Update

Asana

Asana

to version 2.2.3

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for Asana

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2023‑493142023‑11‑28 15:15:08HIGH (8)Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and EnableNodeCliInspectArguments, and thus r3ggi/electroniz3r can be used to perform an attack.26LOCAL
CVE‑2022‑268772022‑04‑09 01:15:17MEDIUM (7)Asana Desktop before 1.6.0 allows remote attackers to exfiltrate local files if they can trick the Asana desktop app into loading a malicious web page.34NETWORK

Deep Windows, Mac, and Linux OS patching

Stay out of the "Negligent MSP" label because Lavawall® covers:
  • 30-312 times as many applications as popular RMMs.
  • "optional" Windows patches, including firmware and drivers
  • Mac OS and application patches
  • Linux Kernel, OS, and package patches for more distribution types than we want to admit exist
Select the operating system you care about to find how Lavawall takes care of Operating System, driver, and application patches.
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.