Ensure your system is accessible by exposing your scripts as REST APIs. Host your scripts in a web interface for ad-hoc execution or robust scheduling. Build custom web-based tools to enable your users to handle tasks themselves without elevated credentials or opening support tickets. Enforce role-based access controls and secruity requirements across the entire platform.
Enhance your favorite editor like Visual Studio or Visual Studio Code with extensions that make scripting easier, faster and more productive. Alternatively, keep things simple with an editor built for PowerShell. Protect your desktop with and from PowerShell.
Whether you're a small business or a large enterprise, you will be in good company among the customers using our solutions. With millions of installs, API requests, and scripts executed every month, we help ensure you can make the most of your IT team.
Today, we are happy to announce the first beta of PowerShell Universal v5. This release includes a number of new features, improvements and changes. We are excited to share these with you and get your feedback. The theme as we move to v5 is to simplify PowerShell Universal by reducing technical debt, removing features that are not widely used or problematic, and focusing on the core value proposition of the platform.
Adam Driscoll is making a trip across the pond to join European PowerShell enthusiasts at PowerShell Day Switzerland. The event will take place Tuesday, February 27th, 2024. Along with all the great content, Adam will be presenting the following sessions. PSBlazor: A New PowerShell Web Technology (45 minutes) As part of the v5 release, we will be introducing a new web technology called PSBlazor. With the introduction of our new admin console based on Blazor, you will also have the opportunity build tools that integrate tightly into the new system.
Overview All supported versions of PowerShell Universal are affected by CVE-2023-49213. This vulnerability allows remote attackers to execute arbitrary commands over HTTP by exploiting the PowerShell Universal API endpoints with specially crafted requests. Please update immediately. Patched versions include: 4.2.1 4.1.10 3.10.2 Download Now About CVE-2023-49213 CVE-2023-49213 is a remote code execution vulnerability that affects all supported versions of PowerShell Universal. Due to improper sanitization of input strings, an attacker can provide specially crafted input to the PowerShell Universal API endpoints to execute arbitrary commands on the server.