on

T20-2020 BIOVIA Direct 2020: Support of BIOVIA Direct on Oracle Exadata Database Machine

BIOVIA Direct 2020




on

(On-Premises Only) Security advisory for Simulation Process Intelligence (3DOrchestrate Services) on 3DEXPERIENCE: March 11th, 2020

A vulnerability associated with Use of Hard-coded Credentials (CWE-798) exists in Simulation Process Intelligence (3DOrchestrate Services) on premises licensed program. The security risk is evaluated as High (CVSS v.3.0 Base Score 8.0) and affects all 3DEXPERIENCE releases (from 3DEXPERIENCE R2014x to 3DEXPERIENCE R2020x).




on

T23-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2019 Hot Fix 3

BIOVIA Pipeline Pilot Chemistry SDK 2019




on

T24-2020 Notification regarding BIOVIA Pipeline Pilot Chemistry 2020 Hot Fix 1

BIOVIA Pipeline Pilot Chemistry SDK 2020







on

T21-2020 Creating a Domain Index on BIOVIA Databases for Direct 2016, 2017 R2, 2018, or Direct 2020

BIOVIA Direct





on

Version 5 Program Directories now available

Check out the list of all new Version 5 Program Directories available online!



  • Program Directory and Release Notes
  • V5






on

Billions Of Devices Open To Wi-Fi Eavesdropping Attacks




on

Skype Squishes Cross-Zone Scripting Bug




on

Fring Brings VoIP To Hacked iPhones




on

Skype Ignores PayPal Siphoning Hijack Scheme





on

Skype Trojan Can Log VoIP Conversations




on

Scareware Scams Spill Onto Skype




on

Fugitive VoIP Hacker Admits 10 Million Minute Spree






on

Bro Network Security Monitor 2.6.3

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.




on

Bro Network Security Monitor 2.6.4

Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.




on

Salt Bugs Allow Full RCE As Root On Cloud Servers




on

Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation

Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities.




on

Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation

Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable.




on

OpenBSD Dynamic Loader chpass Privilege Escalation

This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64).




on

OpenBSD OpenSMTPD Privilege Escalation / Code Execution

Qualys discovered a vulnerability in OpenSMTPD, OpenBSD's mail server. This vulnerability is exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root.




on

OpenSMTPD Local Information Disclosure

Qualys discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server. An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem). A proof of concept exploit is included in this archive.








on

Security Consultant Granted Bail After Hacking GoGet Systems













on

Banks Turns London Man Into RFID-Enabled Guinea Pig




on

RFID-Hack Hits 1 Billion Digital Access Cards Worldwide




on

Hacker Confab Last Hope To Track Attendees With RFID