Content Feature 20890 Oracle Java SE Runtime Environment (JRE) Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2011-3544) kev_version_checks Changed - 2 - 2 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux (CVE-2022-2856) kev_version_checks Changed - 2 - 2 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2024-7971) New Content Feature 25840 Apple Multiple Products Integer Overflow Vulnerability - Apple iOS (CVE-2023-32434) New Content Feature 20020 Adobe Flash Player Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2014-9163) New Content Feature 26140 Apple Multiple Products WebKit Type Confusion Vulnerability - Apple iOS (CVE-2023-32439) New Content Feature 26580 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Apple iOS (CVE-2023-28204) kev_version_checks Changed - 1 - 1 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows (CVE-2022-3038) kev_version_checks Changed - 3 - 3 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows (CVE-2022-26486) kev_version_checks Changed - 2 - 2 40690 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Linux (CVE-2025-14174) 41680 Microsoft Windows Authenticode Signature Verification Remote Code Execution Vulnerability - Windows Server 2008 (CVE-2012-0151) New Content Feature 22920 Microsoft Office Memory Corruption Vulnerability - Any Version of MacOS (CVE-2015-1641) New Content Feature 25510 Apple Multiple Products WebKit Code Execution Vulnerability - Any Version of MacOS (CVE-2023-37450) New Content Feature 39040 PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability - Any Version of MacOS (CVE-2023-2533) New Content Feature 30280 Android Pixel Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2024-32896) kev_version_checks Changed - 2 - 2 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2021-30551) New Content Feature 28540 Apple Multiple Products WebKit Type Confusion Vulnerability - Apple iOS (CVE-2024-23222) New Content Feature 26760 Google Pixel Out-of-Bounds Write Vulnerability - Any Current Service Pack of Android (CVE-2021-39793) New Content Feature 41620 Google Chromium CSS Use-After-Free Vulnerability - Any Version of MacOS (CVE-2026-2441) kev_required_patches Changed - 2 - 2 34870 Android Kernel Remote Code Execution Vulnerability - RHEL (CVE-2024-36971) kev_version_checks Changed - 1 - 1 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2021-30551) New Content Feature 20810 Adobe Reader and Adobe Acrobat Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2009-0927) New Content Feature 19620 Veeam Backup & Replication Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2022-26500) New Content Feature 25920 Apple Multiple Products WebKit Use-After-Free Vulnerability - Apple iOS (CVE-2023-28205) New Content Feature 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS (CVE-2022-26486) New Content Feature 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2024-4947) kev_required_patches Changed - 1 - 1 36020 Linux Kernel Out-of-Bounds Write Vulnerability - RHEL (CVE-2024-53104) New Content Feature 20370 Oracle JRE Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2013-0422) New Content Feature 25450 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of MacOS (CVE-2016-9079) kev_version_checks Changed - 2 - 2 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2024-4947) New Content Feature 26740 Android Kernel Use-After-Free Vulnerability - Any Current Service Pack of Android (CVE-2021-1048) New Content Feature 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS (CVE-2022-0609) kev_version_checks Changed - 1 - 1 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows (CVE-2021-30632) kev_version_checks Changed - 2 - 2 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux (CVE-2020-6572) kev_version_checks Changed - 12 - 12 39860 Grafana Path Traversal Vulnerability - Any Version of Linux (CVE-2021-43798) New Content Feature 26060 Apple iOS WebKit Use-After-Free Vulnerability - Apple iOS (CVE-2021-30762) kev_version_checks Changed - 1 - 1 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows (CVE-2023-6345) New Content Feature 34920 Apple Multiple Products Code Execution Vulnerability - Apple iOS (CVE-2024-44308) New Content Feature 19950 Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2010-0188) New Content Feature 34460 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ (CVE-2021-30883) New Content Feature 20690 Adobe Flash Player Type Confusion Vulnerability - Any Version of MacOS (CVE-2017-11292) New Content Feature 22910 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of MacOS (CVE-2023-27350) kev_version_checks Changed - 1 - 1 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2017-5070) New Content Feature 20340 Oracle JRE Unspecified Vulnerability - Any Version of MacOS (CVE-2010-0840) kev_version_checks Changed - 2 - 2 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux (CVE-2016-1646) New Content Feature 26250 Apple iOS, iPadOS, and macOS Input Validation Vulnerability - Apple iOS (CVE-2020-9934) kev_required_patches Changed - 1 - 1 28950 Linux Kernel Privilege Escalation Vulnerability - RHEL (CVE-2022-0847) New Content Feature 19750 ExifTool Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2021-22204) kev_version_checks Changed - 1 - 1 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows (CVE-2022-2856) kev_version_checks Changed - 1 - 1 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows (CVE-2018-17480) New Content Feature 20220 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2015-5119) New Content Feature 20940 Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability - Any Version of MacOS (CVE-2022-22620) kev_version_checks Changed - 1 - 1 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2022-1096) kev_version_checks Changed - 5 - 5 39500 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Linux (CVE-2010-3765) kev_required_patches Changed - 1 - 1 31090 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2012 R2 (CVE-2024-38112) kev_version_checks Changed - 2 - 2 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-30554) kev_version_checks Changed - 2 - 2 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-37973) New Content Feature 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS (CVE-2025-4664) New Content Feature 25900 Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability - Apple iOS (CVE-2021-1870) New Content Feature 37470 Apple Multiple Products Memory Corruption Vulnerability - Any Version of MacOS (CVE-2025-31200) New Content Feature 37480 Apple Multiple Products Arbitrary Read and Write Vulnerability - Any Version of MacOS (CVE-2025-31201) New Content Feature 34830 Android Framework Privilege Escalation Vulnerability - Any Current Service Pack of Android (CVE-2024-43093) New Content Feature 26050 Apple Multiple Products WebKit Memory Corruption Vulnerability - Apple iOS (CVE-2023-32435) kev_version_checks Changed - 2 - 2 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2022-3723) New Content Feature 26090 Apple iOS WebKit Buffer Overflow Vulnerability - Apple iOS (CVE-2021-30666) kev_version_checks Changed - 2 - 2 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux (CVE-2023-2136) kev_version_checks Changed - 1 - 1 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows (CVE-2022-3075) kev_version_checks Changed - 2 - 2 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows (CVE-2015-4495) kev_required_patches Changed - 1 - 1 30470 Linux Kernel Use-After-Free Vulnerability - RHEL (CVE-2022-2586) New Content Feature 22100 Apple iOS Memory Corruption Vulnerability - Apple iOS (CVE-2019-7287) New Content Feature 34530 Apple Multiple Products Memory Corruption Vulnerability - Mac 12+ (CVE-2024-23225) New Content Feature 37460 Apple Multiple Products Use-After-Free Vulnerability - Any Version of MacOS (CVE-2025-24085) New Content Feature 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2022-3723) New Content Feature 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2023-3079) New Content Feature 40330 WebRTC Heap Buffer Overflow Vulnerability - Apple iOS (CVE-2022-2294) New Content Feature 20670 Adobe Flash Player Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2015-3113) kev_version_checks Changed - 2 - 2 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux (CVE-2019-13720) New Content Feature 19590 Adobe Flash Player Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2018-5002) New Content Feature 20960 Kaseya Virtual System/Server Administrator (VSA) Information Disclosure Vulnerability - Any Version of MacOS (CVE-2021-30116) New Content Feature 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2017-5070) kev_required_patches Changed - 1 - 1 40310 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2012 (CVE-2025-59287) kev_version_checks Changed - 4 - 4 41610 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Linux (CVE-2026-2441) kev_version_checks Changed - 3 - 3 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux (CVE-2020-6820) New Content Feature 34510 Apple Multiple Products WebKit Type Confusion Vulnerability - Mac 12+ (CVE-2023-32439) New Content Feature 30930 Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability - Visual FoxPro (CVE-2012-1856) kev_version_checks Changed - 1 - 1 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2021-21148) New Content Feature 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS (CVE-2021-21166) kev_version_checks Changed - 3 - 3 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows (CVE-2024-9680) New Content Feature 19840 Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2021-30900) kev_version_checks Changed - 2 - 2 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux (CVE-2024-7965) New Content Feature 26240 Apple Multiple Products Memory Initialization Vulnerability - Apple iOS (CVE-2020-27950) New Content Feature 25820 Apple iOS Type Confusion Vulnerability - Apple iOS (CVE-2022-42856) New Content Feature 40140 Apple Multiple Products Unspecified Vulnerability - Mac 12+ (CVE-2022-48503) New Content Feature 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2022-4135) kev_version_checks Changed - 2 - 2 18730 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of Linux (CVE-2016-3718) New Content Feature 34900 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability - Any Version of MacOS (CVE-2024-44309) New Content Feature 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2018-17463) kev_version_checks Changed - 2 - 2 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux (CVE-2021-21193) New Content Feature 37530 Apple Multiple Products Arbitrary Read and Write Vulnerability - Apple iOS (CVE-2025-31201) kev_version_checks Changed - 2 - 2 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux (CVE-2024-4671) New Content Feature 40720 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of MacOS (CVE-2025-14174) New Content Feature 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS (CVE-2023-6345) New Content Feature 34470 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Mac 12+ (CVE-2023-42916) kev_required_patches Changed - 3 - 3 39280 Linux Kernel Time-of-Check Time-of-Use (TOCTOU) Race Condition Vulnerability - RHEL (CVE-2025-38352) New Content Feature 20710 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2016-1019) New Content Feature 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS (CVE-2021-21206) New Content Feature 41370 Apple Multiple Buffer Overflow Vulnerability - Apple iOS (CVE-2026-20700) New Content Feature 13310 Apple iOS, iPadOS, and macOS Input Validation Vulnerability - Any Version of MacOS (CVE-2020-9934) New Content Feature 39510 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2010-3765) New Content Feature 34930 Apple Multiple Products Cross-Site Scripting (XSS) Vulnerability - Apple iOS (CVE-2024-44309) New Content Feature 19960 Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2009-3953) kev_version_checks Changed - 1 - 1 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows (CVE-2017-5030) New Content Feature 22890 Microsoft Silverlight Information Disclosure Vulnerability - Any Version of MacOS (CVE-2013-3896) kev_version_checks Changed - 3 - 3 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux (CVE-2022-26486) New Content Feature 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS (CVE-2019-11708) kev_version_checks Changed - 3 - 3 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows (CVE-2019-11707) kev_version_checks Changed - 2 - 2 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2021-21148) New Content Feature 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS (CVE-2024-4761) kev_required_patches Changed - 4 - 4 39700 Linux Kernel Heap Out-of-Bounds Write Vulnerability - RHEL (CVE-2021-22555) kev_version_checks Changed - 2 - 2 38840 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2025-6554) kev_version_checks Changed - 1 - 1 39340 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2025-10585) New Content Feature 27650 PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2019-11043) New Content Feature 20630 Adobe Flash Player Memory Corruption Vulnerability - Any Version of MacOS (CVE-2010-1297) New Content Feature 40710 Apple Multiple Products Use-After-Free WebKit Vulnerability - Any Version of MacOS (CVE-2025-43529) kev_version_checks Changed - 1 - 1 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-21193) kev_version_checks Changed - 6 - 6 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows (CVE-2023-4863) New Content Feature 25080 Apple Multiple Products WebKit Use-After-Free Vulnerability - Any Version of MacOS (CVE-2023-32373) New Content Feature 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS (CVE-2020-6418) kev_required_patches Changed - 2 - 2 36860 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - RHEL (CVE-2025-24201) kev_version_checks Changed - 3 - 3 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows (CVE-2022-26485) New Content Feature 20130 Adobe Flash Player Use-After-Free Vulnerability - Any Version of MacOS (CVE-2015-5122) New Content Feature 34490 Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability - Mac 12+ (CVE-2023-41064) New Content Feature 26730 Android Kernel Out-of-Bounds Write Vulnerability - Any Current Service Pack of Android (CVE-2020-0041) New Content Feature 34400 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Mac 12+ (CVE-2023-28204) kev_version_checks Changed - 2 - 2 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2020-16009) New Content Feature 26770 Android Kernel Race Condition Vulnerability - Any Current Service Pack of Android (CVE-2021-0920) New Content Feature 25990 Apple Memory Corruption Vulnerability - Apple iOS (CVE-2022-22587) New Content Feature 19430 Microsoft Silverlight Runtime Remote Code Execution Vulnerability - Any Version of MacOS (CVE-2016-0034) New Content Feature 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS (CVE-2021-38003) New Content Feature 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS (CVE-2013-1675) New Content Feature 19790 Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability - Any Version of MacOS (CVE-2010-2883) New Content Feature 20070 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of MacOS (CVE-2015-7645) kev_version_checks Changed - 2 - 2 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux (CVE-2020-15999) kev_version_checks Changed - 1 - 1 40670 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Windows (CVE-2025-14174) New Content Feature 26210 Apple iOS WebKit Memory Corruption Vulnerability - Apple iOS (CVE-2016-4657) New Content Feature 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS (CVE-2024-4671) New Content Feature 15060 Apple Multiple Products WebKit Integer Overflow Vulnerability - Any Version of MacOS (CVE-2021-30663) New Content Feature 14950 Microsoft Word Memory Corruption Vulnerability - Any Version of MacOS (CVE-2014-1761) kev_required_patches Changed - 6 - 6 41350 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows 10 (CVE-2026-21510) New Content Feature 26130 Apple Multiple Products Memory Corruption Vulnerability - Apple iOS (CVE-2019-7286) 41650 Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability - Windows Server 2008 (CVE-2010-3962) New Content Feature 34910 Apple Multiple Products Code Execution Vulnerability - Any Version of MacOS (CVE-2024-44308) New Content Feature 28030 Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability - Any Version of MacOS (CVE-2023-42916) kev_version_checks Changed - 2 - 2 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux (CVE-2022-4262) kev_version_checks Changed - 1 - 1 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows (CVE-2021-21206) New Content Feature 34480 Apple iOS and macOS Out-of-Bounds Write Vulnerability - Mac 12+ (CVE-2022-32893) kev_version_checks Changed - 1 - 1 23960 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows (CVE-2022-2294) New Content Feature 20140 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of MacOS (CVE-2016-3715) New Content Feature 26020 Apple Multiple Products Kernel Unspecified Vulnerability - Apple iOS (CVE-2023-38606) New Content Feature 19460 Oracle VirtualBox Insufficient Input Validation Vulnerability - Any Version of MacOS (CVE-2008-3431) 13730 Microsoft Windows Improper Input Validation Vulnerability - Windows Vista (CVE-2009-1123) New Content Feature 27360 Adobe Acrobat and Reader Use-After-Free Vulnerability - Any Version of MacOS (CVE-2023-21608) kev_required_patches Changed - 1 - 1 31380 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 (CVE-2024-38178) New Content Feature 25940 Apple Multiple Products Code Execution Vulnerability - Apple iOS (CVE-2020-9859) New Content Feature 26120 Apple iOS and macOS Group Facetime Vulnerability - Apple iOS (CVE-2019-6223) New Content Feature 34440 Apple macOS Out-of-Bounds Read Vulnerability - Mac 12+ (CVE-2022-22674) kev_version_checks Changed - 1 - 1 38950 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Windows (CVE-2025-6558) kev_version_checks Changed - 2 - 2 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux (CVE-2017-5030) kev_version_checks Changed - 2 - 2 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux (CVE-2018-17463) New Content Feature 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS (CVE-2022-3075) New Content Feature 35640 Apple Multiple Products Use-After-Free Vulnerability - Apple iOS (CVE-2025-24085) kev_version_checks Changed - 1 - 1 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows (CVE-2016-1646) New Content Feature 15150 Microsoft Office Object Record Corruption Vulnerability - Any Version of MacOS (CVE-2009-0557) New Content Feature 36820 Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2025-24201) kev_version_checks Changed - 3 - 3 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux (CVE-2024-9680) New Content Feature 19760 Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability - Any Version of MacOS (CVE-2023-28206) New Content Feature 13220 Apple Multiple Products Type Confusion Vulnerability - Any Version of MacOS (CVE-2021-1789) New Content Feature 34430 Apple Multiple Products WebKit Memory Corruption Vulnerability - Mac 12+ (CVE-2023-32435) New Content Feature 14990 Apple iOS Type Confusion Vulnerability - Any Version of MacOS (CVE-2022-42856) kev_version_checks Changed - 1 - 1 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows (CVE-2022-3723) Deleted Fixlets: -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 16 07:59:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Mar 2026 09:59:21 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 21 Total Fixlets in Site: 216 Release Date: 2026-03-16 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 43800201 Cryptomator (Intel) v1.19.1 5701001 MongoDB Compass (arm64) v1.49.4 67800201 calibre v9.5.0 87000201 Ulaa (arm64) v146.0.7680.119 11600401 XnViewMP v1.10.4 64004501 PowerShell (Intel) v7.5.5 5700901 MongoDB Compass (Intel) v1.49.4 81400101 Spark Desktop v3.28.2.134142 86600101 Arc v1.138.2 87000101 Ulaa (Intel) v146.0.7680.119 67900201 SteelSeries GG (Intel)) v106.1.0 64006701 PowerShell (arm64) v7.5.5 81200301 CatoClient v5.11.0.7852 87100101 CotEditor v6.2.5 3300301 GIMP (arm64) v3.2.0 62900301 Archi (arm64) v5.8.0 3300201 GIMP (Intel) v3.2.0 62900201 Archi (Intel) v5.8.0 43800301 Cryptomator (arm64) v1.19.1 81500101 iTerm2 v3.6.9 86100201 BraveBrowser v146.1.88.132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 16 09:08:12 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Mar 2026 11:08:12 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-16 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011770 Google Chrome 146.0.7680.80 Available * 5058876 Microsoft Edge Extended Stable Build 146.0.3856.62 Available (x64) * 5058874 Microsoft Edge Extended Stable Build 146.0.3856.62 Available * 5058872 Microsoft Edge Extended Stable Build 146.0.3856.59 Available (x64) * 5058870 Microsoft Edge Extended Stable Build 146.0.3856.59 Available * 5058847 Microsoft Edge Stable Build 146.0.3856.62 Available (x64) * 5058845 Microsoft Edge Stable Build 146.0.3856.62 Available * 5058843 Microsoft Edge Stable Build 146.0.3856.59 Available (x64) * 5058841 Microsoft Edge Stable Build 146.0.3856.59 Available Modified: * 14011768 Google Chrome 146.0.7680.76 Available (Superseded) * 5058820 Microsoft Edge Extended Stable Build 144.0.3719.162 Available (x64) (Superseded) * 5058818 Microsoft Edge Extended Stable Build 144.0.3719.162 Available (Superseded) * 5058801 Microsoft Edge Stable Build 145.0.3800.97 Available (x64) (Superseded) * 5058799 Microsoft Edge Stable Build 145.0.3800.97 Available (Superseded) Reason for Update: * New updates Chrome and Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2459 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 16 09:19:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Mar 2026 11:19:40 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 20 Total Fixlets in Site: 123 Release Date: 2026-03-16 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 5600901 powershell (debian-11) v7.5.5 84900101 brave-browser (deb) v1.88.132 71600401 GitHub_CLI (rpm) v2.88.1 59300501 splunkforwarder (deb) v10.2.1 67700501 vivaldi-stable (deb) v7.8.3925.81 5600801 powershell (debian-12) v7.5.5 71600301 GitHub_CLI (rpm) v2.88.1 5601201 powershell (ubuntu-22.04) v7.5.5 59300601 splunkforwarder (rpm) v10.2.1 5600701 powershell (ubuntu-24.04) v7.5.5 71600201 GitHub_CLI (deb) v2.88.1 5601101 powershell (ubuntu-20.04) v7.5.5 5600601 microsoft-edge-stable (rpm) v146.0.3856.62-1 4101601 google-chrome-stable (rpm) v146.0.7680.80 71600101 GitHub_CLI (deb) v2.88.1 5601001 powershell (debian-10) v7.5.5 84900201 brave-browser (rpm) v1.88.132 5600501 microsoft-edge-stable (deb) v146.0.3856.62-1 67700601 vivaldi-stable (rpm) v7.8.3925.81 4101501 google-chrome-stable (deb) v146.0.7680.80 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 16 10:03:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 16 Mar 2026 12:03:40 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-16 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 35 Total Fixlets in Site: 549 Release Date: 2026-03-16 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 3300101 GIMP v3.2.0.0 37300101 Argus Monitor v7.3.5.3151 58900101 Advanced Installer v23.5.1 62900101 Archi v5.8.0 200201 7-Zip (EXE) v26.00 67700101 Vivaldi v7.8.3925.81 87700101 Glary Utilities (EXE) v6.39.0.43 9800201 Snagit v26.1.0.10201 300301 Adobe DNG Converter v18.2.2 55100301 ImageMagick v7.1.2.17 901901 AWS Command Line Interface v2 v2.34.9.0 5603601 Windows Defender Virus Definitions v1.445.555.0 55000101 HeidiSQL v12.16.0.7240 200101 7-Zip (MSI) v26.00 39000101 CLAN v8.53.00 5601701 PowerShell v7.5.5 59000101 HLAE v2.189.7 64600101 Pandoc v3.9 7000101 Opera Stable v128.0.5807.77 11600301 XnView MP v1.10.5.0 5604401 Microsoft Edge WebView2 Runtime (Standalone) v146.0.3856.62 2300101 CPUID CPU-Z v2.19 23500101 PhraseExpress v18.0.66 2700101 Remote Desktop Manager Enterprise v2026.1.12.0 54300101 Dolt v1.83.6 62700101 SFTPGo v2.7.1 67900101 SteelSeries GG v106.1.0 8300101 R for Windows v4.5.3 200401 7-Zip (EXE) v26.00 29600101 Vim v9.2.0167 52000101 Coder v2.31.5.0 81200101 Cato Client v6.0.1.8602 67700201 Vivaldi v7.8.3925.81 200301 7-Zip (MSI) v26.00 43803901 Cryptomator (MSI) v1.19.1.6316 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 05:56:53 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Mar 2026 08:56:53 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6163-1 - Linux Security Update - Debian 12 (amd64) (ID: 61630101) * DSA-6164-1 - Chromium Security Update - Debian 12 (amd64) (ID: 61640101) Published Site Version: * Patches for Debian 12, version 162. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 06:05:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Mar 2026 09:05:08 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2026:4442 - Vim Security Update - RockyLinux 8 x86_64 (ID: 26444201) * RLSA-2026:4443 - .Net 9.0 Security Update - RockyLinux 8 x86_64 (ID: 26444301) * RLSA-2026:4455 - .Net 8.0 Security Update - RockyLinux 8 x86_64 (ID: 26445501) * RLSA-2026:4458 - .Net 10.0 Security Update - RockyLinux 8 x86_64 (ID: 26445801) * RLSA-2026:4463 - Python3.12 Security Update - RockyLinux 8 x86_64 (ID: 26446301) * RLSA-2026:4473 - Python3.11 Security Update - RockyLinux 8 x86_64 (ID: 26447301) Published Site Version: * Patches for Rocky Linux 8, version 108. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 06:10:55 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Mar 2026 09:10:55 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:4216 - Python3.11 Security Update - RockyLinux 9 x86_64 (ID: 26421601) * RLSA-2026:4445 - .Net 10.0 Security Update - RockyLinux 9 x86_64 (ID: 26444501) * RLSA-2026:4447 - Libvpx Security Update - RockyLinux 9 x86_64 (ID: 26444701) * RLSA-2026:4454 - .Net 8.0 Security Update - RockyLinux 9 x86_64 (ID: 26445401) * RLSA-2026:4456 - .Net 9.0 Security Update - RockyLinux 9 x86_64 (ID: 26445601) * RLSA-2026:4472 - Compat-Openssl11 Security Update - RockyLinux 9 x86_64 (ID: 26447201) Published Site Version: * Patches for Rocky Linux 9, version 91. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 06:12:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Mar 2026 09:12:07 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:3040 - Grafana-Pcp Security Update - AlmaLinux 9 x86_64 (ID: 26304001) * ALSA-2026:3730 - Postgresql Security Update - AlmaLinux 9 x86_64 (ID: 26373001) * ALSA-2026:3753 - Osbuild-Composer Security Update - AlmaLinux 9 x86_64 (ID: 26375301) * ALSA-2026:3842 - Delve Security Update - AlmaLinux 9 x86_64 (ID: 26384201) * ALSA-2026:3896 - Postgresql:15 Security Update - AlmaLinux 9 x86_64 (ID: 26389601) * ALSA-2026:3940 - Nfs-Utils Security Update - AlmaLinux 9 x86_64 (ID: 26394001) * ALSA-2026:4110 - Postgresql:16 Security Update - AlmaLinux 9 x86_64 (ID: 26411001) * ALSA-2026:4165 - Python3.12 Security Update - AlmaLinux 9 x86_64 (ID: 26416501) * ALSA-2026:4168 - Python3.9 Security Update - AlmaLinux 9 x86_64 (ID: 26416801) * ALSA-2026:4173 - Gimp Security Update - AlmaLinux 9 x86_64 (ID: 26417301) * ALSA-2026:4177 - Opentelemetry-Collector Security Update - AlmaLinux 9 x86_64 (ID: 26417701) * ALSA-2026:4188 - Gnutls Security Update - AlmaLinux 9 x86_64 (ID: 26418801) * ALSA-2026:4216 - Python3.11 Security Update - AlmaLinux 9 x86_64 (ID: 26421601) * ALSA-2026:4235 - Nginx:1.26 Security Update - AlmaLinux 9 x86_64 (ID: 26423501) * ALSA-2026:4454 - .Net 8.0 Security Update - AlmaLinux 9 x86_64 (ID: 26445401) Published Site Version: * Patches for Alma Linux 9, version 66. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 06:15:18 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 17 Mar 2026 09:15:18 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260312 - SUSE-RU-2026:0878-1 - Recommended update for google-cloud-sap-agent - leap15.6 - (x86-64) (ID: 26031201) * 260312 - SUSE-SU-2026:0870-1 - Security update for ImageMagick - leap15.6 - (x86-64) (ID: 26031202) * 260312 - SUSE-SU-2026:0871-1 - Security update for MozillaFirefox - leap15.6 - (x86-64) (ID: 26031203) * 260312 - SUSE-SU-2026:0873-1 - Security update for python - leap15.6 - (x86-64) (ID: 26031204) * 260312 - SUSE-SU-2026:0874-1 - Security update for GraphicsMagick - leap15.6 - (x86-64) (ID: 26031205) * 260312 - SUSE-SU-2026:0875-1 - Security update for go1.25 - leap15.6 - (x86-64) (ID: 26031206) * 260312 - SUSE-SU-2026:0876-1 - Security update for go1.26 - leap15.6 - (x86-64) (ID: 26031207) * 260312 - SUSE-SU-2026:0880-1 - Security update for MozillaThunderbird - leap15.6 - (x86-64) (ID: 26031208) * 260312 - SUSE-SU-2026:0882-1 - Security update for postgresql16 - leap15.6 - (x86-64) (ID: 26031209) * 260312 - SUSE-SU-2026:0883-1 - Security update for postgresql17 - leap15.6 - (x86-64) (ID: 26031210) * 260312 - SUSE-SU-2026:0886-1 - Security update for libsoup2 - leap15.6 - (x86-64) (ID: 26031211) * 260313 - SUSE-SU-2026:0894-1 - Security update for libsoup - leap15.6 - (x86-64) (ID: 26031301) Published Site Version: * Patches for openSUSE Leap 15, version 138. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 06:22:48 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Mar 2026 08:22:48 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-17 Message-ID: BigFix has modified content in the Updates for Windows Applications site. Modified: * 5058874 Microsoft Edge Extended Stable Build 146.0.3856.62 Available * 5058876 Microsoft Edge Extended Stable Build 146.0.3856.62 Available (x64) * 5058845 Microsoft Edge Stable Build 146.0.3856.62 Available * 5058847 Microsoft Edge Stable Build 146.0.3856.62 Available (x64) * 5058870 Microsoft Edge Extended Stable Build 146.0.3856.59 Available (Superseded) * 5058872 Microsoft Edge Extended Stable Build 146.0.3856.59 Available (x64) (Superseded) * 5058841 Microsoft Edge Stable Build 146.0.3856.59 Available (Superseded) * 5058843 Microsoft Edge Stable Build 146.0.3856.59 Available (x64) (Superseded) * 6082254 Mozilla Firefox (x64) 148.0.2 Available * 6082509 Mozilla Firefox 148.0.2 Available Reason for Update: * CVE details have been updated for Microsoft Edge updates, and the previous updates have been superseded. * The whitelist URL has been updated in the description of the Firefox fixlets. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2460 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 07:26:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Mar 2026 09:26:40 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-17 Message-ID: Content in the Patches for Windows site has been modified New: * Major [ID:500529201] 5005292: Update for Microsoft Defender for Endpoint - Microsoft Defender for Endpoint (Version 10.8799.25857.1000) - KB5005292 (x64) Modified: * Major [ID:50630301] MS25-JUL: Security Update for Microsoft Visual Studio 2015 Update 3 - Microsoft Visual Studio 2015 Update 3 - KB5063035 * Major [ID:50496801] MS25-FEB: Security Update for remote code execution vulnerability - Visual Studio 2015 Update 3 - KB5049688 * Major [ID:502936501] MS23-OCT: Security Update for remote code execution vulnerability - Visual Studio 2013 Update 5 - KB5029365 * Major [ID:502645501] MS23-JUN: Security Update for information disclosure vulnerability - Visual Studio 2015 Update 3 - KB5026455 * Major [ID:501631602] MS22-AUG: Security update for Microsoft Visual Studio 2015 Update 3 - Microsoft Visual Studio 2015 Update 3 - KB5016316 * Major [ID:50455301] 5045536: Security Update for Microsoft Visual Studio 2015 Update 3 - Microsoft Visual Studio 2015 Update 3 - KB5045536 * Major [ID:507947303] MS26-MAR: Cumulative Update for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5079473 (arm64) * Major [ID:507947301] MS26-MAR: Cumulative Update for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5079473 (x64) * Major [ID:507947307] MS26-MAR: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5079473 (arm64) * Major [ID:507947305] MS26-MAR: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5079473 (x64) Reason for Update: * New update for Microsoft Defender for Endpoint. * Modified Relevance for Visual Studio 2015 and Windows 11 updates. Actions to Take: * None. Published site version: Site Name: Patches for Windows Version: 4690 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 09:04:28 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Mar 2026 11:04:28 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-17 Message-ID: Total New Fixlets: 6 Total Updated Fixlets: 244 Total Fixlets in Site: 3334 Total CVEs Covered: 975 Release Date: 2026-03-17 New Fixlets: 41730 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Linux 41700 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Windows 41740 Google Skia Out-of-Bounds Write Vulnerability - Any Version of MacOS 41710 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Windows 41750 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of MacOS 41720 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Linux Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38950 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Windows 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38960 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Linux 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 39490 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Windows 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 24130 WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 38980 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 39500 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Linux 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 39510 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 41580 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Windows 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 40560 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 40570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 40580 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 41610 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Linux 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 41620 Google Chromium CSS Use-After-Free Vulnerability - Any Version of MacOS 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 24060 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 40670 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Windows 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 40690 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 40720 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of MacOS 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 18730 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of Linux 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 16730 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of Windows 32090 ImageMagick Improper Input Validation Vulnerability - Any Version of Windows 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 18270 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 32140 ImageMagick Improper Input Validation Vulnerability - Any Version of Linux 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 23960 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 39340 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 16310 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of Windows 39350 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38840 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 39360 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 38850 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 09:32:51 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Mar 2026 12:32:51 -0400 Subject: [BESAdmin-Announcements] BigFix Patch Announcement: Extended Support for Alma Linux 10 (x86_64) Architecture Message-ID: BigFix Patch is pleased to announce the extension of its supported operating systems to include Alma Linux 10 on the x86_64 architecture. New Site and Content Details The newly established site, ?Patches for Alma Linux 10?, utilizes dnf as the default package manager. This site provides comprehensive patching content derived from the following Alma Linux 10 channels: - Alma Linux 10.0 - BaseOS - Alma Linux 10.0 - AppStream - Alma Linux 10.0 - CodeReady Builder Mandatory Implementation Prerequisites Successful implementation of Alma Linux 10 patching requires adherence to the following conditions: 1. Client Requirement: Alma Linux 10 necessitates the use of BigFix Client version 11.0 Patch 4 (11.0.4.60). 2. Site Subscription: - Subscribers must enable the ?Patches for Alma Linux 10? site via the License Overview Dashboard. - If the site is not visible, a license update must be performed by clicking ?Check for license update? within the dashboard, followed by execution of the BigFix Administration Tool. 3. Required Plugin: The Patches for Alma Linux 10 site relies on the CentOS R2 Download Plugin, which is accessible through the Manage Download Plugins dashboard located within the Patching Support site. Currently Published Sites - Patches for Alma Linux 10, version 2 - Patching Support, version 1297 Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 17 09:36:37 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 17 Mar 2026 12:36:37 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 10 with bugfixes, published 2026-03-16 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 10* with bug fixes. *Security Benchmark:* CIS Microsoft Windows 10 Enterprise Benchmark with bug fixes, V4.0.0 *Published Sites:* CIS Checklist for Windows 10, site version 24 (The site version is provided for air-gap customers.) *Details:* *Modified relevance and incorporated LGPO remediation for the checks below:* ? (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' (B) ? (L1) Ensure 'Configure Windows spotlight on lock screen' is set to 'Disabled' ? (L1) Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled' ? (L1) Ensure 'Do not suggest third-party content in Windows spotlight' is set to 'Enabled' ? (L1) Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled' ? (L1) Ensure 'Turn off Spotlight collection on Desktop' is set to 'Enabled' ? (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' ? (L1) Ensure 'Turn off toast notifications on the lock screen' is set to 'Enabled' ? (L2) Ensure 'Do not use diagnostic data for tailored experiences' is set to 'Enabled' ? (L2) Ensure 'Prevent Codec Download' is set to 'Enabled' ? (L2) Ensure 'Turn off Help Experience Improvement Program' is set to 'Enabled' ? (L2) Ensure 'Turn off all Windows spotlight features' is set to 'Enabled' ? L1) Ensure 'Turn off Windows Copilot' is set to 'Enabled' *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 18 08:05:35 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Mar 2026 10:05:35 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2026-03-18 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: ## Modified Items: - SDB - OracleDB 19c on Windows - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on Windows - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Windows - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Windows - OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Windows - OJDK 2025-10 Rollback (Superseded) - OracleDB 19c on Windows - 2025-10 Precheck (Superseded) - OracleDB 19c on Windows - 2025-10 Patch (Superseded) - OracleDB 19c on Windows - 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Windows - OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Windows - PSU 2025-10 Rollback - ContainerDB (Superseded) ## Deleted Items: ## Reason for Update: - Updating 2025-10 OracleDB 19c fixlets irrelevant. The 2025-10 Oracle 19c binaries contain a corruption bug, hence they are no longer supported. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v74 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 18 08:18:41 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Mar 2026 10:18:41 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2026-03-18 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: ## Modified Items: - ASM - OracleDB 19c on Linux - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Linux - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Linux - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Linux - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Linux - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Linux - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Linux - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on Linux - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Linux - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Linux - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Linux - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Linux - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Linux - OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-x86 - PSU 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-x86 - PSU 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-x86 - PSU 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Precheck (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 PRECHECK (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-x86 - OJVM 2025-10 PRECHECK (Superseded) - RAC - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 PRECHECK (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 Rollback (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Patch (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Rollback (Superseded) - OracleDB 19c on Linux - 2025-10 Precheck (Superseded) - OracleDB 19c on Linux - 2025-10 Patch (Superseded) - OracleDB 19c on Linux - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Linux - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Linux - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Linux - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Linux - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Linux - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Linux - 2025-10 Rollback (Superseded) - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on AIX - 2025-10 Rollback (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-SPARC - 2025-10 Rollback (Superseded) - OracleDB 19c on Solaris-x86 - 2025-10 Precheck (Superseded) - OracleDB 19c on Solaris-x86 - 2025-10 Patch (Superseded) - OracleDB 19c on Solaris-x86 - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Solaris-x86 - 2025-10 Precheck (Superseded) - ASM - OracleDB 19c on Solaris-x86 - 2025-10 Patch (Superseded) - ASM - OracleDB 19c on Solaris-x86 - 2025-10 Rollback (Superseded) - RAC - OracleDB 19c on Solaris-x86 - 2025-10 Precheck (Superseded) - RAC - OracleDB 19c on Solaris-x86 - 2025-10 Patch (Superseded) - RAC - OracleDB 19c on Solaris-x86 - 2025-10 Rollback (Superseded) - ASM - OracleDB 19c on Linux - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Linux - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Linux - PSU 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on AIX - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on AIX - PSU 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-SPARC - PSU 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJDK 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - OJVM 2025-10 Rollback - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Precheck - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Patch - ContainerDB (Superseded) - ASM - OracleDB 19c on Solaris-x86 - PSU 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJDK 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 PRECHECK - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 -OJVM 2025-10 Rollback - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Precheck - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Patch - ContainerDB (Superseded) - SDB - OracleDB 19c on Solaris-x86 - PSU 2025-10 Rollback - ContainerDB (Superseded) ## Deleted Items: ## Reason for Update: - Updating 2025-10 OracleDB 19c fixlets irrelevant. The 2025-10 Oracle 19c binaries contain a corruption bug, hence they are no longer supported. ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v100 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 18 09:07:42 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Mar 2026 12:07:42 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: New DISA STIG Checklist for Amazon Linux 2023, published 2026-03-18 Message-ID: *Product:* BigFix Compliance *Title:* New DISA STIG Checklist for Amazon Linux 2023 *Security Benchmark:* Amazon Linux 2023 STIG SCAP Benchmark, V1R1 *Published Sites:* DISA STIG Checklist for Amazon Linux 2023, site version 1 (The site version is provided for air-gap customers.) *Details: * ? Total Fixlets in Site: 182 *Additional details:* ? Both analysis and remediation checks are included. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. ? Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which require OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Action to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 10.0.8 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information: *To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: *https://forum.bigfix.com/c/release-announcements/compliance* ? BigFix Compliance SCM Checklists: *Welcome to Wikis* We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 18 11:56:03 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 18 Mar 2026 14:56:03 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-18 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 146.0.7680.80 Available - Mac OS X (ID: 83000249) Published site version: Updates for Mac Applications, version 834. Reasons for Update: A newer version of Chrome for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 08:12:06 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 10:12:06 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-19 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New : * 14011772 Google Chrome 146.0.7680.154 Available Modified : * 14011770 Google Chrome 146.0.7680.80 Available Reason : * New update for Chrome. Important Note: * No CVE details are available for the latest Chrome update; therefore, it has been released as a standard Update. The previous Security Update has been modified and added Manual Cache Published Site Version: * Updates for Windows Applications, Version: 2461 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 08:21:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 11:21:36 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Oracle Linux 9, published 2026-03-19 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Oracle Linux 9*.* *Security Benchmark:* Oracle Linux 9 STIG V1R4 *Published Sites:* DISA STIG Checklist for Oracle Linux 9, site version 2 (The site version is provided for air-gap customers.) *Details:* Total New Fixlets: 2 Total Updated Fixlets: 11 Total Deleted Fixlets: 5 Total Fixlets in Site: 442 *New Fixlets:* ? OL 9 must audit any script or executable called by cron as root or by any privileged user. ? OL 9 must terminate idle user sessions. *Updated Fixlets:* ? OL 9 must be a vendor supported release. ? OL 9 must automatically lock graphical user sessions after 15 minutes of inactivity. ? OL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation. ? OL 9 must be configured so that the systemd Ctrl-Alt-Delete burst key sequence is disabled. ? OL 9 must not install packages from the Extra Packages for Enterprise Linux (EPEL) repository. ? OL 9 must take action when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity. ? OL 9 library files must be group owned by root or a system account. ? OL 9 library files must be owned by root. ? OL 9 library files must have mode 0755 or less permissive. ? OL 9 groups must have unique Group ID (GID) ? OL 9 duplicate User IDs (UIDs) must not exist for interactive users. *Deleted Fixlets:* ? OL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS. ? OL 9 must be configured so that local initialization files do not execute world-writable programs. ? OL 9 must prevent system daemons from using Kerberos for authentication. ? OL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. ? OL 9 must disable automatic mounting of Universal Serial Bus (USB) mass storage driver. *Additional details:* ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site.. ? Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which requires OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed?, and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10.0.8 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? *BigFix Forum:* https://forum.bigfix.com/c/release-announcements/compliance ? *BigFix Compliance SCM Checklists: * https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 10:07:10 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 12:07:10 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-19 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 27 Total Fixlets in Site: 549 Release Date: 2026-03-19 Site version: 339 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 37300101 Argus Monitor v7.3.5.3152 59700101 Epic Games Launcher (MSI) v1.3.176.0 8900101 Slack v4.48.102.0 5601801 PowerToys v0.98.0 901901 AWS Command Line Interface v2 v2.34.12.0 5603601 Windows Defender Virus Definitions v1.445.612.0 55000101 HeidiSQL v12.16.0.7245 5601701 PowerShell v7.6.0 59400101 Syncovery v11.13.7 7000101 Opera Stable v129.0.5823.15 79000101 Datadog Agent v7.77.0.0 5601601 Microsoft Power BI Desktop v2.152.882.0 5604801 SQL Server Management Studio 22 v22.4.1 5602501 Microsoft Visual Studio Code x64 v1.112.0 23100101 LastPass v5.4.1.1429 2700101 Remote Desktop Manager Enterprise v2026.1.14.0 54300101 Dolt v1.83.8 62300101 Gpg4win v5.0.2.4861 6700101 OBS Studio v32.1.0 9500101 Tailscale v1.96.2 5604301 Microsoft Azure Storage Explorer v1.42.0 2800101 Docker Desktop v4.65.0 29600101 Vim v9.2.0192 70400101 CMake v4.3.0 8400101 Royal TS v7.04.50318.0 11800301 Zoom VDI Workplace v6.6.26950 5800301 Mozilla Thunderbird (x64 en-US) v148.0.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 10:32:51 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 12:32:51 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-19 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 20 Total Fixlets in Site: 216 Release Date: 2026-03-19 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 81700101 Keka v1.6.1 6700301 OBS (arm64) v32.1.0 11600401 XnViewMP v1.10.5 64004501 PowerShell (Intel) v7.6.0 81400101 Spark Desktop v3.28.3.134741 85000101 Notion v7.8.0 86600101 Arc v1.138.3 6700201 OBS (Intel) v32.1.0 9500201 Tailscale v1.96.2 64006701 PowerShell (arm64) v7.6.0 74600901 JetBrains Toolbox (arm64) v3.4.0.77112 2800201 Docker v4.65.0 70400201 CMake v4.3.0 74600801 JetBrains Toolbox (Intel) v3.4.0.77112 8900201 Slack v4.48.102 49300201 Numara (Intel) v6.7.0 86100201 Brave Browser v188.132 1000301 AnyDesk v9.6.4 84600301 gcompris-qt v4.3 9800301 Camtasia v2026.0.7 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 10:44:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 12:44:08 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-19 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 13 Total Fixlets in Site: 123 Release Date: 2026-03-19 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 4101601 google-chrome-stable (rpm) v146.0.7680.153 5600801 powershell (debian-12) v7.6.0 2800101 docker-desktop (deb) v4.65.0 5600901 powershell (debian-11) v7.6.0 86200101 discord (deb) v0.0.129 87100101 rabbitmq-server (deb) v4.2.5 2800201 docker-desktop (rpm) v4.65.0 5601001 powershell (debian-10) v7.6.0 87100201 rabbitmq-server (rpm) v4.2.5 5601101 powershell (ubuntu-20.04) v7.6.0 5601201 powershell (ubuntu-22.04) v7.6.0 4101501 google-chrome-stable (deb) v146.0.7680.153 5600701 powershell (ubuntu-24.04) v7.6.0 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 19 14:21:49 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 19 Mar 2026 16:21:49 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-19 Message-ID: Total New Fixlets: 11 Total Updated Fixlets: 212 Total Fixlets in Site: 3339 Total CVEs Covered: 980 Release Date: 2026-03-19 New Fixlets: 41850 Apple Multiple products Use-After-Free Vulnerability - Apple iOS 41870 Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Apple iOS 41820 Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Any Version of MacOS 41840 Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Oracle Linux 41780 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability - Any Version of Windows 41810 Apple Multiple products Use-After-Free Vulnerability - Any Version of MacOS 41830 Apple Multiple Products Integer Overflow or Wraparound Vulnerability - RHEL 41760 Apple Multiple Products Integer Overflow or Wraparound Vulnerability - Ubuntu 41860 Apple iOS and iPadOS Use-After-Free Vulnerability - Apple iOS 41790 Wing FTP Server Information Disclosure Vulnerability - Any Version of Windows 41800 Wing FTP Server Information Disclosure Vulnerability - Any Version of Linux Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38950 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Windows 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 38960 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 24130 WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 38980 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of MacOS 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 41580 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 40560 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 40570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 40580 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 41610 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Linux 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 41620 Google Chromium CSS Use-After-Free Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 24060 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 40670 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Windows 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 41700 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 41710 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Windows 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 40690 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 41720 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Linux 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 41730 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Linux 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 41740 Google Skia Out-of-Bounds Write Vulnerability - Any Version of MacOS 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 40720 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 41750 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of MacOS 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 39260 Meta Platforms WhatsApp Incorrect Authorization Vulnerability - Any Version of MacOS 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 35690 7-Zip Mark of the Web Bypass Vulnerability - Any Version of Windows 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 23960 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 39340 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 19890 Adobe Reader and Acrobat Input Validation Vulnerability - Any Version of MacOS 39350 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38840 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 39360 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 38850 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 06:16:20 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Mar 2026 09:16:20 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6165-1 - Chromium Security Update - Debian 12 (amd64) (ID: 61650101) * DSA-6167-1 - Gst-Plugins-Base1.0 Security Update - Debian 12 (amd64) (ID: 61670101) Published Site Version: * Patches for Debian 12, version 163. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 06:24:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Mar 2026 09:24:40 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2023:5994 - Python27:2.7 Security Update - RockyLinux 8 x86_64 (ID: 23599401) * RLSA-2023:5998 - Python39:3.9 and Python39-Devel:3.9 Security Update - RockyLinux 8 x86_64 (ID: 23599801) * RLSA-2023:6980 - Virt:Rhel and Virt-Devel:Rhel Security, Bug Fix, and Enhancement Update - RockyLinux 8 x86_64 (ID: 23698001) * RLSA-2023:7042 - Python27:2.7 Security and Bug Fix Update - RockyLinux 8 x86_64 (ID: 23704201) * RLSA-2025:17129 - Idm:Dl1 Security Update - RockyLinux 8 x86_64 (ID: 25171291) * RLSA-2026:4672 - Container-Tools:Rhel8 Security Update - RockyLinux 8 x86_64 (ID: 26467201) Published Site Version: * Patches for Rocky Linux 8, version 109. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 06:30:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Mar 2026 09:30:15 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2023:7754 - Pixman Security Update - RockyLinux 9 x86_64 (ID: 23775401) * RLSA-2026:4828 - Mysql Security Update - RockyLinux 9 x86_64 (ID: 26482801) Published Site Version: * Patches for Rocky Linux 9, version 92. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 06:31:29 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Mar 2026 09:31:29 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:4445 - .Net 10.0 Security Update - AlmaLinux 9 x86_64 (ID: 26444501) * ALSA-2026:4447 - Libvpx Security Update - AlmaLinux 9 x86_64 (ID: 26444701) * ALSA-2026:4456 - .Net 9.0 Security Update - AlmaLinux 9 x86_64 (ID: 26445601) * ALSA-2026:4472 - Compat-Openssl11 Security Update - AlmaLinux 9 x86_64 (ID: 26447201) Published Site Version: * Patches for Alma Linux 9, version 67. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 06:34:32 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 20 Mar 2026 09:34:32 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260317 - SUSE-SU-2026:0908-1 - Security update for xen - leap15.6 - (x86-64) (ID: 26031701) * 260318 - SUSE-RU-2026:0925-1 - Recommended update for mksusecd - leap15.6 - (x86-64) (ID: 26031801) * 260318 - SUSE-RU-2026:0929-1 - Recommended update for gedit - leap15.6 - (x86-64) (ID: 26031802) * 260318 - SUSE-SU-2026:0910-1 - Security update for vim - leap15.6 - (x86-64) (ID: 26031803) * 260318 - SUSE-SU-2026:0914-1 - Security update for 389-ds - leap15.6 - (x86-64) (ID: 26031804) * 260318 - SUSE-SU-2026:0917-1 - Security update for kubernetes - leap15.6 - (x86-64) (ID: 26031805) Published Site Version: * Patches for openSUSE Leap 15, version 139. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 20 07:38:56 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 20 Mar 2026 10:38:56 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-20 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 146.0.7680.154 Available - Mac OS X (ID: 83000250) Microsoft Office for Mac 2019 - Outlook 16.107.1 Available (ID: 19000678) Microsoft Office for Mac 2019 - Excel 16.107.1 Available (ID: 19000676) Microsoft Office for Mac 2019 - OneNote 16.107.1 Available (ID: 19000677) Microsoft Office for Mac 2019 - PowerPoint 16.107.1 Available (ID: 19000679) Microsoft Office for Mac 2019 - Word 16.107.1 Available (ID: 19000680) Published site version: Updates for Mac Applications, version 835. Reasons for Update: A newer version of Chrome, MS Office for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 07:31:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 10:31:19 -0400 Subject: [BESAdmin-Announcements] Announcing the Beta Release: Universal Checklist for RHEL Message-ID: Hello BigFix Community, We are excited to announce the beta release of the new Universal Checklist for RHEL, building on our ongoing initiative to simplify and streamline compliance management in BigFix. This release represents another milestone in our Universal Checklist initiative, further advancing our goal of simplifying compliance management through unified, platform-specific checklists across all supported OS versions. It is designed to reduce complexity and enhance performance across your entire environment. This next stage is focused specifically on RHEL, and here?s what it means for you today *What is the Universal Checklist for RHEL?* The Universal Checklist for RHEL is a consolidated checklist designed to assess general purpose compliance across all supported RHEL versions, both RHEL 7, 8, 9 and 10. The second beta release is a collection of all the checks from CIS and DISA benchmarks for all the supported RHELs. It allows you to enforce security configurations across your entire RHEL environment with a single action. *Technical Snapshot* Total Fixlets: 669 Fixlets with Remediation: 502 Benchmark Sources: CIS and DISA STIGs Applies To: RHEL 7, 8, 9 and 10 *Key Benefits in This Beta Release* - *Simplified Workflow*: Instead of selecting and managing multiple checklists for different OS versions (e.g., for 7, 8, 9 and 10), you can now deploy a single universal checklist to scan all your RHEL endpoints. This new model eliminates the need to manually identify, enable, and run multiple OS-specific checklists, significantly cutting down on configuration time - *Version-aware applicability*: The checklist uses version-aware applicability logic, ensuring checks only apply to relevant OS versions. *What's Changing* - *A Single Checklist Model:* You will now manage and deploy one checklist for the entire RHEL platform, rather than one for each OS version and Benchmark. *What Stays the Same* - *Custom Checklist Creation:* Your workflow for creating custom checklists is not changing. You can still use the "Create Custom Checklist" wizard with the content from this new Universal Checklist. - *Parameterization*: The ability to parameterize checks, where applicable, remains unchanged from the existing process. - *Checklist-Level Reporting:* For this beta phase, you will find the compliance score for the Universal Checklist in the same location as your other checklists SCA > Reports > Checklists section. or you can access the same data by running the existing compliance reports in Web Reports (https://\localhost>:8083/webreports) *Note:** It is important to note that this report shows the overall compliance for the general-purpose Universal Checklist itself and is not a substitute for a benchmark-specific (e.g., CIS or DISA) report.* - *Availability of Individual CIS/DISA Checklists:* This Universal Checklist is for general-purpose use. To generate specific CIS or DISA compliance reports, you must continue to use the individual CIS and DISA checklists, which will still be delivered through the existing method. *How to Get Started* The Universal Checklist for RHEL (Beta) is available now. To get started, please subscribe to the content from the [Universal Checklist for RHEL] external site and deploy it to your desired endpoints. To get started: 1. Enable and gather the Universal Checklist for RHEL external site from the License Overview Dashboard. 2. Create a custom site using Create Custom Checks wizard. 3. Change the default parameters if required. 4. If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard 5. Subscribe all the relevant RHEL (7/8/9/10) endpoints. 6. Run SCA import to get the compliance status reports. *We Need Your Feedback* As this is a beta release, your feedback is crucial. Please share your experience, report any issues, and provide suggestions in this forum thread to help us prepare for the general availability release. *What?s Next?* This is just the beginning! Future stages of the Universal Checklist initiative will include: - Expansion to other platforms like macOS, and multiple Linux distributions. - The Universal Checklist will introduce advanced framework-specific mapping for standards like CIS, DISA, PCI DSS, HIPAA, and others, enabling capabilities including: - Framework-specific scoring - Drill-down by Fixlet, device, and group - Historical trend analysis - Exportable audit reports Thank you for your continued support and participation. *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 07:36:18 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 10:36:18 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 11, published 2026-03-23 Message-ID: *Product:* BigFix Compliance *Title:* Updated *CIS Checklist for Windows 11* to support a more recent version of the benchmark. *Security Benchmark:* CIS Microsoft Windows 11 Enterprise Benchmark, V5.0.0 *Published Sites:* CIS Checklist for Windows 11, site version 15 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 14 ? Total Updated Fixlets:35 ? Total Deleted Fixlets: 31 ? Total Fixlets in Site: 560 ? *ADDED* o Ensure 'Require IPPS for IPP printers' is set to 'Enabled' o Ensure 'Enable / disable CLFS logfile authentication' is set to 'Enabled' o Ensure 'Allow Recall to be enabled' is set to 'Disabled' o Ensure 'Set TLS/SSL security policy for IPP printers: Disallow invalid certificate authority' is set to 'Enabled: Checked' o Ensure 'Set TLS/SSL security policy for IPP printers: Disallow non-server certificates' is set to 'Enabled: Checked' o Ensure 'Set TLS/SSL security policy for IPP printers: Disallow invalid certificate common name' is set to 'Enabled: Checked' o Ensure 'Set TLS/SSL security policy for IPP printers: Disallow invalid certificate date' is set to 'Enabled: Checked' o Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked' o Ensure 'Disable HTTP proxy features: Disable proxy authentication' is set to 'Enabled: Disable authentication over loopback interfaces' ? *UPDATED* o (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' o (L1) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' o (L1) Ensure 'Join Microsoft MAPS' is set to 'Disabled' o (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success? o (L1) Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special characters' or 'Passphrase' o (L2) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' o (L1) Ensure 'Prevent automatic download of applications associated with device metadata' o (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' TO include 'RESTRICTED SERVICES\PrintSpoolerService' o (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to o '%SystemRoot%\System32\logfiles\firewall\domainfw.log' TO is configured o (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\privatefw.log' TO is configured o (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log' TO is configured o (L2) Ensure 'Peer Networking Identity Manager (p2pimsvc)' is set to 'Disabled' or 'Not Installed' o (L2) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled' o (L2) Ensure 'Allow widgets' is set to 'Disabled' o Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE', RESTRICTED SERVICES\PrintSpoolerService o Ensure 'Post-authentication actions: Actions' is set to 'Enabled: Reset the password and logoff the managed account' or higher o (L2) Ensure 'Limit Diagnostic Log Collection' is set to 'Enabled' o (L2) Ensure 'Limit Dump Collection' is set to 'Enabled' o Ensure 'Peer Name Resolution Protocol (PNRPsvc)' is set to 'Disabled' or 'Not Installed' o Ensure 'Peer Networking Grouping (p2psvc)' is set to 'Disabled' or 'Not Installed' o Ensure 'PNRP Machine Name Publication Service (PNRPAutoReg)' is set to 'Disabled' or 'Not Installed' ? *DELETED* o (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' o (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)' is set to 'Enabled' o (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' o (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' o (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days' o (L1) Ensure 'Disable OneSettings Downloads' is set to 'Enabled' o (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' FROM User Section o (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE, Users' o (L1) Ensure 'Turn off Windows Copilot' is set to 'Enabled' o (L1) Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE' o (L1) Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE' o (BL) Ensure 'Interactive logon: Machine account lockout threshold' is set to '10 or fewer invalid logon attempts, but not 0' o Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires' is set to 'Enabled: 5 or fewer seconds' o Ensure 'WinHTTP Web Proxy Auto-Discovery Service (WinHttpAutoProxySvc)' is set to 'Disabled' o Ensure 'Configure use of passwords for operating system drives' is set to 'Disabled' o Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False' o Ensure 'Require additional authentication at startup' is set to 'Enabled' o Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Disabled' ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=enus#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 07:39:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 10:39:30 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Oracle 19c Database on Linux, published 2026-03-19 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Oracle 19C database on Linux *Security Benchmark:* CIS Oracle Database 19c Benchmark v2.0.0 *Published Sites:* CIS Checklist for Oracle 19C database on Linux, site version 11. (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 58 ? Total Updated Fixlets:26 ? Total Fixlets in Site: 88 - Updated all checks with descriptions aligned to the latest benchmark standards, including revised Source IDs and SCM IDs to improve traceability and compliance mapping. - As a result of SCM ID and Source ID updates, all checks will appear as removed and newly added within the Sync Wizard during synchronization. This behavior is expected. - Refactored and optimized checks to enhance execution performance, stability, and error handling. - Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* - To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. - If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see BigFix Compliance (hcltechsw.com) *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: - BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance - BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team.* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 08:37:23 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 10:37:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-23 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 5058878 Microsoft Edge Extended Stable Build 146.0.3856.72 Available * 5058880 Microsoft Edge Extended Stable Build 146.0.3856.72 Available (x64) * 5058849 Microsoft Edge Stable Build 146.0.3856.72 Available * 5058851 Microsoft Edge Stable Build 146.0.3856.72 Available (x64) Modified: * 14011772 Google Chrome 146.0.7680.154 Available * 14011770 Google Chrome 146.0.7680.80 Available (Superseded) * 5058874 Microsoft Edge Extended Stable Build 146.0.3856.62 Available (Superseded) * 5058876 Microsoft Edge Extended Stable Build 146.0.3856.62 Available (x64) (Superseded) * 5058845 Microsoft Edge Stable Build 146.0.3856.62 Available (Superseded) * 5058847 Microsoft Edge Stable Build 146.0.3856.62 Available (x64) (Superseded) Reason for Update: * New update for Edge. * Added CVE details for Chrome and superseded previous update. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2462 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 10:57:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 12:57:08 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-23 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:508551607] 5085516: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5085516 (arm64) * Major [ID:508551605] 5085516: Cumulative Update for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5085516 (arm64) * Major [ID:508551603] 5085516: Cumulative Update for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5085516 (x64) * Major [ID:508551601] 5085516: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5085516 (x64) * Major [ID:50725339 ] 5072533: Update for Microsoft Visual Studio 2026 version 18.4.1 - KB5072533 * Major [ID:500736379] 5007364: Update for Microsoft Visual Studio 2022 version 17.14.29 - KB5007364 Reason for Update: * New OOB updates from Microsoft. * New Visual Studio Updates from Microsoft. Additional Notes: * None. Actions to Take: None Published site version: Patches for Windows, Version: 4691 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 11:32:31 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 14:32:31 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Checklist for Windows 2016, published 2026-03-19 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Windows 2016 *Security Benchmark:* CIS Microsoft Windows Server 2016 Benchmark, V4.0.0. *Published Sites:* CIS Checklist for Windows 2016 MS, site version 22. (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 13 ? Total Updated Fixlets:5 ? Total Deleted Fixlets: 2 ? Total Fixlets in Site: 387 ? *NEW FIXLET* o (L1) Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Disabled' o (L1) Ensure 'Configure multicast DNS (mDNS) protocol' is set to 'Disabled' o (L2) Ensure 'Turn off default IPv6 DNS Servers' is set to 'Enabled' o (L1) Ensure 'Do not apply the Mark of the Web tag to files copied from insecure sources' is set to 'Disabled' o (L1) Ensure 'Control whether exclusions are visible to local users' is set to 'Enabled' o (L1) Ensure 'Enable EDR in block mode' is set to 'Enabled' o (L2) Ensure 'Convert warn verdict to block' is set to 'Enabled' o (L1) Ensure 'Configure real-time protection and Security Intelligence Updates during OOBE' is set to 'Enabled' o (L2) Ensure 'Configure Brute-Force Protection aggressiveness' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Configure Remote Encryption Protection Mode' is set to 'Enabled: Audit' or higher o (L2) Ensure 'Configure how aggressively Remote Encryption Protection blocks threats' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Scan excluded files and directories during quick scans' is set to 'Enabled: 1' o (L1) Ensure 'Trigger a quick scan after X days without any scans' is set to 'Enabled: 7' ? *UPDATED FIXLET* ? (L1) Ensure 'Enable Certificate Padding' is set to 'Enabled'' ? (L1) Ensure 'Configure RPC packet level privacy setting for incoming connections' is set to 'Enabled' (moved from 18.4.1 to 18.7.8) ? (L1) Ensure 'Network access: Named Pipes that can be accessed anonymously' is configured (MS only) - Renamed ? (L1)Ensure 'Network access: Remotely accessible registry paths' is configured - Renamed ? (L1)Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configured - Renamed ? *DELETED FIXLET* ? (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled' ? (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled' *Published Sites:* CIS Checklist for Windows 2016 DC, site version 22. (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 13 ? Total Updated Fixlets:5 ? Total Deleted Fixlets: 2 ? Total Fixlets in Site: 384 ? *NEW FIXLET* o (L1) Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Disabled' o (L1) Ensure 'Configure multicast DNS (mDNS) protocol' is set to 'Disabled' o (L2) Ensure 'Turn off default IPv6 DNS Servers' is set to 'Enabled' o (L1) Ensure 'Do not apply the Mark of the Web tag to files copied from insecure sources' is set to 'Disabled' o (L1) Ensure 'Control whether exclusions are visible to local users' is set to 'Enabled' o (L1) Ensure 'Enable EDR in block mode' is set to 'Enabled' o (L2) Ensure 'Convert warn verdict to block' is set to 'Enabled' o (L1) Ensure 'Configure real-time protection and Security Intelligence Updates during OOBE' is set to 'Enabled' o (L2) Ensure 'Configure Brute-Force Protection aggressiveness' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Configure Remote Encryption Protection Mode' is set to 'Enabled: Audit' or higher o (L2) Ensure 'Configure how aggressively Remote Encryption Protection blocks threats' is set to 'Enabled: Medium' or higher o (L1) Ensure 'Scan excluded files and directories during quick scans' is set to 'Enabled: 1' o (L1) Ensure 'Trigger a quick scan after X days without any scans' is set to 'Enabled: 7' ? *UPDATED FIXLET* ? (L1) Ensure 'Enable Certificate Padding' is set to 'Enabled'' ? (L1) Ensure 'Configure RPC packet level privacy setting for incoming connections' is set to 'Enabled' (moved from 18.4.1 to 18.7.8) ? (L1) Ensure 'Network access: Named Pipes that can be accessed anonymously' is configured (DC only) - Renamed ? (L1)Ensure 'Network access: Remotely accessible registry paths' is configured - Renamed ? (L1)Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configured - Renamed ? *DELETED FIXLET* ? (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled' ? (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled' ? Metadata has been incorporated into all the checks. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html?hl=using%2Csynchronize%2Ccustom%2Cchecks%2Cwizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 14:15:20 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 16:15:20 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-23 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 15 Total Fixlets in Site: 123 Release Date: 2026-03-23 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 84900101 brave-browser (deb) v1.88.134 87600901 logstash (deb) v9.3.2 87601401 metricbeat (rpm) v9.3.2 84900201 brave-browser (rpm) v1.88.134 87601001 logstash (rpm) v9.3.2 87600601 elasticsearch (rpm) v9.3.2 87601101 filebeat (deb) v9.3.2 87601201 filebeat (rpm) v9.3.2 5600501 microsoft-edge-stable (deb) v146.0.3856.72-1 67700501 vivaldi-stable (deb) v7.9.3970.41 19300501 dbeaver-ce (rpm) v26.0.1 87600501 elasticsearch (deb) v9.3.2 5600601 microsoft-edge-stable (rpm) v146.0.3856.72-1 87601301 metricbeat (deb) v9.3.2 67700601 vivaldi-stable (rpm) v7.9.3970.41 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 14:30:24 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 16:30:24 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-23 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 19 Total Fixlets in Site: 216 Release Date: 2026-03-23 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 81000201 UVtools (arm64) v6.0.1 43800201 Cryptomator (Intel) v1.19.2 87000201 Ulaa (arm64) v146.0.7680.154 19600401 VSCodium (arm64) v1.112.01907 86600101 Arc v1.139.0 87000101 Ulaa (Intel) v146.0.7680.154 6300201 Nextcloud v4.0.8 19600301 VSCodium (Intel) v1.112.01907 86700101 WebWork Tracker v6.14.24 87100101 CotEditor v6.2.6 19300301 DBeaver (arm64) v26.0.1 64900301 Sigil (arm64) v2.7.6 64007001 Microsoft Teams v26043.2109.4484.3337 12100201 HandBrake v1.11.1 19300201 DBeaver (Intel) v26.0.1 49300201 Numara (Intel) v6.8.0 6900201 OpenShot Video Editor v3.5.0 43800301 Cryptomator (arm64) v1.19.2 81000301 UVtools (Intel) v6.0.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 14:47:06 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 16:47:06 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-23 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 39 Total Fixlets in Site: 552 Release Date: 2026-03-23 Site version: 342 New Fixlets: Updated Fixlets: 4900101 TreeSize Free v4.8.1 12100101 HandBrake v1.11.1 49300101 Numara v6.8.0 55300101 K-Lite v19.6.0.0 64900101 Sigil v2.7.6 67000201 Cold Turkey Blocker v4.9 67700101 Vivaldi v7.9.3970.41 6900101 OpenShot v3.5.0 72100101 Twine v2.11.1 901901 AWS Command Line Interface v2 v2.34.14.0 5603601 Windows Defender Virus Definitions v1.445.706.0 2100501 ShareFile v25.9.2 3400101 Git v2.53.0 55000101 HeidiSQL v12.16.0.7256 59400101 Syncovery v11.13.8 79800101 Able2Extract Professional v21.0 81000101 UVtools v6.0.1 2900401 Beats winlogbeat v9.3.2 5604401 Microsoft Edge WebView2 Runtime (Standalone) v146.0.3856.72 2300101 CPUID CPU-Z v2.19 23500101 PhraseExpress v18.0.67 54300101 Dolt v1.84.0 58300101 Kinovea v2025.2.0 6300101 Nextcloud v4.0.8.20260319 900601 AWS SAM Command Line Interface v1.156.0 9500101 Tailscale v1.96.3 5801301 Firefox Developer Edition (x64 en-US) v149.0 63300701 Altova XMLSpy Professional v2026.0.0.0 19600101 VSCodium (x64) v1.112.01907 29600101 Vim v9.2.0219 44800101 Chocolatey GUI v3.0.0.0 62800101 Greenshot v1.3.315 16900201 Duo Desktop v7.16.0.0 26500201 AOMEI Backupper v8.2.0.0 29300201 windows_exporter v0.31.5 67700201 Vivaldi v7.9.3970.41 63300601 Altova XMLSpy Enterprise v2026.0.0.0 43803901 Cryptomator (MSI) v1.19.2.6322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 23 16:28:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 23 Mar 2026 18:28:36 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-23 Message-ID: Total New Fixlets: 10 Total Updated Fixlets: 690 Total Fixlets in Site: 3355 Total CVEs Covered: 985 Release Date: 2026-03-23 New Fixlets: 41920 Apple Multiple Products Buffer Overflow Vulnerability - Any Version of MacOS 41890 Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability - Any Version of Linux 41960 Apple Multiple Products Classic Buffer Overflow Vulnerability - Apple iOS 41930 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability - SharePoint 41900 Apple Multiple Products Improper Locking Vulnerability - Any Version of MacOS 41970 Apple Multiple Products Buffer Overflow Vulnerability - Apple iOS 41940 Apple Multiple Products Buffer Overflow Vulnerability - RHEL 41910 Apple Multiple Products Classic Buffer Overflow Vulnerability - Any Version of MacOS 41880 Apple Multiple Products Buffer Overflow Vulnerability - Debian 41950 Apple Multiple Products Improper Locking Vulnerability - Apple iOS Updated Fixlets: 6150 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows 10 26630 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 11 8200 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2016 6160 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows 10 8210 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2016 8220 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 16420 Adobe Flash Player Remote Code Execution Vulnerability - Any Version of Windows 6180 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 6190 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows 10 8240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 30770 Microsoft SharePoint Server Privilege Escalation Vulnerability - SharePoint 6200 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 8250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2016 30780 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - SharePoint 8260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 6230 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows 10 8280 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 39000 Microsoft SharePoint Improper Authentication Vulnerability - SharePoint 6240 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8290 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 39010 Microsoft SharePoint Code Injection Vulnerability - SharePoint 6250 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 8300 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 24690 Microsoft Excel Remote Code Execution Vulnerability - Excel 6260 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 36980 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 36990 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 30850 Microsoft SharePoint Server Code Injection Vulnerability - SharePoint 37000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 8330 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 24720 Microsoft Excel Security Feature Bypass - Excel 16530 Adobe Flash Player Integer Overflow Vulnerability - Any Version of Windows 6290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 28820 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 8340 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 6300 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 37020 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 28830 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 28840 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2019 8360 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2016 6320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows 10 37040 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 28850 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 8370 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 41140 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2016 6330 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 37050 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 28860 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 10 8380 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 41150 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2016 6340 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8390 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 28870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 41160 Microsoft Windows Type Confusion Vulnerability - Windows Server 2016 6350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 28880 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows Server 2022 41170 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2016 8410 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 41180 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2016 6370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 41190 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2012 8430 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 41200 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2012 16630 Adobe Flash Player Dereferenced Pointer Vulnerability - Any Version of Windows 6390 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8440 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 41210 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2012 37120 Apache Tomcat Path Equivalence Vulnerability - Any Version of Windows 6400 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8450 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2016 41220 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2012 6410 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows 10 41230 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2012 R2 8470 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 41240 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2012 R2 6430 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8480 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2016 41250 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2012 R2 6440 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 8490 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 41260 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2012 R2 16690 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 6450 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows 10 8500 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 6460 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 10 6470 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8520 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2016 6480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 8540 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2016 6500 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 10 8550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 41320 Microsoft Windows Improper Privilege Management Vulnerability - Windows 10 8560 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 41330 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows 10 31090 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2012 R2 41340 Microsoft Windows Type Confusion Vulnerability - Windows 10 31100 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 8580 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 41350 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows 10 31110 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 6540 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 8590 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 31120 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 41360 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows 10 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 22930 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows 10 6550 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 8600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2016 31140 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows Server 2022 6570 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2016 31150 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 16820 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 6580 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 8630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 35260 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2016 6590 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8640 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 31170 Microsoft Windows Hyper-V Privilege Escalation Vulnerability - Windows 11 35270 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2019 6600 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 8650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2016 31180 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 35280 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 10 41430 Microsoft Windows Improper Privilege Management Vulnerability - Windows 11 27100 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 10 6620 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows 10 8670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 41440 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows 11 16870 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 27110 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 10 6630 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 8680 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2016 41450 Microsoft Windows Type Confusion Vulnerability - Windows 11 35310 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows Server 2022 6640 Microsoft Windows SAM Local Privilege Escalation Vulnerability - Windows 10 8690 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 29170 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 20980 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows 10 41460 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows 11 23030 Microsoft .NET Framework, SharePoint, and Visual Studio Remote Code Execution Vulnerability - Windows Server 2016 35320 Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability - Windows 11 6650 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows 10 29180 Microsoft Windows Internet Shortcut Files Security Feature Bypass Vulnerability - Windows 11 20990 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows 10 41470 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows 11 27140 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 41480 Microsoft Windows Shell Protection Mechanism Failure Vulnerability - Windows Server 2025 6670 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 27150 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2019 21010 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 41490 Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability - Windows Server 2025 14870 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 6680 Microsoft GDI Remote Code Execution Vulnerability - Windows 10 27160 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2016 21020 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows 10 41500 Microsoft Windows Improper Privilege Management Vulnerability - Windows Server 2025 14880 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6690 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows 10 41510 Microsoft Windows Type Confusion Vulnerability - Windows Server 2025 25130 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 14890 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 6700 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 41520 Microsoft Windows NULL Pointer Dereference Vulnerability - Windows Server 2025 16950 Adobe Flash Player and AIR Integer Overflow Vulnerability - Any Version of Windows 6710 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 27190 Microsoft Word Information Disclosure Vulnerability - Word 6720 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows Server 2019 6730 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 6740 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows Server 2019 25180 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 16990 Adobe Flash Player Arbitrary Code Execution Vulnerability - Any Version of Windows 6750 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2019 39520 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 25190 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 6760 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2019 6770 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2019 37490 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2016 37500 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2019 6780 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2019 37510 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 10 6790 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 6800 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27280 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows Server 2022 39570 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 31380 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2012 R2 17050 Adobe Flash Player Memory Corruption Vulnerability - Any Version of Windows 6810 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2019 39580 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 27290 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 31390 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2016 6820 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2019 37540 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2022 27300 Microsoft Streaming Service Proxy Privilege Escalation Vulnerability - Windows 11 31400 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 6830 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows Server 2019 27310 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 31410 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 6840 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 37560 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows 11 31420 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2016 6850 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 37570 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability - Windows Server 2025 31430 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 6860 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2019 31440 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2019 6870 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2019 31450 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 6880 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 21220 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 31460 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27370 Microsoft WordPad Information Disclosure Vulnerability - Windows 10 6890 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 21230 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2019 31470 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2019 6900 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2019 29430 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2016 21240 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 31480 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 6910 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 29440 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2019 31490 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 10 21250 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2019 27400 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2019 6920 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29450 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 10 31500 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 21260 Microsoft Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 15120 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 6930 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2019 27410 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2016 29460 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows Server 2022 31510 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 21270 Microsoft Edge and Internet Explorer Memory Corruption Vulnerability - Windows Server 2016 6940 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 29470 Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability - Windows 11 31520 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 10 15140 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 6950 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 29480 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2019 31530 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 21290 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 6960 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 27440 Microsoft WordPad Information Disclosure Vulnerability - Windows Server 2022 29490 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 10 21300 Microsoft Windows Certificate Dialog Privilege Escalation Vulnerability - Windows Server 2016 6970 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2019 27450 Microsoft WordPad Information Disclosure Vulnerability - Windows 11 6980 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2019 39750 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2022 31560 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows Server 2022 6990 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2019 29520 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows Server 2022 31570 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 7000 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 29530 Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability - Windows 11 31580 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2022 7010 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2019 31590 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows Server 2022 7020 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31600 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2022 7030 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 31610 Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability - Windows 11 35710 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2016 7040 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 31620 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 7050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2019 31630 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 11 33680 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 35730 Microsoft .NET Framework Information Disclosure Vulnerability - Windows 10 7060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 31640 Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - Windows 11 33690 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2016 7070 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 31650 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 11 33700 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 7080 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 33710 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2019 7090 Microsoft Windows Spoofing Vulnerability - Windows Server 2019 33720 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 25530 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 10 7100 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2019 33730 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 10 25540 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 10 7110 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2019 25550 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 7120 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows Server 2019 7130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 33760 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows Server 2022 7140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2019 33770 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 35820 Microsoft .NET Framework Information Disclosure Vulnerability - Windows Server 2022 7150 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 33780 Microsoft Windows Management Console Remote Code Execution Vulnerability - Windows 11 7160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 33790 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 35850 Microsoft .NET Framework Information Disclosure Vulnerability - Windows 11 27660 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 35860 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2016 27670 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 10 7190 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 29720 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 35870 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 27680 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 7200 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2019 29730 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 35880 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2019 27690 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 10 7210 Microsoft Windows SMB Information Disclosure Vulnerability - Windows Server 2019 29740 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 39980 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows Server 2016 25650 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2019 35890 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 7220 Microsoft Windows MSHTML Platform Remote Code Execution Vulnerability - Windows Server 2019 39990 Microsoft Windows Improper Access Control Vulnerability - Windows Server 2016 35900 Microsoft Windows Storage Link Following Vulnerability - Windows 10 25660 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2019 7230 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 40000 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows Server 2016 29760 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 35910 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 10 25670 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 7240 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 40010 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows Server 2019 29770 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 33870 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2016 25680 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2016 7250 Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability - Windows Server 2019 27730 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2016 40020 Microsoft Windows Improper Access Control Vulnerability - Windows Server 2019 33880 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2019 13400 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 25690 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2016 7260 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2019 27740 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 40030 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows Server 2019 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 33890 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 10 13410 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2022 25700 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 35940 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2022 7270 Microsoft Update Notification Manager Privilege Escalation Vulnerability - Windows Server 2019 27750 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 40040 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows 10 29800 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2019 37990 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 13420 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 33900 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows Server 2022 35950 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 27760 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2019 7280 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 29810 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 10 40050 Microsoft Windows Improper Access Control Vulnerability - Windows 10 38000 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2016 13430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2022 33910 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability - Windows 11 35960 Microsoft Windows Storage Link Following Vulnerability - Windows 11 27770 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2019 7290 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2019 40060 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows 10 38010 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2016 29820 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows Server 2022 13440 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2022 35970 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows 11 27780 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 7300 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2019 38020 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2016 29830 Microsoft SmartScreen Prompt Security Feature Bypass Vulnerability - Windows 11 13450 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 35980 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 27790 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2019 7310 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 38030 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 R2 13460 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2022 35990 Microsoft Windows Storage Link Following Vulnerability - Windows Server 2025 7320 Microsoft Windows NTFS Privilege Escalation Vulnerability - Windows Server 2019 38040 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2012 13470 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 38050 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 7330 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 13480 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 33960 Microsoft SharePoint Deserialization Vulnerability - SharePoint 38060 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2019 7340 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 40110 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows Server 2022 13490 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows Server 2022 38070 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2019 7350 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2019 40120 Microsoft Windows Improper Access Control Vulnerability - Windows Server 2022 38910 Microsoft SharePoint Deserialization of Untrusted Data Vulnerability - SharePoint 13500 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows Server 2022 38080 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2019 7360 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29890 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2016 40130 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows Server 2022 13510 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 38090 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2019 7370 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29900 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2019 13520 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 15570 Adobe Flash Player and AIR Use-After-Free Vulnerability - Any Version of Windows 38100 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 10 7380 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 29910 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 10 13530 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 38110 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 10 7390 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2019 29920 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows Server 2022 13540 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2022 38120 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows 10 7400 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2019 29930 Microsoft Windows MSHTML Platform Security Feature Bypass Vulnerability - Windows 11 13550 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2022 38130 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 10 7410 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2019 40180 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows 11 13560 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 38140 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows 10 7420 Microsoft Windows Update Medic Service Privilege Escalation Vulnerability - Windows Server 2019 40190 Microsoft Windows Improper Access Control Vulnerability - Windows 11 13570 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 7430 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows Server 2019 27910 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows Server 2022 40200 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows 11 13580 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 27920 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 40210 Microsoft Windows Improper Access Control Vulnerability - Windows Server 2025 13590 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2022 5400 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows 10 7450 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 27930 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 40220 Microsoft Windows Untrusted Pointer Dereference Vulnerability - Windows Server 2025 13600 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2022 5410 Microsoft Windows AppX Deployment Server Privilege Escalation Vulnerability - Windows 10 7460 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows Server 2019 27940 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows Server 2022 38180 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 40230 Microsoft Windows SMB Client Improper Access Control Vulnerability - Windows Server 2025 13610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2022 5420 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 7470 Microsoft Netlogon Privilege Escalation Vulnerability - Windows Server 2019 38190 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2022 27950 Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 11 13620 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2022 5430 Microsoft Windows Kernel Information Disclosure Vulnerability - Windows 10 7480 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 38200 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2022 27960 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 13630 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2022 7490 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2019 38210 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2022 27970 Microsoft Windows SmartScreen Security Feature Bypass Vulnerability - Windows 11 13640 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 5450 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows 10 38220 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2022 27980 Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability - Windows 11 13650 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2022 5460 Microsoft Internet Explorer Type Confusion Vulnerability - Windows 10 7510 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2019 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 13660 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability - Windows Server 2022 5470 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows 10 7520 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 40290 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2016 13670 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2022 5480 Microsoft Windows Runtime Remote Code Execution Vulnerability - Windows 10 7530 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows Server 2019 40300 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2012 R2 13680 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2022 15730 Adobe Flash Player Unspecified Vulnerability - Any Version of Windows 7540 Microsoft Windows Win32k Privilege Escalation Vulnerability - Windows Server 2019 38260 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows 11 40310 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2012 13690 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 7550 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2019 38270 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows 11 40320 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2019 30080 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2016 13700 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2022 7560 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2019 38280 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows 11 30090 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2019 5520 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 7570 Microsoft Windows Universal Plug and Play (UPnP) Service Privilege Escalation Vulnerability - Windows Server 2019 38290 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows 11 30100 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 10 40340 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2022 5530 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 7580 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2019 38300 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows 11 40350 Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability - Windows Server 2025 5540 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 10 36260 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows Server 2016 7590 Microsoft GDI Remote Code Execution Vulnerability - Windows Server 2019 38310 Microsoft Windows DWM Core Library Use-After-Free Vulnerability - Windows Server 2025 30120 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows Server 2022 32170 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2016 7600 Microsoft Internet Explorer Remote Code Execution Vulnerability - Windows Server 2019 38320 Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability - Windows Server 2025 30130 Microsoft DWM Core Library Privilege Escalation Vulnerability - Windows 11 32180 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2016 36280 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability - Windows 10 5560 Microsoft Windows AppX Deployment Extensions Privilege Escalation Vulnerability - Windows 10 7610 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2019 38330 Microsoft Windows Scripting Engine Type Confusion Vulnerability - Windows Server 2025 32190 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2016 7620 Microsoft Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2016 38340 Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability - Windows Server 2025 32200 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2019 38350 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 32210 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2019 5590 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 7640 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 32220 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2019 32230 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 10 13800 Microsoft Windows Graphic Component Privilege Escalation Vulnerability - Windows 11 5610 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows 10 32240 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 10 13810 Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability - Windows 11 5620 Microsoft MSHTML Remote Code Execution Vulnerability - Windows 10 7670 Microsoft Internet Explorer Information Disclosure Vulnerability - Windows Server 2016 32250 Microsoft Windows Update Use-After-Free Vulnerability - Windows 10 5630 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows 10 7680 Microsoft Internet Explorer Type Confusion Vulnerability - Windows Server 2016 32260 HTTP/2 Rapid Reset Attack Vulnerability - Windows 10 5640 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows 10 36360 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2016 7690 Microsoft Windows CryptoAPI Spoofing Vulnerability - Windows Server 2016 5650 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 36370 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2016 7700 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 5660 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows 10 36380 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2016 7710 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 13860 Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability - Windows 11 36390 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows Server 2016 7720 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows Server 2016 5680 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows 10 36400 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2016 7730 Microsoft Windows Local Security Authority (LSA) Spoofing Vulnerability - Windows Server 2016 22070 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2022 5690 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows 10 36410 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2016 32320 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows Server 2022 36420 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2019 40520 Microsoft Windows Race Condition Vulnerability - Windows 11 32330 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows Server 2022 24140 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 5710 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36430 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2019 7760 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 40530 Microsoft Windows Race Condition Vulnerability - Windows Server 2025 32340 HTTP/2 Rapid Reset Attack Vulnerability - Windows Server 2022 13910 Microsoft Windows Scripting Languages Remote Code Execution Vulnerability - Windows 11 5720 Microsoft Windows LSA Spoofing Vulnerability - Windows 10 36440 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2019 30300 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2016 5730 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 36450 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2019 7780 Microsoft Windows Installer Privilege Escalation Vulnerability - Windows Server 2016 30310 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2019 24170 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 36460 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2019 7790 Microsoft MSHTML Remote Code Execution Vulnerability - Windows Server 2016 30320 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 10 36470 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 10 7800 Microsoft Windows AppX Deployment Service Privilege Escalation Vulnerability - Windows Server 2016 30330 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows Server 2022 32380 Microsoft Windows Installer Improper Privilege Management Vulnerability - Windows 11 36480 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 10 5760 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 7810 Microsoft Windows Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 30340 Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability - Windows 11 32390 Microsoft Windows Mark of the Web (MOTW) Protection Mechanism Failure Vulnerability - Windows 11 13960 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 11 36490 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 10 5770 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows 10 7820 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 32400 HTTP/2 Rapid Reset Attack Vulnerability - Windows 11 36500 Microsoft Windows Win32k Use-After-Free Vulnerability - Windows 10 5780 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows 10 7830 Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability - Windows Server 2016 26260 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows Server 2022 13980 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 11 36510 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 10 26270 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows Server 2022 7840 Microsoft Windows User Profile Service Privilege Escalation Vulnerability - Windows Server 2016 13990 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 36520 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 10 26280 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows Server 2022 7850 Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability - Windows Server 2016 26290 Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability - Windows 11 26300 Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability - Windows 11 7870 Microsoft Windows LSA Spoofing Vulnerability - Windows Server 2016 26310 Microsoft Windows Error Reporting Service Privilege Escalation Vulnerability - Windows 11 7880 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 14030 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 5840 Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability - Windows 10 32470 Adobe Flash Player Double Free Vulnerablity - Any Version of Windows 14040 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 11 7900 Microsoft Windows Print Spooler Remote Code Execution Vulnerability - Windows Server 2016 7910 Microsoft Windows Error Reporting (WER) Privilege Escalation Vulnerability - Windows Server 2016 5870 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows 10 36590 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2022 7920 Microsoft Windows DNS Server Remote Code Execution Vulnerability - Windows Server 2016 5880 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36600 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2022 5890 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36610 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2022 36620 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2022 5910 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows 10 36630 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2022 40730 Microsoft Windows Use After Free Vulnerability - Windows Server 2019 5920 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 7970 Microsoft Active Directory Domain Services Privilege Escalation Vulnerability - Windows Server 2016 40740 Microsoft Windows Use After Free Vulnerability - Windows 10 32560 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2016 5940 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows 10 38710 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2016 32570 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2019 8000 Microsoft Windows Adobe Font Manager Library Remote Code Execution Vulnerability - Windows Server 2016 38720 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 R2 32580 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 10 5960 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 10 8010 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 38730 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2012 26450 Microsoft Windows Search Remote Code Execution Vulnerability - Windows 10 36690 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows 11 38740 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2019 40790 Microsoft Windows Use After Free Vulnerability - Windows Server 2022 5980 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows 10 36700 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows 11 38750 Microsoft Windows External Control of File Name or Path Vulnerability - Windows 10 8030 Microsoft Windows Print Spooler Privilege Escalation Vulnerability - Windows Server 2016 40800 Microsoft Windows Use After Free Vulnerability - Windows 11 32610 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows Server 2022 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 36710 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows 11 40810 Microsoft Windows Use After Free Vulnerability - Windows Server 2025 32620 Microsoft Windows MSHTML Platform Spoofing Vulnerability - Windows 11 6000 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 36720 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows 11 8050 Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability - Windows Server 2016 38770 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2022 6010 Microsoft Windows Spoofing Vulnerability - Windows 10 26490 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2019 8060 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows Server 2016 36730 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows 11 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 6020 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows 10 36740 Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability - Windows Server 2025 38790 Microsoft Windows External Control of File Name or Path Vulnerability - Windows 11 6030 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows 10 26510 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2016 8080 Microsoft Enhanced Cryptographic Provider Privilege Escalation Vulnerability - Windows Server 2016 36750 Microsoft Windows Management Console (MMC) Improper Neutralization Vulnerability - Windows Server 2025 38800 Microsoft Windows External Control of File Name or Path Vulnerability - Windows Server 2025 6040 Microsoft Windows Event Tracing Privilege Escalation Vulnerability - Windows 10 36760 Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability - Windows Server 2025 8090 Microsoft Win32k Privilege Escalation Vulnerability - Windows Server 2016 40860 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2016 6050 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows 10 36770 Microsoft Windows NTFS Information Disclosure Vulnerability - Windows Server 2025 8100 Microsoft Windows Spoofing Vulnerability - Windows Server 2016 40870 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2012 R2 6060 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows 10 36780 Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability - Windows Server 2025 8110 Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability - Windows Server 2016 40880 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2012 6070 Microsoft Windows AppX Deployment Service (AppXSVC) Privilege Escalation Vulnerability - Windows 10 8120 Microsoft Windows Privilege Common Log File System (CLFS) Escalation Vulnerability - Windows Server 2016 40890 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2019 8130 Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability - Windows Server 2016 40900 Microsoft Windows Information Disclosure Vulnerability - Windows 10 6090 Microsoft Windows Privilege Escalation Vulnerability - Windows 10 8140 Microsoft Task Scheduler Privilege Escalation Vulnerability - Windows Server 2016 40910 Microsoft Windows Information Disclosure Vulnerability - Windows Server 2022 22480 Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability - Windows 11 6100 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows 10 40920 Microsoft Windows Information Disclosure Vulnerability - Windows 11 6110 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows 10 8160 Microsoft Windows Privilege Escalation Vulnerability - Windows Server 2016 16360 Trihedral VTScada (formerly VTS) Denial-of-Service Vulnerability - Any Version of Windows 6120 Microsoft Win32k Privilege Escalation Vulnerability - Windows 10 8170 Microsoft Windows Kernel Privilege Escalation Vulnerability - Windows Server 2016 6130 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows 10 26610 Microsoft Windows Search Remote Code Execution Vulnerability - Windows Server 2022 8180 Microsoft .NET Framework Remote Code Execution Vulnerability - Windows Server 2016 6140 Microsoft Windows SMB Information Disclosure Vulnerability - Windows 10 8190 Microsoft Windows Error Reporting Manager Privilege Escalation Vulnerability - Windows Server 2016 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:09:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:09:36 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Message-ID: New content have been added to the Patches for Amazon Linux 2 site. New Fixlets: * ALAS2-2026-3191 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2 x86_64 (ID: 2631911) * ALAS2-2026-3192 - Lcms2 Security update - Amazon linux 2 x86_64 (ID: 2631921) * ALAS2-2026-3193 - Postgresql Security update - Amazon linux 2 x86_64 (ID: 2631931) * ALAS2-2026-3195 - Compat-Libtiff3 Security update - Amazon linux 2 x86_64 (ID: 2631951) * ALAS2-2026-3196 - Libtiff Security update - Amazon linux 2 x86_64 (ID: 2631961) * ALAS2-2026-3197 - Gvfs Security update - Amazon linux 2 x86_64 (ID: 2631971) * ALAS2-2026-3198 - Thunderbird Security update - Amazon linux 2 x86_64 (ID: 2631981) * ALAS2-2026-3199 - Freerdp Security update - Amazon linux 2 x86_64 (ID: 2631991) * ALAS2-2026-3201 - Exiv2 Security update - Amazon linux 2 x86_64 (ID: 2632011) * ALAS2-2026-3202 - Golist Security update - Amazon linux 2 x86_64 (ID: 2632021) * ALAS2-2026-3203 - Golang Security update - Amazon linux 2 x86_64 (ID: 2632031) * ALAS2-2026-3204 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 2632041) * ALAS2-2026-3205 - 389-Ds-Base Security update - Amazon linux 2 x86_64 (ID: 2632051) * ALAS2-2026-3206 - Libsodium Security update - Amazon linux 2 x86_64 (ID: 2632061) * ALAS2-2026-3207 - Amazon-Ssm-Agent Security update - Amazon linux 2 x86_64 (ID: 2632071) * ALAS2-2026-3208 - Wireshark Security update - Amazon linux 2 x86_64 (ID: 2632081) Published Site Version: * Patches for Amazon Linux 2, version 202. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:12:41 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:12:41 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton site. New Fixlets: * ALAS2-2026-3191 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2 aarch64 (ID: 2631911) * ALAS2-2026-3192 - Lcms2 Security update - Amazon linux 2 aarch64 (ID: 2631921) * ALAS2-2026-3193 - Postgresql Security update - Amazon linux 2 aarch64 (ID: 2631931) * ALAS2-2026-3195 - Compat-Libtiff3 Security update - Amazon linux 2 aarch64 (ID: 2631951) * ALAS2-2026-3196 - Libtiff Security update - Amazon linux 2 aarch64 (ID: 2631961) * ALAS2-2026-3197 - Gvfs Security update - Amazon linux 2 aarch64 (ID: 2631971) * ALAS2-2026-3198 - Thunderbird Security update - Amazon linux 2 aarch64 (ID: 2631981) * ALAS2-2026-3199 - Freerdp Security update - Amazon linux 2 aarch64 (ID: 2631991) * ALAS2-2026-3201 - Exiv2 Security update - Amazon linux 2 aarch64 (ID: 2632011) * ALAS2-2026-3202 - Golist Security update - Amazon linux 2 aarch64 (ID: 2632021) * ALAS2-2026-3203 - Golang Security update - Amazon linux 2 aarch64 (ID: 2632031) * ALAS2-2026-3204 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 2632041) * ALAS2-2026-3205 - 389-Ds-Base Security update - Amazon linux 2 aarch64 (ID: 2632051) * ALAS2-2026-3206 - Libsodium Security update - Amazon linux 2 aarch64 (ID: 2632061) * ALAS2-2026-3207 - Amazon-Ssm-Agent Security update - Amazon linux 2 aarch64 (ID: 2632071) * ALAS2-2026-3208 - Wireshark Security update - Amazon linux 2 aarch64 (ID: 2632081) Published Site Version: * Patches for Amazon Linux 2 Graviton, version 130. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:14:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:14:19 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Extras site. New Fixlets: * ALAS2PHP8.2-2026-010 - Libsodium Security update - Amazon linux 2 x86_64 (ID: 260103) * ALAS2GIMP-2026-012 - Gimp Security update - Amazon linux 2 x86_64 (ID: 260121) * ALAS2TOMCAT9-2026-024 - Tomcat Security update - Amazon linux 2 x86_64 (ID: 260241) * ALAS2FIREFOX-2026-054 - Firefox Security update - Amazon linux 2 x86_64 (ID: 260541) * ALAS2KERNEL-5.15-2026-099 - Kernel Security update - Amazon linux 2 x86_64 (ID: 260993) * ALAS2KERNEL-5.10-2026-114 - Kernel Security update - Amazon linux 2 x86_64 (ID: 261141) Published Site Version: * Patches for Amazon Linux 2 Extras, version 28. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:15:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:15:58 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2 Graviton Extras Message-ID: New content have been added to the Patches for Amazon Linux 2 Graviton Extras site. New Fixlets: * ALAS2PHP8.2-2026-010 - Libsodium Security update - Amazon linux 2 aarch64 (ID: 260102) * ALAS2TOMCAT9-2026-024 - Tomcat Security update - Amazon linux 2 aarch64 (ID: 260241) * ALAS2FIREFOX-2026-054 - Firefox Security update - Amazon linux 2 aarch64 (ID: 260541) * ALAS2KERNEL-5.15-2026-099 - Kernel Security update - Amazon linux 2 aarch64 (ID: 260993) * ALAS2KERNEL-5.10-2026-114 - Kernel Security update - Amazon linux 2 aarch64 (ID: 261141) Published Site Version: * Patches for Amazon Linux 2 Graviton Extras, version 28. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:17:04 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:17:04 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 11 Message-ID: New content have been added to the Patches for Debian 11 site. New Fixlets: * Unspecified - Libvirt-Wireshark - Debian 11 (amd64) (ID: 26032001) Published Site Version: * Patches for Debian 11, version 130. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:18:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:18:15 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6170-1 - Snapd Security Update - Debian 12 (amd64) (ID: 61700101) * DSA-6171-1 - Chromium Security Update - Debian 12 (amd64) (ID: 61710101) * DSA-6172-1 - Webkit2gtk Security Update - Debian 12 (amd64) (ID: 61720101) * DSA-6173-1 - Freeciv Security Update - Debian 12 (amd64) (ID: 61730101) * DSA-6175-1 - Libyaml-Syck-Perl Security Update - Debian 12 (amd64) (ID: 61750101) Published Site Version: * Patches for Debian 12, version 164. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:24:39 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:24:39 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2026:5113 - Gimp:2.8 Security Update - RockyLinux 8 x86_64 (ID: 26511301) Published Site Version: * Patches for Rocky Linux 8, version 110. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:25:30 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:25:30 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:4760 - Grub2 Security Update - AlmaLinux 9 x86_64 (ID: 26476001) * ALSA-2026:4828 - Mysql Security Update - AlmaLinux 9 x86_64 (ID: 26482801) * ALSA-2026:4898 - Capstone Security Update - AlmaLinux 9 x86_64 (ID: 26489801) * ALSA-2026:5080 - Libarchive Security Update - AlmaLinux 9 x86_64 (ID: 26508001) Published Site Version: * Patches for Alma Linux 9, version 68. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:25:41 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:25:41 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 10 Message-ID: New content have been added to the Patches for Alma Linux 10 site. New Fixlets: * ALSA-2026:4629 - Libvpx Security Update - AlmaLinux 10 x86_64 (ID: 26462901) * ALSA-2026:4649 - Grub2 Security Update - AlmaLinux 10 x86_64 (ID: 26464901) * ALSA-2026:4705 - Nginx Security Update - AlmaLinux 10 x86_64 (ID: 26470501) * ALSA-2026:4713 - Python3.12 Security Update - AlmaLinux 10 x86_64 (ID: 26471301) * ALSA-2026:4715 - Vim Security Update - AlmaLinux 10 x86_64 (ID: 26471501) * ALSA-2026:4717 - Opencryptoki Security Update - AlmaLinux 10 x86_64 (ID: 26471701) * ALSA-2026:5063 - Libarchive Security Update - AlmaLinux 10 x86_64 (ID: 26506301) * ALSA-2026:5145 - Yggdrasil-Worker-Package-Manager Security Update - AlmaLinux 10 x86_64 (ID: 26514501) * ALSA-2026:5146 - Yggdrasil Security Update - AlmaLinux 10 x86_64 (ID: 26514601) Published Site Version: * Patches for Alma Linux 10, version 3. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 05:27:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 24 Mar 2026 08:27:58 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260319 - SUSE-SU-2026:0931-1 - Security update for jq - leap15.6 - (x86-64) (ID: 26031901) * 260319 - SUSE-SU-2026:0933-1 - Security update for freerdp - leap15.6 - (x86-64) (ID: 26031902) * 260320 - SUSE-SU-2026:0938-1 - Security update for GraphicsMagick - leap15.6 - (x86-64) (ID: 26032001) Published Site Version: * Patches for openSUSE Leap 15, version 140. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 07:27:27 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Mar 2026 10:27:27 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-24 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Google Chrome 146.0.7680.165 Available - Mac OS X (ID: 83000251) Published site version: Updates for Mac Applications, version 836. Reasons for Update: A newer version of Chrome for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 07:33:20 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Mar 2026 10:33:20 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for MS SQL Server 2022, published 2026-03-24 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for MS SQL Server 2022 to support a more recent version of the benchmark *Security Benchmark:* DISA STIG for MS SQL Server 2022 Database_V1R2_Instance_V1R3 *Published Sites:* DISA STIG Checklist for MS SQL Server 2022, site version 3 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 2 ? Total Deleted Fixlets: 0 ? Total Fixlets in Site: 43 ? Updated checks ? V-271268, V-271351, V-271400 ? Updated the query logic. ? Optimized the code and improved the exception handling ? Enhanced and optimized Fixlet relevance to provide accurate validation of results, including improved handling of file-related exceptions. ? Both analysis and remediation checks are included ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 24 07:52:17 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 24 Mar 2026 09:52:17 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-24 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 14011774 Google Chrome 146.0.7680.165 Available * 5058882 Microsoft Edge Extended Stable Build 146.0.3856.78 Available * 5058884 Microsoft Edge Extended Stable Build 146.0.3856.78 Available (x64) * 5058853 Microsoft Edge Stable Build 146.0.3856.78 Available * 5058855 Microsoft Edge Stable Build 146.0.3856.78 Available (x64) Modified: * 14011772 Google Chrome 146.0.7680.154 Available (Superseded) Reason for Update: * New updates for Chrome and Edge. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2463 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 25 08:43:01 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Mar 2026 16:43:01 +0100 Subject: [BESAdmin-Announcements] BigFix Inventory: Application Update 11.0.7.0 published 2026-03-25 Message-ID: The BigFix Inventory Team is proud to announce the new version of the *BigFix Inventory*. *Product: * BigFix Inventory application update 11.0.7.0 *Published site: * BigFix Inventory version 14 *Features: * Key features in HCL BigFix Inventory 11.0.7.0: * License Optimizer: A ready-to-use dashboards for Microsoft SQL Server Standard Edition and Microsoft SQL Server Enterprise Edition. For more details, refer to https://help.hcl-software.com/bigfix/11.0/inventory/Inventory/overview/license_optimizer_MSSQL.html * Idea BFINV-I-433 : Threshold in *All Contracts* can be defined now as Percentage or Fix Value. Previously defined contracts have Fixed Value as default. * Updated the Health Check dashboard with focus on hardware scan status and software scan status and drill down to review status details. For more details, refer to https://help.hcl-software.com/bigfix/11.0/inventory/Inventory/overview/health_check_dashboard.html * New *Software Scan Status* information in *Computers/Hardware Inventory* reports. The status information is grouped into three categories: Success, Partial and Failed and more granular information explains the reason ie. Partial: Not scanned in last 14 days, Failed: Last upload failing. For more details, refer to help.hcl-software.com/bigfix/11.0/inventory/Inventory/admin/software_scan_status.html * Ideas BFINV-I -109 , BFINV-I-261 : New *VM Manager Tool* panel to manage configuration and installation of VM Manager tools directly from the BigFix Inventory UI and enhancements to the *VM Managers* report. * User Interface style and colors changes in data grids and *Edit Contract * panel * Idea BFINV-I-249 , BFINV-I-375 : Automatic bundle and confirmation for components with higher version. Component classification and instance tags are preserved in case of component upgrade on the same computer as classified before. * The *Continuous Discovery Processing* enhancements - Initial Product assignment - Support for Disconnected Scans and Detailed Hardware Scan processing * BigFix Inventory 11.0.7 is an equivalent to IBM License Metric Tool 9.2.42 for IBM Virtualization Capacity reporting 1. The scanner equivalent - BigFix Scanner v11.0.42.0 is available under the BigFix Scanner site. For details refer to the scanner release notes: https://support.bigfix.com/scanner/BigFix-Scanner-11.0.42.0-ReleaseNotes.pdf 2. Audit snapshot is extended with three columns: Component GUID, Product Version GUID, and IBM Product Bundle GUID. 3. The new version is under certification process by IBM on the release date. To view the status of IBM validated releases, refer to https://public.dhe.ibm.com/software/passportadvantage/SubCapacity/BFI_and_HCL_FAQ.pdf * Usability and serviceability enhancements - BFINV-I-461 Data Source Name added to warning log messages - BFINV-I-511 REST API to retrieve information about utilization of license metrics per server - Dynamic activation of debug logging without server restart - Extended Oracle Measurement - output file size reduced by 10% and format improvements * Catalog 20260308 is included in the server package Catalog extended with HCL BigFix Products and bundling options. This is an incremental update to address BFINV-I-203 . Refer to the catalog release notes for details. * Support for new systems and platforms - Ideas BFINV-I-380 , BFINV-I-398 Amazon Linux (ARM) as managed device - Idea BFINV-I-446 BigFix Inventory server support for Amazon RDS database - Red Hat Enterprise Linux 9 and 10 supported by VM Manager Tool * Security enhancements - IBM WebSphere Liberty was upgraded to Open Liberty version 26.0.0.1 - A number of other libraries have been updated. To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Server and tools: https://support.bigfix.com/bfi/BigFix-Inventory-11.0.7.0-ReleaseNotes.pdf Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20260308-ReleaseNotes.pdf Scanner: https://support.bigfix.com/scanner/BigFix-Scanner-11.0.42.0-ReleaseNotes.pdf *Actions needed: * To upgrade the BigFix Inventory server to application update 11.0.7.0, run the *Upgrade to the latest version of BigFix Inventory* Fixlet from the BigFix console and the *BigFix Inventory* site. Important! It is recommended to restart the BigFix Inventory Server after successful database schema upgrade to ensure proper initialization of internal information about current database schema. *Apache Log4j configuration file (log4j2.xml) is reset to default settings during VM Manager Tool and SAP Metric Data Collector update. If the file contains user customization, it is advised to create a backup of the file before the update. After update the customization can be manually restored, according to the new file format.* The complete upgrade procedure and post-upgrade steps are available in the product documentation: https://help.hcl-software.com/bigfix/11.0/inventory/Inventory/upgrading/t_upgrading.html https://help.hcl-software.com/bigfix/11.0/BigFix_Scanner/BigFix_Scanner/Installation/upgrading_scanner_tools_actions.html For more information about how to install, maintain, and use the BigFix Inventory application, refer to the user documentation: https://help.hcl-software.com/bigfix/11.0/inventory/welcome/BigFix_Inventory_welcome.html To find out more about Software Asset Management at BigFix, visit the BigFix page: https://www.hcl-software.com/bigfix/software-asset-management We hope you find this latest release of BigFix Inventory content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 25 09:25:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Mar 2026 11:25:09 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-25 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:304198028] Office 365 Version 16.0.19822.20114 Available for Network Share for Office 365 - Current Channel - Office 365 * Major [ID:304198005] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Vietnamese) * Major [ID:304198033] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Update from Local Client Cache) * Major [ID:304198032] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Ukrainian) * Major [ID:304198043] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Turkish) * Major [ID:304198021] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Thai) * Major [ID:304198014] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Swedish) * Major [ID:304198004] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Spanish) * Major [ID:304198020] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Spanish (Mexico)) * Major [ID:304198003] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Slovenian) * Major [ID:304198018] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Slovak) * Major [ID:304198038] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Serbian Latin) * Major [ID:305198000] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Russian) * Major [ID:304198011] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Portuguese (Brazilian)) * Major [ID:304198040] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Portugese (Portugal)) * Major [ID:304198009] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Polish) * Major [ID:304198012] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Norwegian) * Major [ID:304198025] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Lithuanian) * Major [ID:304198002] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Korean) * Major [ID:304198022] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Japanese) * Major [ID:304198013] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Italian) * Major [ID:304198023] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Indonesian) * Major [ID:304198031] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Hungarian) * Major [ID:304198030] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Hindi) * Major [ID:304198036] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Hebrew) * Major [ID:304198007] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Greek) * Major [ID:304198024] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (German) * Major [ID:304198029] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (French) * Major [ID:304198010] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Finnish) * Major [ID:304198037] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (English (United States)) * Major [ID:304198027] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (English (United Kingdom)) * Major [ID:304198039] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Dutch) * Major [ID:304198041] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Danish) * Major [ID:304198015] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Czech) * Major [ID:304198017] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Chinese (Traditional)) * Major [ID:304198035] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Chinese (Simplified)) * Major [ID:304198016] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Bulgarian) * Major [ID:304198042] Office 365 Version 16.0.19822.20114 Available - Current Channel - Office 365 (Arabic) * Major [ID:304198006] Office 2024 Version 16.0.19822.20114 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail * Major [ID:304198034] Office 2024 Version 16.0.19822.20114 Available - Current Channel - Office 2024 Retail * Major [ID:304198008] Office 2024 Version 16.0.19822.20114 Available - Current Channel - Office 2024 (Update from Local Client Cache) * Major [ID:304198001] Office 2021 Version 16.0.19822.20114 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail * Major [ID:304198019] Office 2021 Version 16.0.19822.20114 Available - Current Channel - Office 2021 Retail * Major [ID:304198026] Office 2021 Version 16.0.19822.20114 Available - Current Channel - Office 2021 (Update from Local Client Cache) Modified: * Major [ID:304197252] Office 365 Version 16.0.19725.20190 Available for Network Share for Office 365 - Current Channel - Office 365 (Superseded) * Major [ID:304197233] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Vietnamese) (Superseded) * Major [ID:304197253] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Update from Local Client Cache) (Superseded) * Major [ID:304197254] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Ukrainian) (Superseded) * Major [ID:304197222] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Turkish) (Superseded) * Major [ID:304197225] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Thai) (Superseded) * Major [ID:304197241] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Swedish) (Superseded) * Major [ID:304197236] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Spanish) (Superseded) * Major [ID:304197224] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Spanish (Mexico)) (Superseded) * Major [ID:304197227] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Slovenian) (Superseded) * Major [ID:304197231] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Slovak) (Superseded) * Major [ID:304197249] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Serbian Latin) (Superseded) * Major [ID:304197237] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Russian) (Superseded) * Major [ID:304197217] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Portuguese (Brazilian)) (Superseded) * Major [ID:304197246] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Portugese (Portugal)) (Superseded) * Major [ID:304197250] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Polish) (Superseded) * Major [ID:304197228] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Norwegian) (Superseded) * Major [ID:304197235] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Lithuanian) (Superseded) * Major [ID:304197258] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Korean) (Superseded) * Major [ID:304197240] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Japanese) (Superseded) * Major [ID:304197232] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Italian) (Superseded) * Major [ID:304197247] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Indonesian) (Superseded) * Major [ID:304197245] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Hungarian) (Superseded) * Major [ID:304197242] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Hindi) (Superseded) * Major [ID:304197229] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Hebrew) (Superseded) * Major [ID:304197220] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Greek) (Superseded) * Major [ID:304197221] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (German) (Superseded) * Major [ID:304197223] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (French) (Superseded) * Major [ID:304197218] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Finnish) (Superseded) * Major [ID:304197234] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (English (United States)) (Superseded) * Major [ID:304197226] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (English (United Kingdom)) (Superseded) * Major [ID:304197248] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Dutch) (Superseded) * Major [ID:304197239] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Danish) (Superseded) * Major [ID:304197216] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Czech) (Superseded) * Major [ID:304197251] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Chinese (Traditional)) (Superseded) * Major [ID:304197219] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Chinese (Simplified)) (Superseded) * Major [ID:304197255] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Bulgarian) (Superseded) * Major [ID:304197230] Office 365 Version 16.0.19725.20190 Available - Current Channel - Office 365 (Arabic) (Superseded) * Major [ID:304197259] Office 2024 Version 16.0.19725.20190 Available for Network Share for Office 2024 - Current Channel - Office 2024 Retail (Superseded) * Major [ID:304197257] Office 2024 Version 16.0.19725.20190 Available - Current Channel - Office 2024 Retail (Superseded) * Major [ID:304197243] Office 2024 Version 16.0.19725.20190 Available - Current Channel - Office 2024 (Update from Local Client Cache) (Superseded) * Major [ID:304197244] Office 2021 Version 16.0.19725.20190 Available for Network Share for Office 2021 - Current Channel - Office 2021 Retail (Superseded) * Major [ID:304197238] Office 2021 Version 16.0.19725.20190 Available - Current Channel - Office 2021 Retail (Superseded) * Major [ID:304197256] Office 2021 Version 16.0.19725.20190 Available - Current Channel - Office 2021 (Update from Local Client Cache) (Superseded) Reason for Update: * New Office updates from Microsoft. Additional Notes: * None. Actions to Take: None Published site version: Patches for Windows, Version: 4692 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 25 09:26:11 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Mar 2026 12:26:11 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: NEW CIS Checklist for Windows 2025 Stand-alone, published 2026-03-18 Message-ID: *Product:* BigFix Compliance *Title:* New CIS Checklist for Windows 2025 Stand-alone *Security Benchmark:* CIS Checklist for Windows 2025 Stand-alone Benchmark, V1.0.0. *Published Sites:* CIS Checklist for Windows 2025 Stand-alone, site version 1. (The site version is provided for air-gap customers.) *Details:* ? Total Fixlets in Site: 389 * Additional details:* ?Deploy and Run? task has been implemented to validate compliance for the following rules: ? (L1) Ensure ?Network access: Allow anonymous SID/Name translation? is set to ?Disabled? ? (L1) Ensure ?Password must meet complexity requirements? is set to ?Enabled? ? (L1) Ensure ?Store passwords using reversible encryption? is set to ?Disabled? Note: This task has to be run periodically. Both analysis and remediation checks are included Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 11.0.3 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html?hl=using%2Csynchronize%2Ccustom%2Cchecks%2Cwizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 25 09:36:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Mar 2026 17:36:15 +0100 Subject: [BESAdmin-Announcements] BigFix Scanner Update 11.0.42.0 published 2026-03-25 Message-ID: The BigFix Scanner Team is proud to announce the new version of the* BigFix Scanner*. *Published site: * BigFix Scanner version 9 *Features: * Key features in this update: * Technical equivalent to IBM Common Inventory Technology component v9.2.42. * Response to Idea BFINV-I-424 : Support for signatures with JAR file inspection - Solution integrated into the Wscan scanning engine. - Inspection Depth: Scans performed at Level 1; nested JAR files within an archive are not inspected in this version. * Technical Preview: Service component for MAC OS to collect device metrics for BigFix solutions - Use the *Activate/Deactivate Preview Features* Fixlets to install/uninstall - Note: No support for the Wscan component on MAC OS * Support for new systems Ideas BFINV-I-380 , BFINV-I-398 Support for Amazon Linux on ARM64 * All Windows-based executables transitioned to a new Code Signing Certificate * Selected scanner fixes. To view the details related to the preview feature and scanner defects that were fixed in this update, refer to the release notes https://support.bigfix.com/scanner/BigFix-Scanner-11.0.42.0-ReleaseNotes.pdf For more information about the supported systems, refer to the BigFix Scanner documentation https://help.hcl-software.com/bigfix/11.0/BigFix_Scanner/BigFix_Scanner/Installation/supported_managed_devices.html The BigFix team published a set of articles explaining the change related to the new Scanner site, scanner naming, versioning, common and product specific fixlets. For details refer to the BigFix Scanner documentation. *Actions needed: * Run the *Install or Upgrade scanner* Fixlet from the *BigFix Scanner* site to install or upgrade both Service and Wscan components. *Deploying default BigFix Scanner means installation of additional Windows service. Please consult and agree within wider IT teams rollout of this across the environment. Some systems might monitor introducing new service on Windows endpoints and trigger alerts.* Run the *Install or Upgrade Scanner - Wscan Only* Fixlet in case you would like to install or upgrade the Wscan component. The complete upgrade procedure and post-upgrade steps are available in the product documentation: https://help.hcl-software.com/bigfix/11.0/BigFix_Scanner/BigFix_Scanner/Installation/upgrading_scanner_tools_actions.html . For more information about how to install, maintain, and use the BigFix Scanner, refer to https://help.hcl-software.com/bigfix/11.0/BigFix_Scanner/index.html. We hope you find this latest release of BigFix Scanner content useful and effective. Thank you! ? The BigFix Scanner Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Wed Mar 25 09:49:04 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Wed, 25 Mar 2026 11:49:04 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-25 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 6082511 Mozilla Firefox 149.0 Available * 6082256 Mozilla Firefox (x64) 149.0 Available * 6082519 Mozilla Firefox 140.9.0 ESR Available * 6082517 Mozilla Firefox (x64) 140.9.0 ESR Available * 6082515 Mozilla Firefox 115.34.0 ESR Available * 6082513 Mozilla Firefox (x64) 115.34.0 ESR Available * 6101844 Mozilla Thunderbird 149.0 Available * 6101846 Mozilla Thunderbird 140.9.0 ESR Available * 5058857 Zoom (x64) 7.0.0.33767 Available Modified: * 6082509 Mozilla Firefox 148.0.2 Available (Superseded) * 6082254 Mozilla Firefox (x64) 148.0.2 Available (Superseded) * 6082501 Mozilla Firefox 140.8.0 ESR Available (Superseded) * 6082499 Mozilla Firefox (x64) 140.8.0 ESR Available (Superseded) * 6082505 Mozilla Firefox 115.33.0 ESR Available (Superseded) * 6082503 Mozilla Firefox (x64) 115.33.0 ESR Available (Superseded) * 6101842 Mozilla Thunderbird 148.0.1 Available (Superseded) * 6101840 Mozilla Thunderbird 140.8.1 ESR Available (Superseded) * 6101838 Mozilla Thunderbird 148.0 Available (Superseded) * 6101836 Mozilla Thunderbird 140.8.0 ESR Available (Superseded) Reason for Update: * New updates for Firefox, Thunderbird and Zoom. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2464 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 26 06:53:05 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Mar 2026 08:53:05 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-26 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 4001344 Notepad++ (x64) 8.9.3 Available * 4001343 Notepad++ 8.9.3 Available Modified: * 4001342 Notepad++ (x64) 8.9.2 Available (Superseded) * 4001341 Notepad++ 8.9.2 Available (Superseded) Reason for Update: * New update for Notepad++. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2465 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 26 08:50:45 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Mar 2026 10:50:45 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-26 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:405262303] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 (x64) * Major [ID:405262302] 4052623: Update for Microsoft Defender antimalware platform - Microsoft Defender Antivirus - KB4052623 Modified: * Major [ID:500280603] MS25-DEC: Security Update for Microsoft Word 2016 - Word 2016 - KB5002806 (x64) (Superseded) * Major [ID:500281903] MS25-DEC: Security Update for Microsoft Office 2016 - Office 2016 - KB5002819 (x64) (Superseded) * Major [ID:500280901] MS25-NOV: Security Update for Microsoft Office 2016 - Office 2016 - KB5002809 (x64) (Superseded) * Major [ID:500281003] MS25-NOV: Security Update for Microsoft Office 2016 - Office 2016 - KB5002810 (x64) (Superseded) * Major [ID:500271903] MS25-OCT: Security Update for Microsoft Office 2016 - Office 2016 - KB5002719 (x64) (Superseded) * Major [ID:500275701] MS25-OCT: Security Update for Microsoft Office 2016 - Office 2016 - KB5002757 (x64) (Superseded) * Major [ID:500279203] MS25-OCT: Security Update for Microsoft Office 2016 - Office 2016 - KB5002792 (x64) (Superseded) * Major [ID:500278903] MS25-OCT: Security Update for Microsoft Word 2016 - Word 2016 - KB5002789 (x64) (Superseded) * Major [ID:500278103] MS25-SEP: Security Update for Microsoft Office 2016 - Office 2016 - KB5002781 (x64) (Superseded) * Major [ID:500277903] MS25-SEP: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002779 (x64) (Superseded) * Major [ID:500278003] MS25-SEP: Security Update for Microsoft Word 2016 - Word 2016 - KB5002780 (x64) (Superseded) * Major [ID:500275603] MS25-AUG: Security Update for Microsoft Office 2016 - Office 2016 - KB5002756 (x64) (Superseded) * Major [ID:500276503] MS25-AUG: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002765 (x64) (Superseded) * Major [ID:500276303] MS25-AUG: Security Update for Microsoft Word 2016 - Word 2016 - KB5002763 (x64) (Superseded) * Major [ID:500276103] 5002761: Update for Microsoft OneNote 2016 - OneNote 2016 - KB5002761 (x64) * Major [ID:500274503] MS25-JUL: Security Update for Microsoft Word 2016 - Word 2016 - KB5002745 (x64) (Superseded) * Major [ID:500274603] MS25-JUL: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002746 (x64) (Superseded) * Major [ID:500274203] MS25-JUL: Security Update for Microsoft Office 2016 - Office 2016 - KB5002742 (x64) (Superseded) * Major [ID:500273403] MS25-JUL: Security Update for Microsoft Office 2016 - Office 2016 - KB5002734 (x64) (Superseded) * Major [ID:500265503] MS25-JUL: Security Update for Microsoft Office 2016 - Office 2016 - KB5002655 (x64) (Superseded) * Major [ID:500271003] MS25-JUN: Security Update for Microsoft Word 2016 - Word 2016 - KB5002710 (x64) (Superseded) * Major [ID:500268903] MS25-JUN: Security Update for Microsoft PowerPoint 2016 - PowerPoint 2016 - KB5002689 (x64) (Superseded) * Major [ID:500273003] MS25-JUN: Security Update for Microsoft Office 2016 - Office 2016 - KB5002730 (x64) (Superseded) * Major [ID:500271103] MS25-MAY: Security Update for Microsoft Office 2016 - Office 2016 - KB5002711 (x64) (Superseded) * Major [ID:500271603] MS25-MAY: Security Update for Microsoft Office 2016 - Office 2016 - KB5002716 (x64) (Superseded) * Major [ID:448443201] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB4484432 (x64) (Superseded) * Major [ID:500258801] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002588 (x64) (Superseded) * Major [ID:500270003] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002700 (x64) (Superseded) * Major [ID:500270301] MS25-APR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002703 (x64) (Superseded) * Major [ID:500262201] MS25-APR: Security Update for Microsoft OneNote 2016 - Office 2016 - KB5002622 (x64) * Major [ID:500270201] MS25-APR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002702 (x64) (Superseded) * Major [ID:500269401] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002694 (x64) (Superseded) * Major [ID:500269301] MS25-MAR: Security Update for Microsoft Office 2016 - Office 2016 - KB5002693 (x64) (Superseded) * Major [ID:500266201] MS25-MAR: Security Update for Microsoft Word 2016 - Word 2016 - KB5002662 (x64) (Superseded) * Major [ID:500268401] MS25-FEB: Security Update for Microsoft Office 2016 - Office 2016 - KB5002684 (x64) (Superseded) * Major [ID:500268601] MS25-FEB: Security Update for Microsoft Office 2016 - Office 2016 - KB5002686 (x64) (Superseded) * Major [ID:500265603] MS25-JAN: Security Update for Microsoft Outlook 2016 - Outlook 2016 - KB5002656 (x64) (Superseded) * Major [ID:500259401] 5002594: Update for Microsoft OneNote 2016 - OneNote 2016 - KB5002594 (x64) * Major [ID:500254501] 5002545: Update for Microsoft OneNote 2016 - OneNote 2016 - KB5002545 (x64) * Major [ID:500250001] 5002500: Update for Microsoft OneNote 2016 - OneNote 2016 - KB5002500 (x64) * Major [ID:448443401] MS23-AUG: Security Update for Microsoft OneNote 2016 - OneNote 2016 - KB4484434 (x64) * Major [ID:448432901] 4484329: Update for OneNote 2016 - OneNote 2016 - KB4484329 (x64) * Major [ID:1609927] MS16-099: Security Update for Microsoft Office - OneNote 2016 - KB3115419 (x64) Reason for Update: * New Office updates from Microsoft. Additional Notes: * None. Actions to Take: None Published site version: Patches for Windows, Version: 4693 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 26 09:15:04 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Mar 2026 11:15:04 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-26 Message-ID: Total New Fixlets: 15 Total Updated Fixlets: 49 Total Fixlets in Site: 565 Release Date: 2026-03-26 Site version: 343 New Fixlets: 5800801 Midori Browser (x64 en-US) v11.6.3 66000101 MPC-HC v2.6.4.12 65500101 SmartTaskbar v1.4.5 74600101 Lenovo System Update v5.08.03.59 87900101 ExplorerPatcher v26100.4946.69.6 2700201 UniGetUI v2026.1.3.0 7700201 Plex HTPC (EXE) v1.71.1 8400201 Royal Server v5.3.60108.0 88100101 Shotcut v26.2.26 7700301 Plex (EXE) v1.112.0 89000101 PostgreSQL 18 (EXE) v18.3.2 89000201 PostgreSQL 17 (EXE) v17.9.2 89000301 PostgreSQL 16 (EXE) v16.13.2 89100101 Ditto (EXE) v3.25.113.0 88200101 MuseScore Studio (MSI) v4.6.5.253511702 Updated Fixlets: 11300101 WinSCP v6.5.6 2000901 WebexNonLocalized (x64) v46.3.1.34493 10500101 UltraEdit v32.2.0.21 23700101 Prey v1.13.25 1000201 AnyDesk (EXE) v9.6.12 49300101 Numara v6.8.1 37300101 Argus Monitor v7.3.5.3154 6500101 Node.js LTS v24.14.1 20700301 Logi Options v2.1.854977 21500301 SyncBackSE v11.3.142.0 55100301 ImageMagick v7.1.2.18 84500101 Waterfox v6.6.10 5603601 Windows Defender Virus Definitions v1.447.6.0 901901 AWS Command Line Interface v2 v2.34.17.0 2100501 ShareFile v26.3.12 21400101 GadgetPack v40.0.0 55000101 HeidiSQL v12.16.0.7258 59400101 Syncovery v11.13.9 1500201 Atlassian Companion (Machine) v3.1.0.0 21500201 SyncBackPro v11.3.142.0 64200101 LLVM v22.1.2 7000101 Opera Stable v129.0.5823.22 79000101 Datadog Agent v7.77.1.0 9600301 TeamViewer Host v15.76.3.0 5604401 Microsoft Edge WebView2 Runtime (Standalone) v146.0.3856.78 9600701 TeamViewer Host v15.76.3 5601601 Microsoft Power BI Desktop v2.152.1057.0 21500101 SyncBackFree v11.3.142.0 2700101 Remote Desktop Manager Enterprise v2026.1.15.0 5602501 Microsoft Visual Studio Code x64 v1.113.0 6300101 Nextcloud v33.0.0.20260323 60400201 WizTree v4.31 65100101 Obsidian v1.12.7 67700101 Vivaldi v7.9.3970.45 67900101 SteelSeries GG v107.0.0 74300101 Free Download Manager v6.33.2.6656 8700101 Beyond Compare v5.2.1 9600201 TeamViewer v15.76.3 5801301 Firefox Developer Edition (x64 en-US) v150.0 87000101 ProfiCAD (EXE) v13.4.9 29600101 Vim v9.2.0240 2800101 Docker Desktop v4.66.0 52000101 Coder v2.31.6.0 5200101 Krita v5.3.0 6500201 Node.js v25.8.2 67700201 Vivaldi v7.9.3970.45 9600101 TeamViewer v15.76.3 5800301 Mozilla Thunderbird (x64 en-US) v149.0.0 5604601 Azure Connected Machine Agent v1.62.03365.2847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 26 09:42:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Mar 2026 11:42:19 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-26 Message-ID: Total New Fixlets: 12 Total Updated Fixlets: 14 Total Fixlets in Site: 135 Release Date: 2026-03-26 New Fixlets: 88600501 Zettlr (deb) v4.3.0 88500601 Draw.io (rpm) v29.6.1 88000501 DbGate (deb) v7.1.5 87900501 SmartGit (deb) v25.1.110 87700501 Trilium_Notes (deb) v0.102.1 87800501 EdrawMax (deb) v15.0.6 87800601 EdrawMax (rpm) v15.0.6 88100501 Portmaster (deb) v2.1.7 88200501 WireDesktop (deb) v3.40.3882 88300501 Rambox (deb) v2.6.1 88400501 Ferdium (deb) v7.1.1 88500501 Draw.io (deb) v29.6.1 Updated Fixlets: 4101601 google-chrome-stable (rpm) v146.0.7680.164 2800101 docker-desktop (deb) v4.66.0 11800101 zoom (deb) v7.0.0.1666 84900101 brave-browser (deb) v1.88.136 85000101 rclone (deb) v1.73.3 2800201 docker-desktop (rpm) v4.66.0 11800201 zoom (rpm) v7.0.0.1666 84900201 brave-browser (rpm) v1.88.136 85000201 rclone (rpm) v1.73.3 86200101 discord (deb) v0.0.130 67700501 vivaldi-stable (deb) v7.9.3970.45 8700501 BeyondCompare (deb) v5.2.1 67700601 vivaldi-stable (rpm) v7.9.3970.45 4101501 google-chrome-stable (deb) v146.0.7680.164 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Thu Mar 26 10:32:02 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Thu, 26 Mar 2026 12:32:02 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-26 Message-ID: Total New Fixlets: 12 Total Updated Fixlets: 9 Total Fixlets in Site: 228 Release Date: 2026-03-26 New Fixlets: 87900101 Fetch v5.8.3 87300101 Flameshot v13.3.0 87400101 CellProfiler v4.2.8 87600101 AltTab v10.3.0 87800101 Balsamiq Wireframes v4.8.6 60100201 SonicWall Cloud Secure Edge (Intel) v4.0.1 87500201 Chatbox (Intel) v1.19.0 87300201 Flameshot (arm64) v13.3.0 87500301 Chatbox (arm64) v1.19.0 88000101 BBEdit v15.5.5 88100201 Blender (arm64) v5.0.1 88200101 Jitsi Meet v2026.1.1 Updated Fixlets: 74600801 JetBrains Toolbox (Intel) v3.4.1.78303 74600901 JetBrains Toolbox (arm64) v3.4.1.78303 85000101 Notion v7.9.0 87000101 Ulaa (Intel) v146.0.7680.165 49300201 Numara (Intel) v6.8.1 7800201 Podman Desktop v1.26.1 87000201 Ulaa (arm64) v146.0.7680.165 7800301 Podman Desktop (arm64) v1.26.1 8700301 Beyond Compare v5.2.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 05:37:19 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Mar 2026 08:37:19 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * DSA-6176-1 - Strongswan Security Update - Debian 12 (amd64) (ID: 61760101) * DSA-6177-1 - Chromium Security Update - Debian 12 (amd64) (ID: 61770101) * DSA-6178-1 - Firefox-Esr Security Update - Debian 12 (amd64) (ID: 61780101) Published Site Version: * Patches for Debian 12, version 165. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 05:48:35 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Mar 2026 08:48:35 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2026:5578 - Virt:Rhel and Virt-Devel:Rhel Security Update - RockyLinux 8 x86_64 (ID: 26557801) * RLSA-2026:5580 - Mysql:8.0 Security Update - RockyLinux 8 x86_64 (ID: 26558001) Published Site Version: * Patches for Rocky Linux 8, version 111. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 05:56:13 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Mar 2026 08:56:13 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:5640 - Mysql:8.4 Security Update - RockyLinux 9 x86_64 (ID: 26564001) Published Site Version: * Patches for Rocky Linux 9, version 93. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:00:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 09:00:08 -0400 Subject: [BESAdmin-Announcements] NIS2 Compliance Checklist for RHEL Message-ID: Hello BigFix Community, We are pleased to announce the release of a new compliance checklist within *BigFix Compliance*, designed to support the *NIS2 Directive (EU) 2022/2555*. As organizations across the European Union, and those doing business with them, prepare for the heightened cybersecurity requirements of NIS2, we are expanding our library to help you automate and audit technical controls effectively. *What is the NIS2 Compliance Checklist?* The NIS2 Compliance Checklist is a specialized content pack designed to assess compliance against the technical requirements of *Directive (EU) 2022/2555* for RHEL. This release consolidates relevant security checks from widely recognized benchmarks such as CIS and DISA, aligning them directly with the risk management measures outlined in *Article 21(2).* It enables organizations to enforce standardized security configurations while auditing their environments against established European cybersecurity requirements. *Technical Snapshot* Here is a quick overview of the coverage provided in this release: ? *Total Fixlets:* 669 ? *Fixlets with Remediation:* 575 ? *Benchmark Sources:* CIS and DISA ? *Applies To:* RHEL 7, 8, 9 and 10 *Scope of Coverage* The NIS2 Directive is broad, covering organizational and technical measures. This checklist focuses specifically on the *technical controls* that can be monitored and enforced via BigFix. We currently support controls across *6 key categories*, mapping directly to the following articles: ? *Incident Handling *(Check Count: 195) ? *(Article 21(2), point (b))* ? Monitoring configurations that facilitate accurate logging and incident detection. ? *Security in Network and Information Systems Acquisition, Development, and Maintenance *(Check Count: 257) ? *(Article 21(2), point (e))* ? Ensuring secure configurations and vulnerability management during system lifecycles. ? *Cryptography *(Check Count: 30) ? *(Article 21(2), point (h))* ? Verifying encryption settings and cryptographic protocols. ? *Access Control *(Check Count: 179) ? *(Article 21(2), points (i) and (j))* ? Auditing user rights, authentication policies, and privilege management. ? *Asset Management *(Check Count: 8) ? *(Article 21(2), point (i))* ? Ensuring visibility and control over hardware and software assets. *How to Get Started* The NIS2 Checklist for RHEL is available now. To get started, please subscribe to the content from the NIS2 Checklist for RHEL external site and deploy it to your desired endpoints. To get started: 1. Enable and gather the NIS2 Checklist for RHEL external site from the License Overview Dashboard. 2. Create a custom site using Create Custom Checks wizard. 3. Change the default parameters if required. 4. If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard 5. Subscribe all the relevant RHEL (7/8/910) endpoints. 6. Run the Deploy and Run Task. 7. Run SCA import to get compliance status reports. *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We are committed to helping you stay compliant with the latest regulatory frameworks. If you have questions regarding specific checks or need assistance with implementation, please feel free to reply to this thread . *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:00:31 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 27 Mar 2026 09:00:31 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260323 - SUSE-RU-2026:0965-1 - Recommended update for sssd - leap15.6 - (x86-64) (ID: 26032301) * 260323 - SUSE-SU-2026:0948-1 - Security update for helm - leap15.6 - (x86-64) (ID: 26032302) * 260323 - SUSE-SU-2026:0949-1 - Security update for runc - leap15.6 - (x86-64) (ID: 26032303) * 260323 - SUSE-SU-2026:0950-1 - Security update for docker - leap15.6 - (x86-64) (ID: 26032304) * 260323 - SUSE-SU-2026:0960-1 - Security update for gvfs - leap15.6 - (x86-64) (ID: 26032305) * 260323 - SUSE-SU-2026:0971-1 - Security update for python39 - leap15.6 - (x86-64) (ID: 26032306) * 260323 - SUSE-SU-2026:0972-1 - Security update for docker-stable - leap15.6 - (x86-64) (ID: 26032307) * 260324 - SUSE-SU-2026:0976-1 - Security update for go1.26-openssl - leap15.6 - (x86-64) (ID: 26032401) * 260324 - SUSE-SU-2026:0977-1 - Security update for go1.25-openssl - leap15.6 - (x86-64) (ID: 26032402) * 260324 - SUSE-SU-2026:0979-1 - Security update for strongswan - leap15.6 - (x86-64) (ID: 26032403) * 260324 - SUSE-SU-2026:0998-1 - Security update for gstreamer-plugins-ugly - leap15.6 - (x86-64) (ID: 26032404) * 260325 - SUSE-RU-2026:1001-1 - Recommended update for rust1.94 - leap15.6 - (x86-64) (ID: 26032501) * 260325 - SUSE-SU-2026:1008-1 - Security update for Prometheus - leap15.6 - (x86-64) (ID: 26032502) * 260325 - SUSE-SU-2026:1013-1 - Security update for Tools - leap15.6 - (x86-64) (ID: 26032503) * 260325 - SUSE-SU-2026:1029-1 - Security update for salt - leap15.6 - (x86-64) (ID: 26032504) * 260325 - SUSE-SU-2026:1037-1 - Security update for grafana - leap15.6 - (x86-64) (ID: 26032505) Published Site Version: * Patches for openSUSE Leap 15, version 141. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:02:40 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 09:02:40 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Windows 2022 with bugfix, published 2026-03-26 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Windows 2022 with bugfix *Security Benchmark:* DISA STIG Checklist for Windows 2022 Benchmark, V2R6 *Published Sites:* DISA STIG Checklist for Windows 2022 , site version 19(The site version is provided for air-gap customers.) *Details:* ? Modified remediation for the below check - Windows Server 2022 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:05:59 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 09:05:59 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Windows Server 2019 with bugfix, published 2026-03-26 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Windows Server 2019 with bugfix *Security Benchmark:* DISA STIG Checklist for Windows Server 2019 Benchmark, V3R6 *Published Sites:* DISA STIG Checklist for Windows Server 20 19, site version 26(The site version is provided for air-gap customers.) *Details:* ? Modified remediation for the below check - Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcl-software.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:08:48 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 09:08:48 -0400 Subject: [BESAdmin-Announcements] NIS2 Compliance Checklist for MacOS Message-ID: Hello BigFix, Community, We are pleased to announce the release of a new compliance checklist within *BigFix Compliance*, designed to support the *NIS2 Directive (EU) 2022/2555*. As organizations across the European Union, and those doing business with them, prepare for the heightened cybersecurity requirements of NIS2, we are expanding our library to help you automate and audit technical controls effectively. *What is the NIS2 Compliance Checklist?* The NIS2 Compliance Checklist is a specialized content pack designed to assess compliance against the technical requirements of *Directive (EU) 2022/2555* for MacOS. This release consolidates relevant security checks from widely recognized benchmarks such as CIS and DISA, aligning them directly with the risk management measures outlined in Article 21(2). It enables organizations to enforce standardized security configurations while auditing their environments against established European cybersecurity requirements. *Technical Snapshot* Here is a quick overview of the coverage provided in this release: ? *Total Fixlets:* 204 ? *Fixlets with Remediation:* 69 ? *Parameterized Fixlets:* 20 ? *Benchmark Sources:* CIS, DISA ? *Applies To:* MacOS 14,15,26 *Scope of Coverage* The NIS2 Directive is broad, covering organizational and technical measures. This checklist focuses specifically on the *technical controls* that can be monitored and enforced via BigFix. We currently support controls across *5 key categories*, mapping directly to the following articles: ? *Incident Handling *(Check Count: 10) ? *(Article 21(2), point (b))* ? Monitoring configurations that facilitate accurate logging and incident detection. ? *Security in Network and Information Systems Acquisition, Development, and Maintenance *(Check Count: 113) ? *(Article 21(2), point (e))* ? Ensuring secure configurations and vulnerability management during system lifecycles. ? *Cryptography *(Check Count: 6) ? *(Article 21(2), point (h))* ? Verifying encryption settings and cryptographic protocols. ? *Access Control *(Check Count: 73) ? *(Article 21(2), points (i) and (j))* ? Auditing user rights, authentication policies, and privilege management. ? *Business Continuity and Crisis Management *(Check Count: 1) ? *(Article 21(2), point (c)) ? Verifying backup configurations, system restore settings, and recovery mechanisms to support operational continuity.* *How to Get Started* The NIS2 Checklist for MacOS is available now. To get started, please subscribe to the content from the NIS2 Checklist for MacOS external site and deploy it to your desired endpoints. To get started: 1. Enable and gather the NIS2 Checklist for MacOS external site from the License Overview Dashboard. 2. Create a custom site using Create Custom Checks wizard. 3. Change the default parameters if required. 4. If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard 5. Subscribe all the relevant MacOS (14/15/26) endpoints. 6. Environment Setup Task needs to be executed. 7. Run SCA import to get the compliance status reports. *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We are committed to helping you stay compliant with the latest regulatory frameworks. If you have questions regarding specific checks or need assistance with implementation, please feel free to reply to this thread . *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 06:11:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 09:11:21 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: NEW CIS Checklist for Windows 2022 Stand-alone, published 2026-03-25 Message-ID: *Product:* BigFix Compliance *Title:* New CIS Checklist for Windows 2022 Stand-alone *Security Benchmark:* CIS Checklist for Windows 2022 Stand-alone Benchmark, V1.0.0. *Published Sites:* CIS Checklist for Windows 2022 Stand-alone, site version 1. (The site version is provided for air-gap customers.) *Details:* ? Total Fixlets in Site: 374 * Additional details:* ?Deploy and Run? task has been implemented to validate compliance for the following rules: ? (L1) Ensure ?Network access: Allow anonymous SID/Name translation? is set to ?Disabled? ? (L1) Ensure ?Password must meet complexity requirements? is set to ?Enabled? ? (L1) Ensure ?Store passwords using reversible encryption? is set to ?Disabled? Note: This task has to be run periodically. Both analysis and remediation checks are included Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 11.0.3 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see https://help.hcltechsw.com/bigfix/11.0/compliance/Compliance/SCM_Users_Guide/c_using_synchronize_custom_checks_wiz.html?hl=using%2Csynchronize%2Ccustom%2Cchecks%2Cwizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! ? The BigFix Compliance team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 07:26:15 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 10:26:15 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended published 2026-03-27 Message-ID: Content in Patches for Mac OS X has been modified. New Fixlets: UPDATE- macOS Sequoia 15.7.5 Available via Nudge (ID: 15100016) UPDATE- macOS Sequoia 15.7.5 Available for Apple Silicon (ARM64) (ID: 15000032) UPDATE- macOS Sequoia 15.7.5 Available (ID: 15000031) UPDATE- macOS Sonoma 14.8.5 Available via Nudge (ID: 14100024) UPDATE- macOS Sonoma 14.8.5 Available for Apple Silicon (ARM64) (ID: 14000048) UPDATE- macOS Sonoma 14.8.5 Available (ID: 14000047) UPDATE- macOS Tahoe 26.4 Available via Nudge (ID: 26100006) UPDATE- macOS Tahoe 26.4 Available for Apple Silicon (ARM64) (ID: 26000012) UPDATE- macOS Tahoe 26.4 Available (ID: 26000011) UPDATE- Safari 26.4 - macOS Sequoia (15.0 Client) (ID: 98140908) UPDATE- Safari 26.4 - macOS Sonoma (14.0 Client) (ID: 98140909) Published site version: Updates for Mac OS X, version 624. Reasons for Update: A newer version of Tahoe, Sonoma, Sequoia and Safari for MAC has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 07:27:27 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 10:27:27 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-27 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Microsoft Office for Mac 2019 - Excel 16.107.2 Available (ID: 19000681) Microsoft Office for Mac 2019 - OneNote 16.107.2 Available (ID: 19000682) Microsoft Office for Mac 2019 - Outlook 16.107.2 Available (ID: 19000683) Microsoft Office for Mac 2019 - PowerPoint 16.107.2 Available (ID: 19000684) Microsoft Office for Mac 2019 - Word 16.107.2 Available (ID: 19000685) Mozilla Firefox 149.0 Available - Mac OS X (ID: 20750316) Mozilla Firefox 140.9.0 ESR Available - Mac OS X (ID: 20750317) Zoom 7.0.0 (77593) Available - Mac OS X (ID: 51000146) Published site version: Updates for Mac Applications, version 837. Reasons for Update: A newer version of MS Office apps, Firefox and Zoom for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 08:01:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 10:01:09 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-27 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 138 Update for Azure Connected Machine Agent Version 1.62 - Windows (x64) * 9101618 Adobe Acrobat 2026.001.21346 Available - Adobe Acrobat - Continuous Track * 9101619 Adobe Acrobat 2026.001.21346 Available - Adobe Acrobat - Continuous Track (x64) * 8102009 Adobe Acrobat Reader 2026.001.21346 Available - Adobe Acrobat Reader - Continuous Track * 8102008 Adobe Acrobat Reader 2026.001.21346 Available - Adobe Acrobat Reader - Continuous Track (x64) * 8102011 Adobe Acrobat Reader 2026.001.21346 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track * 8102010 Adobe Acrobat Reader 2026.001.21346 Available (MUI Installer) - Adobe Acrobat Reader - Continuous Track (x64) * 5058886 Microsoft Edge Extended Stable Build 146.0.3856.84 Available * 5058888 Microsoft Edge Extended Stable Build 146.0.3856.84 Available (x64) * 5058859 Microsoft Edge Stable Build 146.0.3856.84 Available * 5058861 Microsoft Edge Stable Build 146.0.3856.84 Available (x64) Modified: * 136 Update for Azure Connected Machine Agent Version 1.61 - Windows (x64) (Superseded) * 5058882 Microsoft Edge Extended Stable Build 146.0.3856.78 Available (Superseded) * 5058884 Microsoft Edge Extended Stable Build 146.0.3856.78 Available (x64) (Superseded) * 5058853 Microsoft Edge Stable Build 146.0.3856.78 Available (Superseded) * 5058855 Microsoft Edge Stable Build 146.0.3856.78 Available (x64) (Superseded) * 5058878 Microsoft Edge Extended Stable Build 146.0.3856.72 Available (Superseded) * 5058880 Microsoft Edge Extended Stable Build 146.0.3856.72 Available (x64) (Superseded) * 5058849 Microsoft Edge Stable Build 146.0.3856.72 Available (Superseded) * 5058851 Microsoft Edge Stable Build 146.0.3856.72 Available (x64) (Superseded) Reason for Update: * New updates for Azure Connected Machine Agent, Edge, Adobe Acrobat and Reader. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2466 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 09:18:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 11:18:07 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-27 Message-ID: Content in the Patches for Windows site has been released. New: * Major [ID:507939107] 5079391: Cumulative Update Preview for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5079391 (arm64) * Major [ID:507939105] 5079391: Cumulative Update Preview for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5079391 (x64) * Major [ID:507939103] 5079391: Cumulative Update Preview for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5079391 (arm64) * Major [ID:507939101] 5079391: Cumulative Update Preview for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5079391 (x64) * Major [ID:508348203] 5083482: Safe OS Dynamic Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5083482 (arm64) * Major [ID:508348201] 5083482: Safe OS Dynamic Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5083482 (x64) * Major [ID:508348207] 5083482: Safe OS Dynamic Update for Windows 11 Version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5083482 (arm64) * Major [ID:508348205] 5083482: Safe OS Dynamic Update for Windows 11 Version 25H2 - Windows 11 Version 25H2 - KB5083482 (x64) * Major [ID:50725343 ] 5072533: Update for Microsoft Visual Studio 2026 version 18.4.2 - KB5072533 Reason for Update: * New Visual Studio Update from Microsoft. * New Preview and Safe OS Dynamic Updates from Microsoft. Additional Notes: * None. Actions to Take: None Published site version: Patches for Windows, Version: 4694 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 09:37:28 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 12:37:28 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated CIS Oracle 19c Database on Windows, published 2026-03-26 Message-ID: *Product:* BigFix Compliance *Title:* Updated CIS Checklist for Oracle 19C database on Windows *Security Benchmark:* CIS Oracle Database 19c Benchmark v2.0.0 *Published Sites:* CIS Checklist for Oracle 19C database on Windows, site version 8. (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 58 ? Total Updated Fixlets:26 ? Total Fixlets in Site: 88 - Updated all checks with descriptions aligned to the latest benchmark standards, including revised Source IDs and SCM IDs to improve traceability and compliance mapping. - As a result of SCM ID and Source ID updates, all checks will appear as removed and newly added within the Sync Wizard during synchronization. This behavior is expected. - Refactored and optimized checks to enhance execution performance, stability, and error handling. - The Applicability Fixlet now includes additional validation, ensuring that the Environment Setup Task log file exists, is not older than 90 days, and that results files are present. This ensures Fixlets are reported as Not Applicable and that the Measured Value (MV) correctly indicates that the Environment Setup Task has not been executed - Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. *Actions to take:* - To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product, and you must be using BigFix version 10 and later. - If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see BigFix Compliance (hcltechsw.com) *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: - BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance - BigFix Compliance SCM Checklists: https://bigfix-wiki.hcltechsw.com/wikis/home?lang=en-us#!/wiki/BigFix%20Wiki/page/SCM%20Checklists We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team.* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 09:41:29 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 12:41:29 -0400 Subject: [BESAdmin-Announcements] BigFix Compliance: Updated DISA STIG Checklist for Red Hat Enterprise Linux 9, published 2026-03-27 Message-ID: *Product:* BigFix Compliance *Title:* Updated DISA STIG Checklist for Red Hat Enterprise Linux 9 *Security Benchmark:* Red Hat Enterprise Linux 9 STIG SCAP Benchmark V2R7 *Published Sites:* DISA STIG Checklist for RHEL 9, site version 8 (The site version is provided for air-gap customers.) *Details:* ? Total New Fixlets: 0 ? Total Updated Fixlets: 9 ? Total Deleted Fixlets: 3 ? Total Fixlets in Site: 439 *Updated Fixlets:* ? The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled. ? RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory. ? RHEL 9 must automatically lock graphical user sessions after 10 minutes of inactivity. ? RHEL 9 must terminate idle user sessions. ? RHEL 9 must require authentication to access emergency mode. ? RHEL 9 must enable FIPS mode. ? The Trivial File Transfer Protocol (TFTP) server must not be installed unless it is required, and if required, the RHEL 9 TFTP daemon must be configured to operate in secure mode. ? RHEL 9 must not install packages from the Extra Packages for Enterprise Linux (EPEL) repository. ? RHEL 9 SSH server configuration files' permissions must not be modified. *Deleted Checks:* ? Local RHEL 9 initialization files must not execute world-writable programs. ? RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog. ? RHEL 9 must display the date and time of the last successful account logon upon logon. *Additional details:* ? Both analysis and remediation checks are included. ? Some of the checks allow you to use the parameterized setting to enable customization for compliance evaluation. Note that parameterization and remediation actions require the creation of a custom site. ? Improved a few checks by adding the pending restart feature to them. The pending restart feature works in the following ways: ? The action results will show ?Pending Restart? instead of ?Fixed? for those checks which require OS reboot. ? The check will show relevant for those endpoints until they are rebooted. ? Post reboot of the endpoint the action results will show as ?Fixed? and the check will be compliant. *Actions to take:* ? To subscribe to the above site, you can use the License Overview Dashboard to enable and gather the site. Note that you must be entitled to the BigFix Compliance product and you must be using BigFix version 10.0 and later. ? If you use custom sites, update your custom sites accordingly to use the latest content. You can synchronize your content by using the Synchronize Custom Checks wizard. For more information, see Using the Synchronize Custom Checks wizard *More information:* To know more about the BigFix Compliance SCM checklists, please see the following resources: ? BigFix Forum: https://forum.bigfix.com/c/release-announcements/compliance ? BigFix Compliance SCM Checklists: Welcome to Wikis We hope you find this latest release of SCM content useful and effective. Thank you! *? The BigFix Compliance team* -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 10:37:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 12:37:08 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-27 Message-ID: Total New Fixlets: 3 Total Updated Fixlets: 266 Total Fixlets in Site: 3352 Total CVEs Covered: 986 Release Date: 2026-03-27 New Fixlets: 42000 VMware Tools Authentication Bypass Vulnerability - Any Version of Linux 41980 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability - Any Operating System 41990 VMware Tools Authentication Bypass Vulnerability - Any Version of Windows Updated Fixlets: 38400 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of MacOS 28160 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 16390 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 31750 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Linux 18440 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 25100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 31760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15890 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Windows 18450 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 20500 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of MacOS 17940 Google Chrome Use-After-Free Vulnerability - Any Version of Linux 19990 Google Chromium V8 Integer Overflow Vulnerability - Any Version of MacOS 16410 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Windows 31770 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of MacOS 18460 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Linux 28190 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 17950 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 36900 Google Chromium Mojo Sandbox Escape Vulnerability - Any Version of Windows 31780 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38950 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Windows 20520 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of MacOS 17450 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15920 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Windows 33840 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 15410 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 20530 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of MacOS 18480 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38960 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of Linux 33850 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 20540 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of MacOS 17980 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Linux 20030 Google Chromium Portals Use-After-Free Vulnerability - Any Version of MacOS 19520 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 39490 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Windows 19450 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 24130 WebRTC Heap Buffer Overflow Vulnerability - Any Version of MacOS 33860 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 38980 Google Chromium ANGLE and GPU Improper Input Validation Vulnerability - Any Version of MacOS 19010 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Linux 17480 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Linux 19020 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 39500 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of Linux 14930 WhatsApp Cross-Site Scripting Vulnerability - Any Version of MacOS 20050 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of MacOS 19540 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of MacOS 39510 Mozilla Multiple Products Remote Code Execution Vulnerability - Any Version of MacOS 20570 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 18010 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 29790 GitLab Community and Enterprise Editions Improper Access Control Vulnerability - Any Version of Linux 16480 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 15970 Google Chrome Use-After-Free Vulnerability - Any Version of Windows 17000 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of Windows 15980 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Windows 39020 PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability - Any Version of Windows 15470 Google Chromium Race Condition Vulnerability - Any Version of Windows 41580 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Windows 22640 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Windows 40560 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17010 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 19570 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 16500 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 18540 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Linux 18040 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 20090 Google Chromium Information Disclosure Vulnerability - Any Version of MacOS 40570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 16510 Google Chrome Blink Use-After-Free Vulnerability - Any Version of Windows 39040 PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability - Any Version of MacOS 20610 Google Chromium Animation Use-After-Free Vulnerability - Any Version of MacOS 20100 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 40580 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17540 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Linux 16520 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19080 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Linux 41610 Google Chromium CSS Use-After-Free Vulnerability - Any Version of Linux 22670 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of Windows 29840 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Windows 19600 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of MacOS 41620 Google Chromium CSS Use-After-Free Vulnerability - Any Version of MacOS 15510 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 20120 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 19610 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of MacOS 16030 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of Windows 18590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17060 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of Windows 34980 Spring Framework JDK 9+ Remote Code Execution Vulnerability - Any Version of Windows 29860 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of Linux 20650 Mozilla Firefox Use-After-Free Vulnerability - Any Version of MacOS 18090 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Linux 19630 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16560 Google Chromium Blink Use-After-Free Vulnerability - Any Version of Windows 20150 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 17590 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Linux 17080 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Windows 29880 Google Chromium Visuals Use-After-Free Vulnerability - Any Version of MacOS 19130 Google Chromium V8 Use-After-Free Vulnerability - Any Version of Linux 16060 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 38590 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Windows 17090 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38600 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of Linux 19660 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of MacOS 16590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38610 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability - Any Version of MacOS 18130 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Linux 20180 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of MacOS 17620 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19670 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16090 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 24060 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Linux 40670 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Windows 20190 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 17120 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Windows 41700 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Windows 18660 Google Chrome Media Use-After-Free Vulnerability - Any Version of Linux 15590 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18150 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Linux 20200 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of MacOS 19180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 41710 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Windows 18670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20720 Google Chromium V8 Out-of-Bounds Memory Vulnerability - Any Version of MacOS 17650 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Linux 40690 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of Linux 29940 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19700 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 41720 Google Skia Out-of-Bounds Write Vulnerability - Any Version of Linux 15610 Google Chromium V8 Heap Buffer Overflow Vulnerability - Any Version of Windows 20730 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 22780 Google Chrome Skia Integer Overflow Vulnerability - Any Version of Linux 29950 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Windows 16640 Google Chrome Media Use-After-Free Vulnerability - Any Version of Windows 26880 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Windows 37120 Apache Tomcat Path Equivalence Vulnerability - Any Version of Windows 18690 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Linux 19200 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of Linux 41730 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of Linux 25350 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Windows 17670 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 19720 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of MacOS 16140 Google Chromium V8 Integer Overflow Vulnerability - Any Version of Windows 41740 Google Skia Out-of-Bounds Write Vulnerability - Any Version of MacOS 18190 Google Chromium Information Disclosure Vulnerability - Any Version of Linux 40720 Google Chromium Out of Bounds Memory Access Vulnerability - Any Version of MacOS 19730 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of MacOS 16660 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 41750 Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability - Any Version of MacOS 18200 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17690 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20260 Google Chromium V8 Memory Corruption Vulnerability - Any Version of MacOS 16680 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of Windows 18730 ImageMagick Server-Side Request Forgery (SSRF) Vulnerability - Any Version of Linux 15660 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of Windows 20270 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 26930 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Windows 16180 Google Chromium Portals Use-After-Free Vulnerability - Any Version of Windows 18740 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Linux 20790 Google Chrome FreeType Heap Buffer Overflow Vulnerability - Any Version of MacOS 18230 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 20280 Google Chrome Blink Use-After-Free Vulnerability - Any Version of MacOS 25400 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of Linux 17210 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30010 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20290 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 17730 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Linux 19780 Mozilla Firefox Information Disclosure Vulnerability - Any Version of MacOS 17220 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Linux 16200 Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability - Any Version of Windows 18760 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Linux 15690 Google Chromium Mojo Insufficient Data Validation Vulnerability - Any Version of Windows 17740 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Linux 26960 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of Linux 15700 TeamViewer Desktop Bypass Remote Login Vulnerability - Any Version of Windows 28500 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Windows 27990 Google Skia Integer Overflow Vulnerability - Any Version of Windows 20820 Google Chromium V8 Use-After-Free Vulnerability - Any Version of MacOS 19800 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of MacOS 17750 GitLab Community and Enterprise Editions Remote Code Execution Vulnerability - Any Version of Linux 30040 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of Linux 39260 Meta Platforms WhatsApp Incorrect Authorization Vulnerability - Any Version of MacOS 18780 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Linux 18270 ImageMagick Arbitrary File Deletion Vulnerability - Any Version of Linux 28510 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of Linux 20320 Google Chromium Blink Use-After-Free Vulnerability - Any Version of MacOS 22880 Google Chrome Skia Integer Overflow Vulnerability - Any Version of MacOS 14180 Microsoft Defender Remote Code Execution Vulnerability - Any Version of Windows 18790 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Linux 15720 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20840 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 25450 Mozilla Firefox, Firefox ESR, and Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 18280 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Linux 30060 Google Chromium V8 Out-of-Bounds Memory Write Vulnerability - Any Version of MacOS 17260 Google Chromium Race Condition Vulnerability - Any Version of Linux 26990 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of Linux 28010 Google Skia Integer Overflow Vulnerability - Any Version of Linux 16240 Google Chromium Information Disclosure Vulnerability - Any Version of Windows 28530 Google Chromium V8 Out-of-Bounds Memory Access Vulnerability - Any Version of MacOS 36210 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability - Any Version of Linux 30070 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16760 Google Chromium Network Service Use-After-Free Vulnerability - Any Version of Windows 16250 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 20860 Google Chromium V8 Improper Input Validation Vulnerability - Any Version of MacOS 20350 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 22910 PaperCut MF/NG Improper Access Control Vulnerability - Any Version of MacOS 14210 Microsoft Malware Protection Engine Improper Restriction of Operations Vulnerability - Any Version of Windows 16770 Google Chromium V8 Out-of-Bounds Read Vulnerability - Any Version of Windows 19330 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 29690 Elasticsearch Remote Code Execution Vulnerability - Any Version of Linux 15750 Mozilla Firefox Security Feature Bypass Vulnerability - Any Version of Windows 28040 Google Skia Integer Overflow Vulnerability - Any Version of MacOS 19850 Google Chrome Use-After-Free Vulnerability - Any Version of MacOS 19340 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of MacOS 32140 ImageMagick Improper Input Validation Vulnerability - Any Version of Linux 16270 Mozilla Firefox and Thunderbird Type Confusion Vulnerability - Any Version of Windows 18830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 15760 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18320 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Linux 12690 Docker Desktop Community Edition Privilege Escalation Vulnerability - Any Version of Windows 19860 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of MacOS 16790 Google Chromium GPU Heap Buffer Overflow Vulnerability - Any Version of Windows 23960 WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 28570 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 17310 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 16800 Google Chromium V8 Incorrect Implementation Vulnerabililty - Any Version of Windows 27040 Google Chromium WebP Heap-Based Buffer Overflow Vulnerability - Any Version of MacOS 18850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Linux 15780 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 18340 Mozilla Firefox And Thunderbird Use-After-Free Vulnerability - Any Version of Linux 28580 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 39340 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 38830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 28590 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20400 Google Chrome Media Use-After-Free Vulnerability - Any Version of MacOS 18350 Google Chrome WebAudio Use-After-Free Vulnerability - Any Version of Linux 39350 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 38840 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 17850 Mozilla Firefox Information Disclosure Vulnerability - Any Version of Linux 16830 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 19390 Google Chromium Race Condition Vulnerability - Any Version of MacOS 16320 Google Chromium V8 Memory Corruption Vulnerability - Any Version of Windows 39360 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 15810 Google Chromium WebGL Use-After-Free Vulnerability - Any Version of Windows 38850 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 20420 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 19910 Google Chromium Intents Insufficient Input Validation Vulnerability - Any Version of MacOS 27080 Google Chromium libvpx Heap Buffer Overflow Vulnerability - Any Version of MacOS 15820 Mozilla Firefox and Thunderbird Denial-of-Service Vulnerability - Any Version of Windows 25040 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 30160 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 16850 Google Chromium Animation Use-After-Free Vulnerability - Any Version of Windows 19920 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 20440 Google Chromium PopupBlocker Security Bypass Vulnerability - Any Version of MacOS 17880 Google Chromium Indexed DB API Use-After-Free Vulnerability - Any Version of Linux 18910 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Linux 28130 Google Chromium WebRTC Heap Buffer Overflow Vulnerability - Any Version of Windows 38370 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Windows 19940 Google Chromium V8 Out-of-Bounds Write Vulnerability - Any Version of MacOS 25060 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 30180 Google Chromium V8 Type Confusion Vulnerability - Any Version of Linux 20970 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 38380 Google Chromium Loader Insufficient Policy Enforcement Vulnerability - Any Version of Linux 29680 Elasticsearch Groovy Scripting Engine Remote Code Execution Vulnerability - Any Version of Linux 16370 Google Chromium V8 Remote Code Execution Vulnerability - Any Version of Windows 31730 Google Chromium V8 Inappropriate Implementation Vulnerability - Any Version of Windows 30200 Google Chromium V8 Type Confusion Vulnerability - Any Version of MacOS 16890 Mozilla Firefox Use-After-Free Vulnerability - Any Version of Windows 31740 Google Chromium V8 Type Confusion Vulnerability - Any Version of Windows 23950 IBM WebSphere Application Server and Server Hypervisor Edition Code Injection. - Any Version of Windows -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 13:02:58 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 15:02:58 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Middleware published 2026-03-27 Message-ID: BigFix has modified content in the Updates for Windows Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Apache Tomcat 10 v10.1.53 (Scanner based) - Windows (x64) - Update: Apache Tomcat 10 v10.1.53 (Scanner based) - Windows (x32) - Update: Apache Tomcat 11 v11.0.20 (Scanner based) - Windows (x64) - Update: Apache Tomcat 11 v11.0.20 (Scanner based) - Windows (x32) - Update: Apache Tomcat 9 v9.0.116 (Scanner based) - Windows (x64) - Update: Apache Tomcat 9 v9.0.116 (Scanner based) - Windows (x32) - Update: MongoDB v7.0.31 - Windows (x64) - Update: MongoDB v8.0.20 - Windows (x64) ## Modified Items: - Update: Apache Tomcat 10 v10.1.52 (Scanner based) - Windows (x64) (Superseded) - Update: Apache Tomcat 10 v10.1.52 (Scanner based) - Windows (x32) (Superseded) - Update: Apache Tomcat 11 v11.0.18 (Scanner based) - Windows (x64) (Superseded) - Update: Apache Tomcat 11 v11.0.18 (Scanner based) - Windows (x32) (Superseded) - Update: Apache Tomcat 9 v9.0.115 (Scanner based) - Windows (x64) (Superseded) - Update: Apache Tomcat 9 v9.0.115 (Scanner based) - Windows (x32) (Superseded) - Update: MongoDB v7.0.30 - Windows (x64) (Superseded) - Update: MongoDB v8.0.19 - Windows (x64) (Superseded) ## Deleted Items: - 5701213 MongoDB-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update OracleDB Patch List and update scripts WINDOWS More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Windows Applications Middleware, Version: v75 ## Additional Links: - None - Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 13:04:39 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 15:04:39 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Linux Applications Middleware published 2026-03-27 Message-ID: BigFix has modified content in the Updates for Linux Applications Middleware site, which is available to customers with BigFix Compliance. ## New Items: - Update: Apache Tomcat 10 v10.1.53 (Scanner based) - Linux - Update: Apache Tomcat 9 v9.0.116 (Scanner based) - Linux - Update: Apache Tomcat 11 v11.0.20 (Scanner based) - Linux - Update: Apache Tomcat 9 v9.0.116 (Scanner based) - Solaris - Update: Apache Tomcat 10 v10.1.53 (Scanner based) - Solaris - Update: Apache Tomcat 11 v11.0.20 (Scanner based) - Solaris - Update: Apache Tomcat 9 v9.0.116 (Scanner based) - AIX - Update: Apache Tomcat 10 v10.1.53 (Scanner based) - AIX - Update: Apache Tomcat 11 v11.0.20 (Scanner based) - AIX - Update: MongoDB v7.0.31 - RedHat / CentOS 7 (x64) - Update: MongoDB v7.0.31 - RedHat / CentOS 8 (x64) - Update: MongoDB v7.0.31 - SUSE 12 (x64) - Update: MongoDB v7.0.31 - SUSE 15 (x64) - Update: MongoDB v7.0.31 - Ubuntu 20.04 (x64) - Update: MongoDB v7.0.31 - Ubuntu 22.04 (x64) - Update: MongoDB v7.0.31 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.20 - RedHat / CentOS 8 (x64) - Update: MongoDB v8.0.20 - RedHat / CentOS 9 (x64) - Update: MongoDB v8.0.20 - SUSE 15 (x64) - Update: MongoDB v8.0.20 - Ubuntu 20.04 (x64) - Update: MongoDB v8.0.20 - Ubuntu 22.04 (x64) ## Modified Items: - Update: Apache Tomcat 10 v10.1.52 (Scanner based) - Linux (Superseded) - Update: Apache Tomcat 9 v9.0.115 (Scanner based) - Linux (Superseded) - Update: Apache Tomcat 11 v11.0.18 (Scanner based) - Linux (Superseded) - Update: Apache Tomcat 9 v9.0.115 (Scanner based) - Solaris (Superseded) - Update: Apache Tomcat 10 v10.1.52 (Scanner based) - Solaris (Superseded) - Update: Apache Tomcat 11 v11.0.18 (Scanner based) - Solaris (Superseded) - Update: Apache Tomcat 9 v9.0.115 (Scanner based) - AIX (Superseded) - Update: Apache Tomcat 10 v10.1.52 (Scanner based) - AIX (Superseded) - Update: Apache Tomcat 11 v11.0.18 (Scanner based) - AIX (Superseded) - Update: MongoDB v7.0.30 - RedHat / CentOS 7 (x64) (Superseded) - Update: MongoDB v7.0.30 - RedHat / CentOS 8 (x64) (Superseded) - Update: MongoDB v7.0.30 - SUSE 12 (x64) (Superseded) - Update: MongoDB v7.0.30 - SUSE 15 (x64) (Superseded) - Update: MongoDB v7.0.30 - Ubuntu 20.04 (x64) (Superseded) - Update: MongoDB v7.0.30 - Ubuntu 22.04 (x64) (Superseded) - Update: MongoDB v7.0.30 - RedHat / CentOS 9 (x64) (Superseded) - Update: MongoDB v8.0.19 - RedHat / CentOS 8 (x64) (Superseded) - Update: MongoDB v8.0.19 - RedHat / CentOS 9 (x64) (Superseded) - Update: MongoDB v8.0.19 - SUSE 15 (x64) (Superseded) - Update: MongoDB v8.0.19 - Ubuntu 20.04 (x64) (Superseded) - Update: MongoDB v8.0.19 - Ubuntu 22.04 (x64) (Superseded) ## Deleted Items: - 5700115 MongoDB-Update - 5700215 MongoDB-Update - 5700315 MongoDB-Update - 5700415 MongoDB-Update - 5700615 MongoDB-Update - 5701015 MongoDB-Update - 5701115 MongoDB-Update - 5701413 MongoDB-Update - 5701513 MongoDB-Update - 5701713 MongoDB-Update - 5701913 MongoDB-Update - 5702013 MongoDB-Update ## Reason for Update: - New Software Releases from Vendors ## Actions to Take: - Review new content and deploy as needed. - For oracle db, you must run the following as policy actions: - Update Oracle Patch List and update script - ASM - Update Oracle Patch List and update script More Info: https://forum.bigfix.com/t/what-are-the-updates-for-applications-middleware-sites/42258 ## Published Site Version: - Updates for Linux Applications Middleware, Version: v101 ## Additional Links: - None ? Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 13:33:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 15:33:07 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended Installers published 2026-03-27 Message-ID: Total New Fixlets: 15 Total Updated Fixlets: 134 Total Fixlets in Site: 516 Release Date: 2026-03-27 New Fixlets: 5800802 Midori Browser (x64 en-US) v11.6.4 89000102 PostgreSQL 18 (EXE) v18.3.2 74600102 Lenovo System Update v5.08.03.59 66000102 MPC-HC v2.6.4.12 65500102 SmartTaskbar v1.4.5 87900102 ExplorerPatcher v26100.4946.69.6 2700202 UniGetUI v2026.1.3.0 7700202 Plex HTPC (EXE) v1.71.1 8400202 Royal Server v5.3.60108.0 88100102 Shotcut v26.2.26 7700302 Plex (EXE) v1.112.0 88200102 MuseScore Studio (MSI) v4.6.5.253511702 89000202 PostgreSQL 17 (EXE) v17.9.2 89000302 PostgreSQL 16 (EXE) v16.13.2 89100102 Ditto (EXE) v3.25.113.0 Updated Fixlets: 10500102 UltraEdit v32.2.0.21 12100102 HandBrake v1.11.1 2000902 WebexNonLocalized (x64) v46.3.1.34493 55300102 K-Lite v19.6.0.0 5601802 PowerToys v0.98.1 63300102 Altova MissionKit v2026.00.00.01 64900102 Sigil v2.7.6 9800202 Snagit v26.1.0.10201 55000102 HeidiSQL v12.16.0.7263 11800102 Zoom v7.0.33767 21400102 GadgetPack v40.0.0 3800102 Go Programming Language v1.26.1 1500202 Atlassian Companion (Machine) v3.1.0.0 39000102 CLAN v8.53.00 79000102 Datadog Agent v7.77.1.0 87000102 ProfiCAD (EXE) v13.4.9 5604402 Microsoft Edge WebView2 Runtime (Standalone) v146.0.3856.84 2600502 Dell Command | Configure v5.2.1.16 5800502 Mozilla Firefox (x64 en-US) v149.0.0 19500102 Cyberduck v9.4.1.44384 48300102 Bitwarden v2026.2.1 5100102 KeePass v2.61 62700102 SFTPGo v2.7.1 60400202 WizTree v4.31 6700102 OBS Studio v32.1.0 8300102 R for Windows v4.5.3 85100102 pgAdmin 4 (EXE) v9.13 87600202 foobar (EXE) v2.25.8 44800102 Chocolatey GUI v3.0.0.0 62400102 Microsoft Azure CLI (32-bit) v2.84.0 70400102 CMake v4.3.0 9600102 TeamViewer v15.76.3 16900202 Duo Desktop v7.16.0.0 26500202 AOMEI Backupper v8.2.0.0 23700102 Prey v1.13.25 49300102 Numara v6.8.2 84500102 Waterfox v6.6.10 20700302 Logi Options v2.1.854977 301202 Adobe Acrobat Reader v25.1.21288.0 2600602 DELL System Update v2.2.0.1 5800602 Mozilla Firefox ESR (x64 en-US) v140.9.0 5604002 Microsoft Azure PowerShell (MSI) v15.4.0.40597 21800102 PDF-Over v4.4.8 2600102 Dell Command | Update v5.6.0 61800102 ocenaudio (EXE) v3.17.3 66600102 dev-sidecar v2.0.0 5100202 KeePassXC v2.7.12 81000102 UVtools v6.0.1 9600702 TeamViewer Host v15.76.3 5700802 MongoDB Compass v1.49.4.0 50300102 Markdown Viewer v4.0.1 58300102 Kinovea v2025.2.0 5602502 Microsoft Visual Studio Code x64 v1.113.0 11900102 Zotero v8.0.4 21500102 SyncBackFree v11.3.142.0 2300102 CPUID CPU-Z v2.19 23100102 LastPass v5.4.1.1429 67900102 SteelSeries GG v107.0.0 4100302 Google Drive v122.0.1.0 74300102 Free Download Manager v6.33.2.6656 9600202 TeamViewer v15.76.3 19600102 VSCodium (x64) v1.112.01907 3600102 GlassWire v3.8.1033 62800102 Greenshot v1.3.315 64400102 RustDesk v1.4.6.29544831 1300202 iTunes v12.13.10.3 8400102 Royal TS v7.04.50318.0 11800302 Zoom VDI Workplace v6.6.26950 5604602 Azure Connected Machine Agent v1.62.03365.2847 43803902 Cryptomator (MSI) v1.19.2.6322 11300102 WinSCP v6.5.6 3300102 GIMP v3.2.0.0 6500102 Node.js LTS v24.14.1 1000202 AnyDesk (EXE) v9.6.12 300302 Adobe DNG Converter v18.2.2 901902 AWS Command Line Interface v2 v2.34.18.0 2100502 ShareFile v26.3.12 7800102 Podman v5.8.1 84600102 gcompris (MSI) v26.1 9400102 Tableau Desktop v2026.1.0 21500202 SyncBackPro v11.3.142.0 9600302 TeamViewer Host v15.76.3.0 4100402 Google Earth Pro v7.3.7 48200502 Process Lasso v17.1.0.50 5601602 Microsoft Power BI Desktop v2.152.1057.0 23500102 PhraseExpress v18.0.67 2700102 Remote Desktop Manager Enterprise v2026.1.15.0 60300102 kdenlive v25.12.3 65100102 Obsidian v1.12.7 84300102 Notepad++ v8.9.3.0 5801302 Firefox Developer Edition (x64 en-US) v150.0 52000102 Coder v2.31.6.0 4000102 GoodSync v12.9.26.6 29600102 Vim v9.2.0260 63200102 Pale Moon v34.1.0 6500202 Node.js v25.8.2 7200102 Paint.NET v5.1.12 74400102 Ekahau v11.8.10 5800302 Mozilla Thunderbird (x64 en-US) v149.0.0 2100602 XenCenter v26.1.0 11700102 Yubico Authenticator v7.3.2 5300102 LibreOffice v26.2.2 37300102 Argus Monitor v7.3.5.3154 59700102 Epic Games Launcher (MSI) v1.3.176.0 62900102 Archi v5.8.0 6900102 OpenShot v3.5.0 74100102 Rocket.Chat v4.13.0 84600202 GCompris Educational Software (EXE) v26.1 21500302 SyncBackSE v11.3.142.0 9400202 Tableau Reader v2026.1.0 5601702 PowerShell v7.6.0 3400102 Git v2.53.0 59400102 Syncovery v11.13.10 64200102 LLVM v22.1.2 85000102 MobaXterm Home Edition v26.1 9800102 Camtasia v26.0.4 2900402 Beats winlogbeat v9.3.2 5604802 SQL Server Management Studio 22 v22.4.1 1500102 Sourcetree v3.4.30 54300102 Dolt v1.84.0 62300102 Gpg4win v5.0.2.4861 9500102 Tailscale v1.96.3 63200202 Pale Moon v34.1.0 5604302 Microsoft Azure Storage Explorer v1.42.0 300502 Adobe Acrobat v25.001.21288 8700102 Beyond Compare v5.2.1 17200102 Axure RP v11.0.0.4137 2800102 Docker Desktop v4.66.1 71600102 GitHub Desktop v3.5.6.0 81200102 Cato Client v6.0.1.8602 29300202 windows_exporter v0.31.5 74100202 Rocket.Chat v4.13.0 87600102 foobar (EXE) v2.25.8 900602 AWS SAM Command Line Interface v1.157.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Fri Mar 27 13:54:51 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Fri, 27 Mar 2026 15:54:51 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Mac OS Applications Extended Installers published 2026-03-27 Message-ID: Total New Fixlets: 12 Total Updated Fixlets: 88 Total Fixlets in Site: 230 Release Date: 2026-03-27 New Fixlets: 87400102 CellProfiler v4.2.8 87300102 Flameshot v13.3.0 87600102 AltTab v10.9.0 87800102 Balsamiq Wireframes v4.8.6 60100202 SonicWall Cloud Secure Edge (Intel) v4.0.1 87300202 Flameshot (arm64) v13.3.0 87500202 Chatbox (Intel) v1.19.1 87900102 BBEdit v15.5.5 60100302 SonicWall Cloud Secure Edge (arm64) v4.0.1 87500302 Chatbox (arm64) v1.19.1 88900102 Fetch v5.8.3 88200102 Jitsi Meet v2026.1.1 Updated Fixlets: 9800302 Camtasia v2026.0.7 24200202 TablePlus v6.8.2 79500302 Genesys Cloud v2.48.680 11600402 XnViewMP v1.10.5 19600402 VSCodium (arm64) v1.112.01907 87000102 Ulaa (Intel) v146.0.7680.165 6300202 Nextcloud v4.0.8 9500202 Tailscale v1.96.2 63200302 Pale Moon (Intel) v34.1.0 64006702 PowerShell (arm64) v7.6.0 74600502 PyCharm (Intel) v2025.3.4 300602 Adobe Acrobat Reader v25.001.21288 86700102 WebWork Tracker v6.15.24 2800202 Docker v4.66.1 5300302 LibreOffice (arm64) v26.2.2 62900302 Archi (arm64) v5.8.0 74100302 Rocket.Chat v4.13.0 4100702 Google Drive v122.0.1 12100202 HandBrake v1.11.1 2001002 Webex (Intel) v46.3.1.34493 8900202 Slack v4.48.102 51400302 Clockify Desktop v2.12.3 43800202 Cryptomator (Intel) v1.19.2 67800202 calibre v9.6.0 87000202 Ulaa (arm64) v146.0.7680.165 63200402 Pale Moon (arm64) v34.1.0 48300202 Bitwarden v2026.2.1 6700202 OBS (Intel) v32.1.0 81200302 CatoClient v5.11.0.7852 87100102 CotEditor v6.2.6 70400202 CMake v4.3.0 22400202 Koodo Reader (Intel) v2.3.1 2001102 Webex (arm64) v46.3.1.34493 64900302 Sigil (arm64) v2.7.6util 12500202 Evernote v11.9.1 49300202 Numara (Intel) v6.8.2 84500202 Waterfox v6.6.10 43800302 Cryptomator (arm64) v1.19.2 81700102 Keka v1.6.1 81000202 UVtools (arm64) v6.0.1 61800202 ocenaudio v3.17.3 65000202 logtalk v3.98.0 11500302 Wireshark (Intel) v4.4.14 19500302 Cyberduck v9.4.1.44384 5100302 KeePassXC (Intel) v2.7.12 6700302 OBS (arm64) v32.1.0 5700902 MongoDB Compass (Intel) v1.49.4 81400102 Spark Desktop v3.28.3.134741 67900202 SteelSeries GG (Intel)) v107.0.0 11900202 Zotero v8.0.5 45500202 StellarPhotoRecovery v12.6.0.0 50300202 Markdown Viewer (Intel) v4.0.1 22400302 Koodo Reader (arm64) v2.3.1 64700202 Joplin (Intel) v3.5.13 64400202 RustDesk (Intel) v1.4.6 64007002 Microsoft Teams v26043.2109.4484.3337 74600802 JetBrains Toolbox (Intel) v3.4.1.78303 60000102 Things3 v3.22.11 19300202 DBeaver (Intel) v26.0.1 3300202 GIMP (Intel) v3.2.0 1000302 AnyDesk v9.6.5 81000302 UVtools (Intel) v6.0.1 11500402 Wireshark (arm64) v4.4.14 5100402 KeePassXC (arm64) v2.7.12 20600202 Insomnia v12.4.0 28600202 Balena CLI (Intel) v24.0.3 5701002 MongoDB Compass (arm64) v1.49.4 50300302 Markdown Viewer (arm64) v4.0.1 64700302 Joplin (arm64) v3.5.13 7800202 Podman Desktop v1.26.2 8700302 Beyond Compare v5.2.1 64004502 PowerShell (Intel) v7.6.0 85000102 Notion v7.9.0 86600102 Arc v1.140.0 65100202 Obsidian v1.12.7 23500202 PhraseExpress v7.0.38 19600302 VSCodium (Intel) v1.112.01907 64400302 RustDesk (arm64) v1.4.6 74600902 JetBrains Toolbox (arm64) v3.4.1.78303 84700102 Nudge v2.1.0.81852 19300302 DBeaver (arm64) v26.0.1 3300302 GIMP (arm64) v3.2.0 74600402 PyCharm (arm64) v2025.3.4 5300202 LibreOffice (Intel) v26.2.2 62900202 Archi (Intel) v5.8.0 6900202 OpenShot Video Editor v3.5.0 28600302 BalenaCLI (arm64) v24.0.3 7800302 Podman Desktop (arm64) v1.26.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 09:10:36 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 11:10:36 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications Extended published 2026-03-30 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 28 Total Fixlets in Site: 566 Release Date: 2026-03-30 Site version: 344 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 3300101 GIMP v3.2.2.0 37300101 Argus Monitor v7.3.5.3156 49300101 Numara v6.8.3 5300101 LibreOffice v26.2.2 5601801 PowerToys v0.98.1 85700101 Wasmer v7.1.0 8600201 Sandboxie Plus v1.17.3 901901 AWS Command Line Interface v2 v2.34.19.0 5603601 Windows Defender Virus Definitions v1.447.77.0 55000101 HeidiSQL v12.16.0.7266 59400101 Syncovery v11.13.10 63000101 Icecream Screen Recorder v7.46 7000101 Opera Stable v129.0.5823.28 8600101 Sandboxie Classic v5.72.3 5604401 Microsoft Edge WebView2 Runtime (Standalone) v146.0.3856.84 5603901 XmlNotepad v2.9.0.21 5601601 Microsoft Power BI Desktop v2.152.1279.0 72400201 Bluebeam Revu v21.8.0 87600201 foobar (EXE) v2.25.8 901201 AWS VPN Client v5.3.4 5800801 Midori Browser (x64 en-US) v11.6.4 70400101 CMake v4.3.1 29600101 Vim v9.2.0265 2800101 Docker Desktop v4.67 4000101 GoodSync v12.9.27.7 87600101 foobar (EXE) v2.25.8 900601 AWS SAM Command Line Interface v1.157.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 09:32:23 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 11:32:23 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for 'Nix Applications Extended published 2026-03-30 Message-ID: Total New Fixlets: 0 Total Updated Fixlets: 17 Total Fixlets in Site: 135 Release Date: 2026-03-30 New Fixlets: No Fixlets Added In This Release Updated Fixlets: 85400201 rstudio (rpm) v2026.01.2 71600401 GitHub_CLI (rpm) v2.89.0 61700501 webmin (deb) v2.630 88500501 Draw.io (deb) v29.6.6 85400101 rstudio (deb) v2026.01.2 88500601 Draw.io (rpm) v29.6.6 71600301 GitHub_CLI (rpm) v2.89.0 2800201 docker-desktop (rpm) v4.67 71600201 GitHub_CLI (deb) v2.89.0 5600601 microsoft-edge-stable (rpm) v146.0.3856.84-1 22400601 koodo-reader (rpm) v2.3.1 2800101 docker-desktop (deb) v4.67 71600101 GitHub_CLI (deb) v2.89.0 5600501 microsoft-edge-stable (deb) v146.0.3856.84-1 22400501 koodo-reader (deb) v2.3.1 88000501 DbGate (deb) v7.1.6 61700601 webmin (rpm) v2.630 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 09:45:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 11:45:21 -0500 Subject: [BESAdmin-Announcements] Content Modification> Updates for Mac OS Applications Extended published 2026-03-30 Message-ID: Total New Fixlets: 1 Total Updated Fixlets: 27 Total Fixlets in Site: 229 Release Date: 2026-03-30 New Fixlets: 60100301 SonicWall Cloud Secure Edge (arm64) v4.0.1 Updated Fixlets: 2800201 Docker v4.67.0 2800301 Docker (arm64) v4.67.0 24200201 TablePlus v6.8.6 67800201 calibre v9.6.0 7800201 Podman Desktop v1.26.2 87500301 Chatbox (arm64) v1.19.1 86600101 Arc v1.140.0 11900201 Zotero v8.0.5 65100201 Obsidian v1.12.7 67900201 SteelSeries GG (Intel)) v107.0.0 22400301 Koodo Reader (arm64) v2.3.1 87500201 Chatbox (Intel) v1.19.1 84700101 Nudge v2.1.1.81855 22400201 Koodo Reader (Intel) v2.3.1 70400201 CMake v4.3.1 2001101 Webex (arm64) v46.3.1.34493 5300301 LibreOffice (arm64) v26.2.2 55600101 Bartender 5 v5.5.8 60000101 Things3 v3.22.11 87600101 AltTab v10.9.0 2001001 Webex (Intel) v46.3.1.34493 49300201 Numara (Intel) v6.8.3 5300201 LibreOffice (Intel) v26.2.2 84500201 Waterfox v6.6.10 1000301 AnyDesk v9.6.5 51400301 Clockify Desktop v2.12.3 7800301 Podman Desktop (arm64) v1.26.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 11:52:29 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 14:52:29 -0400 Subject: [BESAdmin-Announcements] Content in the Patches for ESXi Site has been modified 2026-03-30 Message-ID: Content in the Patches for ESXi site has been modified. Reasons for Update: Patches for ESXi 8.0: February 2026 VMware ESXi 8.0 Update 3i Release Notes Broadcom-ELX-lpfc_14.4.0.42-35vmw.803.0.95.25205845.bes VMware-NVMeoF-RDMA_1.0.3.10-1vmw.803.0.95.25205845.bes ESXi80U3i-25205845.bes ESXi_8.0.3-0.95.25205845.bes Mellanox-nmlx5_4.23.7.2-1vmw.803.0.95.25205845.bes VMware-NVMe-PCIe_1.2.4.16-1vmw.803.0.95.25205845.bes VMware-NVMeoF-TCP_1.0.1.37-1vmw.803.0.95.25205845.bes VMware-vmkusb_0.1-25vmw.803.0.95.25205845.bes esx-update_8.0.3-0.95.25205845.bes esxio-update_8.0.3-0.95.25205845.bes ESXi80U3si-25197580 (Superseded).bes ESXi_8.0.3-0.92.25197580 (Superseded).bes Pensando-ionic-cloud_20.0.0-49vmw.803.0.92.25197580.bes Pensando-ionic-en_20.0.0-57vmw.803.0.92.25197580.bes VMware-Host-Client_2.18.0-25191442.bes esx-update_8.0.3-0.92.25197580 (Superseded).bes esxio-update_8.0.3-0.92.25197580 (Superseded).bes Patches for ESXi 9.0: July 2025 VMware ESX 9.0.0.0100 Release Notes ESXi_9.0.0-0100.24813472.bes esx-update_9.0.0-0.24755229.bes esxio-update_9.0.0-0.24755229.bes Patches for ESXi 9.0: September 2025 ESX ESXi_9.0.1-0.24957456.bes VMware-HBR-UW_9.0.1-0.24957456.bes VMware-NVMeoF-TCP_2.0.1.1-1vmw.901.0.24957456.bes VMware-VM-Tools_13.0.5-0.24957456.bes VMware-vmkusb_0.1-29vmw.901.0.24957456.bes esx-update_9.0.1-0.24957456.bes vsphere-fdm_9.0.1-0.24957456.bes Broadcom-ELX-lpfc_900.14.4.390.20-36vmw.901.0.24957456.bes Intel-Volume-Mgmt-Device_9.0.0.1100-4vmw.901.0.24957456.bes esxio-update_9.0.1-0.24957456.bes Patches for ESXi 9.0: January 2026 ESX ESXi_9.0.2-0.25148076.bes Pensando-ionic-en_24.9.0-12vmw.902.0.25148076.bes VMware-VM-Tools_13.0.10-0.25148076.bes esx-update_9.0.2-0.25148076.bes Broadcom-bnxt-Net-RoCE_226.0.31.0-41vmw.902.0.25148076.bes Pensando-ionic-cloud_24.9.0-12vmw.902.0.25148076.bes Broadcom-ELX-lpfc_900.14.4.390.22-36vmw.902.0.25148076.bes VMware-NVMeoF-RDMA_1.0.3.11-1vmw.902.0.25148076.bes esxio-update_9.0.2-0.25148076.bes Published site version: *Patches for ESXi - Site Version: 150 Actions to Take: *Gathering of the site will have the new content automatically applied HCL BigFix - Lifecycle Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 13:27:46 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 16:27:46 -0400 Subject: [BESAdmin-Announcements] Content Modification: Updates for MAC Applications published 2026-03-30 Message-ID: Content in Updates for Mac Applications has been modified. New Fixlets: Adobe Acrobat DC 26.001.21346 (Continuous Track) Available - Mac OS X (ID: 10152250) Adobe Acrobat Reader DC 26.001.21346 (Continuous Track) Available - Mac OS X (ID: 10152251) Published site version: Updates for Mac Applications, version 838. Reasons for Update: A newer version of Adobe Acrobat DC and Adobe Acrobat Reader DC for Mac has been released. Actions to Take: Gathering of the site will automatically show the updates made. Application Engineering Team BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Mon Mar 30 14:53:43 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Mon, 30 Mar 2026 16:53:43 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Kev Content published 2026-03-30 Message-ID: Total New Fixlets: 1 Total Updated Fixlets: 3 Total Fixlets in Site: 3353 Total CVEs Covered: 987 Release Date: 2026-03-30 New Fixlets: 42010 Craft CMS Code Injection Vulnerability - Any Operating System Updated Fixlets: 19170 Webmin Command Injection Vulnerability - Any Version of Linux 39860 Grafana Path Traversal Vulnerability - Any Version of Linux 18110 Grafana Authentication Bypass Vulnerability - Any Version of Linux -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:29:27 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:29:27 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Message-ID: New content have been added to the Patches for Amazon Linux 2023 site. New Fixlets: * ALAS2023-2026-1470 - Firefox Security update - Amazon linux 2023 x86_64 (ID: 322614701) * ALAS2023-2026-1472 - Libssh Security update - Amazon linux 2023 x86_64 (ID: 322614721) * ALAS2023-2026-1473 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2023 x86_64 (ID: 322614731) * ALAS2023-2026-1474 - Lcms2 Security update - Amazon linux 2023 x86_64 (ID: 322614741) * ALAS2023-2026-1475 - Gvfs Security update - Amazon linux 2023 x86_64 (ID: 322614751) * ALAS2023-2026-1476 - Python-Flask Security update - Amazon linux 2023 x86_64 (ID: 322614761) * ALAS2023-2026-1477 - Libde265 Security update - Amazon linux 2023 x86_64 (ID: 322614771) * ALAS2023-2026-1478 - Imagemagick Security update - Amazon linux 2023 x86_64 (ID: 322614781) * ALAS2023-2026-1479 - Ocaml Security update - Amazon linux 2023 x86_64 (ID: 322614791) * ALAS2023-2026-1480 - Exiv2 Security update - Amazon linux 2023 x86_64 (ID: 322614801) * ALAS2023-2026-1481 - Openexr Security update - Amazon linux 2023 x86_64 (ID: 322614811) * ALAS2023-2026-1482 - Golang Security update - Amazon linux 2023 x86_64 (ID: 322614821) * ALAS2023-2026-1483 - Nodejs22 Security update - Amazon linux 2023 x86_64 (ID: 322614831) * ALAS2023-2026-1484 - Nodejs20 Security update - Amazon linux 2023 x86_64 (ID: 322614841) * ALAS2023-2026-1485 - Freerdp Security update - Amazon linux 2023 x86_64 (ID: 322614851) * ALAS2023-2026-1486 - Freetype Security update - Amazon linux 2023 x86_64 (ID: 322614861) * ALAS2023-2026-1489 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 322614891) * ALAS2023-2026-1490 - Python3.13-Pip Security update - Amazon linux 2023 x86_64 (ID: 322614901) * ALAS2023-2026-1491 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 322614911) * ALAS2023-2026-1492 - Python-Markdown Security update - Amazon linux 2023 x86_64 (ID: 322614921) * ALAS2023-2026-1493 - Libsodium Security update - Amazon linux 2023 x86_64 (ID: 322614931) * ALAS2023-2026-1494 - Kernel Security update - Amazon linux 2023 x86_64 (ID: 322614941) * ALAS2023-2026-1495 - Kernel6.12 Security update - Amazon linux 2023 x86_64 (ID: 322614951) * ALAS2023-2026-1496 - Tomcat9 Security update - Amazon linux 2023 x86_64 (ID: 322614961) * ALAS2023-2026-1497 - Tomcat10 Security update - Amazon linux 2023 x86_64 (ID: 322614971) * ALAS2023-2026-1498 - Libtiff Security update - Amazon linux 2023 x86_64 (ID: 322614981) * ALAS2023-2026-1514 - Kernel6.18 Security update - Amazon linux 2023 x86_64 (ID: 322615141) Published Site Version: * Patches for Amazon Linux 2023, version 79. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:31:12 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:31:12 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Amazon Linux 2023 Graviton Message-ID: New content have been added to the Patches for Amazon Linux 2023 Graviton site. New Fixlets: * ALAS2023-2026-1470 - Firefox Security update - Amazon linux 2023 aarch64 (ID: 322614701) * ALAS2023-2026-1472 - Libssh Security update - Amazon linux 2023 aarch64 (ID: 322614721) * ALAS2023-2026-1473 - Amazon-Cloudwatch-Agent Security update - Amazon linux 2023 aarch64 (ID: 322614731) * ALAS2023-2026-1474 - Lcms2 Security update - Amazon linux 2023 aarch64 (ID: 322614741) * ALAS2023-2026-1475 - Gvfs Security update - Amazon linux 2023 aarch64 (ID: 322614751) * ALAS2023-2026-1476 - Python-Flask Security update - Amazon linux 2023 aarch64 (ID: 322614761) * ALAS2023-2026-1477 - Libde265 Security update - Amazon linux 2023 aarch64 (ID: 322614771) * ALAS2023-2026-1478 - Imagemagick Security update - Amazon linux 2023 aarch64 (ID: 322614781) * ALAS2023-2026-1479 - Ocaml Security update - Amazon linux 2023 aarch64 (ID: 322614791) * ALAS2023-2026-1480 - Exiv2 Security update - Amazon linux 2023 aarch64 (ID: 322614801) * ALAS2023-2026-1481 - Openexr Security update - Amazon linux 2023 aarch64 (ID: 322614811) * ALAS2023-2026-1482 - Golang Security update - Amazon linux 2023 aarch64 (ID: 322614821) * ALAS2023-2026-1483 - Nodejs22 Security update - Amazon linux 2023 aarch64 (ID: 322614831) * ALAS2023-2026-1484 - Nodejs20 Security update - Amazon linux 2023 aarch64 (ID: 322614841) * ALAS2023-2026-1485 - Freerdp Security update - Amazon linux 2023 aarch64 (ID: 322614851) * ALAS2023-2026-1486 - Freetype Security update - Amazon linux 2023 aarch64 (ID: 322614861) * ALAS2023-2026-1489 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 322614891) * ALAS2023-2026-1490 - Python3.13-Pip Security update - Amazon linux 2023 aarch64 (ID: 322614901) * ALAS2023-2026-1491 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 322614911) * ALAS2023-2026-1492 - Python-Markdown Security update - Amazon linux 2023 aarch64 (ID: 322614921) * ALAS2023-2026-1493 - Libsodium Security update - Amazon linux 2023 aarch64 (ID: 322614931) * ALAS2023-2026-1494 - Kernel Security update - Amazon linux 2023 aarch64 (ID: 322614941) * ALAS2023-2026-1495 - Kernel6.12 Security update - Amazon linux 2023 aarch64 (ID: 322614951) * ALAS2023-2026-1496 - Tomcat9 Security update - Amazon linux 2023 aarch64 (ID: 322614961) * ALAS2023-2026-1497 - Tomcat10 Security update - Amazon linux 2023 aarch64 (ID: 322614971) * ALAS2023-2026-1498 - Libtiff Security update - Amazon linux 2023 aarch64 (ID: 322614981) * ALAS2023-2026-1514 - Kernel6.18 Security update - Amazon linux 2023 aarch64 (ID: 322615141) Published Site Version: * Patches for Amazon Linux 2023 Graviton, version 59. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:32:04 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:32:04 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Debian 12 Message-ID: New content have been added to the Patches for Debian 12 site. New Fixlets: * Unspecified - Bind9-Dnsutils - Debian 12 (amd64) (ID: 26032801) * Unspecified - Bind9-Host - Debian 12 (amd64) (ID: 26032802) * DSA-6179-1 - Thunderbird Security Update - Debian 12 (amd64) (ID: 61790101) * DSA-6180-1 - Ruby-Rack Security Update - Debian 12 (amd64) (ID: 61800101) * DSA-6181-1 - Bind9 Security Update - Debian 12 (amd64) (ID: 61810101) * DSA-6182-1 - Libxml-Parser-Perl Security Update - Debian 12 (amd64) (ID: 61820101) * DSA-6185-1 - Phpseclib Security Update - Debian 12 (amd64) (ID: 61850101) * DSA-6186-1 - Php-Phpseclib Security Update - Debian 12 (amd64) (ID: 61860101) * DSA-6187-1 - Php-Phpseclib3 Security Update - Debian 12 (amd64) (ID: 61870101) Published Site Version: * Patches for Debian 12, version 166. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:37:09 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:37:09 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 8 Message-ID: New content have been added to the Patches for Rocky Linux 8 site. New Fixlets: * RLSA-2026:3963 - Kernel Security Update - RockyLinux 8 x86_64 (ID: 26396301) * RLSA-2026:4728 - Libpng Security Update - RockyLinux 8 x86_64 (ID: 26472801) * RLSA-2026:4772 - Glibc Security Update - RockyLinux 8 x86_64 (ID: 26477201) Published Site Version: * Patches for Rocky Linux 8, version 112. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:41:14 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:41:14 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Rocky Linux 9 Message-ID: New content have been added to the Patches for Rocky Linux 9 site. New Fixlets: * RLSA-2026:4759 - Kernel Security Update - RockyLinux 9 x86_64 (ID: 26475901) * RLSA-2026:4898 - Capstone Security Update - RockyLinux 9 x86_64 (ID: 26489801) * RLSA-2026:5080 - Libarchive Security Update - RockyLinux 9 x86_64 (ID: 26508001) Published Site Version: * Patches for Rocky Linux 9, version 94. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:42:07 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:42:07 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 9 Message-ID: New content have been added to the Patches for Alma Linux 9 site. New Fixlets: * ALSA-2026:5599 - Nginx Security Update - AlmaLinux 9 x86_64 (ID: 26559901) * ALSA-2026:5602 - Vim Security Update - AlmaLinux 9 x86_64 (ID: 26560201) * ALSA-2026:5603 - Opencryptoki Security Update - AlmaLinux 9 x86_64 (ID: 26560301) * ALSA-2026:5640 - Mysql:8.4 Security Update - AlmaLinux 9 x86_64 (ID: 26564001) * ALSA-2026:5942 - Golang Security Update - AlmaLinux 9 x86_64 (ID: 26594201) Published Site Version: * Patches for Alma Linux 9, version 69. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:42:18 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:42:18 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for Alma Linux 10 Message-ID: New content have been added to the Patches for Alma Linux 10 site. New Fixlets: * ALSA-2026:5913 - Ncurses Security Update - AlmaLinux 10 x86_64 (ID: 26591301) * ALSA-2026:5939 - Freerdp Security Update - AlmaLinux 10 x86_64 (ID: 26593901) * ALSA-2026:5941 - Golang Security Update - AlmaLinux 10 x86_64 (ID: 26594101) Published Site Version: * Patches for Alma Linux 10, version 4. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 04:44:21 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: 31 Mar 2026 07:44:21 -0400 Subject: [BESAdmin-Announcements] New Fixlets Published in Fixlet Site: Patches for openSUSE Leap 15 Message-ID: New content have been added to the Patches for openSUSE Leap 15 site. New Fixlets: * 260326 - SUSE-RU-2026:1070-1 - Recommended update for linuxptp - leap15.6 - (x86-64) (ID: 26032601) * 260326 - SUSE-SU-2026:1062-1 - Security update for python310 - leap15.6 - (x86-64) (ID: 26032602) * 260326 - SUSE-SU-2026:1063-1 - Security update for frr - leap15.6 - (x86-64) (ID: 26032603) * 260326 - SUSE-SU-2026:1064-1 - Security update for python-tornado6 - leap15.6 - (x86-64) (ID: 26032604) * 260326 - SUSE-SU-2026:1065-1 - Security update for sqlite3 - leap15.6 - (x86-64) (ID: 26032605) * 260326 - SUSE-SU-2026:1068-1 - Security update for pgvector - leap15.6 - (x86-64) (ID: 26032606) * 260327 - SUSE-OU-2026:1111-1 - Optional update for rsyslog - leap15.6 - (x86-64) (ID: 26032701) * 260327 - SUSE-RU-2026:1109-1 - Recommended update for rmt-server - leap15.6 - (x86-64) (ID: 26032702) * 260327 - SUSE-SU-2026:1090-1 - Security update for python3 - leap15.6 - (x86-64) (ID: 26032703) * 260327 - SUSE-SU-2026:1091-1 - Security update for kea - leap15.6 - (x86-64) (ID: 26032704) * 260327 - SUSE-SU-2026:1098-1 - Security update for cosign - leap15.6 - (x86-64) (ID: 26032705) * 260327 - SUSE-SU-2026:1105-1 - Security update for containerd - leap15.6 - (x86-64) (ID: 26032706) * 260327 - SUSE-SU-2026:1107-1 - Security update for python312 - leap15.6 - (x86-64) (ID: 26032707) * 260327 - SUSE-SU-2026:1126-1 - Security update for MozillaFirefox - leap15.6 - (x86-64) (ID: 26032708) Published Site Version: * Patches for openSUSE Leap 15, version 142. Actions to Take: * Gathering of the site will automatically show the updates made. Application Engineering Team BigFix Patch From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 08:12:06 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 31 Mar 2026 10:12:06 -0500 Subject: [BESAdmin-Announcements] Content Modification: Updates for Windows Applications published 2026-03-31 Message-ID: BigFix has modified content in the Updates for Windows Applications site. New: * 6101848 Mozilla Thunderbird 149.0.1 Available * 5058863 Zoom (x64) 7.0.1.34140 Available Modified: * 5058886 Microsoft Edge Extended Stable Build 146.0.3856.84 Available * 5058888 Microsoft Edge Extended Stable Build 146.0.3856.84 Available (x64) * 5058859 Microsoft Edge Stable Build 146.0.3856.84 Available * 5058861 Microsoft Edge Stable Build 146.0.3856.84 Available (x64) * 5058857 Zoom (x64) 7.0.0.33767 Available (Superseded) Reason for Update: * New updates for Thunderbird and Zoom. * Added additional CVEs to Edge content. Important Note: * None. Published Site Version: * Updates for Windows Applications, Version: 2467 Additional Links: -- Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 08:53:08 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 31 Mar 2026 21:23:08 +0530 Subject: [BESAdmin-Announcements] BigFix Inventory: Catalog 20260326 Update published 2026-03-31 Message-ID: BigFix Inventory Team is proud to announce the new version of BigFix Inventory Catalog. Product: BigFix Inventory Catalog update 20260326. Published site version: BigFix Inventory Discovery - version 38 Features: Key updates in HCL BigFix Inventory Catalog 20260326: - Discovery of 250+ new software versions including but not limited to the following software manufacturers like Adobe, AutoDesk, Azul, Dell, Google, HCL, Hewlett-Packard, Micro Focus, Microsoft, Open Text, & Oracle. - Added discovery for Windows 11, for different version streams from 21H2 to 25H2 across all editions covering 30 new components and EOS details for these 30 new Windows 11 components. - Added new Publisher ?Reading Thermal ? to the Catalog. - Delivered 4 Ideas BFINV-I-503 , BFINV-I-505 , BFINV-I-508 , BFINV-I-509 - New bundle definitions for HCL AppScan Source components to the AppScan Source parent product have been incorporated for versions 10.0 through 10.10. For previously discovered SWID tags, the bundling information will appear after some time. - Optimization for Catalog processing by removing old software signatures from BigFix Inventory main Catalog. Deleted 15+ signatures To view the complete list of new features and defects that were fixed in this application update, refer to the release notes. Catalog: https://support.bigfix.com/bfi/BigFix-Inventory-Catalog-20260326-ReleaseNotes.pdf To view the complete catalog content, use the Software Components report in BigFix Inventory. Actions needed: To apply new discovery capability, run the Server Software Catalog Update Fixlet ( BigFix Inventory Discovery site) from the BigFix console and then wait for the next data import. For more information about how to install, maintain, and use BigFix Inventory application, refer to the user documentation: BigFix 11 Inventory Documentation To find out more about Catalog Updates, visit: Catalog Overview We hope you find this latest release of BigFix Inventory Catalog content useful and effective. Thank you! ? The BigFix Inventory Team -------------- next part -------------- An HTML attachment was scrubbed... URL: From besadmin-announcements at bigmail.bigfix.com Tue Mar 31 09:13:56 2026 From: besadmin-announcements at bigmail.bigfix.com (Announcements for BES Administrators) Date: Tue, 31 Mar 2026 11:13:56 -0500 Subject: [BESAdmin-Announcements] Content Release: Patches for Windows published 2026-03-31 Message-ID: Content in the Patches for Windows site has been released. Modified: * Major [ID:507947301] MS26-MAR: Cumulative Update for Windows 11, version 25H2 - Windows 11 Version 25H2 - KB5079473 (x64) * Major [ID:507947303] MS26-MAR: Cumulative Update for Windows 11, version 25H2 for ARM64 - Windows 11 Version 25H2 - KB5079473 (arm64) * Major [ID:507947305] MS26-MAR: Cumulative Update for Windows 11 Version 24H2 - Windows 11 Version 24H2 - KB5079473 (x64) * Major [ID:507947307] MS26-MAR: Cumulative Update for Windows 11 Version 24H2 for ARM64 - Windows 11 Version 24H2 - KB5079473 (arm64) * Major [ID:500271403] 5002714: Update for Microsoft OneNote 2016 - OneNote 2016 - KB5002714 (x64) Reason for Update: * Relevance has been modified. Additional Notes: * None. Actions to Take: None Published site version: Patches for Windows, Version: 4695 Additional links: Application Engineering Team HCL BigFix -------------- next part -------------- An HTML attachment was scrubbed... URL: