The pandemic’s effect on your money

The pandemic’s effect on your money

This article was originally posted by the FTC. See the original article here.

This April is Financial Literacy Month, so this week we’re talking about financial resiliency. The Coronavirus has been devastating for many people’s financial lives. Through no fault of their own, millions have lost jobs, businesses, and savings due to the financial impact of the pandemic. Many folks are simply trying to decide how to put food on the table and keep their housing. Some, who were able to keep their jobs, are hanging in there. And others are somewhere in between.

Over the next five days, we’ll talk about some back-to-basics steps for anyone looking ahead toward financial recovery. We’ll talk about managing debt, avoiding payment scams, checking your credit, and spotting job scams. As we work to get our lives back to normal, it’s more important than ever to look out for each other, our family, friends, and neighbors. So, when you spot a scam, report it to the FTC. And then tell those around you about it so they can protect themselves.

Also, check out and share this video about why to report scams.

We hope you’ll stay tuned this week for some practical ideas you can share with your family, friends, and community. Share this blog, the video, and follow along on social media at #FinancialLiteracyMonth.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Exploring Anomalies with Log Analytics using KQL

Exploring Anomalies with Log Analytics using KQL

This article is contributed. See the original author and article here.

Detecting anomalies in your data can be a very powerful and desired functionality. Within Azure Monitor we provide a really easy method to alert on Anomalies if they are coming from Metrics (Creating Alerts with Dynamic Thresholds in Azure Monitor – Azure Monitor | Microsoft Docs). But what if the anomalies you want to detect are not a metric but sit in Application Insights or Log Analytics. Well, that’s where the Kusto query language comes to the rescue.


 


Detecting Anomalies with Kusto


Kusto has anomaly detection built in using series_decompose_anomalies.


 


series_decompose_anomalies() – Azure Data Explorer | Microsoft Docs


 


Now I’m not going to lie, the first time I read the above article I came away a little confused. But once you’ve built a query a few time using this then it becomes fairly simple.


 


Some of the key things you need to do to utilize this is:



  • You need to pull the data that you want to detect anomalies on

  • You need to order the results.

  • You need to then create either a list or series before you use the series_decompose_anomalies

  • Create a new column that detect the anomalies.


I think the best way to show this is to walk through a scenario.


 


Scenario


We want to look at the number of events occurring on each of our servers in the System event log. We want to detect any anomalies where more events than normal happen on a server. To make this query even more useful we’ll take the list of servers that have had anomalies and chart them by eventid.


 


Step 1: Pulling the Data


Step one is to get the data that you want to detect anomalies on. What the below query will do is filter to only event in the “System” log and then create a count of events for each server in 30 minute aggregates.


 

Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)

 


So the output from just this query would look something like this:


bwatts670_0-1617478804224.png


 


Step 2: Order the results


Before we create a list or series we need to order the results by the time generated. This is the simplest step but essential if you want accurate results! Just add the following line to your query:


 

| order by TimeGenerated

 


So now our query looks like this.


 

Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)
| order by TimeGenerated

 


Step 3: Make a List


Now we have everything ready to create the list in Kusto. Below is the line you need to add to your query. This will make a list of both the TimeGenerated field and the EventCount field. So what we’ll end up with is a single line for each server with a list of the TImeGenerated and EventCount fields.


 

| summarize EventCount=make_list(EventCount),TimeGenerated=make_list(TimeGenerated) by Computer

 


So the query looks like this


 

Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)
| order by TimeGenerated
| summarize EventCount=make_list(EventCount),TimeGenerated=make_list(TimeGenerated) by Computer

 


And the output should look something like this:


bwatts670_1-1617478804229.png


 


Step 4: Detect Anomalies


We have our query setup to detect the anomalies, we just need to pass the “EventCount” field to series_decompose_anomalies and create a new column with the results:


 

| extend outliers=series_decompose_anomalies(EventCount)

 


So the outliers filed will contain 3 values


              0=Normal


              -1=less events than normal


              1=more events than normal


So our query would now look like this:


 

Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)
| order by TimeGenerated
| summarize EventCount=make_list(EventCount),TimeGenerated=make_list(TimeGenerated) by Computer
| extend outliers=series_decompose_anomalies(EventCount)

 


And the output should look something like this:


bwatts670_2-1617478804235.png


As you can see, we have some anomalies that got detected.


 


Extra Credit


When I get to this point I always like to look at where the anomalies were detected and make sure that I would consider them anomalies. I won’t go into it in this article but you can adjust how sensitive the calculations. For me to easily see where the anomalies were detected I’ll use mvexpand on any of the list that we’ve made:


 

| mv-expand TimeGenerated, EventCount, outliers

 


Then look at the results to make sure where I see a 1 (we’ll later filter to only positive anomalies) it makes sense:


bwatts670_3-1617478804240.png


 


I’d also check on the ones that stay at 0 to make sure the EventCounts are pretty close:


bwatts670_4-1617478804244.png


 


Step 5: Get Useful Information


Not saying what we have right now isn’t useful but I like to use the anomalies info to get more detailed information. So in this case we detected anomalies for the number of events on a server. Now that we know the server had an anomaly maybe we want to graph that by the EventId to determine what caused the anomaly. Lets start by expanding the list like before but then filtering to only outliers that equal 1


 

| mv-expand TimeGenerated, EventCount, outliers
| where outliers == 1

 


This will give us every outlier detected by each server. What I really need is a list of each server that has had at least one anomaly. So I just at the following:


 

| distinct Computer

 


I want to feed the results into another query so let me set a variable called “Computers” using the let command. So our completed initial query looks like this:


 

let Computers=Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)
| order by TimeGenerated
| summarize EventCount=make_list(EventCount),TimeGenerated=make_list(TimeGenerated) by Computer
| extend outliers=series_decompose_anomalies(EventCount)
| mv-expand TimeGenerated, EventCount, outliers
| where outliers == 1
| distinct Computer;

 


So now I can in my next query I can filter down to just these computers using “| where Computer in (Computers)” where Computers is fed in from the above query.


 

….(prev query)
Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| where Computer in (Computers)
| extend ChartName = strcat(Computer,'-',EventID)
| summarize EventCount=count() by ChartName,bin(TimeGenerated, 30m)
| render timechart

 


The only thing different I did here is create a “ChartName” field that is a combination of the Computer and the EventID. I’m using the same time period (7d) and the same aggregation (30m) for both the anomaly detection and this second query. That way you’re looking at the same data for both.


 


Below is the complete query:


 


 

let Computers=Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| summarize EventCount=count() by Computer, bin(TimeGenerated,30m)
| order by TimeGenerated
| summarize EventCount=make_list(EventCount),TimeGenerated=make_list(TimeGenerated) by Computer
| extend outliers=series_decompose_anomalies(EventCount)
| mv-expand TimeGenerated, EventCount, outliers
| where outliers == 1
| distinct Computer;
Event
| where TimeGenerated >= ago(7d)
| where EventLog == 'System'
| where Computer in (Computers)
| extend ChartName = strcat(Computer,'-',EventID)
| summarize EventCount=count() by ChartName,bin(TimeGenerated, 30m)
| render timechart

 


 Here are the results in my environment.


 


bwatts670_5-1617478804259.png


 


 


I just have one server in my environment so charting it makes sense. I would probably analyze the data in a table if I had a bunch of servers. But you can see really quickly I can see that EventID 7036 is the one that is causing the anomalies for this server. The rest of the events are staying stable, but that event varies a good bit on the server.


 


If you’re interested in another scenario where this same process can be useful check out my previous blog about “Detecting Azure Cost Anomalies.”


 


Summary


Once you get the hand of “series_decompose_anomalies” it can be a very useful tool in your toolbelt. I covered using this to visualize anomalies in the number of events occurring in the System event log. As long as you can follow the steps above (Get the data you want, order the data, make a list or series, and then detect anomalies) you can explore your data for anomalies. Just like we can visualize the data we can also setup alerts through Azure Monitor.

Microsoft Graph Fundamentals learning path – Module 2

Microsoft Graph Fundamentals learning path – Module 2

This article is contributed. See the original author and article here.


Welcome back to my series about the Microsoft Graph Fundamentals learning path on Microsoft Learn. This is part 2; if you did not read part 1 yet, this is your chance to catch up! I will stay here and wait for you with a coffee :hot_beverage:


 

This module is called Configure a JavaScript application to retrieve Microsoft 365 data using Microsoft Graph and we start with an


intro


We are still sticking to the business scenario from module 1: We want to create an app that can access email, chats, files, meetings. To authenticate users, Microsoft 365 uses Microsoft Identity, and we will need to use Microsoft Identity and Microsoft Graph to get the data we want to display in our app by using Microsoft Authentication Library(MSAL).


Wait, what? Don’t worry if you did not completely understand this. We will do this step-by-step.


Understand the role of Azure Active Directory with Microsoft Graph


OK, we already understood that Microsoft Graph is THE API to access data in Microsoft 365 – but of course, this data needs to be secured because we don’t want everyone to access them, right? This is what we need Microsoft Identity platform for. Microsoft identity ensures that only authorized users (delegated permissions) and apps (application permissions) access data stored in Microsoft 365. The challenge now is to link Microsoft Identity (of which we will use Azure Active Directory) to our Microsoft Graph powered app. The module explains in detail how you register your app in Azure AD and retrieve your application ID. Later on, you will add this ID into the MSAL (Microsoft Authentication Library)’s code of your app to link to your Azure Active directory.


But before we do this in an exercise, we will learn some theoretical stuff that we need later on.


Understand Microsoft Graph permissions and consent


Crucial to understand that a user or admin needs to consent before the app requests permission to access Microsoft 365 data via Graph, which is why we need to know a little bit more about:


Scopes


All resources have specific scopes, like User.Read (lets you read the profile of the signed-in user) or User.Read.All lets you read the profiles of all users present in this directory. Of course, you will want only to allow scopes that are necessary for the application. You can look up scopes for each request in the official documentation and also learn about them while trying out requests in Graph Explorer.


Permission types


We can perform requests on behalf of a user (delegated permission), and we can run background processes like creating, reading, updating, or deleting events of all calendars without the requirement of a signed-in user. This means that an admin will need to pre-consent to these permissions.


Access tokens


The unit also describes how the magic with an access token works – and uses a great comparison for that! An access token is like a movie ticket – but your application gives it to Graph to show it has permission to access the requested data in Microsoft 365. LOVE this explanation so much!


 

GraphAccessTokenTicket.png


We use this movie ticket/access token in the Authorization header of our HTTP request.


Register an application with Azure Active Directory


In this unit, you learn which account type you can select when registering an app in AD and that web and single-page apps will require a redirect URI so that identity platform redirects and sends security tokens after authentication.


In case you wondered: There is a big difference between authentication and authorization.


 

GraphFunAuth.png


Exercise – Register an application with Azure Active Directory


This exercise walks us step by step through registering an app in Azure AD- I highly recommend following this unit if you never registered an application before:


 

appreg.png


Let’s now


Retrieve an access token using MSAL


MSAL will make Token interaction more effortless for you because we can acquire tokens from the identity platform to authenticate users and access Microsoft Graph.


 

auth.gif





Now that we understood the authentication flow, it’s time to get our hands dirty with


Exercise – Retrieve an access token using MSAL


To get this straight – you will clone a repository either using git or downloading a zip file. After opening this in Visual Studio Code (or any other editor), you will need to replace two placeholders with tenant ID and app ID from your Azure app registration.


The unit walks you through some crucial parts of your app and lets you map this code to the authentication flow.


 

GraphApp.png


Congratz! – you made it!


 

GraphFun-didit2.png


Conclusion


I loved this module – even if I already knew how to register applications and what Microsoft Graph does – it clarified the authentication flow once again and walked me nicely through some crucial parts of the code that I cloned from the MSLearn repository. Some basic understanding of JavaScript was beneficial to let the app run and know WHY and HOW it runs.



 

Vulnerability Summary for the Week of March 29, 2021

This article is contributed. See the original author and article here.

accusoft — imagegear
  An out-of-bounds write vulnerability exists in the TIFF header count-processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. 2021-03-31 not yet calculated CVE-2021-21773
MISC accusoft — imagegear
  An out-of-bounds write vulnerability exists in the SGI Format Buffer Size Processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. 2021-03-31 not yet calculated CVE-2021-21776
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to modify content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. 2021-04-01 not yet calculated CVE-2021-28546
MISC adobe — acrobat_reader_dc
  Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to show arbitrary content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. 2021-04-01 not yet calculated CVE-2021-28545
MISC apache — cxf
  CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a “request” parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the “request_uri” parameter. CXF was not validating the “request_uri” parameter (apart from ensuring it uses “https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10. 2021-04-02 not yet calculated CVE-2021-22696
MLIST
CONFIRM
MLIST
MLIST
MLIST
MLIST apple — ios_and_ipados
  A logic issue was addressed with improved state management. This issue is fixed in iOS 14.3 and iPadOS 14.3. An enterprise application installation prompt may display the wrong domain. 2021-04-02 not yet calculated CVE-2020-29613
MISC apple — ios_and_ipados
  A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 14.4 and iPadOS 14.4. An attacker with physical access to a device may be able to see private contact information. 2021-04-02 not yet calculated CVE-2021-1756
MISC apple — ios_and_ipados
  A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 14.4 and iPadOS 14.4. An attacker in a privileged position may be able to perform a denial of service attack. 2021-04-02 not yet calculated CVE-2021-1780
MISC apple — ios_and_ipados
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted font may result in the disclosure of process memory. 2021-04-02 not yet calculated CVE-2020-29639
MISC apple — ios_and_ipados
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1794
MISC apple — ios_and_ipados
  An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1795
MISC apple — ios_and_ipados
  An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1796
MISC apple — macos
  KIS for macOS in some use cases was vulnerable to AV bypass that potentially allowed an attacker to disable anti-virus protection. 2021-04-01 not yet calculated CVE-2021-26718
MISC apple — macos
  An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Server 5.11. Processing a maliciously crafted URL may lead to an open redirect or cross site scripting. 2021-04-02 not yet calculated CVE-2020-9995
MISC apple — macos
  OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp. 2021-03-30 not yet calculated CVE-2020-15075
MISC apple — macos_big_sur A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A person with physical access to an iOS device may be able to access contacts from the lock screen. 2021-04-02 not yet calculated CVE-2021-1755
MISC apple — macos_big_sur
  An issue existed in screen sharing. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A user with screen sharing access may be able to view another user’s screen. 2021-04-02 not yet calculated CVE-2020-27893
MISC apple — macos_big_sur
  An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-27897
MISC
MISC apple — macos_big_sur
  An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-10015
MISC
MISC apple — macos_big_sur
  An input validation issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to read restricted memory. 2021-04-02 not yet calculated CVE-2020-10001
MISC apple — macos_big_sur
  A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.0.1. A malicious application with root privileges may be able to access private information. 2021-04-02 not yet calculated CVE-2020-10008
MISC apple — multiple_products A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing maliciously crafted web content may lead to code execution. 2021-04-02 not yet calculated CVE-2020-27920
MISC
MISC
MISC
MISC
MISC apple — multiple_products This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy. 2021-04-02 not yet calculated CVE-2021-1801
FEDORA
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27919
MISC
MISC apple — multiple_products A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers. 2021-04-02 not yet calculated CVE-2021-1799
FEDORA
MISC
MISC
MISC
MISC
MISC apple — multiple_products A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to execute arbitrary code with system privileges. 2021-04-02 not yet calculated CVE-2020-27914
MISC
MISC apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27948
MISC
MISC
MISC
MISC apple — multiple_products A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause unexpected application termination or arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1818
MISC
MISC
MISC
MISC apple — multiple_products A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. 2021-04-02 not yet calculated CVE-2021-1871
FEDORA
MISC
MISC apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-29611
MISC
MISC
MISC
MISC
MISC apple — multiple_products Multiple issues were addressed with improved logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2021-1750
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27923
MISC
MISC
MISC
MISC
MISC apple — multiple_products A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27922
MISC
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, watchOS 7.2. A remote attacker may be able to leak memory. 2021-04-02 not yet calculated CVE-2020-29608
MISC
MISC
MISC
MISC
MISC apple — multiple_products A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27931
MISC
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A local user may be able to cause unexpected system termination or read kernel memory. 2021-04-02 not yet calculated CVE-2020-27936
MISC apple — multiple_products A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to access private information. 2021-04-02 not yet calculated CVE-2020-27937
MISC
MISC apple — multiple_products Multiple issues were addressed with improved logic. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A sandboxed process may be able to circumvent sandbox restrictions. 2021-04-02 not yet calculated CVE-2020-27935
MISC
MISC
MISC
MISC apple — multiple_products A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in tvOS 14.3, iOS 14.3 and iPadOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.2. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27943
MISC
MISC
MISC
MISC apple — multiple_products An integer overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. Processing maliciously crafted web content may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27945
MISC
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in watchOS 6.3, iOS 12.5, iOS 14.3 and iPadOS 14.3, watchOS 7.2. Unauthorized code execution may lead to an authentication policy violation. 2021-04-02 not yet calculated CVE-2020-27951
MISC
MISC
MISC
MISC apple — multiple_products An information disclosure issue was addressed with improved state management. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font may result in the disclosure of process memory. 2021-04-02 not yet calculated CVE-2020-27946
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted font may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1790
MISC apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1792
MISC
MISC
MISC
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause a denial of service. 2021-04-02 not yet calculated CVE-2021-1761
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1736
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27939
MISC apple — multiple_products An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1744
MISC
MISC
MISC
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to bypass Privacy preferences. 2021-04-02 not yet calculated CVE-2020-29621
MISC apple — multiple_products An out-of-bounds read issue existed in the curl. This issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to a denial of service. 2021-04-02 not yet calculated CVE-2021-1778
MISC
MISC
MISC
MISC apple — multiple_products A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1763
MISC
MISC apple — multiple_products A stack overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted text file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1772
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local attacker may be able to elevate their privileges. 2021-04-02 not yet calculated CVE-2021-1757
MISC
MISC
MISC
MISC apple — multiple_products This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted font may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1775
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1746
MISC
MISC
MISC
MISC apple — multiple_products A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-29624
MISC
MISC
MISC
MISC apple — multiple_products A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.. 2021-04-02 not yet calculated CVE-2021-1782
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to heap corruption. 2021-04-02 not yet calculated CVE-2020-29617
MISC
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted image may lead to a denial of service. 2021-04-02 not yet calculated CVE-2020-29615
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1785
MISC
MISC
MISC
MISC apple — multiple_products A logic issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. 2021-04-02 not yet calculated CVE-2021-1769
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1753
MISC
MISC apple — multiple_products This issue was addressed with improved setting propagation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. An attacker in a privileged network position may be able to unexpectedly alter application state. 2021-04-02 not yet calculated CVE-2020-9978
MISC
MISC
MISC
MISC
MISC apple — multiple_products This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1742
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1738
MISC apple — multiple_products An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0, macOS Big Sur 11.0.1. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-9955
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing maliciously crafted web content may lead to code execution. 2021-04-02 not yet calculated CVE-2021-1747
MISC
MISC
MISC
MISC apple — multiple_products A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application could execute arbitrary code leading to compromise of user information. 2021-04-02 not yet calculated CVE-2021-1760
MISC
MISC
MISC
MISC apple — multiple_products A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-9975
MISC
MISC
MISC
MISC
MISC apple — multiple_products Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. 2021-04-02 not yet calculated CVE-2020-9967
MISC
MISC
MISC
MISC
MISC apple — multiple_products A buffer overflow was addressed with improved size validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-9962
MISC
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1758
MISC
MISC
MISC
MISC apple — multiple_products An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-9960
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. A sandboxed process may be able to circumvent sandbox restrictions. 2021-04-02 not yet calculated CVE-2020-27901
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27924
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-27907
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted audio file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27908
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to execute arbitrary code with system privileges. 2021-04-02 not yet calculated CVE-2020-27915
MISC
MISC apple — multiple_products
  A race condition was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-27921
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-27947
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to heap corruption. 2021-04-02 not yet calculated CVE-2020-29619
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, iCloud for Windows 7.20, watchOS 6.2.8, tvOS 13.4.8, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27933
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27944
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-27952
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace. 2021-04-02 not yet calculated CVE-2020-27949
MISC apple — multiple_products
  A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1751
MISC apple — multiple_products
  A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A local attacker may be able to elevate their privileges. 2021-04-02 not yet calculated CVE-2020-27899
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. A local user may be able to cause unexpected system termination or read kernel memory. 2021-04-02 not yet calculated CVE-2020-9930
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-29618
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A validation issue was addressed with improved logic. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2020-27941
MISC apple — multiple_products
  This issue was addressed with improved entitlements. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to elevate privileges. 2021-04-02 not yet calculated CVE-2020-29620
MISC apple — multiple_products
  An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1737
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-29625
MISC apple — multiple_products
  An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. An attacker in a privileged network position may be able to bypass authentication policy. 2021-04-02 not yet calculated CVE-2020-29633
MISC
MISC apple — multiple_products
  “Clear History and Website Data” did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history. 2021-04-02 not yet calculated CVE-2020-29623
FEDORA
MISC
MISC
MISC apple — multiple_products
  A validation issue was addressed with improved input sanitization. This issue is fixed in tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. 2021-04-02 not yet calculated CVE-2021-1748
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1745
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1743
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1741
MISC
MISC
MISC
MISC apple — multiple_products
  A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, iCloud for Windows 7.20, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-9926
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-9956
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved validation. This issue is fixed in watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0, macOS Big Sur 11.0.1. A malicious application may be able to elevate privileges. 2021-04-02 not yet calculated CVE-2020-9971
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to execute arbitrary code with system privileges. 2021-04-02 not yet calculated CVE-2020-29612
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted audio file may disclose restricted memory. 2021-04-02 not yet calculated CVE-2020-29610
MISC
MISC
MISC
MISC apple — multiple_products
  A race condition was addressed with additional validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2021-1806
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted file may lead to heap corruption. 2021-04-02 not yet calculated CVE-2020-29614
MISC
MISC
MISC
MISC apple — multiple_products
  The issue was addressed with improved permissions logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local user may be able to read arbitrary files. 2021-04-02 not yet calculated CVE-2021-1797
MISC
MISC
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1844
FEDORA
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1759
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. 2021-04-02 not yet calculated CVE-2021-1870
FEDORA
MISC
MISC apple — multiple_products
  An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, macOS Mojave 10.14.6 Security Update 2021-002. An application may be able to execute arbitrary code with kernel privileges. 2021-04-02 not yet calculated CVE-2021-1805
MISC apple — multiple_products
  The issue was addressed with improved permissions logic. This issue is fixed in macOS Big Sur 11.0.1. A local application may be able to enumerate the user’s iCloud documents. 2021-04-02 not yet calculated CVE-2021-1803
MISC apple — multiple_products
  A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. A local attacker may be able to elevate their privileges. 2021-04-02 not yet calculated CVE-2021-1802
MISC apple — multiple_products
  This issue was addressed by improved management of object lifetimes. This issue is fixed in iOS 12.5.2, iOS 14.4.2 and iPadOS 14.4.2, watchOS 7.3.3. Processing maliciously crafted web content may lead to universal cross site scripting. Apple is aware of a report that this issue may have been actively exploited.. 2021-04-02 not yet calculated CVE-2021-1879
MISC
MISC
MISC apple — multiple_products
  A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause a denial of service. 2021-04-02 not yet calculated CVE-2021-1764
MISC
MISC
MISC
MISC apple — multiple_products
  An access issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1783
MISC
MISC
MISC
MISC apple — multiple_products
  A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1789
FEDORA
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A malicious application may be able to leak sensitive user information. 2021-04-02 not yet calculated CVE-2021-1781
MISC
MISC apple — multiple_products
  A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2020-29616
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1793
MISC
MISC
MISC
MISC apple — multiple_products
  This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy. 2021-04-02 not yet calculated CVE-2021-1765
FEDORA
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to a denial of service. 2021-04-02 not yet calculated CVE-2021-1766
MISC
MISC
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1777
MISC
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to elevate privileges. 2021-04-02 not yet calculated CVE-2020-27938
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1754
MISC
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local user may be able to create or modify system files. 2021-04-02 not yet calculated CVE-2021-1786
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to disclose kernel memory. 2021-04-02 not yet calculated CVE-2021-1791
MISC
MISC
MISC
MISC apple — multiple_products
  An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted font file may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1776
MISC
MISC
MISC
MISC apple — multiple_products
  A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1788
FEDORA
MISC
MISC
MISC
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1774
MISC
MISC
MISC
MISC apple — multiple_products
  A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to a denial of service. 2021-04-02 not yet calculated CVE-2021-1773
MISC
MISC
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. A user that is removed from an iMessage group could rejoin the group. 2021-04-02 not yet calculated CVE-2021-1771
MISC apple — multiple_products
  An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. 2021-04-02 not yet calculated CVE-2021-1768
MISC
MISC apple — multiple_products
  Multiple issues were addressed with improved logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A local attacker may be able to elevate their privileges. 2021-04-02 not yet calculated CVE-2021-1787
MISC
MISC
MISC
MISC apple — multiple_products
  This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to heap corruption. 2021-04-02 not yet calculated CVE-2021-1767
MISC
MISC apple — multiple_products
  A logic error in kext loading was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. An application may be able to execute arbitrary code with system privileges. 2021-04-02 not yet calculated CVE-2021-1779
MISC apple — xcode
  A path handling issue was addressed with improved validation. This issue is fixed in Xcode 12.4. A malicious application may be able to access arbitrary files on the host device while running an app that uses on-demand resources with Xcode. 2021-04-02 not yet calculated CVE-2021-1800
MISC asus — ux360ca_bios_laptops
  The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3). 2021-03-31 not yet calculated CVE-2021-26943
CONFIRM
MISC btcpay — server
  BTCPay Server before 1.0.7.1 mishandles the policy setting in which users can register (in Server Settings > Policies). This affects Docker use cases in which a mail server is configured. 2021-04-01 not yet calculated CVE-2021-29251
MISC cms — made_simple
  CMS Made Simple (CMSMS) 2.2.15 allows authenticated XSS via the /admin/addbookmark.php script through the Site Admin > My Preferences > Title field. 2021-03-30 not yet calculated CVE-2021-28935
MISC cohesity — dataplatform
  Undocumented Default Cryptographic Key Vulnerability in Cohesity DataPlatform version 6.3 prior 6.3.1g, 6.4 up to 6.4.1c and 6.5.1 through 6.5.1b. The ssh key can provide an attacker access to the linux system in the affected version. 2021-04-02 not yet calculated CVE-2021-28123
CONFIRM cohesity — dataplatform
  A man-in-the-middle vulnerability in Cohesity DataPlatform support channel in version 6.3 up to 6.3.1g, 6.4 up to 6.4.1c and 6.5.1 through 6.5.1b. Missing server authentication in impacted versions can allow an attacker to Man-in-the-middle (MITM) support channel UI session to Cohesity DataPlatform cluster. 2021-04-02 not yet calculated CVE-2021-28124
CONFIRM confluence — server_and_data_center
  The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability. 2021-04-01 not yet calculated CVE-2021-26072
MISC conquest — dicom_server
  CONQUEST DICOM SERVER before 1.5.0 has a code execution vulnerability which can be exploited by attackers to execute malicious code. 2021-03-31 not yet calculated CVE-2020-35308
MISC core — ltp_le
  Buffer overflow in Core FTP LE v2.2 allows local attackers to cause a denial or service (crash) via a long string in the Setup->Users->Username editbox. 2021-04-02 not yet calculated CVE-2020-21588
MISC
MISC coursems — coursems
  CourseMS (aka Course Registration Management System) 2.1 is affected by cross-site scripting (XSS). When an attacker with access to an Admin account creates a Job Title in the Site area (aka the admin/add_jobs.php name parameter), they can insert an XSS payload. This payload will execute whenever anyone visits the registration page. 2021-03-31 not yet calculated CVE-2021-29663
MISC
MISC curl — curl
  curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly “short-cut” the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work – unless curl has been told to ignore the server certificate check. 2021-04-01 not yet calculated CVE-2021-22890
MISC
MISC
FEDORA curl — curl
  curl 7.1.1 to and including 7.75.0 is vulnerable to an “Exposure of Private Personal Information to an Unauthorized Actor” by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request. 2021-04-01 not yet calculated CVE-2021-22876
MISC
MISC
FEDORA d-link — dir-816_devices
  D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter. 2021-03-30 not yet calculated CVE-2021-26810
MISC
MISC d-link — dir-846_routers
  HNAP1/control/SetMasterWLanSettings.php in D-Link D-Link Router DIR-846 DIR-846 A1_100.26 allows remote attackers to execute arbitrary commands via shell metacharacters in the ssid0 or ssid1 parameter. 2021-04-02 not yet calculated CVE-2020-27600
MISC
MISC
MISC d-link — dir-878_devices
  An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication. 2021-04-02 not yet calculated CVE-2021-30072
MISC
MISC dell — system_update
  Dell System Update (DSU) 1.9 and earlier versions contain a denial of service vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to cause the system to run out of memory by running multiple instances of the vulnerable application. 2021-04-02 not yet calculated CVE-2021-21529
MISC dell — wyse_management_suite
  Wyse Management Suite versions up to 3.2 contains a vulnerability wherein a malicious authenticated user can cause a denial of service in the job status retrieval page, also affecting other users that would have normally access to the same subset of job details 2021-04-02 not yet calculated CVE-2021-21533
MISC dell — wyse_thinos
  Dell Wyse ThinOS 8.6 MR9 contains remediation for an improper management server validation vulnerability that could be potentially exploited to redirect a client to an attacker-controlled management server, thus allowing the attacker to change the device configuration or certificate file. 2021-04-02 not yet calculated CVE-2021-21532
MISC devolutions — remote_desktop_manager An issue was discovered in Devolutions Remote Desktop Manager before 2020.2.12. There is a cross-site scripting (XSS) vulnerability in webviews. 2021-04-01 not yet calculated CVE-2021-23922
CONFIRM devolutions — remote_desktop_manager
  Cross-Site Scripting (XSS) in Administrative Reports in Devolutions Remote Desktop Manager before 2021.1 allows remote authenticated users to inject arbitrary web script or HTML via multiple input fields. 2021-04-01 not yet calculated CVE-2021-28047
CONFIRM devolutions — server
  An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements. 2021-04-01 not yet calculated CVE-2021-23921
CONFIRM devolutions — server
  An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files. 2021-04-01 not yet calculated CVE-2021-23924
CONFIRM devolutions — server
  An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users. 2021-04-01 not yet calculated CVE-2021-23923
CONFIRM devolutions — server
  An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document. 2021-04-01 not yet calculated CVE-2021-23925
CONFIRM django — django-registration
  django-registration is a user registration package for Django. The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django. Triggering this requires: A site is using django-registration < 3.1.2, The site has detailed error reports (such as Django’s emailed error reports to site staff/developers) enabled and a server-side error (HTTP 5xx) occurs during an attempt by a user to register an account. Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user’s proposed credentials (such as a password). 2021-04-01 not yet calculated CVE-2021-21416
CONFIRM dma — softlab_radius_manager
  DMA Softlab Radius Manager 4.4.0 is affected by Cross Site Scripting (XSS) via the description, name, or address field (under admin.php). 2021-04-02 not yet calculated CVE-2021-29011
MISC
MISC dma — softlab_radius_manager
  DMA Softlab Radius Manager 4.4.0 assigns the same session cookie to every admin session. The cookie is valid when the admin is logged in, but is invalid (temporarily) during times when the admin is logged out. In other words, the cookie is functionally equivalent to a static password, and thus provides permanent access if stolen. 2021-04-02 not yet calculated CVE-2021-29012
MISC
MISC docsify — docsify
  docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the ” character. 2021-04-02 not yet calculated CVE-2021-30074
MISC eclipse — jetty In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame. 2021-04-01 not yet calculated CVE-2021-28165
CONFIRM eclipse — jetty
  In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. 2021-04-01 not yet calculated CVE-2021-28164
CONFIRM eclipse — jetty
  In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory that is a symlink, the contents of the webapps directory is deployed as a static webapp, inadvertently serving the webapps themselves and anything else that might be in that directory. 2021-04-01 not yet calculated CVE-2021-28163
CONFIRM emlog — emlog
  Vulnerability in emlog v6.0.0 allows user to upload webshells via zip plugin module. 2021-04-02 not yet calculated CVE-2020-21585
MISC
MISC episerver –find
  An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL. 2021-03-31 not yet calculated CVE-2020-24550
MISC etsy — rest_api_client
  node-etsy-client is a NodeJs Etsy ReST API Client. Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too This is fixed in node-etsy-client v0.3.0 and later. 2021-04-01 not yet calculated CVE-2021-21421
MISC
CONFIRM f5 — big-ip On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, the upload functionality in BIG-IP Advanced WAF and BIG-IP ASM allows an authenticated user to upload files to the BIG-IP system using a call to an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23001
MISC f5 — big-ip On BIG-IP versions 13.1.3.4-13.1.3.6 and 12.1.5.2, if the tmm.http.rfc.enforcement BigDB key is enabled in a BIG-IP system, or the Bad host header value is checked in the AFM HTTP security profile associated with a virtual server, in rare instances, a specific sequence of malicious requests may cause TMM to restart. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23000
MISC f5 — big-ip On BIG-IP Advanced WAF and BIG-IP ASM versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, DOM-based XSS on DoS Profile properties page. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22993
MISC f5 — big-ip On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, the Traffic Management Microkernel (TMM) process may produce a core file when undisclosed MPTCP traffic passes through a standard virtual server. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23003
MISC f5 — big-ip On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, SYN flood protection thresholds are not enforced in secure network address translation (SNAT) listeners. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22998
MISC f5 — big-ip On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, Multipath TCP (MPTCP) forwarding flows may be created on standard virtual servers without MPTCP enabled in the applied TCP profile. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23004
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22988
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3, undisclosed requests to a virtual server may be incorrectly handled by the Traffic Management Microkernel (TMM) URI normalization, which may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may theoretically allow bypass of URL based access control or remote code execution (RCE). Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22991
MISC f5 — big-ip
  On BIG-IP versions 14.1.4 and 16.0.1.1, when the Traffic Management Microkernel (TMM) process handles certain undisclosed traffic, it may start dropping all fragmented IP traffic. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23007
MISC f5 — big-ip
  When using BIG-IP APM 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, or all 12.1.x and 11.6.x versions or Edge Client versions 7.2.1.x before 7.2.1.1, 7.1.9.x before 7.1.9.8, or 7.1.8.x before 7.1.8.5, the session ID is visible in the arguments of the f5vpn.exe command when VPN is launched from the browser on a Windows system. Addressing this issue requires both the client and server fixes. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23002
MISC f5 — big-ip
  On versions 15.0.x before 15.1.0 and 14.1.x before 14.1.4, the BIG-IP system provides an option to connect HTTP/2 clients to HTTP/1.x servers. When a client is slow to accept responses and it closes a connection prematurely, the BIG-IP system may indefinitely retain some streams unclosed. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22999
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3 when running in Appliance mode, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22987
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, when running in Appliance mode with Advanced WAF or BIG-IP ASM provisioned, the TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22989
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. This vulnerability is due to an incomplete fix for CVE-2020-5948. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22994
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, a malicious HTTP response to an Advanced WAF/BIG-IP ASM virtual server with Login Page configured in its policy may trigger a buffer overflow, resulting in a DoS attack. In certain situations, it may allow remote code execution (RCE), leading to complete system compromise. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22992
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, on systems with Advanced WAF or BIG-IP ASM provisioned, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22990
MISC f5 — big-ip
  On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22986
MISC
MISC
MISC f5 — big-iq On all 7.x and 6.x versions (fixed in 8.0.0), when using a Quorum device for BIG-IQ high availability (HA) for automatic failover, BIG-IQ does not make use of Transport Layer Security (TLS) with the Corosync protocol. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23005
MISC f5 — big-iq On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ high availability (HA) when using a Quorum device for automatic failover does not implement any form of authentication with the Corosync daemon. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22995
MISC f5 — big-iq
  On all 7.x and 6.x versions (fixed in 8.0.0), undisclosed BIG-IQ pages have a reflected cross-site scripting vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-23006
MISC f5 — big-iq_data_collection_device
  On all 7.x versions (fixed in 8.0.0), when set up for auto failover, a BIG-IQ Data Collection Device (DCD) cluster member that receives an undisclosed message may cause the corosync process to abort. This behavior may lead to a denial-of-service (DoS) and impact the stability of a BIG-IQ high availability (HA) cluster. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22996
MISC f5 — big-iq_ha_elasticsearch On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. 2021-03-31 not yet calculated CVE-2021-22997
MISC fireeye — ex_3500_devices
  eMPS 9.0.1.923211 on FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the sort_by parameter to the email search feature. According to the vendor, the issue is fixed in 9.0.3. NOTE: this is different from CVE-2020-25034 and affects newer versions of the software. 2021-04-01 not yet calculated CVE-2021-28969
MISC fireeye — ex_3500_devices
  eMPS 9.0.1.923211 on the Central Management of FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the job_id parameter to the email search feature. According to the vendor, the issue is fixed in 9.0.3. 2021-04-01 not yet calculated CVE-2021-28970
MISC flycms — flycms
  Server Side Request Forgery (SSRF) vulnerability in saveUrlAs function in ImagesService.java in sunkaifei FlyCMS version 20190503. 2021-04-01 not yet calculated CVE-2020-19613
MISC github — enterprise_server
  An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App’s web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program. 2021-04-02 not yet calculated CVE-2021-22865
MISC
MISC
MISC github — gitbuh
  A deadlock vulnerability was found in ‘github.com/containers/storage’ in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS). 2021-04-01 not yet calculated CVE-2021-20291
MISC gitlab — ce/ee An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server. 2021-04-02 not yet calculated CVE-2021-22201
CONFIRM
MISC
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API. 2021-04-02 not yet calculated CVE-2021-22202
CONFIRM
MISC
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user. 2021-04-02 not yet calculated CVE-2021-22200
CONFIRM
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all versions from 13.8 and above allowing an authenticated user to delete incident metric images of public projects. 2021-04-02 not yet calculated CVE-2021-22198
CONFIRM
MISC
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 where an infinite loop exist when an authenticated user with specific rights access a MR having source and target branch pointing to each other 2021-04-02 not yet calculated CVE-2021-22197
CONFIRM
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting in merge request via a specifically crafted branch name. 2021-04-02 not yet calculated CVE-2021-22196
CONFIRM
MISC
MISC gitlab — ce/ee
  Client side code execution in gitlab-vscode-extension v3.15.0 and earlier allows attacker to execute code on user system 2021-04-01 not yet calculated CVE-2021-22195
CONFIRM
MISC gitlab — ce/ee
  Potential DoS was identified in gitlab-shell in GitLab CE/EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command. 2021-04-01 not yet calculated CVE-2021-22177
CONFIRM
MISC
MISC gitlab — ce/ee
  An issue has been discovered in GitLab CE/EE affecting all versions starting with 13.7.9. A specially crafted Wiki page allowed attackers to read arbitrary files on the server. 2021-04-02 not yet calculated CVE-2021-22203
CONFIRM
MISC
MISC gocd — gocd
  In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field. 2021-04-01 not yet calculated CVE-2021-25924
MISC
MISC google — exposure_notification_verification_server
  A privilege escalation vulnerability impacting the Google Exposure Notification Verification Server (versions prior to 0.23.1), allows an attacker who (1) has UserWrite permissions and (2) is using a carefully crafted request or malicious proxy, to create another user with higher privileges than their own. This occurs due to insufficient checks on the allowed set of permissions. The new user creation event would be captured in the Event Log. 2021-03-31 not yet calculated CVE-2021-22538
CONFIRM
CONFIRM
CONFIRM
CONFIRM hewlett_packard_enterprises — ilo_amplified_pack
  A potential security vulnerability has been identified in HPE iLO Amplifier Pack. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). HPE has provided the following software update to resolve the vulnerability in HPE iLO Amplifier Pack: HPE iLO Amplifier Pack 1.80 or later. 2021-04-01 not yet calculated CVE-2021-26580
MISC hewlett_packard_enterprises — superdome_flex_server
  A potential security vulnerability has been identified in HPE Superdome Flex server. A denial of service attack can be remotely exploited leaving hung connections to the BMC web interface. The monarch BMC must be rebooted to recover from this situation. Other BMC management is not impacted. HPE has made the following software update to resolve the vulnerability in HPE Superdome Flex Server: Superdome Flex Server Firmware 3.30.142 or later. 2021-04-01 not yet calculated CVE-2021-26581
MISC huawei — smartphone An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages. 2021-04-01 not yet calculated CVE-2020-9148
MISC huawei — smartphone
  A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios. 2021-04-01 not yet calculated CVE-2020-9146
MISC huawei — smartphone
  An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages. 2021-04-01 not yet calculated CVE-2020-9149
MISC huawei — smartphone
  A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read. 2021-04-01 not yet calculated CVE-2020-9147
MISC isolated-vm — isolated-vm
  isolated-vm is a library for nodejs which gives you access to v8’s Isolate interface. Versions of isolated-vm before v4.0.0 have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. Reference objects allow access to the underlying reference’s full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker they would be able to use it to acquire a Reference to the nodejs context’s Function object. Similar application-specific attacks could be possible by modifying the local prototype of other API objects. Access to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution. This is addressed in v4.0.0 through a series of related changes. 2021-03-30 not yet calculated CVE-2021-21413
MISC
MISC
MISC
CONFIRM jamf — pro
  Jamf Pro before 10.28.0 allows XSS related to inventory history, aka PI-009376. 2021-04-02 not yet calculated CVE-2021-30125
MISC jenkins — rest_list_parameter_plugin
  Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. 2021-03-30 not yet calculated CVE-2021-21635
MLIST
CONFIRM jenkins — team_foundation_server_plugin
  A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins. 2021-03-30 not yet calculated CVE-2021-21636
MLIST
CONFIRM jenkins — team_foundation_server_plugin
  A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. 2021-03-30 not yet calculated CVE-2021-21637
MLIST
CONFIRM jira — server_and_data_center
  The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability. 2021-04-01 not yet calculated CVE-2021-26071
MISC jira — server_and_data_center
  The membersOf JQL search function in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a group exists & members of groups if they are assigned to publicly visible issue field. 2021-04-01 not yet calculated CVE-2020-36286
N/A jira — server_and_data_center
  The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check. 2021-04-01 not yet calculated CVE-2020-36238
MISC kopano — groupware_core
  kopano-ical (formerly zarafa-ical) in Kopano Groupware Core through 8.7.16, 9.x through 9.1.0, 10.x through 10.0.7, and 11.x through 11.0.1 and Zarafa 6.30.x through 7.2.x allows memory exhaustion via long HTTP headers. 2021-03-31 not yet calculated CVE-2021-28994
MLIST
MISC latrix — latrix
  An issue was discovered in LATRIX 0.6.0. SQL injection in the txtaccesscode parameter of inandout.php leads to information disclosure and code execution. 2021-04-02 not yet calculated CVE-2021-30000
MISC
MISC lightmeter — controlcenter
  Lightmeter ControlCenter 1.1.0 through 1.5.x before 1.5.1 allows anyone who knows the URL of a publicly available Lightmeter instance to access application settings, possibly including an SMTP password and a Slack access token, via a settings HTTP query. 2021-04-02 not yet calculated CVE-2021-30126
MISC linux — linux_kernel An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245. 2021-03-30 not yet calculated CVE-2021-29648
MISC
MISC
FEDORA
FEDORA
FEDORA linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624. 2021-03-30 not yet calculated CVE-2021-29647
MISC
MISC
FEDORA
FEDORA
FEDORA linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8. 2021-03-30 not yet calculated CVE-2021-29646
MISC
MISC
FEDORA
FEDORA
FEDORA linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf. 2021-03-30 not yet calculated CVE-2021-29650
MISC
MISC
FEDORA
FEDORA
FEDORA linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677. 2021-03-30 not yet calculated CVE-2021-29649
MISC
MISC
FEDORA
FEDORA
FEDORA linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b. 2021-04-02 not yet calculated CVE-2021-30002
MISC
MISC
MISC luvion — grand_elite_3
  An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model. 2021-04-02 not yet calculated CVE-2020-11925
MISC magnolia — cms
  Magnolia CMS From 6.1.3 to 6.2.3 contains a stored cross-site scripting (XSS) vulnerability in the setText parameter of /magnoliaAuthor/.magnolia/. 2021-04-02 not yet calculated CVE-2021-25893
MISC
MISC
MISC magnolia — cms
  Magnolia CMS contains a stored cross-site scripting (XSS) vulnerability in the /magnoliaPublic/travel/members/login.html mgnlUserId parameter. 2021-04-02 not yet calculated CVE-2021-25894
MISC
MISC
MISC magpierss — magpierss
  Because of a incorrect escaped exec command in MagpieRSS in 0.72 in the /extlib/Snoopy.class.inc file, it is possible to add a extra command to the curl binary. This creates an issue on the /scripts/magpie_debug.php and /scripts/magpie_simple.php page that if you send a specific https url in the RSS URL field, you are able to execute arbitrary commands. 2021-04-02 not yet calculated CVE-2021-28940
MISC
MISC magpierss — magpierss
  Because of no validation on a curl command in MagpieRSS 0.72 in the /extlib/Snoopy.class.inc file, when you send a request to the /scripts/magpie_debug.php or /scripts/magpie_simple.php page, it’s possible to request any internal page if you use a https request. 2021-04-02 not yet calculated CVE-2021-28941
MISC
MISC mahara — mahara
  Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox. 2021-03-31 not yet calculated CVE-2021-29349
MISC mobileiron — mobile@work
  MobileIron Mobile@Work through 2021-03-22 allows attackers to distinguish among valid, disabled, and nonexistent user accounts by observing the number of failed login attempts needed to produce a Lockout error message 2021-03-29 not yet calculated CVE-2021-3391
MISC
MISC
MISC mozilla — firefox
  Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23988
MISC
MISC mozilla — firefox
  By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23983
MISC
MISC mozilla — firefox
  A malicious extension with the ‘search’ permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23986
MISC
MISC mozilla — firefox
  If an attacker is able to alter specific about:config values (for example malware running on the user’s computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user’s browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23985
MISC
MISC mozilla — multiple_products Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network’s hosts as well as services running on the user’s local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23982
MISC
MISC
MISC
MISC mozilla — multiple_products
  A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23984
MISC
MISC
MISC
MISC mozilla — multiple_products
  A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23981
MISC
MISC
MISC
MISC mozilla — multiple_products
  Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87. 2021-03-31 not yet calculated CVE-2021-23987
MISC
MISC
MISC
MISC netmask — npm_package
  Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. 2021-04-01 not yet calculated CVE-2021-28918
MISC
MISC
MISC
MISC
MISC netty — netty
  Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final. 2021-03-30 not yet calculated CVE-2021-21409
MISC
MISC
CONFIRM
MISC nokia — g-120w-f-3fe46606agab91_devices
  An issue was discovered on Nokia G-120W-F 3FE46606AGAB91 devices. There is Stored XSS in the administrative interface via urlfilter.cgi?add url_address. 2021-04-02 not yet calculated CVE-2021-30003
MISC okta — access_gateway
  A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account. 2021-04-02 not yet calculated CVE-2021-28113
CONFIRM olivier_poitrey — node_demask
  The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918. 2021-03-30 not yet calculated CVE-2021-29418
MISC
MISC openexr — openexr There’s a flaw in OpenEXR’s scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability. 2021-03-31 not yet calculated CVE-2021-3478
MISC
MISC openexr — openexr
  There’s a flaw in OpenEXR’s Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability. 2021-03-31 not yet calculated CVE-2021-3479
MISC
MISC openexr — openexr
  A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR’s IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability. 2021-04-01 not yet calculated CVE-2021-20296
MISC
MISC openexr — openexr
  A flaw was found in OpenEXR’s B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability. 2021-03-30 not yet calculated CVE-2021-3476
MISC
MISC openexr — openexr
  There’s a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability. 2021-03-30 not yet calculated CVE-2021-3474
MISC
MISC openexr — openexr
  There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to be processed by OpenEXR could cause an integer overflow, potentially leading to problems with application availability. 2021-03-30 not yet calculated CVE-2021-3475
MISC
MISC openexr — openexr
  There’s a flaw in OpenEXR’s deep tile sample size calculations in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, subsequently leading to an out-of-bounds read. The greatest risk of this flaw is to application availability. 2021-03-31 not yet calculated CVE-2021-3477
MISC
MISC ovidentia — cms
  Ovidentia CMS 6.x contains a SQL injection vulnerability in the “id” parameter of index.php. The “checkbox” property into “text” data can be extracted and displayed in the text region or in source code. 2021-03-30 not yet calculated CVE-2021-29343
MISC
MISC pbootcms — pbotcms
  PbootCMS 3.0.4 contains a SQL injection vulnerability through index.php via the search parameter that can reveal sensitive information through adding an admin account. 2021-03-31 not yet calculated CVE-2021-28245
MISC pega — chat_access_group
  Misconfiguration of the Pega Chat Access Group portal in Pega platform 7.4.0 – 8.5.x could lead to unintended data exposure. 2021-04-01 not yet calculated CVE-2021-27653
MISC perl — perl
  The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. 2021-03-31 not yet calculated CVE-2021-29662
MISC piwigo — piwigo
  SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages. 2021-04-02 not yet calculated CVE-2021-27973
MISC pomerium — pomerium
  Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process 2021-04-02 not yet calculated CVE-2021-29652
CONFIRM pomerium — pomerium
  Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2). 2021-04-02 not yet calculated CVE-2021-29651
CONFIRM portswigger — burp_suite
  An issue was discovered in PortSwigger Burp Suite before 2021.2. During viewing of a malicious request, it can be manipulated into issuing a request that does not respect its upstream proxy configuration. This could leak NetNTLM hashes on Windows systems that fail to block outbound SMB. 2021-03-29 not yet calculated CVE-2021-29416
MISC
MISC postgresql — postgresql
  An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read. 2021-04-01 not yet calculated CVE-2021-3393
MISC pretashop — ps_emailsubscription
  ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office The issue has been fixed in 2.6.1 2021-03-31 not yet calculated CVE-2021-21418
MISC
MISC
CONFIRM
MISC prtg — network_monitor
  An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG’s Web server. 2021-03-31 not yet calculated CVE-2021-27220
CONFIRM python — python models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries. 2021-04-01 not yet calculated CVE-2021-29421
CONFIRM red_hat — red_hat
  A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2. 2021-04-01 not yet calculated CVE-2021-3447
MISC redis — redis
  A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc’s malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc. 2021-03-31 not yet calculated CVE-2021-3470
MISC rstudio — shiny_server
  Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash. 2021-04-02 not yet calculated CVE-2021-3374
MISC
MISC rust — rust An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A double drop can sometimes occur upon a panic in T::drop(). 2021-04-01 not yet calculated CVE-2021-29931
MISC rust — rust An issue was discovered in the telemetry crate through 2021-02-17 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size(). 2021-04-01 not yet calculated CVE-2021-29937
MISC rust — rust
  An issue was discovered in the insert_many crate through 2021-01-26 for Rust. Elements may be dropped twice if a .next() method panics. 2021-04-01 not yet calculated CVE-2021-29933
MISC rust — rust
  An issue was discovered in the through crate through 2021-02-18 for Rust. There is a double free (in through and through_and) upon a panic of the map function. 2021-04-01 not yet calculated CVE-2021-29940
MISC rust — rust
  An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an iterator returns a len() that is too small. 2021-04-01 not yet calculated CVE-2021-29941
MISC rust — rust
  An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A drop of uninitialized memory can sometimes occur upon a panic in T::default(). 2021-04-01 not yet calculated CVE-2021-29930
MISC rust — rust
  An issue was discovered in the parse_duration crate through 2021-03-18 for Rust. It allows attackers to cause a denial of service (CPU and memory consumption) via a duration string with a large exponent. 2021-04-01 not yet calculated CVE-2021-29932
MISC rust — rust
  An issue was discovered in the adtensor crate through 2021-01-11 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix. 2021-04-01 not yet calculated CVE-2021-29936
MISC rust — rust
  An issue was discovered in the rocket crate before 0.4.7 for Rust. uri::Formatter can have a use-after-free if a user-provided function panics. 2021-04-01 not yet calculated CVE-2021-29935
MISC rust — rust
  An issue was discovered in the stackvector crate through 2021-02-19 for Rust. There is an out-of-bounds write in StackVec::extend if size_hint provides certain anomalous data. 2021-04-01 not yet calculated CVE-2021-29939
MISC rust — rust
  An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function. 2021-04-01 not yet calculated CVE-2021-29938
MISC rust — rust
  An issue was discovered in PartialReader in the uu_od crate before 0.0.4 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation. 2021-04-01 not yet calculated CVE-2021-29934
MISC rust — rust
  An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index can return uninitialized values if an iterator returns a len() that is too large. 2021-04-01 not yet calculated CVE-2021-29942
MISC sannce — smart_hd_wifi_security_camera
  An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. By default, a mobile application is used to stream over UDP. However, the device offers many more services that also enable streaming. Although the service used by the mobile application requires a password, the other streaming services do not. By initiating communication on the RTSP port, an attacker can obtain access to the video feed without authenticating. 2021-04-02 not yet calculated CVE-2019-20464
MISC sannce — smart_hd_wifi_security_camera
  An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. A local attacker with the “default” account is capable of reading the /etc/passwd file, which contains a weakly hashed root password. By taking this hash and cracking it, the attacker can obtain root rights on the device. 2021-04-02 not yet calculated CVE-2019-20466
MISC sannce — smart_hd_wifi_security_camera
  An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. It is possible (using TELNET without a password) to control the camera’s pan/zoom/tilt functionality. 2021-04-02 not yet calculated CVE-2019-20465
MISC sannce — smart_hd_wifi_security_camera
  An issue was discovered on Sannce Smart HD Wifi Security Camera EAN 2 950004 595317 devices. A crash and reboot can be triggered by crafted IP traffic, as demonstrated by the Nikto vulnerability scanner. For example, sending the 111111 string to UDP port 20188 causes a reboot. To deny service for a long time period, the crafted IP traffic may be sent periodically. 2021-04-02 not yet calculated CVE-2019-20463
MISC softing — ag_opc_toolbox
  Softing AG OPC Toolbox through 4.10.1.13035 allows /en/diag_values.html Stored XSS via the ITEMLISTVALUES##ITEMID parameter, resulting in JavaScript payload injection into the trace file. This payload will then be triggered every time an authenticated user browses the page containing it. 2021-04-02 not yet calculated CVE-2021-29661
MISC softing — ag_opc_toolbox
  A Cross-Site Request Forgery (CSRF) vulnerability in en/cfg_setpwd.html in Softing AG OPC Toolbox through 4.10.1.13035 allows attackers to reset the administrative password by inducing the Administrator user to browse a URL controlled by an attacker. 2021-04-02 not yet calculated CVE-2021-29660
MISC synology — diskstation_manager
  Improper neutralization of special elements used in an OS command in SYNO.Core.Network.PPPoE in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via realname parameter. 2021-04-01 not yet calculated CVE-2021-29083
CONFIRM terramaster — f2-210_devices
  TerraMaster F2-210 devices through 2021-04-03 use UPnP to make the admin web server accessible over the Internet on TCP port 8181, which is arguably inconsistent with the “It is only available on the local network” documentation. NOTE: manually editing /etc/upnp.json provides a partial but undocumented workaround. 2021-04-03 not yet calculated CVE-2021-30127
MISC
MISC visual_code_stuido — visual_code_studio
  The unofficial vscode-rufo extension before 0.0.4 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace folder. 2021-03-31 not yet calculated CVE-2021-29658
MISC
MISC
MISC visual_studio_code — stripe
  vscode-stripe is an extension for Visual Studio Code. A vulnerability in Stripe for Visual Studio Code extension exists when it loads an untrusted source-code repository containing malicious settings. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. The update addresses the vulnerability by modifying the way the extension validates its settings. 2021-04-01 not yet calculated CVE-2021-21420
CONFIRM vrealize — operations_manager_api
  Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials. 2021-03-31 not yet calculated CVE-2021-21975
MISC vrealize — operations_manager_api
  Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system. 2021-03-31 not yet calculated CVE-2021-21983
MISC vwmware — carbon_black_cloud_workload_appliance
  VMware Carbon Black Cloud Workload appliance 1.0.0 and 1.01 has an authentication bypass vulnerability that may allow a malicious actor with network access to the administrative interface of the VMware Carbon Black Cloud Workload appliance to obtain a valid authentication token. Successful exploitation of this issue would result in the attacker being able to view and alter administrative configuration settings. 2021-04-01 not yet calculated CVE-2021-21982
MISC wire-webapp — wire-webapp
  wire-webapp is an open-source front end for Wire, a secure collaboration platform. In wire-webapp before version 2021-03-15-production.0, when being prompted to enter the app-lock passphrase, the typed passphrase will be sent into the most recently used chat when the user does not actively give focus to the input field. Input element focus is enforced programatically in version 2021-03-15-production.0. 2021-04-02 not yet calculated CVE-2021-21400
MISC
MISC
MISC
CONFIRM wiz — colors_a60_lightbulb
  An issue was discovered in WiZ Colors A60 1.14.0. Wi-Fi credentials are stored in cleartext in flash memory, which presents an information-disclosure risk for a discarded or resold device. 2021-04-02 not yet calculated CVE-2020-11924
MISC wiz — colors_a60_lightbulb
  An issue was discovered in WiZ Colors A60 1.14.0. The device sends unnecessary information to the cloud controller server. Although this information is sent encrypted and has low risk in isolation, it decreases the privacy of the end user. The information sent includes the local IP address being used and the SSID of the Wi-Fi network the device is connected to. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.) 2021-04-02 not yet calculated CVE-2020-11922
MISC wiz — colors_a60_lightbulb
  An issue was discovered in WiZ Colors A60 1.14.0. API credentials are locally logged. 2021-04-02 not yet calculated CVE-2020-11923
MISC wpa_supplicant — hostapd
  In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. 2021-04-02 not yet calculated CVE-2021-30004
MISC wuzhi — cms_4.1.0
  Directory traversal in coreframe/app/template/admin/index.php in WUZHI CMS 4.1.0 allows attackers to list files in arbitrary directories via the dir parameter. 2021-04-02 not yet calculated CVE-2020-21590
MISC
MISC xerox — multiple_products
  Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with “a weaponized clone file” to execute arbitrary commands. 2021-03-29 not yet calculated CVE-2021-28671
CONFIRM xerox — multiple_products
  Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling. 2021-03-29 not yet calculated CVE-2021-28672
CONFIRM xerox — multiple_products
  Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with “a weaponized clone file” to execute arbitrary commands in the Web User Interface. 2021-03-29 not yet calculated CVE-2021-28673
CONFIRM zeromq — zeromq There’s a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality. 2021-04-01 not yet calculated CVE-2021-20235
MISC
MISC zeromq — zeromq
  An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability. 2021-04-01 not yet calculated CVE-2021-20234
MISC
MISC zohocorp — manageengine_opmanager
  Manage Engine OpManager builds below 125346 are vulnerable to a remote denial of service vulnerability due to a path traversal issue in spark gateway component. This allows a remote attacker to remotely delete any directory or directories on the OS. 2021-04-01 not yet calculated CVE-2021-20078
MISC
Learn more about your animated characters in your Video

Learn more about your animated characters in your Video

This article is contributed. See the original author and article here.

Detecting and recognizing faces in videos is a common task. Models are trained to detect the general attributes of the human face, as well as delicate details that are the unique features that make each one of us one of a kind. With the right algorithms and sufficient training models can detect a face in the video, and even, when trained for it, assign the correct name to each face.


What about an animated character? Can the human-based models detect a cartoon version of a human, or even a talking fork? The answer is that in most cases, no. Animated characters have their own unique features, and not only that they are different from humans, but they also differ a lot between themselves.


The animated characters detection and recognition task is indeed a big challenge for the Data Science community. The Video Indexer DS team has been dealing with this task in the past year and half, and today we release a big milestone of improvement in these models. The final goal of this task is to recognize the animated character by its name and specify all its appearances in the video. This is a big task that is separated to three sub models.


 


Example of Animated Characters Recognition


We would like to create a model that recognizes the characters in the video [1]. Since there is only one episode for this video, to demonstrate that the recognition of characters works on parts of the video that were not used for training the recognition model, I trimmed the video to two parts – part 1 of ~3 minutes, and part 2 – the rest of the video.


We start from creating an empty animation model:


Go to Model Customization (the left arrow), and to the “Animated characters (preview)” tab. Press on the “Add model” (red arrow), and enter a model name.


 


Picture4.png


Pic 1: screenshot from Video Indexer website creating a custom model for animated characters.  


 


Picture2.jpg


Pic 2: screenshot from Video Indexer website after creating a custom model for animated characters.  


 


Next, we index the first part of the video using the “Animation models (preview)” option, and our new model:


Picture5.png


Pic 3: screenshot from Video Indexer website uploading a video selecting an animation characters custom model


 


This is how the video looks after indexing:


3.jpg


Pic 4: screenshot of Video Indexer player page, showing the detected animated characters of the indexed video [1]


 


We see that 5 characters were detected in the video, and I’m interested in creating a model for the characters Big Buck Bunny, Rodent1, Rodent2, Rodent3 and Butterfly:


Picture1.png


Pic 5: Representative images of the characters that were detected and grouped when indexing the video [1]


 


I edit the relevant group names in Video Indexer website, and they are automatically shown in the Custom Vision website for the model, with all the images behind each character.


4.jpg


Pic 6: screenshot of custom vision website showing the group of one of the characters [1]


 


I go over the groups in the Custom Vision website, and delete images that were grouped wrongly, or contain multiple characters in the same image:


16.jpg


Pic 7: screenshot of custom vision website showing the group of one of the characters when images are being deleted [1]


 


I train the model from the Video Indexer website. It is important to train the model from Video Indexer and not from Custom Vision website.


I then index the second part video with the trained model:


10.jpg


Pic 8: screenshot of the player page of video indexer website. Rodent3 was recognized.[1]


 


We see that all 5 characters were recognized:


Picture2.png


Pic 9: screenshot of the insight panel of video indexer website, showing all 5 characters were recognized successfully. [1]


 


The black lines below the recognized character indicate the places in the video that this character appears at.


 


Getting the best results from your animation model


To get good results, we recommend following these guidelines:



  1. For the initial training, each should be preferably longer than 15 minutes.,. If you have shorter episodes, we recommend uploading at least 30 minutes of video content before training to ensure variability of the training. The multiple videos will contribute to more angles, versions, backgrounds, and outfits of the different characters, and will enable better recognition later.

  2. Before naming a group, view its images in the Custom Vision website to make sure it’s a good group.

  3. Remove images that are mistakenly placed in a group. For example, if an image contains multiple characters, it is recommended not to leave it in the group. In addition, an image that is very blurred, or contains an object that is not the wanted characters, should be deleted. This can be done in the Custom Vision website, by checking the images and pressing “Delete”.

  4. If an image is mistakenly grouped with the wrong character, it is recommended to change its group. This can be done by checking the image, pressing “Tug Images”, writing the correct group’s name, and removing the incorrect one.

  5. Merge groups of the same character by giving them the same name in Video Indexer.

  6. Do not leave groups that are smaller than 5 images.


Once you have completed this initial work on the model’s output you are ready to train the model and start using it for recognition.


 


How does it work?


The first step is detecting that a specific object in the video is indeed an animated character, and not a still object. A character in animation videos can be anything from a girl to a talking car, therefore the detector has a difficult and wide mission. The animation detector was built a year ago and was incorporated in Video Indexer successfully.


The second step is grouping all the instances of the same animated character together. This is in fact a clustering problem, which is an unsupervised task. Our work here included analyzing many animation videos of different types, manually tagging the characters’ images to their assigned groups, and searching for the best algorithmic solution that fits the widest range of animation types. The input for the clustering is an embedding representing the detected animated characters – a numeric representation of each image by a vector of numbers, which is the output of the first step – the detector. We take the embedding, fit it to our needs and apply the clustering algorithm to it, to find the groups of images that represent the same character. Our solution relies on an algorithm of the density-based clustering family, which we trained and expanded for the animation specific needs.


Finally, comes the recognition of the character group that allows for naming the group. This is a step that you might know from using Video Indexer that can recognize hundreds of thousands of celebrities by their name, or any other person that you train your own custom models to recognize. The same can be done with animated characters. After indexing one or a few videos of the same series, the groups of character images that were found, can be named, and merged if necessary. You can then train your own animated model and index new episodes of the same series. The known (trained) characters will be recognized and named automatically.
The recognition step was also improved in the new version we released to be more precise.


 


Picture6.pngPic 10: Illustration of the algorithmic process [1]


 


Learn More


Review the animated character’s model customization concept to learn how to upload animated videos, tag the characters’ names, train the model and then use it for recognition or use the how to guide.


In closing, we’d like to call you to Review the animated character’s model customization concept to learn how to upload animated videos, tag the characters’ names, train the model and then use it for recognition or use the how to guide. We are looking to get your feedback.


For those of you who are new to our technology, we’d encourage you to get started today with these helpful resources in general:




 


[1] Big Buck Bunny is licensed under the Creative Commons Attribution 3.0 Unported license. © copyright Blender Foundation | www.bigbuckbunny.org

IoT Asset discovery based on FW logs

This article is contributed. See the original author and article here.

 


When protecting your network, you need to have full visibility on your assets. While traditional IT devices are well covered, IoT devices are becoming a bigger blind spot for security operators. IoT devices are added to environments without a proper security solution to protect and monitor them. These devices are becoming a weak spot in every environment, making the entire environment more vulnerable to attacks.


 


 To address this issue, Azure Defender for IoT and Azure Sentinel have created a dedicated workbook, named: IoT Asset Discovery. The workbook includes identification of the IoT devices and their type, the countries those IoT devices are communicating with and if there is any malicious indication related to those devices. Using this dashboard will give a basic assessment of IoT devices and their security exposure.


 


Currently this feature supports only Fortinet FW logs.


 


Although this workbook discovers IoT assets, without the need to deploy Azure Defender for IoT. In order to gain a more comprehensive and complete solution for securing and monitoring your IoT environment, we recommend using Azure Defender for IoT. Defender for IoT is built to enhance the security capability of your entire IoT environment. Natively integrated with IoT Hub and Azure Sentinel, Azure Defender for IoT will enrich your environment with unprecedented comprehensive investigation, monitoring and response capabilities.


 


To explore more about security features on the IoT platform, Join IoT Security community.

General availability and public preview of Microsoft unified DLP key features April 2021 update

General availability and public preview of Microsoft unified DLP key features April 2021 update

This article is contributed. See the original author and article here.

 


Microsoft’s unified Data Loss Prevention solution provides an ever-expanding set of capabilities to address the needs of organizations to protect sensitive information from risky or inappropriate sharing, transfer, or use in the modern workplace.


 


Since our last announcements at spring Ignite a few weeks ago (see blog here), we are proud to introduce two new capabilities in general availability and also offer an exciting new public preview.


 


 


Advanced Controls in DLP for Email Protection – General Availability


Today we are excited to announce the general availability of 27 new controls (conditions and actions) for DLP policies in Microsoft Exchange.


 


Some customers have previously used Exchange Transfer Rules (ETR) to define special handing actions for email messages that met specific criteria. While this approach provided them with the ability to enforce messaging policies, many deployments required a broader and more streamlined approach that leveraged integration with DLP to simplify policy creation, policy monitoring, and event remediation.


 


These new DLP conditions and exceptions announced in general availability for Exchange enhance the already existing capabilities in DLP (See highlighted in Figure 1: New DLP Conditions for Exchange and Figure 2: New DLP Actions and Sensitivity Labels) to offer customers the ability to configure the same conditions, exceptions, and actions they previously used in ETR, within DLP, to offer additional granular control over the scoping and application of a DLP policy, and ensure policies are applied as intended in Exchange.


 


This new approach provides customers with a fully consolidated view of all DLP policies, alerts, and alert management across Microsoft’s unified DLP offerings that operations teams will find valuable in their day-to-day tasks.


Figure 1.png


Figure 1: New DLP Conditions for Exchange


 


Figure_2.png


 


Figure 2. New DLP Actions for Exchange


 


 


Sensitivity label-aware DLP policies – General Availability


We continue to invest in developing cutting-edge information protection solutions for our customers. Microsoft Information Protection (MIP) is an intelligent, unified, and extensible solution to know your data, protect your data, and prevent data loss across an enterprise – in Microsoft 365 Apps, services, on-premises, devices, and third-party SaaS applications and services.


 


Sensitivity labels are a core capability of MIP. They allows customers to classify data according to sensitivity such as Public, General, Confidential, Highly Confidential or any other sensitivity label created by the organization to meet its needs.


This sensitivity information is added to the file information and is used to guide users, applications, and services in the proper handling and use of sensitive data such as:



  • Protect content in Microsoft 365 Apps across different platforms and devices

  • Enforce protection settings such as encryption or watermarks on labeled content

  • Protect content in third-party apps and services

  • Extend sensitivity labels to third-party apps and services

  • Classify content without using any protection settings

  • Expand the quality of insights to intelligently flag potential insider risks


With the general availability of sensitivity label-aware DLP policies, organizations can apply a MIP sensitivity label as a foundational component for a DLP policy, thereby streamlining the process to help ensure sensitive information is protected with DLP from risky or inappropriate sharing, transfer or use.


 


Figure_3.jpg


Figure 3. Sensitivity Label-aware DLP policies


 


Figure_4 Supported services, items, policy tips and enforceability.png


Figure 4. Supported services, items, policy tips and enforceability


 


 


Dynamic Policy Scoping by User in OneDrive for Business (Security Groups and Distribution List support) – Public Preview


Organizations often have a need to scope DLP policies in Microsoft OneDrive for Business (ODB) to specific groups of users to address the unique use cases that are applicable only to some user communities and not others.


 


With the public preview of security groups and distribution lists for ODB, its now easier than ever for organizations to leverage their existing security groups and distribution lists as the applicable context in an ODB DLP policy.


 


This means that as users are added or removed from a security group or distribution list, they are automatically added or removed from the associated ODB DLP policies without any additional configuration in the DLP policy definition itself. This approach offers significant benefits for organizations who have very large or dynamic user populations such as groups with high turnovers, or changes in business function.


 


Using security groups and distribution lists as the applicable context in ODB DLP policies also provides a simplified means for bulk inclusion and exclusion of user communities. This is particularly beneficial for example when a ODB DLP policy is only intended to apply to a group of users located in a specific geography, business unit, or role.


 


Figure_5-SG DL odb.png


Figure 5. Security Groups and Distribution Lists for OneDrive for business


 


Figure_6 Groups_DL exclusion.png


Figure 6. Security Groups and Distribution Lists – Inclusion


 


Figure_7 Groups_DL Inclusion.png


Figure 7. Security Groups and Distribution Lists – exclusion


 


Quick Path to Value


To help customers accelerate their deployment of a comprehensive information protection and data loss prevention strategy across all their environments containing sensitive data and help ensure immediate value, Microsoft provides a one-stop approach to data protection and DLP policy deployment within the Microsoft 365 Compliance Center.



Microsoft Information Protection (MIP) provides a common set of classification and data labeling tools that leverage AI and machine learning to support even the most complex of regulatory or internal sensitive information compliance mandates. The more than 150 sensitive information types and over 40 built-in policy templates for common industry regulations and compliance in MIP offer a quick path to value.


 


Consistent User Experience


No matter where DLP is applied, users have a consistent and familiar experience when notified of an activity that is in violation with a defined policy. Policy Tips and guidance are provided using a familiar look and feel users are already accustomed to from applications and services they use every day. This approach can reduce end-user training time, eliminates alert confusion, increases user confidence in prescribed guidance and remediations, and improves overall compliance with policies – without impacting productivity.


 


Integrated Insights


Microsoft DLP interoperates with other Security and Compliance solutions such as MIP, Microsoft Defender, and Insider Risk Management to provide broad and comprehensive coverage and visibility required by organizations to meet their regulatory and policy compliance obligations.


 


Figure 8 Integrated Insights.png


Figure 8: Integrated Insights


 



This approach reduces the dependence on individual and uncoordinated solutions from disparate providers to monitor user actions, remediate policy violations, and educate users on the correct handling of sensitive data at the endpoint, on-premises, and in the cloud.


 


Get Started


Microsoft unified DLP solution is part of a broader set of Information Protection and Governance solutions within the Microsoft 365 Compliance Suite. You can sign up for a trial of Microsoft 365 E5 or navigate to the Microsoft 365 Compliance Center to get started today.


 


Additional resources:


  • For more information on Data Loss Prevention, please see this and this

  • For videos on Microsoft Unified DLP approach and Endpoint DLP see this and this 

  • For more information on Advanced Controls in DLP for Email protection see this

  • For more information on Sensitivity Labels as a condition for DLP policies, see this  

  • For a Microsoft Mechanics video on Endpoint DLP see this 

  • For more information on the Microsoft Compliance Extension for Chrome see and this

  • For more information on DLP Alerts and Event Management, see this 

  • For more information on Sensitivity Labels, please see this  

  • For more information on conditions and actions for Unified DLP, please see this

  • For the latest on Microsoft Information Protection, see this and this


Thank you,


The Microsoft Information Protection team


 

Prepare for severe spring weather with tips you can share

Prepare for severe spring weather with tips you can share

This article was originally posted by the FTC. See the original article here.

According to the National Weather Service, the peak severe weather season is during the spring months of March, April, and May. Already this season, we’ve seen heavy rains, flooding, and tornados in southern areas like Alabama, Arkansas, Georgia, Louisiana, Mississippi, Tennessee, and East Texas. And we know that scammers follow not just the headlines, but also the storm fronts.

Handling post-disaster scammers is never easy. And getting ready for the severe weather that’s sure to come can be a challenge. But both are even harder due to the COVID-19 pandemic. Visit the FTC’s site, Dealing with Weather Emergencies, to start planning your response. You’ll find ideas about how to:

Share these tips with friends, family, and community organizations by getting a free one-page customizable handout at Picking Up the Pieces after a Disaster. Add your local consumer protection and emergency service contacts and post copies for people to download.

If you or anyone you know needs to report a disaster-related scam, visit Reportfraud.ftc.gov.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Ready, Set, Go … Deploy Azure VMware Solution

This article is contributed. See the original author and article here.

Originally posted on virtualworkloads.com


 


First things first, you need to start with collecting up all the prerequisites. There isn’t much, but it’s essential. Generally speaking, most can be done on the fly, assuming the person doing the deployment has at least Contributor rights to Azure and understands the overall Azure standards that their company has put in place. The complete list of prerequisites can be found here.


 


The items from the prerequisite list that absolutely need to be done ahead of time are;


 



Once all those prerequisites are completed, you can move on to the deployment.


There are two ways to do the deployment; via the Azure Portal or a Powershell deployment script.


 


After the deployment completes, you most may want to connect Azure VMware Solution back to your on-premises environment via ExpressRoute and then setup VMware HCX to migrate workloads from your on-premises environment to Azure VMware Solution.


 


You should check out the Azure VMware Solution Hands-on-Lab and give a read to Emad Younis’ blog post Overview of Azure VMware Solution Next Evolution. He does a great job going over the deployment in detail and post-deployment and unique benefits to Azure VMware Solution.

Azure Marketplace new offers – Volume 128

Azure Marketplace new offers – Volume 128

This article is contributed. See the original author and article here.











We continue to expand the Azure Marketplace ecosystem. For this volume, 108 new offers successfully met the onboarding criteria and went live. See details of the new offers below:





























































































































































































































































































































































































































































Applications


[ui!] UrbanPulse.png

[ui!] UrbanPulse: [ui!] UrbanPulse is a centralized urban data platform on Microsoft Azure that delivers real-time actionable insights by visualizing a wide variety of data across systems.


AI Operator.png

AI Operator: Chemical Technologies’ AI-powered AI Operator ingests data from industrial processes and provides real-time recommendations to your production team or fully automated process optimization decisions.


Allpro.png

Allpro: Allpro expands your existing ERP system by collecting and confirming data about employee-related and project-related costs for key processes, including time reporting, project expenses, and business trip approvals.


AssistEdge Discover.png

AssistEdge Discover: Discover gaps and variations in your processes and identify opportunities for automation across your organization with AssistEdge Discover. Capture human-machine interactions nonintrusively, improve process transparency, gain actionable insights, and more.


AtScale Adaptive Analytics 2021.png

AtScale Adaptive Analytics 2021: AtScale Adaptive Analytics unleashes the power of data to help businesspeople and data scientists alike make data-driven decisions quickly, easily, and at scale.


BI-Clinical for Providers.png

BI-Clinical for Providers: Citiustech’s BI-Clinical analytics platform on Microsoft Azure offers an extensive range of configurable apps covering more than 900 KPIs for clinical, financial, operational, and regulatory requirements.


Bitnami Shell Container Image.png

Bitnami Shell Container Image: Bitnami offers this preconfigured container image of Bitnami Shell. Based on minideb, Bitnami Shell is well-suited for helper tasks such as running initialization tasks in init containers from Helm charts.


CareSeed HEDIS Quality Reporting.png

CareSeed HEDIS Quality Reporting: CareSeed Forecast is a reporting solution that empowers your organization to execute key tasks and deliver improved results for the Healthcare Effectiveness Data and Information Set (HEDIS) and other quality measures.


CentOS 7 Minimal.png

CentOS 7 Minimal: This preconfigured image from Cloud Maven Solutions provides a minimal installation of CentOS 7, which includes several major changes that pertain to booting up and managing the system.


CentOS 8 Minimal.png

CentOS 8 Minimal: This preconfigured image from Cloud Maven Solutions provides a minimal installation of CentOS 8, which includes a system-wide cryptographic policy that means you don’t have to modify security configurations for individual applications.


Certified Apache NiFi - Calculated Systems.png

Certified Apache NiFi – Calculated Systems: Apache NiFi enables you to automatically capture, move, enrich, and transform machine data, Internet of Things (IoT) data, and streaming data between systems. Build data pipelines from commercial data feeds, manufacturing equipment, IoT sensors, web servers, and more.


ChillETL Framework.png

ChillETL Framework: Built on Microsoft Azure Data Factory, ChillETL is Cloud Data Solutions’ framework for addressing common design patterns associated with scheduling and logging ETL processes, intelligent restarts on failures, notifications, and more.


cloudstep - cloud cost modelling done right.png

cloudstep – cloud cost modelling done right: cloudstep helps IT organizations develop a fully costed migration plan for their customers. Summarize an organization’s change program in waves, enabling technical teams to understand what is ahead, where savings will occur, and what internal effort is required.


Cognite Data Fusion.png

Cognite Data Fusion: Cognite Data Fusion is a specialized DataOps and AI platform providing DataOps at scale for heavy-asset industries. Make all industrial data accessible, understandable, and useful for data scientists and developers alike.


Colibri.png

Colibri: Built on Microsoft Azure, Colibri is a cloud-based supply chain planning solution that covers sales and demand forecasting, distribution and supply planning, and sales and operations planning management.


Connect Plus.png

Connect Plus: The value of data continues to increase along with the need to be able to exchange it effectively. Connect Plus serves as a central hub that simplifies, scales, and standardizes data exchange. This application is available only in Dutch.


Cosmos Lite.png

Cosmos Lite: Cosmos Lite for virtual broadcast channel playout provides a fast Microsoft Azure-based playout solution that enables broadcasters and service providers to spin up both OTT and traditional TV channels in a few minutes.


CSMART by Celebal.png

CSMART by Celebal: A comprehensive cloud management platform for Microsoft Azure, C-SMART simplifies Azure usage with easy monitoring, management, optimization, and reporting along with automated deployment and data migration features.


CXP Cloud Enterprise.png

CXP Cloud Enterprise: Built in partnership with leading healthcare systems to meet enterprise needs, Oneview Healthcare’s Care Experience Platform (CXP) Cloud Enterprise edition scales to thousands of endpoints across every type of healthcare facility.


eCarUp - EV Charging Solution.png

eCarUp – EV Charging Solution: Easily manage, bill, and rent your e-charging station with eCarUp on Microsoft Azure. Once connected to eCarUp, you can use a growing set of parameters to customize charging stations to your use cases (public, semi-public, private).


EDGE Next.png

EDGE Next: EDGE Next is a smart building solution that uses sensors and other sources to gather data and deliver actionable insights. Make your building smarter, safer, and more sustainable with EDGE Next.


EDISPHERE Private Instance using MS-SQL Database.png

EDISPHERE Private Instance using MS-SQL Database: Available on Microsoft Azure as a private instance using SQL Server, EDISPHERE is a cost-effective electronic data interchange (EDI) software and web services integration platform that uses traditional EDI formats to integrate ERP and cloud systems.


Ekran System Insider Threat Management Solution.png

Ekran System Insider Threat Management Solution: Ekran System is a comprehensive insider risk-management solution that helps organizations mitigate threats by deterring, detecting, and disrupting threats from internal users across IT infrastructures.


FUJITSU Retail Solution Brainforce.png

FUJITSU Retail Solution Brainforce: Available only in Japanese, Brainforce leverages a microservices architecture to expand the retail value chain by providing a reimagined consumer shopping experience and rewarding stores and employees for their work.


Gimmal Link.png

Gimmal Link: Gimmal Link seamlessly moves content created in SAP to SharePoint and allows SharePoint users to create and link to transactions in SAP. Increase content availability through multiple delivery channels with Gimmal Link.


Gimmal Records.png

Gimmal Records: Gimmal Records integrates with your content repositories to manage all your records and information collectively. Leverage comprehensive records management to help ensure organizational compliance, no matter where your records live.


Honeywell Quantum Solutions.png

Honeywell Quantum Solutions: Honeywell Quantum Solutions’ quantum computers are trapped-ion-based systems with differentiated features that enable you to explore a variety of complex problems. Approach quantum computation in new ways with a robust increase in computational power.


H-Scale For Providers.png

H-Scale for Providers: H-Scale is a Microsoft Azure-based data integration and management platform that empowers organizations to build a cloud-native data strategy from scratch. Streamline healthcare data acquisition, storage, curation, and provisioning while adding business value.


Imperva Application Security.png

Imperva Application Security: Imperva Application Security protects your critical applications and APIs with a defense-in-depth approach. Features include a web application firewall, DDoS protection, and machine learning-powered attack analysis.


KITT Chatbot.png

KITT Chatbot: KITT is a text-based and speech-to-text chatbot that can be integrated with websites, instant-messaging systems, intranets, and more. This application is available in German and English.


Koverse Intelligent Solutions Platform.png

Koverse Intelligent Solutions Platform: The Koverse Intelligent Solutions Platform enables organizations to design and build scalable data-driven solutions in a high-availability/high-performance Apache Accumulo-based environment.


Mask Detection.png

Mask Detection: Volteo Edge’s Mask Detection module for Azure IoT Edge helps improve workplace safety through mask compliance monitoring. Deploy Volteo Edge, connect your cameras, activate your Azure Live Video Analytics graph, and get mask violation events delivered to your Azure IoT Hub.


Minimal Installation of Debian 10.png

Minimal Installation of Debian 10: This preconfigured image from Virtual Pulse provides a minimal installation of Debian 10 optimized for automated use at scale. Debian 10 is used as a common base system on top of which other appliances can be built and tested.


Modern Requirements4DevOps.png

Modern Requirements4DevOps: Modern Requirements4DevOps lets you author, elicit, automate, trace, and define requirements in Azure DevOps services. Reduce project cycle times by providing the right amount of requirement analysis, quality management, and reporting.


MultiChain 2 Enterprise with Support.png

MultiChain 2 Enterprise with Support: Ready to deploy on Microsoft Azure, this MultiChain 2 Enterprise template is suitable for organizations wishing to run their own MultiChain Enterprise node without the hassle of managing it on-premises. MultiChain 2 Enterprise is a leading enterprise blockchain platform.


NaviSafe.png

NaviSafe: Hosted on Microsoft Azure, UST NaviSafe is an IoT-based safety and productivity platform designed to significantly reduce unsafe behavior at construction sites. NaviSafe drives worker safety to help you achieve accident-free construction and manufacturing sites.


Nia DocAI.png

Nia DocAI: Nia DocAI is an enterprise-grade solution that leverages advanced AI techniques, including computer vision and natural language processing, to help users across industries derive insights from unstructured data in their documents.


ORBITS.png

ORBITS: Students can use ORBITS to study together with peers or use its Smart Transcription service to automatically transform virtual lessons into organized, searchable, and reviewable text or video clips.


PetaSuite CE.png

PetaSuite CE: PetaSuite CE provides lossless compression of genomic files. The PetaSuite binary consists of a command-line tool that performs compression and decompression and a user-mode library that allows other tools and pipelines to access data in its original file formats.


Project Online Data Warehouse.png

Project Online Data Warehouse: PPM Works Data Warehouse provides an authenticated, cloud-based data solution for your Microsoft Project Online reporting needs. Easily import your old SQL Server Reporting Services assets or build new ones using Power BI and SQL Server Reporting Services, Excel Services, or other reporting software.


Project Planner Sync.png

Project Planner Sync: PPM Works Project to Planner Sync enables you to use Microsoft Planner for task management while managing the execution in Microsoft Project Online. Collaborate seamlessly, automate workloads, reduce costs, and more.


Quisitive LedgerPay.png

Quisitive LedgerPay: Quisitive LedgerPay seamlessly integrates payments, analytics, and targeted push marketing operations in one cloud-based solution. Increase revenue and customer engagement and loyalty with LedgerPay’s payment intelligence.


Replix Data Fabric.png

Replix Data Fabric: Replix Data Fabric is a multi-region data replication service that supports multicloud deployment across any distance. Eliminate the operational complexity associated with setting up and maintaining a data replication infrastructure in your organization.


Return to Work Solution.png

Return to Work Solution: Cambay Digital’s Return to Work solution enables organizations to monitor the safety of their workforce by providing daily health assessments and COVID-19 screening for all employees.


ScrumOnDemand.png

ScrumOnDemand: ScrumOnDemand is a talent-sourcing and fulfilment platform that enables Eyon’s enterprise partners to post project resource needs, which Elyon fulfills based on its global talent pool. Find the right talent for your organization’s needs with ScrumOnDemand.


Stack Moxie.png

Stack Moxie: Stack Moxie on Microsoft Azure provides automated testing and monitoring for your organization’s integrations and configurations. Ensure leads reach your sales team, emails do not contain broken links, analytics are tagged as expected, and more.


Story City Engagement Platform.png

Story City Engagement Platform: Story City is an engagement and economic development platform that gamifies real-world streets to deliver location-based storytelling. The solution geolocates experiential content locations to encourage outdoor activity and increase foot traffic and spending across cities.


The CloudLab Smart Azure Calculator.png

The CloudLab Smart Azure Calculator: Produce a detailed, accurate, and optimized Microsoft Azure migration business case in just a few hours with the CloudLab’s Smart Azure Calculator. Significantly reduce your pre-sales costs and increase your success rate in winning Azure migration business.


TravelgateX.png

TravelgateX: The TravelgateX global marketplace provides APIs that connect buyers and sellers across the travel industry. Connect to sellers, expand your inventory, and reach new customers with TravelgateX.


Tufin SecureCloud.png

Tufin SecureCloud: Tufin SecureCloud on Microsoft Azure enables security teams to gain visibility into their cloud security posture, establish security guardrails, and achieve continuous compliance without compromising the business benefits of cloud computing.


Vault - Secrets Management as a Service.png

Vault – Secrets Management as a Service: Vault can encrypt and decrypt arbitrary key/value secrets without storing them, allowing security teams to define encryption parameters and allowing developers to store encrypted data without having to design their own encryption methods.


Vendor On-boarding Autopilot.png

Vendor On-boarding Autopilot: Need to onboard new vendors for your business? Autopilot on Microsoft Azure facilitates the collection of vendor information and documents to help streamline the onboarding process.


Vital Knowledge - Knowledge Management Platform.png

Vital Knowledge – Knowledge Management Platform: Vital Knowledge connects people, knowledge, and ideas to increase your organization’s intellectual capital and improve productivity, creativity, and competitiveness. This application is available only in Traditional Chinese.


Vormetric Data Security Manager v6.4.4.png

Vormetric Data Security Manager v6.4.4: The Vormetric Data Security Manager (DSM) from Thales eSecurity provisions and manages keys for Vormetric data security platform solutions. Efficiently address compliance requirements, regulatory mandates, and industry best practices with DSM.


WeDX ARM Template - IoT with Edge AI & Digital Twins.png

WeDX ARM Template – IoT with Edge AI & Digital Twins: motojin.com offers this ARM template for its WeDX Server 5, an IoT solution that manages customizable edge AI and digital twins on Microsoft Azure. Features include IoT and edge device management, indoor maps for digital twins, and live video analytics management.



Consulting services


1-Day Master Data Management Workshop.png

1-Day Master Data Management Workshop: Master data management (MDM) capabilities are a key element of a successful Microsoft Azure data strategy. This free workshop from Agile Solutions will help you identify business use cases along with infrastructure and Azure architecture requirements for your MDM solution.


1-Day Product 360 Workshop.png

1-Day Product 360 Workshop: Product data management capabilities are a key element of a successful Microsoft Azure data strategy. Agile Solutions’ free workshop will help you identify business use cases along with infrastructure and Azure architecture requirements for a customized Product 360 data management solution.


1-Day Supplier 360 Workshop.png

1-Day Supplier 360 Workshop: Supplier data management capabilities are a key element of a successful Microsoft Azure data strategy. Agile Solutions’ free workshop will help you identify business use cases along with infrastructure and Azure architecture requirements for a customized Supplier 360 data management solution.


3fifty Cyber Security Assessment 5-Day Assessment.png

3fifty Cyber Security Assessment: 5-Day Assessment: In this five-day assessment, 3fifty will determine your organization’s level of cloud security and identify technical vulnerabilities and relevant risks. Deliverables include a step-by-step plan to improve security across your organization. This service is available in Dutch.


3fifty Managed Security Services.png

3fifty Managed Security Services: Available in Dutch and English, 3fifty’s managed SOC-as-a-service offering includes monitoring and management of your organization’s Microsoft Azure security.


4-Hour Cloud Migration Assessment.png

4-Hour Cloud Migration Assessment: Squid Technologies offers this free cloud migration assessment of your organization’s IT environment and cloud readiness. Deliverables include a server readiness check, cloud adoption roadmap, and network assessment and mapping guidance.


5-Week Migration to Azure.png

5-Week Migration to Azure: This five-week migration offer from Genesis Technology will help your organization improve service availability and enhance system security by moving your applications and services to Microsoft Azure. This service is available in Traditional Chinese.


6-Week CAF Adopt Assessment.png

6-Week CAF Adopt Assessment: Accelerate your cloud adoption journey to Microsoft Azure with Alithya’s six-week assessment aligned with Microsoft’s Cloud Adoption Framework for Azure. Alithya will provide an in-depth Azure migration report, recommendations for app migration patterns, and a best-practices presentation.


AI Fast Start 10-Hour Workshop.png

AI Fast Start: 10-Hour Workshop: Wondering how you can use artificial intelligence to improve your business processes? Altitudo’s AI Fast Start workshop will help you understand the benefits of AI and how the Azure AI platform can deliver a measurable competitive advantage.


AKS Migration 1-Week Assessment.png

AKS Migration: 1-Week Assessment: Assess your organization’s cloud readiness and plan your application modernization and migration to Microsoft Azure and Azure Kubernetes Service (AKS) in Canonical’s one-week assessment. Accelerate time to market and drive agility with Azure and AKS.


Analytics with Azure Machine Learning 8-Week Implementation.png

Analytics with Azure Machine Learning: 8-Week Implementation: Available only in Portuguese, Blueshift Brazil’s offering aims to help you reduce costs and gain agility in your strategic decision-making with Azure Machine Learning Studio and Power BI.


AVS Pilot Accelerator 4-Week Proof of Concept.png

AVS Pilot Accelerator: 4-Week Proof of Concept: Phoenix Software’s Azure VMware Solution (AVS) Pilot Accelerator will enable you to run your VMware workloads natively on Microsoft Azure. Manage your environment using familiar VMware tools while modernizing your applications with Azure-native services.


Azure Application Modernisation 5-Day Assessment.png

Azure Application Modernization: 5-Day Assessment: This application modernization assessment from Cloud Direct will provide you with an understanding of what’s possible for your applications on Microsoft Azure. Get a roadmap of migration options along with optimization recommendations and solution paths.


Azure DevOps Quickstart 3-Day Proof of Concept.png

Azure DevOps Quickstart: 3-Day Proof of Concept: Quickly launch your first application running on Microsoft Azure in Petabytz’s DevOps quick-start proof of concept. Deliverables include a detailed overview of different Azure DevOps modules and components.


Azure Kubernetes for Dev 1-Day Workshop.png

Azure Kubernetes for Dev: 1-Day Workshop: Learn how to access and navigate an Azure Kubernetes Service (AKS) cluster, deploy an application to AKS, and monitor the application’s status in Deep Network’s one-day workshop.


Azure LifeCycle Solution - 8-Week Implementation.png

Azure LifeCycle Solution – 8-Week Implementation: Data#3 uses a five-step approach in its implementation offering to assess everything from network connectivity to security before considering migrating workloads to Microsoft Azure. Migrate and optimize workloads for the cloud and tap into Azure services to drive digital innovation.


Azure Migration Readiness 6-Week Assessment.png

Azure Migration Readiness: 6-Week Assessment: In this six-week server infrastructure assessment, Practical Solutions will analyze your organization’s workload utilization and provide recommendations and cost projections for a migration to Microsoft Azure.


Azure Spring Cloud MVP Build & 4-Week Assessment.png

Azure Spring Cloud: MVP Build & 4-Week Assessment: Kin + Carta will evaluate your organization’s digital estate and assess your software development processes, then create a Spring Cloud instance on Microsoft Azure. Easily deploy Spring Boot-based Java microservices with Spring Cloud on Azure.


Azure SQL 3-Week Consulting & Implementation.png

Azure SQL: 3-Week Consulting & Implementation: Simplify the management of your big data environment by migrating SQL workloads from SQL Server to Microsoft Azure virtual machines. In this engagement, CROC will help you migrate your data-processing tools to Azure.


Azure VMware Solution 5-Day Workshops.png

Azure VMware Solution: 5-Day Workshop: Learn about the benefits of an Azure VMware Solution and get a range of solutions tailored to your needs along with an overview of how they can help your business in this workshop from Synapsys.


Azure Workload Migration 8-Week Proof of Concept.png

Azure Workload Migration: 8-Week Proof of Concept: Practical Solutions’ proof of concept includes a server assessment to analyze workload utilization, migration recommendations, and cost projections as well as the migration of an IaaS workload or containerized application to Microsoft Azure.


Citrix on Azure Service 1-Hour Briefing.png

Citrix on Azure Service: 1-Hour Briefing: Looking to migrate, modernize, and transform your Citrix environments with Microsoft Azure? Cloud Direct’s free briefing covers how to optimize costs, performance, and security when migrating Citrix workloads to Azure.


Cloud Migration Modernisation 4-Week Implementation.png

Cloud Migration Modernization: 4-Week Implementation: QuantiQ offers a cloud migration and modernization service to help you modernize your existing applications and tackle more extensive cloud migration projects. This offering includes a migration assessment, lift-and-shift migration to Microsoft Azure, and optimization.


Cybersecurity Solution Assessment 2-Week Assessment.png

Cybersecurity Solution Assessment: 2-Week Assessment: Waterleaf Digital’s cybersecurity assessment includes a review of your organization’s IT infrastructure and security-related policies and practices. Gain an understanding of your organization’s compliance with security regulations and resilience against potential harm.


Data & BI Maturity Framework 6-Week Assessment.png

Data & BI Maturity Framework: 6-Week Assessment: Birlasoft’s assessment framework will help you realign your technology roadmap from on-premises legacy data and BI systems to Microsoft Azure-based data and BI platform, including services such as Azure Data Factory, Azure Databricks, Azure Synapse Analytics, and Microsoft Power BI.


Data Lake on Azure 2-Hour Briefing.png

Data Lake on Azure: 2-Hour Briefing: Learn how to design, implement, and maintain a Microsoft Azure-based data platform solution tailored to your organization’s needs in The unbelievable Machine Company’s free briefing. Facilitate data-driven decision-making and generate more value across your organization.


Data Protections Engine 5-Day Proof of Concept.png

Data Protections Engine: 5-Day Proof of Concept: Built in Apache Spark and deployed to Microsoft Azure Databricks, Elastacloud’s Data Protection Engine (DPE) helps ensure your business is compliant with GDPR, CCPA, and other data privacy regulations. This proof of concept includes deployment of DPE to your environment.


Disaster Recovery as a Service 6-Week Assessment.png

Disaster Recovery as a Service: 6-Week Assessment: In this assessment, Performance Technologies will review your on-premises VMs and physically hosted application pool, then provide you with a plan for delivering an advanced backup, disaster recovery, and business continuity strategy on Microsoft Azure.


Facial Recognition Service 4-Week Implementation.png

Facial Recognition Service: 4-Week Implementation: Reduce business fraud with the implementation of Logic Studio’s facial recognition service, available only in Spanish. Automatically verify the identity of your customers, suppliers, and collaborators with a solution powered by Azure Cognitive Services.


HPC in Azure 1-Hour Briefing.png

HPC on Azure: 1-Hour Briefing: Learn how high-performance computing (HPC) on Microsoft Azure can help boost performance across your organization in Cloud Direct’s free one-hour briefing.


Insight Connected Platform 5-Week Implementation.png

Insight Connected Platform: 5-Week Implementation: This Microsoft Azure-based solution includes IoT sensors to help organizations safely reopen, stay open, and comply with organizational and governmental guidelines for preventing the spread of infectious diseases.


Intelligent Data Lakehouse 10-Week implementation.png

Intelligent Data Lakehouse: 10-Week implementation: Based on Microsoft Azure big data and analytics technologies, OpenSistemas’ Intelligent Data Lakehouse implementation is designed to help you eliminate data silos, gain actionable insights, optimize costs, and more. This service is available in Spanish.


Kinetics Azure Lighthouse Managed Service.png

Kinetics Azure Lighthouse Managed Service: Kinetics’ managed services for Microsoft Azure will help you transition from an on-premises infrastructure and learn about the benefits of a cloud-first business. Managed service offerings include Azure subscription monitoring and management, VM management, backup management, and more.


Lift & Shift to the Cloud - 10-Week implementation.png

Lift & Shift to the Cloud – 10-Week Implementation: In this 10-week engagement, 3fifty will migrate your existing development, test, or production environments from VMWare or Hyper-V to Microsoft Azure infrastructure as a service.


Managed Azure Sentinel 4-Week Proof of Concept.png

Managed Azure Sentinel: 4-Week Proof of Concept: Learn about a comprehensive approach to event collection and collation, threat detection, risk analysis, and reporting for your organization in Interactive’s free Managed Azure Sentinel proof of concept.


Managed Cloud Platform Protection (Zero Trust).png

Managed Cloud Platform Protection (Zero Trust): Based on the zero-trust approach, ASAPCLOUD’s Managed Hybrid Cloud Platform Protection is a managed service that protects hybrid Microsoft Azure infrastructures. Protect your infrastructure with server hardening, encryption, vulnerability management, and more.


Managed Detection and Response.png

Managed Detection and Response: ASAPCLOUD’s Managed Detection and Response (MDR) service uses artificial intelligence and machine learning to deliver threat intelligence, threat hunting, security monitoring, incident analysis, and incident response.


Managed Identity and Access (Zero Trust).png

Managed Identity and Access (Zero Trust): Based on the zero-trust approach, ASAPCLOUDs Managed Identity and Access service manages Microsoft Azure security controls for your organization, including Azure Active Directory, Azure Active Directory multi-factor authentication, and Microsoft Intune.


Managed Windows Virtual Desktop.png

Managed Windows Virtual Desktop: ASAPCLOUD provides end-to-end Windows Virtual Desktop implementation and fully managed cloud desktop service on Microsoft Azure, including monitoring, automation, and incident management with a 24×7 service desk.


Microsoft Azure Assessment 1-Day Assessment.png

Microsoft Azure Assessment: 1-Day Assessment: Are you looking to explore all the benefits of Microsoft Azure but aren’t sure where to start? Let ZiAAS advise you on how to bring cost transparency, governance, and operational excellence to the cloud.


Migrate to the Cloud 1-Hour Workshop.png

Migrate to the Cloud: 1-Hour Workshop: Claranet’s public cloud experts will help you optimize, manage, and monitor your systems on Microsoft Azure. In this one-hour workshop, Claranet will gain an understanding of your Azure migration challenges and needs. This offer is available only in French.


PM Data Platform Build 8-Week Implementation.png

PM Data Platform Build: 8-Week Implementation: Providing analytics as a service and implementing a custom Microsoft Azure data analytics platform, Intrava helps property management companies consolidate their data and derive actionable insights from disparate data systems.


Solution Assessment App Modernization 4 Weeks.png

Solution Assessment App Modernization: 4 Weeks: Billennium can help you understand your current environment and recommend next steps toward the cloud. This assessment will identify and prioritize applications for migration to Microsoft Azure.


Strategic Digital Roadmap (TMC) 1-Day Workshop.png

Strategic Digital Roadmap (TMC): 1-Day Workshop: The All for One Group will provide you with a thorough overview of your digitalization approaches as well as a strategic digitalization roadmap. This service is available only in German.


SyncLect AI 10-Week Proof of Concept.png

SyncLect AI: 10-Week Proof of Concept: Available only in Japanese, Headwaters’ platform can be linked to AI, IoT, robots, web pages, apps, and chatbots to help accelerate AI development and improve operational and scalability across your organization.


We OPTIMISE Your Infrastructure.png

We OPTIMISE Your Infrastructure: ASAPCLOUD can manage advanced Microsoft Azure solutions for you, including Azure Monitor, Azure Security Center, Azure Automation, and Azure Arc. This offering is based on four pillars: availability, configuration, performance, and security.


Windows Virtual Desktop 1-Day Workshop.png

Windows Virtual Desktop: 1-Day Workshop: Offering a custom evaluation of the benefits of Windows Virtual Desktop, Synapsys will cover how to best address Windows Virtual Desktop on Microsoft Azure along with the value you can obtain.


Windows Virtual Desktop 1-Day Workshop (Insight).png

Windows Virtual Desktop: 1-Day Workshop: Insight will help you get familiar with Windows Virtual Desktop, provide a demo, and determine your next steps. The workshop will cover use cases, pricing, adoption models, best practices, and reference architecture.


Windows Virtual Desktop 2-Day Proof of Concept.png

Windows Virtual Desktop: 2-Day Proof of Concept: Insight will help you test your design, document feedback about performance, and analyze your experiences with Windows Virtual Desktop. You will create a small-scale demonstration in your environment.


Windows Virtual Desktop 3-Week Implementation.png

Windows Virtual Desktop: 3-Week Implementation: Windows Virtual Desktop is a comprehensive desktop and app virtualization service running in the cloud. Softlanding will develop a proof of concept and deploy and support your Windows Virtual Desktop environment.


Windows Virtual Desktop 10 day implementation.png

Windows Virtual Desktop: 10-Day implementation: Asurgent will install your applications in Windows Virtual Desktop on Microsoft Azure. The service includes a workshop, setup, deploying virtual machines, and configuring Windows Virtual Desktop access to Azure Active Directory.


Windows Virtual Desktop 1-Day Workshop (Insight).png

Windows Virtual Desktop: 10-Day Implementation: Access Windows 10 desktops and apps securely from anywhere on any device. Insight will create a specially provisioned Windows Virtual Desktop landing zone tailored to your needs.


Windows Virtual Desktop 10-Day POC.png

Windows Virtual Desktop: 10-Day Proof of Concept: With a deep level of cloud expertise, Codec can help Irish companies drive digital transformation. This proof of concept will deploy a minimum of 25 virtual desktops, allowing you to validate the benefits of Windows Virtual Desktop.