2 VirtualTablet Server 3.0.2 Denial Of Service By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 17:22:22 GMT VirtualTablet Server version 3.0.2 denial of service proof of concept exploit. Full Article
2 T19-2020 Notification regarding BIOVIA CISPro 2020 Hot Fix 2 By www.3ds.com Published On :: Thu, 20 Feb 2020 09:58:36 +0100 BIOVIA CISPro 2020 Hot Fix 2 Full Article BIOVIA Tech Notes BIOVIA Content
2 Upgrade of Managed DSLS Service on Feb, 29th 3:00AM (UTC+1). Estimated duration: 3 hours By www.3ds.com Published On :: Tue, 25 Feb 2020 17:29:19 +0100 Managed DSLS Service will be upgraded on Feb, 29th (starting Saturday Feb, 29th 2020 - 3AM - UTC+1) Full Article 3DEXPERIENCE Managed DSLS maintenance
2 T20-2020 BIOVIA Direct 2020: Support of BIOVIA Direct on Oracle Exadata Database Machine By www.3ds.com Published On :: Wed, 11 Mar 2020 11:34:14 +0100 BIOVIA Direct 2020 Full Article BIOVIA Tech Notes BIOVIA Content
2 (On-Premises Only) Security advisory for Simulation Process Intelligence (3DOrchestrate Services) on 3DEXPERIENCE: March 11th, 2020 By www.3ds.com Published On :: Tue, 10 Mar 2020 11:04:49 +0100 A vulnerability associated with Use of Hard-coded Credentials (CWE-798) exists in Simulation Process Intelligence (3DOrchestrate Services) on premises licensed program. The security risk is evaluated as High (CVSS v.3.0 Base Score 8.0) and affects all 3DEXPERIENCE releases (from 3DEXPERIENCE R2014x to 3DEXPERIENCE R2020x). Full Article 3DEXPERIENCE 3DEXPERIENCE 3DEXPERIENCE R2014x 3DEXPERIENCE R2015x 3DEXPERIENCE R2016x 3DEXPERIENCE R2017x 3DEXPERIENCE R2018x 3DEXPERIENCE R2019x
2 T23-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2019 Hot Fix 3 By www.3ds.com Published On :: Wed, 11 Mar 2020 12:40:53 +0100 BIOVIA Pipeline Pilot Chemistry SDK 2019 Full Article BIOVIA Tech Notes
2 T24-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2020 Hot Fix 1 By www.3ds.com Published On :: Wed, 11 Mar 2020 12:43:07 +0100 BIOVIA Pipeline Pilot Chemistry SDK 2020 Full Article BIOVIA Tech Notes BIOVIA Content
2 T25-2020 Notification regarding BIOVIA Foundation 2020 Hot Fix 1 By www.3ds.com Published On :: Wed, 11 Mar 2020 12:56:53 +0100 BIOVIA Foundation Full Article BIOVIA Tech Notes BIOVIA Content
2 T26-2020 Notification regarding BIOVIA Foundation 2020 Hot Fix 2 By www.3ds.com Published On :: Wed, 11 Mar 2020 13:05:05 +0100 BIOVIA Foundation Full Article BIOVIA Tech Notes BIOVIA Content
2 T27-2020 Notification regarding BIOVIA Foundation 2019 SP2 Hot Fix 3 By www.3ds.com Published On :: Wed, 11 Mar 2020 13:09:01 +0100 BIOVIA Foundation Full Article BIOVIA Tech Notes BIOVIA Content
2 3DEXPERIENCE R2018x FP.2011 Program Directory now available By www.3ds.com Published On :: Mon, 16 Mar 2020 18:05:01 +0100 3DEXPERIENCE R2018x FP.2011 Program Directory now available Full Article 3DEXPERIENCE Program Directory and Release Notes 3DEXPERIENCE R2018x
2 T21-2020 Creating a Domain Index on BIOVIA Databases for Direct 2016, 2017 R2, 2018, or Direct 2020 By www.3ds.com Published On :: Wed, 01 Apr 2020 15:42:39 +0200 BIOVIA Direct Full Article BIOVIA Tech Notes BIOVIA Content
2 T22-2020 Creating a Domain Index on BIOVIA ACD Data Mart for Direct 2018 or Direct 2020 By www.3ds.com Published On :: Wed, 01 Apr 2020 15:43:07 +0200 BIOVIA Direct Full Article BIOVIA Tech Notes Collaborative Science
2 3DEXPERIENCE R2019x FD08 (FP.2013) Program Directory now available By www.3ds.com Published On :: Mon, 30 Mar 2020 10:17:30 +0200 3DEXPERIENCE R2019x FD08 (FP.2013) Program Directory is now available online. Full Article 3DEXPERIENCE Program Directory and Release Notes
2 3DEXPERIENCE R2020x FD02 (FP.2014) Program Directory now available By www.3ds.com Published On :: Mon, 06 Apr 2020 12:35:38 +0200 3DEXPERIENCE R2020x FD02 (FP.2014) Program Directory now available Full Article 3DEXPERIENCE Program Directory and Release Notes 3DEXPERIENCE 2020x
2 T30-2020 Notification regarding BIOVIA Workbook 2019 SP1 HF3 By www.3ds.com Published On :: Thu, 09 Apr 2020 10:20:28 +0200 BIOVIA Workbook 2019 SP1 Full Article BIOVIA 2019 Tech Notes BIOVIA Content
2 T31-2020 Notification regarding BIOVIA Workbook 2019 HF5 Interim File Release 1 By www.3ds.com Published On :: Wed, 15 Apr 2020 11:54:41 +0200 BIOVIA Workbook 2019 Full Article BIOVIA Tech Notes 2019 BIOVIA Content
2 T32-2020 Notification regarding BIOVIA Workbook 2019 SP1 HF3 Interim File Release 1 By www.3ds.com Published On :: Wed, 15 Apr 2020 11:57:29 +0200 BIOVIA Workbook 2019 Full Article BIOVIA Tech Notes 2019 BIOVIA Content
2 3DEXPERIENCE R2017x FP.2016 Program Directory now available By www.3ds.com Published On :: Fri, 17 Apr 2020 08:52:00 +0200 3DEXPERIENCE R2017x FP.2016 Program Directory is now available online. Full Article 3DEXPERIENCE Program Directory and Release Notes 3DEXPERIENCE R2017x
2 nestc042.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT No information is available for this file. Full Article
2 fwnes20b.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT No information is available for this file. Full Article
2 b4b02.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:32 GMT No information is available for this file. Full Article
2 kv2.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:57:33 GMT No information is available for this file. Full Article
2 fisa2.txt By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE Full Article
2 Logwatch 7.5.2 By packetstormsecurity.com Published On :: Sat, 27 Jul 2019 10:22:22 GMT Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems. Full Article
2 Bro Network Security Monitor 2.6.3 By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 20:33:35 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
2 Bro Network Security Monitor 2.6.4 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 23:57:22 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
2 Suricata IDPE 5.0.2 By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 16:09:16 GMT Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools. Full Article
2 Falco 0.20.0 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:20:22 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
2 Falco 0.21.0 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:33:23 GMT Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace. Full Article
2 How To Hack A Company By Circumventing Its WAF For Fun And Profit - Part 2 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:35:24 GMT Full Article headline hacker flaw
2 Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
2 Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
2 Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
2 Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
2 Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
2 Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
2 Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
2 Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
2 Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
2 Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
2 Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
2 Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
2 Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
2 Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 15:02:22 GMT Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability. Full Article
2 GNU Privacy Guard 2.2.14 By packetstormsecurity.com Published On :: Tue, 19 Mar 2019 21:10:07 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 GNU Privacy Guard 2.2.15 By packetstormsecurity.com Published On :: Tue, 26 Mar 2019 15:17:20 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article
2 Stegano 0.9.2 By packetstormsecurity.com Published On :: Thu, 04 Apr 2019 23:48:57 GMT Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information. Full Article
2 GNU Privacy Guard 2.2.16 By packetstormsecurity.com Published On :: Tue, 28 May 2019 16:43:38 GMT GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. Full Article