Lansweeper
Patch Tuesday
Contents
- 1 Microsoft Patch Tuesday – April 2024
- 1.1 Microsoft Defender for IoT Vulnerabilities
- 1.2 SmartScreen Prompt Security Feature Bypass Vulnerability
- 1.3 Multiple Elevation of Privilege Vulnerabilities
- 1.4 Run the Patch Tuesday April 2024 Audit
- 1.5 Patch Tuesday April 2024 CVE Codes & Titles
- 1.6 Other articles in this category
- 1.7 Ready to get started? You’ll be up and running in no time.
Microsoft Patch Tuesday – April 2024
10 min. read
09/04/2024
By Esben Dochy
Contents
-
Microsoft Defender for IoT Vulnerabilities
-
SmartScreen Prompt Security Feature Bypass Vulnerability
-
Multiple Elevation of Privilege Vulnerabilities
-
Run the Patch Tuesday April 2024 Audit
-
Patch Tuesday April 2024 CVE Codes & Titles
TL;DR | Go Straight to the April 2024 Patch Tuesday Audit Report
Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The April 2024 edition of Patch Tuesday brings us 151 new fixes, with 3 rated as critical. We’ve listed the most important changes below.
Microsoft Defender for IoT Vulnerabilities
All critical vulnerabilities this month are part of Microsoft Defender for IoT. CVE-2024-21322, CVE-2024-21323 and CVE-2024-29053 while three additional less ciritcal vulnerabilities were also fixed (CVE-2024-21324, CVE-2024-29055, CVE-2024-29054).
Obviously you have to be using this product in order to be affected. More specifically, you’ll need to be using the legacy on-premises management console.
All three critical vulnerabilites have slighly different requirements ranging from requiring the attacker to be an administrator to any authenticated attacker could trigger the vulnerability.
SmartScreen Prompt Security Feature Bypass Vulnerability
The second high profile fix is a security bypass vulnerability for SmartScreen. Microsoft Defender SmartScreen helps protect you from online threats like malware and phishing by checking websites and downloaded files against a database of unsafe ones. To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files using a launcher application that requests that no UI be shown.
CVE-2024-29988 has a CVSS score of 8.8 and Microsoft lists it as one of the vulnerabilities that is more likely to be exploited.
Multiple Elevation of Privilege Vulnerabilities
The large majority of vulnerabilities marked by Microsoft as “more liekly” to be exploited this month are elevation of privilege vulnerabilities that all can lead to the attacker gaining SYSTEM privileges. Their CVSS base scores are all 7.8 and Microsoft has not provided any additional information at this time.
- CVE-2024-26158 (Microsoft Install Service Elevation of Privilege Vulnerability)
- CVE-2024-26218 (Windows Kernel Elevation of Privilege Vulnerability)
- CVE-2024-26241 (Win32k Elevation of Privilege Vulnerability)
- CVE-2024-26211 (Windows RAC Manager Elevation of Privilege Vulnerability)
- CVE-2024-26230 (Windows Telephony Server Elevation of Privilege Vulnerability)
- CVE-2024-26239 (Windows Telephony Server Elevation of Privilege Vulnerability)
Run the Patch Tuesday April 2024 Audit
To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.
The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!
Run the April Patch Tuesday Audit
Patch Tuesday April 2024 CVE Codes & Titles
CVE Number | CVE Title |
CVE-2023-24932 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-20669 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-20688 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-20689 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-21409 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
CVE-2024-21424 | Azure Compute Gallery Elevation of Privilege Vulnerability |
CVE-2024-26250 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26252 | Windows rndismp6.sys Remote Code Execution Vulnerability |
CVE-2024-26253 | Windows rndismp6.sys Remote Code Execution Vulnerability |
CVE-2024-26254 | Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability |
CVE-2024-26255 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-26172 | Windows DWM Core Library Information Disclosure Vulnerability |
CVE-2024-26179 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2024-26200 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2024-26205 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
CVE-2024-26232 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
CVE-2024-28920 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28922 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28919 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28896 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28923 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28898 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28901 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-28902 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-28905 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
CVE-2024-28906 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28908 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28909 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28910 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28911 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28912 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28913 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28914 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28915 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28929 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28931 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28932 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28936 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28939 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28942 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28945 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29043 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29045 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29047 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29050 | Windows Cryptographic Services Remote Code Execution Vulnerability |
CVE-2024-29063 | Azure AI Search Information Disclosure Vulnerability |
CVE-2024-29064 | Windows Hyper-V Denial of Service Vulnerability |
CVE-2024-29066 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability |
CVE-2024-20685 | Azure Private 5G Core Denial of Service Vulnerability |
CVE-2024-23594 | Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi |
CVE-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability |
CVE-2024-2201 | Intel: CVE-2024-2201 Branch History Injection |
CVE-2024-20678 | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
CVE-2024-20665 | BitLocker Security Feature Bypass Vulnerability |
CVE-2024-20693 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2024-21322 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
CVE-2024-21323 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
CVE-2024-21324 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
CVE-2024-21447 | Windows Authentication Elevation of Privilege Vulnerability |
CVE-2024-26193 | Azure Migrate Remote Code Execution Vulnerability |
CVE-2024-26168 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26171 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26175 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26180 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26183 | Windows Kerberos Denial of Service Vulnerability |
CVE-2024-26189 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26194 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26195 | DHCP Server Service Remote Code Execution Vulnerability |
CVE-2024-26202 | DHCP Server Service Remote Code Execution Vulnerability |
CVE-2024-26219 | HTTP.sys Denial of Service Vulnerability |
CVE-2024-26220 | Windows Mobile Hotspot Information Disclosure Vulnerability |
CVE-2024-26221 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26222 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26223 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26224 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26227 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26231 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26233 | Windows DNS Server Remote Code Execution Vulnerability |
CVE-2024-26243 | Windows USB Print Driver Elevation of Privilege Vulnerability |
CVE-2024-26248 | Windows Kerberos Elevation of Privilege Vulnerability |
CVE-2024-26210 | Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability |
CVE-2024-26229 | Windows CSC Service Elevation of Privilege Vulnerability |
CVE-2024-26235 | Windows Update Stack Elevation of Privilege Vulnerability |
CVE-2024-26236 | Windows Update Stack Elevation of Privilege Vulnerability |
CVE-2024-26237 | Windows Defender Credential Guard Elevation of Privilege Vulnerability |
CVE-2024-26242 | Windows Telephony Server Elevation of Privilege Vulnerability |
CVE-2024-26244 | Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability |
CVE-2024-26245 | Windows SMB Elevation of Privilege Vulnerability |
CVE-2024-26207 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-26208 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
CVE-2024-26213 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
CVE-2024-26214 | Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability |
CVE-2024-26215 | DHCP Server Service Denial of Service Vulnerability |
CVE-2024-26216 | Windows File Server Resource Management Service Elevation of Privilege Vulnerability |
CVE-2024-26217 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-26226 | Windows Distributed File System (DFS) Information Disclosure Vulnerability |
CVE-2024-26228 | Windows Cryptographic Services Security Feature Bypass Vulnerability |
CVE-2024-26240 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-26251 | Microsoft SharePoint Server Spoofing Vulnerability |
CVE-2024-26257 | Microsoft Excel Remote Code Execution Vulnerability |
CVE-2024-28924 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28925 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28897 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28900 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
CVE-2024-28904 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
CVE-2024-28907 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
CVE-2024-28926 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28927 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28930 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28933 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28934 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28935 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28937 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28938 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28940 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28941 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28943 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-28944 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29044 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29046 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29048 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29052 | Windows Storage Elevation of Privilege Vulnerability |
CVE-2024-29053 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
CVE-2024-29055 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
CVE-2024-29054 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
CVE-2024-29061 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-29062 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-20670 | Outlook for Windows Spoofing Vulnerability |
CVE-2024-29982 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29983 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29984 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-29985 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
CVE-2024-23593 | Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell |
CVE-2024-29989 | Azure Monitor Agent Elevation of Privilege Vulnerability |
CVE-2024-29992 | Azure Identity Library for .NET Information Disclosure Vulnerability |
CVE-2024-29993 | Azure CycleCloud Elevation of Privilege Vulnerability |
CVE-2024-26256 | libarchive Remote Code Execution Vulnerability |
CVE-2024-26158 | Microsoft Install Service Elevation of Privilege Vulnerability |
CVE-2024-28921 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-28903 | Secure Boot Security Feature Bypass Vulnerability |
CVE-2024-29988 | SmartScreen Prompt Security Feature Bypass Vulnerability |
CVE-2024-26209 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability |
CVE-2024-26218 | Windows Kernel Elevation of Privilege Vulnerability |
CVE-2024-26241 | Win32k Elevation of Privilege Vulnerability |
CVE-2024-26234 | Proxy Driver Spoofing Vulnerability |
CVE-2024-26211 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
CVE-2024-26212 | DHCP Server Service Denial of Service Vulnerability |
CVE-2024-26230 | Windows Telephony Server Elevation of Privilege Vulnerability |
CVE-2024-26239 | Windows Telephony Server Elevation of Privilege Vulnerability |
CVE-2024-29056 | Windows Authentication Elevation of Privilege Vulnerability |
CVE-2024-28917 | Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability |
-
Copied
Contents
-
Microsoft Defender for IoT Vulnerabilities
-
SmartScreen Prompt Security Feature Bypass Vulnerability
-
Multiple Elevation of Privilege Vulnerabilities
-
Run the Patch Tuesday April 2024 Audit
-
Patch Tuesday April 2024 CVE Codes & Titles
Stay informed with our monthly Patch Tuesday report
Sign up for free.
var gform;gform||(document.addEventListener(“gform_main_scripts_loaded”,function()return!!(null!=i&&i!=o.tag),window.addEventListener(“DOMContentLoaded”,function()return!!(null!=i&&i!=o.tag),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o)return!!(null!=i&&i!=o.tag,hooks:{action:,filter:{}},addAction:function(o,n,r,t){gform.addHook(“action”,o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook(“filter”,o,n,r,t)},doAction:function(o){gform.doHook(“action”,o,arguments)},applyFilters:function(o){return gform.doHook(“filter”,o,arguments)},removeAction:function(o,n){gform.removeHook(“action”,o,n)},removeFilter:function(o,n,r){gform.removeHook(“filter”,o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+”_”+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){“function”!=typeof(t=o.callable)&&(t=window[t]),”action”==n?t.apply(null,r):r[0]=t.apply(null,r)})),”filter”==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});
"*" indicates required fields
Email*
HiddenEmailType HiddenIM – Conv Page – Processing HiddenIM – UTM_Campaign FC – Processing HiddenIM – UTM_Campaign LC – Processing HiddenIM – UTM_Content FC – Processing HiddenIM – UTM_Content LC – Processing HiddenIM – UTM_Medium FC – Processing HiddenIM – UTM_Medium LC – Processing HiddenIM – UTM_Source FC – Processing HiddenIM – UTM_Source LC – Processing HiddenIM – UTM_Term FC – Processing HiddenIM – UTM_Term LC – Processing Hiddengclid Hiddenmsclkid EmailThis field is for validation purposes and should be left unchanged.
gform.initializeOnLoaded( function() {gformInitSpinner( 37, ‘ true );jQuery(‘#gform_ajax_frame_37’).on(‘load’,function(){var contents = jQuery(this).contents().find(‘*’).html();var is_postback = contents.indexOf(‘GF_AJAX_POSTBACK’) >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find(‘#gform_wrapper_37’);var is_confirmation = jQuery(this).contents().find(‘#gform_confirmation_wrapper_37’).length > 0;var is_redirect = contents.indexOf(‘gformRedirect(){‘) >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery(‘html’).css(‘margin-top’), 10) + parseInt(jQuery(‘body’).css(‘margin-top’), 10) + 100;if(is_form){jQuery(‘#gform_wrapper_37’).html(form_content.html());if(form_content.hasClass(‘gform_validation_error’)){jQuery(‘#gform_wrapper_37’).addClass(‘gform_validation_error’);} else {jQuery(‘#gform_wrapper_37’).removeClass(‘gform_validation_error’);}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */ jQuery(document).scrollTop(jQuery(‘#gform_wrapper_37’).offset().top – mt); }, 50 );if(window[‘gformInitDatepicker’]) {gformInitDatepicker();}if(window[‘gformInitPriceFields’]) {gformInitPriceFields();}var current_page = jQuery(‘#gform_source_page_number_37’).val();gformInitSpinner( 37, ‘ true );jQuery(document).trigger(‘gform_page_loaded’, [37, current_page]);window[‘gf_submitting_37’] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find(‘.GF_AJAX_POSTBACK’).html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery(‘#gform_wrapper_37’).replaceWith(confirmation_content);jQuery(document).scrollTop(jQuery(‘#gf_37’).offset().top – mt);jQuery(document).trigger(‘gform_confirmation_loaded’, [37]);window[‘gf_submitting_37’] = false;wp.a11y.speak(jQuery(‘#gform_confirmation_message_37’).text());}, 50);}else{jQuery(‘#gform_37’).append(contents);if(window[‘gformRedirect’]) {gformRedirect();}}jQuery(document).trigger(“gform_pre_post_render”, [{ formId: “37”, currentPage: “current_page”, abort: function() { this.preventDefault(); } }]); if (event.defaultPrevented) { return; } const gformWrapperDiv = document.getElementById( “gform_wrapper_37” ); if ( gformWrapperDiv ) { const visibilitySpan = document.createElement( “span” ); visibilitySpan.id = “gform_visibility_test_37”; gformWrapperDiv.insertAdjacentElement( “afterend”, visibilitySpan ); } const visibilityTestDiv = document.getElementById( “gform_visibility_test_37” ); let postRenderFired = false; function triggerPostRender() { if ( postRenderFired ) { return; } postRenderFired = true; jQuery( document ).trigger( ‘gform_post_render’, [37, current_page] ); gform.utils.trigger( { event: ‘gform/postRender’, native: false, data: { formId: 37, currentPage: current_page } } ); if ( visibilityTestDiv ) { visibilityTestDiv.parentNode.removeChild( visibilityTestDiv ); } } function debounce( func, wait, immediate ) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if ( !immediate ) func.apply( context, args ); }; var callNow = immediate && !timeout; clearTimeout( timeout ); timeout = setTimeout( later, wait ); if ( callNow ) func.apply( context, args ); }; } const debouncedTriggerPostRender = debounce( function() { triggerPostRender(); }, 200 ); if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) { const observer = new MutationObserver( ( mutations ) => { mutations.forEach( ( mutation ) => { if ( mutation.type === ‘attributes’ && visibilityTestDiv.offsetParent !== null ) { debouncedTriggerPostRender(); observer.disconnect(); } }); }); observer.observe( document.body, { attributes: true, childList: false, subtree: true, attributeFilter: [ ‘style’, ‘class’ ], }); } else { triggerPostRender(); } } );} );
NO CREDIT CARD REQUIRED
Ready to get started?
You’ll be up and running in no time.
Explore all our features, free for 14 days.
TRY NOW
TALK TO SALES