Monthly Release Notes - August 2022

Jump to:

 

Automate


Automate Desktop and Automate Plus/Ultimate

Version 11.7.1

August 25, 2022

Fixes
  • The Database (SQL query) activity now creates an empty dataset if no rows are returned as a result of the statement execution.

Version 11.7.0

August 5, 2022

New Features
  • FTP Action Enhancements
    • Automate Desktop and Automate Plus/Ultimate.

    • Added the ability to adjust SFTP pipeline length, block transfers, and upload/download block size.

    • Added the ability to suppress additional operations for SFTP transfers.

  • JSON Object Action Enhancements

    • Automate Desktop and Automate Plus/Ultimate.

    • Added new activities to expand support for JSON-related automation (Add field, Add to, Create, Delete field, Delete from, Get size, Get values, Set values, and To text).

    • Resolved numerous issues related to the JSON (Decode) activity.

  • OCR Action Enhancements

    • Automate Desktop and Automate Plus/Ultimate.

    • Added support for the Turkish language for all OCR activities.

  • Web Browser Action Enhancements

    • Added support for Internet Explorer (IE) mode for the Microsoft Edge browser.

    • Added the ability to load extensions for Chromium-based browsers.

    • Added the ability to inject JavaScript into a web page by way of the Inject JavaScript activity.

    • The Web Browser action now keeps the current web driver if it cannot download an updated version.

Enhancements
  • Added support for Windows 11.

  • Task performance has been improved in Automate Enterprise.

  • Access to the Automate Enterprise communication definitions has been removed.

  • The Automate Enterprise Process Agent now supports Java 11.0 or later.

  • When the previous task in a workflow is run on an Agent Group, the next task's "Previous" agent now works as expected.

  • The Database (SQL query) and (Stored procedure) activities now provide the option to include milliseconds in query results for DateTime dataset values.

  • The File System (Move) activity's Source and Destination parameters now support over 260 characters.

Fixes
  • The File System Trigger now restarts if file triggering is manually turned off, and then back on, or if a task is manually ended using the Running Task dialog box.

  • The OCR action no longer displays an error while using the Tesseract engine.

  • The Text (Replace) activity now honors regex expressions in the "Replace with" parameter.

  • The Web Browser (Open) activity now returns the web page's code while using view-source.

  • The Web Browser (Select list item(s)) and (Select menu item) activities no longer display an error if a variable is used in the session name.

  • The Web Browser action has been updated to improve performance with clicking on and extracting page elements.

  • The IF (Contains text) activity no longer fails and displays an error when the "\Q" escape sequence is used.

  • The HTTP action no longer fails to connect to LinkedIn while using OAuth 2.0 authentication.

  • The FTP (Logon) activity no longer displays an error while trying to connect to an FTP server using a private key file.

  • The FTP log file now includes a list of all uploaded files if the file path includes a wildcard.

  • The FTP action no longer fails to connect while using SFTP Auto or Custom ciphers.

  • The OnTaskFailure event now executes when the Task (Stop) activity contains numeric values.

  • The Task (Start subtask) activity now continues past an On Error step if the subtask fails.

  • The HTTP action's "Authentication type" parameter now displays all available types, based on the HTTP activity being used.

  • The PowerShell action no longer displays an error message if PowerShell 2.0 or later is installed.

  • The Input (Send keystrokes) activity’s help page has been updated to explain case sensitivity in more detail.

  • The Expression Builder is now accessible from the PDF (Set fields) activity's AcroForm parameter.

  • The RowsAffected dataset field is now populated when using SQL queries.

  • Workflows containing a web browser session will no longer close a web browser window unless the Web Browser (Close) activity is included in the task.

  • The PDF (Get attachment(s)) activity now retains the value entered in the “Destination” parameter when updating from Automate 10 to Automate Desktop 11.

Back to Top

 

Boldon James


Data Classification Reporting Server

Version 2.0

August 5, 2022

New Features
  • Updated product name to HelpSystems Data Classification Reporting Server to reflect that multiple product lines can use this product, for example, Boldon James and Titus.

  • Updated Reporting Server user interface to provide a new modern look-and-feel that is consistent with other HelpSystems products.

  • Added support for SQL Server encrypted connections using SSL/TLS Certificates.

Enhancements
  • Added support for .NET Desktop Runtime 6.0 and ASP.Net Core Runtime 6.0-Hosting Bundle.

Back to Top

 

Cobalt Strike


Cobalt Strike

Version: 4.7

August 17, 2022

New Features
  • Added new memory options to the Malleable C2 Profile for BOF execution, allowing users to define how BOFs live in memory.
  • Added SOCKS5 proxy server support, including DNS resolution and UDP support.
  • Added an option to import credentials on the View -> Credentials list. Added an additional export option to facilitate this.
  • Added a stageless payload generator dialog that allows you to set either "thread" or "process" as the exit option.
  • Added a new command clipboard to steal the contents of the Windows clipboard.
    • Also added an Aggressor Script function bclipboard to steal the contents of the Windows clipboard.
  • Added a preference to set whether to display the teamserver tab bar at all times (unchecked by default).
  • Added a new menu item to allow the user to generate x86 and x64 stageless payloads for all available payload variants at once.
    • Also added a new Aggressor Script function all_payloads to do this without showing the dialog.
  • Added a sleep time tracking feature.
    • The sleep time for each Beacon is recorded and displayed in a new column in the Beacon table view
    • Sleep time is persisted between teamserver restarts.
  • Added a Beacon Health feature that uses the sleep time and last checkin time for each Beacon to indicate whether the Beacon is active, disconnected or dead.
  • Added a dark mode option to the UI.
  • Added two new Beacon console commands.
    • file_browser opens the File Browser.
    • process_browser opens the Process Browser.
  • Added automatic parsing and resolution of Windows error codes.
    • Added a new Beacon console command windows_error_code that can be independently used to convert a Windows error code to a message.
    • Added a new Aggressor Script function windows_error_code that can be used to convert a Windows error code to a message.
Enhancements
  • Updated how Beacon processes BOFs.
  • BOF memory sections are now located together, this resolves issues where BOFs may not run because the address offset is > 4GB.
    • Added support for additional relocation types.
    • Increased the number of available dynamic functions from 32 to 64.
  • Updated File Browser processing to ensure that actions are displayed on the Beacon console and logged in the activity report in the same way as when the "ls" command is run.
  • Updated Beacon interactions in the UI. Double-clicking a Beacon now open the Beacon console (i.e. interact with the Beacon).
  • Updated Process Browser processing to ensure that actions are dispalyed on the Beacon console and logged in the activity report in the same way as when the "ps" command is run.
  • Updated the main menu to flatten out and reorganize some of the menus.
  • Updated the icons used in the UI and simplified the toolbar, removing buttons for some of the less popular functions.
  • Added a new dialog that displays default shortcut keys (Help -> Default Shortcut Keys).
  • Updated Beacon and SSH console timestamps. They are both now on by default.
  • Updated the Beacon status bar to display more information including hostname, host OS bitness (x86 or x64), username, process ID, process bitness (x86 or x64), parent process ID (linked Beacons only), Beacon note (truncated if > 50 characters) and last connection time.
  • Updated the event status bar to include the teamserver local IP and number of Beacons.
  • Updated Sleep mask to be executed as a BOF.
    • Sleep mask size limit increased from 769 to 8192 bytes.
  • Updated module stomping to support the ability to specify the starting ordinal when searching for exported functions.
  • Updated steal_token to enable it to steal tokens from processes that it previously couldn't get to, by making the access mask customizable.
    • Also updated the steal_token dialog in the UI to make it easier to set the access mask.
  • Updated the Beacon right-click menu. Changes made to Beacon, SSH, Graph and Targets options.
  • Updated the "ps" command output.
    • Parent/child process relationships are resolved and displayed in a tree.
  • Updated the images used for Beacons, sessions and targets in the pivot chart and table views.
  • Updated the Aggressor Script function setup_reflective_loader to output the ReflectiveLoader function offset to the script console.
Fixes
  • Fixed reliability issues around how copy/paste works. Text is now reliably copied to the clipboard.

Back to Top

 

Digital Defense


Frontline Agent

Version 1.44.3

August 17, 2022

Enhancements
  • Implemented the following new vulnerability checks:

    • 149437 Apple Security Update: 2022-005 Catalina (Medium) - Mac
    • 149435 Apple Security Update: macOS Big Sur 11.6.8 (Medium) - Mac
    • 149438 Apple Security Update: macOS Monterey 12.5 (Medium) - Mac
    • 149436 Apple Security Update: Safari 15.6 (High) - Mac
    • 149384 APSB22-32: Security Updates Available for Adobe Acrobat and Reader (High) - Windows, Mac
    • 149383 APSB22-35: Security Updates Available for Adobe Photoshop CC (High) - Windows
    • 149388 Azul Zulu Critical Patch Update: JULY-2022 (High) - Windows
    • 149562 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium) - Windows
    • 149561 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium) - Windows
    • 149381 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.134 (High) - Windows, Mac
    • 149536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 104.0.5112.79 (High) - Windows, Mac
    • 149382 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 103.0.1264.71 (High) - Windows
    • 149385 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 103 (High) - Windows, Mac
    • 149386 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.1 (High) - Windows, Mac
    • 149387 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.12 (High) - Windows, Mac
    • 149537 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.1 (High) - Windows
    • 149538 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.12 (High) - Windows
    • 149567 MS22-AUG: Microsoft Exchange Server Security Update (High) - Windows
    • 149564 MS22-AUG: Microsoft Internet Explorer Security Update (High) - Windows
    • 149566 MS22-AUG: Microsoft Office Security Update (High) - Windows
    • 149565 MS22-AUG: Microsoft Windows Security Update (High) - Windows
    • 149416 Zoom DLL Injection (Medium) - Windows
    • 149415 Zoom Insufficient Hostname Validation (Medium) - Windows
Fixes
  • Updated Vulnerability Descriptions:
    • 149200 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.114 (High)
    • 128316 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 38.4 (High)

Frontline NIRV Scanner

Version 4.5.0

August 24, 2022

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 149621 Amazon Linux 2 Security Advisory: ALAS-2022-1833 (Low)
  • 149622 Amazon Linux 2 Security Advisory: ALAS-2022-1834 (Medium)

  • 149619 Amazon Linux Security Advisory: ALAS-2022-1629 (Medium)

  • 149620 Amazon Linux Security Advisory: ALAS-2022-1630 (Medium)

  • 149618 Amazon Linux Security Advisory: ALAS-2022-1631 (Medium)

  • 149617 Amazon Linux Security Advisory: ALAS-2022-1632 (Medium)

  • 149611 APSB22-39: Security Updates Available for Adobe Acrobat and Reader (High)

  • 149433 Atlassian Confluence Hard Coded User Account (High)

  • 149624 Cisco Security Advisory: CISCO-SA-ASA-WEBVPN-LOEKSNMO (Medium)

  • 149590 ELSA-2022-20240: podman security update (Low)

  • 149593 ELSA-2022-5937: kernel security and bug fix update (Low)

  • 149582 ELSA-2022-5942: vim security update (High)

  • 149568 ELSA-2022-5948: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update (Medium)

  • 149575 ELSA-2022-6003: kernel security, bug fix, and enhancement update (Medium)

  • 149572 ELSA-2022-6043: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 149584 ELSA-2022-6057: .NET Core 3.1 security, bug fix, and enhancement update (Low)

  • 149577 ELSA-2022-6058: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 149571 ELSA-2022-9682: httpd:2.4 security update (High)

  • 149594 ELSA-2022-9690: Unbreakable Enterprise kernel-container security update (Medium)

  • 149589 ELSA-2022-9691: Unbreakable Enterprise kernel-container security update (Medium)

  • 149580 ELSA-2022-9692: Unbreakable Enterprise kernel security update (Medium)

  • 149578 ELSA-2022-9694: Unbreakable Enterprise kernel security update (Medium)

  • 149573 ELSA-2022-9699: Unbreakable Enterprise kernel-container security update (Medium)

  • 149585 ELSA-2022-9709: Unbreakable Enterprise kernel security update (Low)

  • 149588 ELSA-2022-9710: Unbreakable Enterprise kernel-container security update (Low)

  • 149581 ELSA-2022-9714: httpd security update (Medium)

  • 149586 ELSA-2022-9717: cri-o security update (High)

  • 149574 ELSA-2022-9718: cri-o security update (High)

  • 149569 ELSA-2022-9719: cri-o security update (High)

  • 149587 ELSA-2022-9720: cri-o security update (High)

  • 149591 ELSA-2022-9726: Unbreakable Enterprise kernel security update (Medium)

  • 149592 ELSA-2022-9727: Unbreakable Enterprise kernel security update (Medium)

  • 149579 ELSA-2022-9728: Unbreakable Enterprise kernel security update (Medium)

  • 149583 ELSA-2022-9729: Unbreakable Enterprise kernel-container security update (Medium)

  • 149570 ELSA-2022-9730: Unbreakable Enterprise kernel-container security update (Medium)

  • 149576 ELSA-2022-9731: Unbreakable Enterprise kernel-container security update (Medium)

  • 149610 Google Chrome: Multiple Vulnerabilities in Versions Less Than 104.0.5112.101 (High)

  • 149612 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 104 (High)

  • 149613 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.2 (High)

  • 149615 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.13 (High)

  • 149614 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.2 (High)

  • 149616 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.13 (High)

  • 149623 Palo Alto PAN-OS Security Advisory: PAN-192999 (High)

  • 149595 RHSA-2022:6002: kernel-rt security and bug fix update (Low)

  • 149596 RHSA-2022:6043: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 149598 RHSA-2022:6057: .NET Core 3.1 security, bug fix, and enhancement update (Low)

  • 149597 RHSA-2022:6058: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 149605 [USN-5526-2] PyJWT regression (Medium)

  • 149602 [USN-5556-1] Booth vulnerability (Medium)

  • 149600 [USN-5559-1] Moment.js vulnerabilities (Medium)

  • 149599 [USN-5561-1] GNOME Web vulnerabilities (Medium)

  • 149601 [USN-5563-1] http-parser vulnerability (Medium)

  • 149603 [USN-5568-1] WebKitGTK vulnerabilities (Medium)

  • 149604 [USN-5569-1] Unbound vulnerabilities (Medium)

  • 149606 [USN-5571-1] PostgreSQL vulnerability (Medium)

  • 149607 [USN-5573-1] rsync vulnerability (Medium)

  • 149608 [USN-5574-1] Exim vulnerability (Medium)

  • 149609 [USN-5575-1] Libxslt vulnerabilities (Medium)

Fixes
  • Updated Vulnerability Descriptions:
  • 149562 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium)
  • 149561 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium)

  • 149200 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.114 (High)

  • 149536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 104.0.5112.79 (High)

  • 149385 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 103 (High)

  • 149537 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.1 (High)

  • 128316 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 38.4 (High)

  • 149538 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.12 (High)

  • 149567 MS22-AUG: Microsoft Exchange Server Security Update (High)

  • 149564 MS22-AUG: Microsoft Internet Explorer Security Update (High)

  • 149566 MS22-AUG: Microsoft Office Security Update (High)

  • 149565 MS22-AUG: Microsoft Windows Security Update (High)

Version 4.4.1

August 11, 2022

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 149559 Amazon Linux 2 Security Advisory: ALAS-2022-1830 (High)
  • 149558 Amazon Linux 2 Security Advisory: ALAS-2022-1831 (High)

  • 149560 Amazon Linux 2 Security Advisory: ALAS-2022-1832 (High)

  • 149553 Amazon Linux Security Advisory: ALAS-2022-1610 (High)

  • 149548 Amazon Linux Security Advisory: ALAS-2022-1611 (High)

  • 149555 Amazon Linux Security Advisory: ALAS-2022-1612 (Medium)

  • 149543 Amazon Linux Security Advisory: ALAS-2022-1613 (High)

  • 149557 Amazon Linux Security Advisory: ALAS-2022-1614 (High)

  • 149546 Amazon Linux Security Advisory: ALAS-2022-1615 (High)

  • 149542 Amazon Linux Security Advisory: ALAS-2022-1616 (Medium)

  • 149544 Amazon Linux Security Advisory: ALAS-2022-1617 (High)

  • 149541 Amazon Linux Security Advisory: ALAS-2022-1618 (High)

  • 149549 Amazon Linux Security Advisory: ALAS-2022-1619 (High)

  • 149545 Amazon Linux Security Advisory: ALAS-2022-1620 (High)

  • 149556 Amazon Linux Security Advisory: ALAS-2022-1621 (High)

  • 149547 Amazon Linux Security Advisory: ALAS-2022-1622 (High)

  • 149554 Amazon Linux Security Advisory: ALAS-2022-1623 (Medium)

  • 149550 Amazon Linux Security Advisory: ALAS-2022-1624 (Medium)

  • 149552 Amazon Linux Security Advisory: ALAS-2022-1625 (Medium)

  • 149540 Amazon Linux Security Advisory: ALAS-2022-1626 (High)

  • 149551 Amazon Linux Security Advisory: ALAS-2022-1627 (High)

  • 149539 Amazon Linux Security Advisory: ALAS-2022-1628 (High)

  • 149563 Citrix Security Advisory: CTX457836 (Medium)

  • 149480 Debian Security Advisory: DSA-5191-1 (High)

  • 149478 Debian Security Advisory: DSA-5196-1 (High)

  • 149476 Debian Security Advisory: DSA-5197-1 (High)

  • 149479 Debian Security Advisory: DSA-5198-1 (Medium)

  • 149477 Debian Security Advisory: DSA-5202-1 (Medium)

  • 149443 ELSA-2022-5695: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149462 ELSA-2022-5696: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149461 ELSA-2022-5698: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149442 ELSA-2022-5709: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149450 ELSA-2022-5716: grafana security update (Medium)

  • 149468 ELSA-2022-5717: grafana security update (Medium)

  • 149439 ELSA-2022-5726: java-17-openjdk security, bug fix, and enhancement update (Medium)

  • 149471 ELSA-2022-5736: java-17-openjdk security, bug fix, and enhancement update (Medium)

  • 149470 ELSA-2022-5767: firefox security update (Medium)

  • 149441 ELSA-2022-5773: thunderbird security update (Medium)

  • 149457 ELSA-2022-5774: thunderbird security update (Medium)

  • 149454 ELSA-2022-5775: go-toolset:ol8 security and bug fix update (Medium)

  • 149475 ELSA-2022-5776: firefox security update (Medium)

  • 149451 ELSA-2022-5777: firefox security update (Medium)

  • 149467 ELSA-2022-5778: thunderbird security update (Medium)

  • 149465 ELSA-2022-5779: ruby:2.5 security update (Medium)

  • 149472 ELSA-2022-5799: go-toolset and golang security and bug fix update (Medium)

  • 149444 ELSA-2022-5809: pcre2 security update (Medium)

  • 149458 ELSA-2022-5813: vim security update (High)

  • 149455 ELSA-2022-5818: openssl security update (High)

  • 149453 ELSA-2022-5819: kernel security and bug fix update (High)

  • 149456 ELSA-2022-5821: virt:ol and virt-devel:ol security, bug fix, and enhancement update (Medium)

  • 149466 ELSA-2022-5823: 389-ds:1.4 security update (Medium)

  • 149445 ELSA-2022-5826: mariadb:10.5 security, bug fix, and enhancement update (Medium)

  • 149447 ELSA-2022-5904: php security update (Medium)

  • 149469 ELSA-2022-5905: xorg-x11-server security update (Medium)

  • 149448 ELSA-2022-9667: Unbreakable Enterprise kernel security update (High)

  • 149473 ELSA-2022-9668: libvirt libvirt-python security update (Medium)

  • 149463 ELSA-2022-9669: qemu security update (Medium)

  • 149446 ELSA-2022-9670: microcode_ctl security update (Low)

  • 149474 ELSA-2022-9675: httpd security update (High)

  • 149452 ELSA-2022-9676: httpd security update (High)

  • 149449 ELSA-2022-9680: httpd security update (High)

  • 149464 ELSA-2022-9683: openssl security update (High)

  • 149440 ELSA-2022-9689: Unbreakable Enterprise kernel security update (Medium)

  • 149460 ELSA-2022-9693: Unbreakable Enterprise kernel security update (Medium)

  • 149459 ELSA-2022-9700: virt:kvm_utils security update (Medium)

  • 149562 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium)

  • 149561 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.0.12394 and Earlier (Medium)

  • 149536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 104.0.5112.79 (High)

  • 149537 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.1 (High)

  • 149538 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 91.12 (High)

  • 149567 MS22-AUG: Microsoft Exchange Server Security Update (High)

  • 149564 MS22-AUG: Microsoft Internet Explorer Security Update (High)

  • 149566 MS22-AUG: Microsoft Office Security Update (High)

  • 149565 MS22-AUG: Microsoft Windows Security Update (High)

  • 149487 RHSA-2022:5716: grafana security update (Medium)

  • 149481 RHSA-2022:5717: grafana security update (Medium)

  • 149494 RHSA-2022:5726: java-17-openjdk security, bug fix, and enhancement update (Medium)

  • 149484 RHSA-2022:5736: java-17-openjdk security, bug fix, and enhancement update (Medium)

  • 149499 RHSA-2022:5767: firefox security update (Medium)

  • 149486 RHSA-2022:5773: thunderbird security update (Medium)

  • 149502 RHSA-2022:5774: thunderbird security update (Medium)

  • 149491 RHSA-2022:5775: go-toolset:rhel8 security and bug fix update (Medium)

  • 149495 RHSA-2022:5776: firefox security update (Medium)

  • 149505 RHSA-2022:5777: firefox security update (Medium)

  • 149492 RHSA-2022:5778: thunderbird security update (Medium)

  • 149501 RHSA-2022:5779: ruby:2.5 security update (Low)

  • 149497 RHSA-2022:5799: go-toolset and golang security and bug fix update (Medium)

  • 149510 RHSA-2022:5809: pcre2 security update (Low)

  • 149503 RHSA-2022:5813: vim security update (Low)

  • 149483 RHSA-2022:5818: openssl security update (Low)

  • 149493 RHSA-2022:5819: kernel security and bug fix update (Medium)

  • 149506 RHSA-2022:5821: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Low)

  • 149504 RHSA-2022:5823: 389-ds:1.4 security update (Low)

  • 149498 RHSA-2022:5826: mariadb:10.5 security, bug fix, and enhancement update (Low)

  • 149489 RHSA-2022:5834: kernel-rt security and bug fix update (Medium)

  • 149485 RHSA-2022:5837: java-1.8.0-ibm security update (Low)

  • 149482 RHSA-2022:5839: kpatch-patch security update (Medium)

  • 149490 RHSA-2022:5904: php security update (Medium)

  • 149488 RHSA-2022:5905: xorg-x11-server security update (Medium)

  • 149507 RHSA-2022:5937: kernel security and bug fix update (Low)

  • 149496 RHSA-2022:5939: kernel-rt security and bug fix update (Low)

  • 149508 RHSA-2022:5942: vim security update (Low)

  • 149500 RHSA-2022:5948: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update (Low)

  • 149509 RHSA-2022:6003: kernel security, bug fix, and enhancement update (Low)

  • 149434 SNMPv2c Server Detection (Info)

  • 149533 VMware Security Advisory: VMSA-2022-0016 (Low)

  • 149534 VMware Security Advisory: VMSA-2022-0018 (Low)

  • 149535 VMware Security Advisory: VMSA-2022-0020 (Low)

  • 149511 [USN-5531-1] protobuf-c vulnerability (Medium)

  • 149512 [USN-5535-1] Intel Microcode vulnerabilities (Medium)

  • 149515 [USN-5536-1] Firefox vulnerabilities (Medium)

  • 149513 [USN-5537-1] MySQL vulnerabilities (Medium)

  • 149516 [USN-5537-2] MySQL vulnerability (Medium)

  • 149514 [USN-5538-1] libtirpc vulnerability (Medium)

  • 149517 [USN-5539-1] Linux kernel vulnerabilities (Medium)

  • 149518 [USN-5540-1] Linux kernel vulnerabilities (Medium)

  • 149519 [USN-5541-1] Linux kernel (Azure) vulnerabilities (Medium)

  • 149520 [USN-5542-1] Samba vulnerabilities (Medium)

  • 149521 [USN-5543-1] Net-SNMP vulnerabilities (Medium)

  • 149522 [USN-5544-1] Linux kernel vulnerabilities (Medium)

  • 149524 [USN-5546-1] OpenJDK vulnerabilities (Medium)

  • 149525 [USN-5546-2] OpenJDK 8 vulnerabilities (Medium)

  • 149523 [USN-5547-1] NVIDIA graphics drivers vulnerabilities (Medium)

  • 149529 [USN-5548-1] libxml2 vulnerability (Medium)

  • 149526 [USN-5549-1] Django vulnerability (Medium)

  • 149527 [USN-5550-1] GnuTLS vulnerabilities (Medium)

  • 149528 [USN-5551-1] mod-wsgi vulnerability (Medium)

  • 149530 [USN-5552-1] phpLiteAdmin vulnerability (Medium)

  • 149531 [USN-5554-1] GDK-PixBuf vulnerability (Medium)

  • 149532 [USN-5555-1] GStreamer Good Plugins vulnerabilities (Medium)

Fixes
  • Updated Vulnerability Descriptions:
    • 146718 Apache HTTP Server Directory Traversal Vulnerability (High)
    • 149384 APSB22-32: Security Updates Available for Adobe Acrobat and Reader (High)

    • 149383 APSB22-35: Security Updates Available for Adobe Photoshop CC (High)

    • 149432 Axis Network Camera Detected (Info)

    • 149388 Azul Zulu Critical Patch Update: JULY-2022 (High)

    • 149381 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.134 (High)

    • 149382 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 103.0.1264.71 (High)

    • 149385 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 103 (High)

    • 149386 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.1 (High)

    • 149387 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.12 (High)

    • 149416 Zoom DLL Injection (Medium)

    • 149415 Zoom Insufficient Hostname Validation (Medium)

Version 4.3.3

August 4, 2022

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 149411 Amazon Linux 2 Security Advisory: ALAS-2022-1807 (Medium)
  • 149394 Amazon Linux 2 Security Advisory: ALAS-2022-1808 (Medium)

  • 149396 Amazon Linux 2 Security Advisory: ALAS-2022-1809 (High)

  • 149407 Amazon Linux 2 Security Advisory: ALAS-2022-1810 (Medium)

  • 149408 Amazon Linux 2 Security Advisory: ALAS-2022-1811 (High)

  • 149400 Amazon Linux 2 Security Advisory: ALAS-2022-1812 (High)

  • 149402 Amazon Linux 2 Security Advisory: ALAS-2022-1813 (High)

  • 149390 Amazon Linux 2 Security Advisory: ALAS-2022-1814 (Medium)

  • 149395 Amazon Linux 2 Security Advisory: ALAS-2022-1815 (High)

  • 149409 Amazon Linux 2 Security Advisory: ALAS-2022-1816 (High)

  • 149403 Amazon Linux 2 Security Advisory: ALAS-2022-1817 (Low)

  • 149389 Amazon Linux 2 Security Advisory: ALAS-2022-1818 (Medium)

  • 149401 Amazon Linux 2 Security Advisory: ALAS-2022-1819 (Medium)

  • 149404 Amazon Linux 2 Security Advisory: ALAS-2022-1820 (Medium)

  • 149405 Amazon Linux 2 Security Advisory: ALAS-2022-1821 (Medium)

  • 149399 Amazon Linux 2 Security Advisory: ALAS-2022-1822 (Low)

  • 149398 Amazon Linux 2 Security Advisory: ALAS-2022-1823 (Low)

  • 149393 Amazon Linux 2 Security Advisory: ALAS-2022-1824 (Low)

  • 149391 Amazon Linux 2 Security Advisory: ALAS-2022-1825 (Medium)

  • 149406 Amazon Linux 2 Security Advisory: ALAS-2022-1826 (Medium)

  • 149410 Amazon Linux 2 Security Advisory: ALAS-2022-1827 (Medium)

  • 149392 Amazon Linux 2 Security Advisory: ALAS-2022-1828 (Low)

  • 149397 Amazon Linux 2 Security Advisory: ALAS-2022-1829 (High)

  • 149423 Apache Tomcat Security Advisory: June 2022 (Medium)

  • 149384 APSB22-32: Security Updates Available for Adobe Acrobat and Reader (High)

  • 149383 APSB22-35: Security Updates Available for Adobe Photoshop CC (High)

  • 149432 Axis Network Camera Detected (Info)

  • 149388 Azul Zulu Critical Patch Update: JULY-2022 (High)

  • 149412 Cisco Security Advisory: CISCO-SA-ASA-ASDM-SIG-NPKVWDJM (High)

  • 149329 Citrix Security Advisory: CTX370550 (Medium)

  • 149333 Citrix Security Advisory: CTX370551 (High)

  • 149327 Citrix Security Advisory: CTX377814 (Low)

  • 149330 Citrix Security Advisory: CTX390511 (Medium)

  • 149331 Citrix Security Advisory: CTX460016 (High)

  • 149328 Citrix Security Advisory: CTX460064 (Medium)

  • 149332 Citrix Security Advisory: CTX461397 (Low)

  • 149262 Debian Security Advisory: DLA-2880-1 (Medium)

  • 149306 Debian Security Advisory: DLA-2881-1 (Medium)

  • 149283 Debian Security Advisory: DLA-2898-1 (Low)

  • 149293 Debian Security Advisory: DLA-2916-1 (Medium)

  • 149295 Debian Security Advisory: DLA-2921-1 (Medium)

  • 149296 Debian Security Advisory: DLA-2930-1 (High)

  • 149266 Debian Security Advisory: DLA-2933-1 (High)

  • 149264 Debian Security Advisory: DLA-2939-1 (Medium)

  • 149300 Debian Security Advisory: DLA-2942-1 (High)

  • 149310 Debian Security Advisory: DLA-2961-1 (High)

  • 149269 Debian Security Advisory: DLA-2974-1 (Low)

  • 149307 Debian Security Advisory: DLA-2976-1 (Medium)

  • 149292 Debian Security Advisory: DLA-2977-1 (Medium)

  • 149257 Debian Security Advisory: DLA-2994-1 (High)

  • 149273 Debian Security Advisory: DLA-3020-1 (High)

  • 149301 Debian Security Advisory: DLA-3021-1 (High)

  • 149318 Debian Security Advisory: DLA-3040-1 (High)

  • 149256 Debian Security Advisory: DLA-3041-1 (High)

  • 149248 Debian Security Advisory: DLA-3052-1 (High)

  • 149253 Debian Security Advisory: DLA-3053-1 (Medium)

  • 149245 Debian Security Advisory: DLA-3054-1 (High)

  • 149246 Debian Security Advisory: DLA-3055-1 (High)

  • 149252 Debian Security Advisory: DLA-3056-1 (Medium)

  • 149249 Debian Security Advisory: DLA-3057-1 (Medium)

  • 149271 Debian Security Advisory: DLA-3058-1 (High)

  • 149309 Debian Security Advisory: DLA-3059-1 (High)

  • 149263 Debian Security Advisory: DLA-3060-1 (Medium)

  • 149308 Debian Security Advisory: DLA-3061-1 (High)

  • 149278 Debian Security Advisory: DLA-3062-1 (Medium)

  • 149303 Debian Security Advisory: DLA-3063-1 (Medium)

  • 149281 Debian Security Advisory: DLA-3065-1 (High)

  • 149287 Debian Security Advisory: DLA-3066-1 (High)

  • 149272 Debian Security Advisory: DSA-5044-1 (High)

  • 149312 Debian Security Advisory: DSA-5045-1 (High)

  • 149291 Debian Security Advisory: DSA-5047-1 (Low)

  • 149285 Debian Security Advisory: DSA-5055-1 (Low)

  • 149267 Debian Security Advisory: DSA-5062-1 (Low)

  • 149314 Debian Security Advisory: DSA-5069-1 (Medium)

  • 149315 Debian Security Advisory: DSA-5070-1 (Low)

  • 149275 Debian Security Advisory: DSA-5074-1 (Medium)

  • 149304 Debian Security Advisory: DSA-5086-1 (Low)

  • 149321 Debian Security Advisory: DSA-5090-1 (High)

  • 149284 Debian Security Advisory: DSA-5094-1 (High)

  • 149311 Debian Security Advisory: DSA-5097-1 (High)

  • 149297 Debian Security Advisory: DSA-5104-1 (Medium)

  • 149279 Debian Security Advisory: DSA-5106-1 (High)

  • 149254 Debian Security Advisory: DSA-5110-1 (Low)

  • 149276 Debian Security Advisory: DSA-5112-1 (Medium)

  • 149298 Debian Security Advisory: DSA-5114-1 (Medium)

  • 149286 Debian Security Advisory: DSA-5115-1 (Medium)

  • 149280 Debian Security Advisory: DSA-5116-1 (Medium)

  • 149302 Debian Security Advisory: DSA-5120-1 (Low)

  • 149289 Debian Security Advisory: DSA-5121-1 (Medium)

  • 149322 Debian Security Advisory: DSA-5122-1 (Low)

  • 149259 Debian Security Advisory: DSA-5123-1 (Medium)

  • 149319 Debian Security Advisory: DSA-5125-1 (Medium)

  • 149260 Debian Security Advisory: DSA-5129-1 (High)

  • 149288 Debian Security Advisory: DSA-5130-1 (Medium)

  • 149323 Debian Security Advisory: DSA-5134-1 (Medium)

  • 149255 Debian Security Advisory: DSA-5135-1 (Low)

  • 149261 Debian Security Advisory: DSA-5136-1 (Low)

  • 149320 Debian Security Advisory: DSA-5141-1 (Medium)

  • 149294 Debian Security Advisory: DSA-5143-1 (High)

  • 149290 Debian Security Advisory: DSA-5148-1 (Medium)

  • 149325 Debian Security Advisory: DSA-5156-1 (High)

  • 149317 Debian Security Advisory: DSA-5158-1 (Medium)

  • 149274 Debian Security Advisory: DSA-5163-1 (Low)

  • 149244 Debian Security Advisory: DSA-5164-1 (Medium)

  • 149251 Debian Security Advisory: DSA-5166-1 (High)

  • 149250 Debian Security Advisory: DSA-5167-1 (High)

  • 149305 Debian Security Advisory: DSA-5168-1 (Medium)

  • 149247 Debian Security Advisory: DSA-5169-1 (High)

  • 149277 Debian Security Advisory: DSA-5170-1 (Medium)

  • 149299 Debian Security Advisory: DSA-5171-1 (Medium)

  • 149324 Debian Security Advisory: DSA-5173-1 (High)

  • 149316 Debian Security Advisory: DSA-5174-1 (Medium)

  • 149268 Debian Security Advisory: DSA-5176-1 (Medium)

  • 149282 Debian Security Advisory: DSA-5177-1 (High)

  • 149258 Debian Security Advisory: DSA-5178-1 (Low)

  • 149326 Debian Security Advisory: DSA-5179-1 (Medium)

  • 149313 Debian Security Advisory: DSA-5184-1 (High)

  • 149270 Debian Security Advisory: DSA-5185-1 (Medium)

  • 149265 Debian Security Advisory: DSA-5186-1 (Medium)

  • 149424 Drupal Security Advisory: SA-CORE-2022-010 (Medium)

  • 149425 Drupal Security Advisory: SA-CORE-2022-011 (Medium)

  • 149426 Drupal Security Advisory: SA-CORE-2022-012 (Medium)

  • 149427 Drupal Security Advisory: SA-CORE-2022-013 (High)

  • 149428 Drupal Security Advisory: SA-CORE-2022-014 (High)

  • 149429 Drupal Security Advisory: SA-CORE-2022-015 (Medium)

  • 149229 ELSA-2022-17956: go-toolset:ol8addon security update (Medium)

  • 149238 ELSA-2022-5542: squid security update (Medium)

  • 149240 ELSA-2022-5564: kernel security, bug fix, and enhancement update (Medium)

  • 149235 ELSA-2022-5683: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149241 ELSA-2022-5687: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149233 ELSA-2022-9586: olcne security update (High)

  • 149232 ELSA-2022-9587: olcne security update (High)

  • 149236 ELSA-2022-9588: olcne security update (High)

  • 149243 ELSA-2022-9589: olcne security update (High)

  • 149228 ELSA-2022-9590: Unbreakable Enterprise kernel security update (High)

  • 149242 ELSA-2022-9591: Unbreakable Enterprise kernel-container security update (High)

  • 149227 ELSA-2022-9595: grub2 security update (Medium)

  • 149231 ELSA-2022-9596: grub2 security update (Medium)

  • 149234 ELSA-2022-9601: Unbreakable Enterprise kernel security update (Medium)

  • 149230 ELSA-2022-9602: Unbreakable Enterprise kernel-container security update (Medium)

  • 149237 ELSA-2022-9609: Unbreakable Enterprise kernel security update (Medium)

  • 149239 ELSA-2022-9612: Unbreakable Enterprise kernel-container security update (Medium)

  • 149381 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.134 (High)

  • 149382 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 103.0.1264.71 (High)

  • 149226 Microsoft Skype for Business End of Life (High)

  • 149385 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 103 (High)

  • 149386 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.1 (High)

  • 149387 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 91.12 (High)

  • 149419 OpenSSL Fencepost Error (Medium)

  • 149418 OpenSSL Memory Corruption (High)

  • 149417 Oracle Database Critical Patch Update: July 2022 (High)

  • 149430 Oracle MySQL Critical Patch Update: July 2022 (High)

  • 149431 Oracle WebLogic Critical Patch Update: July 2022 (High)

  • 149421 PHP Remote Code Execution (RCE) Vulnerability (High)

  • 149422 PHP Remote Code Execution (RCE) Vulnerability (High)

  • 149339 RHSA-2022:5564: kernel security, bug fix, and enhancement update (Medium)

  • 149341 RHSA-2022:5565: kernel-rt security and bug fix update (Medium)

  • 149334 RHSA-2022:5597: pandoc security update (Medium)

  • 149336 RHSA-2022:5640: kernel security update (Medium)

  • 149337 RHSA-2022:5683: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149335 RHSA-2022:5687: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149343 RHSA-2022:5695: java-11-openjdk security, bug fix, and enhancement update (Medium)

  • 149338 RHSA-2022:5696: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149342 RHSA-2022:5698: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149340 RHSA-2022:5709: java-1.8.0-openjdk security, bug fix, and enhancement update (Medium)

  • 149420 Samba Security Advisory July 2022 (High)

  • 149365 Solaris Security Patch: (119783-49): System security update (Medium)

  • 149366 Solaris Security Patch: (119784-49): System security update (Medium)

  • 149367 Solaris Security Patch: (142397-02): System security update (Medium)

  • 149368 Solaris Security Patch: (142398-02): System security update (Medium)

  • 149369 Solaris Security Patch: (152643-16): System security update (Medium)

  • 149370 Solaris Security Patch: (152644-16): System security update (Medium)

  • 149371 Solaris Security Patch: (153091-01): System security update (Medium)

  • 149372 Solaris Security Patch: (153092-01): System security update (Medium)

  • 149373 Solaris Security Patch: (153153-06): System security update (Medium)

  • 149374 Solaris Security Patch: (153154-06): System security update (Medium)

  • 149375 Solaris Security Patch: (153260-51): System security update (Medium)

  • 149376 Solaris Security Patch: (153261-51): System security update (Medium)

  • 149377 Solaris Security Patch: (153262-51): System security update (Medium)

  • 149378 Solaris Security Patch: (153263-51): System security update (Medium)

  • 149379 Solaris Security Patch: (153264-41): System security update (Medium)

  • 149380 Solaris Security Patch: (153265-41): System security update (Medium)

  • 149414 TLS Connection: TLS Version 1.3 Enabled (Info)

  • 149416 Zoom DLL Injection (Medium)

  • 149415 Zoom Insufficient Hostname Validation (Medium)

  • 149348 [USN-5473-2] ca-certificates update (Medium)

  • 149344 [USN-5503-2] GnuPG vulnerability (Medium)

  • 149345 [USN-5510-1] X.Org X Server vulnerabilities (Medium)

  • 149346 [USN-5510-2] X.Org X Server vulnerabilities (Medium)

  • 149347 [USN-5511-1] Git vulnerabilities (Medium)

  • 149349 [USN-5513-1] Linux kernel (AWS) vulnerabilities (Medium)

  • 149350 [USN-5514-1] Linux kernel vulnerabilities (Medium)

  • 149351 [USN-5515-1] Linux kernel vulnerabilities (Medium)

  • 149352 [USN-5517-1] Linux kernel (OEM) vulnerabilities (Medium)

  • 149353 [USN-5518-1] Linux kernel vulnerabilities (Medium)

  • 149355 [USN-5519-1] Python vulnerability (Medium)

  • 149354 [USN-5520-1] HTTP-Daemon vulnerability (Medium)

  • 149357 [USN-5520-2] HTTP-Daemon vulnerability (Medium)

  • 149356 [USN-5522-1] WebKitGTK vulnerabilities (Medium)

  • 149358 [USN-5524-1] HarfBuzz vulnerability (Medium)

  • 149359 [USN-5526-1] PyJWT vulnerability (Medium)

  • 149360 [USN-5527-1] Checkmk vulnerabilities (Medium)

  • 149361 [USN-5528-1] FreeType vulnerabilities (Medium)

  • 149362 [USN-5529-1] Linux kernel (OEM) vulnerabilities (Medium)

  • 149363 [USN-5530-1] PHP vulnerability (Medium)

  • 149364 [USN-5532-1] Bottle vulnerability (Medium)

Fixes
  • Updated Vulnerability Descriptions:
    • 149200 Google Chrome: Multiple Vulnerabilities in Versions Less Than 103.0.5060.114 (High)
    • 149224 ManageEngine ADAudit Plus Detected (Info)

    • 149225 ManageEngine ADAudit Plus Path Traversal and Blind XXE (High)

    • 149202 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 103.0.1264.44 (High)

    • 149201 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 103.0.1264.49 (High)

    • 149223 MS22-JUL: Microsoft Office Security Update (High)

    • 149222 MS22-JUL: Microsoft Windows Security Update (High)

    • 149217 Visual Studio Code Elevation of Privilege Vulnerability (Medium)

    • 149220 Visual Studio Code Elevation of Privilege Vulnerability (Medium)

    • 149215 Visual Studio Code Remote Code Execution and Spoofing Vulnerability (Medium)

    • 149218 Visual Studio Code Remote Code Execution and Spoofing Vulnerability (Medium)

    • 149210 Visual Studio Code Remote Code Execution Vulnerability (Medium)

    • 149211 Visual Studio Code Remote Code Execution Vulnerability (Medium)

    • 149212 Visual Studio Code Remote Code Execution Vulnerability (Medium)

    • 149213 Visual Studio Code Remote Code Execution Vulnerability (High)

    • 149214 Visual Studio Code Remote Code Execution Vulnerability (Medium)

    • 149221 Visual Studio Code Remote Code Execution Vulnerability (Medium)

    • 149216 Visual Studio Code Spoofing Vulnerability (Medium)

    • 149219 Visual Studio Code Spoofing Vulnerability (Medium)

Back to Top

 

Digital Guardian


Agent for Windows

Version: 7.8.2

Aug, 2022

New Features
  • Enhancements to DG WIP Configuration:

    This DG Agent for Windows release contains enhancements to DG WIP processing to improve the customer experience. Previously, when a configuration error was found in one resource — such as a bad onecrl.json resource, a bad template.pem resource, or a domain flag in domainflags.txt that DG WIP could not understand — DG WIP would treat the error as a critical problem and return to its default configuration. Now DG WIP can ignore certain problems in its configuration, while continuing to process all other parts of the configuration.

    Configuration errors not critical to DG WIP processing trigger a WIP configuration warning. If the problem is a bad onecrl.json resource or a bad template.pem resource, DG WIP ignores the entire bad resource and uses an alternate resource. For non-critical errors in domainflags.txt, DG WIP ignores just the flag that it cannot understand, or just the line that it cannot parse, and still uses the rest of the domain flags file. If critical configuration errors occur, such as a bad proxyscripts.zip file or a bad config.json file, DG WIP still falls back to its default configuration.

    For more details on sample op alerts refer to Digital_Guardian_Agent_for_Windows_7.8.2_Release_Notes.

     

Fixes
  • On some DG Agent computers, the DG MSI installer tool (DgMSITool.hta ) failed to create a custom MSI that had feature packages embedded in the MSI due to a permissions issue that prevented saving the file using SaveAs. DG resolved this by keeping the original database open in read-only mode during a SaveAs.

  • System performance was degraded after the DG Agent was upgraded from version 7.6.4 to version 7.8.1. This occurred because a MIP SDK dependency preceded the DgAgent\mip folder in the DLL loading search order. The search order has been adjusted to correct this issue.

  • Non-critical errors in a domainflags.txt entry resulted in DG Agents reverting to the default domain flags file instead of the last working version. This issue was resolved as part of enhancements to DG WIP, including domainflags.txt processing. For details, see "Enhancements to DG WIP Configuration." Refer to "Digital_Guardian_Agent_for_Windows_7.8.2_Release_Notes" on page 16.

  • DG now truncates the file paths of Microsoft Outlook email attachments that are stored for internal usage to 259 characters if the file path is greater than 260 characters to ensure that email attachments that are 1 MB or larger do not cause Outlook to shut down.

  • When formatted text was copied and pasted within the same Microsoft Word document or from one Word document to another, the pasted text lost its formatting. This occurred only when the "Pasting from other programs" option was set to "Keep Text Only" (File > Options > Advanced > Pasting from other programs). This has been fixed so that the formatting data is retained in this scenario.

  • The DG Agent default Process Flag Resource file (prcsflgs.dat) has been updated with changes to the flag settings that apply to how the DG Agent interacts with the Cylance Smart AntiVirus software product. For details, refer to "Resource File Changes" on page 18.

  • When presenting prompts that contain links intended to open a web browser, the DGPrompt process now calls the browser that is set as the default to display and/or redirect the information.

  • A rule was not triggering correctly on a file being added to an archive using the File Explorer context menu (right click). The rule now triggers correctly.

  • A customer with DG Adaptive Content Inspection (ACI) enabled encountered extremely slow operations when deleting hundreds of thousands of files because the DG Agent was attempting to classify the files. A recycle-bin path in the ACI2 section of the Directory Control File (dirctrl.dat) now ensures that the Agent does not attempt to classify files going to the recycle bin.

  • DG made a change to the DG Agent to correct an issue with Adaptive Content Inspection (ACI) in which incorrect conversion of multibyte characters in the body of emails resulted in faulty classification of words and phrases.

  • DG made changes to ensure that the DG WIP logs (dgwip0.log, dgwip1.log, and so on) will no longer be created in the disk root folder (for example, C:\) when there is a error retrieving the DG Agent installation folder from the Windows registry.

Back to Top

 

Document Management (RJS)


DeliverNow

Version: 1.2.18

August 22, 2022

New Features
  • Added ability to thread network file monitoring.
Enhancements
  • Added Windows Integrated Security option for SQL Server.
  • Added the ability to set a custom smtp server timeout value, overriding the default value of 20 seconds.
  • Added ability to customize connection reuse parameter for IBM i connections. Users can override the default value for each configured service.
  • Added new PDF Library for conversions to PDFs that allows for new font options and better automatic scaling of output files.
  • Added SQL Upgrade Scripts to installed package for ease of troubleshooting.
  • Added XLSX as a output type option for spool file conversions using DataImport.
  • Added Admin setting to allow StartTLS to be enabled/disabled in the event email servers, like newer O365 servers, do not support the command.
Fixes
  • Fixed issue with log viewer where users could potentially inject their own SQL into the query filter.
  • Increased field width of Imaging Destination dropdown lists
  • Sorted the document type list on the destinations add/update page.
  • Fixed issue where * No Route choice in UI could save invalid data.

Back to Top

 

FileCatalyst


FileCatalyst Workflow

Version 5.1.5 - Build 49

August 26, 2022

  • Using: FileCatalyst Direct Server 3.8.5 Build 85

  • Using: FileCatalyst TransferAgent 3.8.5 Build 85

  • Fixed: Using multiple FIELD(xyz) doesn't work in File Target location path in FC Sites

  • Fixed: Workflow "current log" file is not being created in the expected location

  • Prevent user from inadvertently setting the Site initial directory to an empty string

  • Replace the Log4j library with the Logback library

  • Help text updates

  • Update End-of-life versions in Release Notes

  • Various security fixes

  • Modernized look and feel

  • Various usability improvements

  • Download site revisions

Back to Top

 

Globalscape


EFT

Version 8.1.0.9

August 5, 2022

New Features

    Context Variables

    • Added %USER.HOME_FOLDER_PATH% to return user's full home folder path

    EFT Administration

    • Added support for 64bit

    • Added support to create Advanced Workflow folders

    • Added support for Upload VFS Quotas

    • Added support to map EFT site root folder to the cloud

    • Added support for Remote Agent list export to CSV

    • Added support for SSL Certificate Rotation Period Notification

    Event Rules

    • Added support for multi-event rule move to folder

    High Availability (HA)

    • Added support for upgrade cluster with zero downtime

    OpenPGP

    • Updated OpenPGP library

    OpenSSL

    • Updated OpenSSL library to 1.1.1o (Note: FIPS will continue to use 1.0.2u)

    Remote Agent (RAM)

    • Added support for Compress/Decompress action in RAM

    REST API

    • Added REST API support for email templates

    • Added REST API support to obtain defined users under the /sites/{siteid}/users endpoint

    • Added REST API keep-alive endpoint

    • Added REST API support to return admin session information

    • Added REST API support for User Settings templates

    • Added REST API support for Permission Groups

    • Added REST API support for AWE

    • Added REST API support for Custom Commands

    • Added REST API support for Connection Profiles

    • Added REST API support for DMZ Gateway

    • Added REST API support for VFS cloud

    • Added REST API support for Remote Agents

    WTC

    • Added support for downloading a workspace share folder as a zip file

Enhancements

    Advanced Properties (AP)

    • Removed "EnableMultiPart" and "MultipartValue" APs

    Context Variables

    • Expanded support for %FS.VIRTUAL_PATH% in certain event rules

    • Expanded support for %WS_OWNER_NAME% in the Send email template

    EFT Administration

    • Increased Compress/Decompress buffer size for better performance in EFT admin UI and event rules

    • Restored the ability to select registration for Single or Multi Site DMZ

    • Added WEL and EFT logging for PGP Key Rotation Period Notification

    • Added Support for Microsoft Edge WebView2 for ARM report rendering

    • Support for Windows Server 2022

    Event Rules

    • Added AWS Region Asia Pacific, Jakarta

    High Availability (HA)

    • EFT Templates are now in a single location when configured in a cluster

    Licensing

    • EFT will now provide 5 free workspace licenses upon activation of the HTTPs module

    • Added support to register Advanced Security Module (ASM) license key in Regulatory Compliance Module to unlock both Regulatory Compliance Module and Advanced Authentication Modes Module

    • Added support to register Express Security Module (ESM) license key in Regulatory Compliance Module to unlock Regulatory Compliance Module

    • Restored EFT registration UI behavior, EFT Server must first be registered before any other module

    • Added Advanced option to the EFT registration wizard to help troubleshoot registration issues

    REST API

    • Added the ability to obtain last password change details in the userId metrics endpoint

 

Fixes

    ARM

    • Fixed an issue where data reported in the Traffic - Protocolwise Connections table were not properly reporting the correct bytes

    Authentication

    • Fixed an issue where LDAP users were getting provisioned without authentication due to an issue with SAML SSO configurations

    Custom Commands

    • Fixed an issue where modified custom commands would not be saved

    • Fixed an issue where context variables to action fields broke legacy behavior

    EFT Administration

    • Fixed an issue where the EFT Admin UI could hang when disk quota would trigger recalculation

    • Fixed an issue where the EFT administrators would not be able to connect via our Admin console remotely when TLS 1.3 was disabled

    • Fixed an issue where the EFT administrators could not set large values in custom user profile fields

    • Fixed an issue where requests were made to the EFT AppData path on user account login

    • Fixed an issue where the RADIUS test button would report a failure even when configured properly

    • Fixed an issue where the Automate Workflow logs would reside on the wrong path when configuring EFT remotely

    • Fixed an issue where the EFT Admin UI could crash when configured with a specific CIC profile

    • Fixed an issue where the Azure Blob SAS token test button would report a failure even when configured properly

    • Fixed an issue where the Admin UI stats option would not properly count event rules

    • Fixed an issue where EFT Event Rule administrators could not use the browse button in an event rule

    • Fixed an issue where copying/pasting event rule conditions/actions would not work as expected

    • Fixed an issue where under certain conditions EFT admin UI could hang during backup process

    • Fixed an issue where under certain conditions upgrades from EFT Express could fail

    • Fixed an issue where EFT would not properly prohibit reuse of previous password minimum value

    • Fixed an issue where the EFT admin UI would not always report the correct active session count

    • Fixed an issue where under certain conditions EFT would crash after an upgrade

    • Fixed an issue where under certain conditions new users were not being forced to change password upon first use

    • Fixed an issue where banned file types were still allowed to upload

    EFT COM API

    • Fixed an issue where site.GetPermPathsList would not properly identify non-existing folders

    • Fixed an issue where certain workspaces API endpoints were no longer available

    EFT Event Rules

    • Fixed an issue where Automate Workflow event rules would not always trigger after an upgrade

    • Fixed an issue where under certain conditions Folder Monitor event rules could double trigger

    • Fixed an issue where Cloud Upload actions would fail when the name contained a comma

    • Fixed an issue where the If Login Name condition would not work under certain conditions

    • Fixed an issue where the User Login failed condition would not trigger in the HTTPS protocol

    • Fixed an issue where If Virtual Path filter would not work when configured with Starts With

    • Fixed an issue where under certain conditions a configured MultiPartUpload could crash EFT

    • Fixed an issue where under certain conditions a configured pure sync event could cause EFT to crash

    • Fixed an issue where Cloud Monitor object event rules may not properly load balance

    • Fixed an issue where uploading to a Azure Blob would fail with permissions lower than Storage Level Access

    • Fixed an issue where under certain conditions users were unable to login via CAC when AllowNonCACUsers AP is enabled

    FIPS

    • Fixed an issue where upon upgrade EFT would not disable non-supported FIPS ciphers

    • Fixed an issue where under certain conditions upon upgrade to 8.0.6 FTPS transfers would fail

    FTP

    • Fixed an issue where FTP would fail to connect to OpenVMS

    Logging

    • Fixed an issue where TED6logs were not saved on the correct path when configured with an AP

    MFA

    • Fixed an issue where UserAgentHeaderMustUseOTP Advanced Property (AP) would not properly work with different formatting/configurations

    OpenPGP

    • Fixed an issue where OpenPGP would fail to decrypt encrypted files with Bouncy Castle

    Registration

    • Fixed an issue where manual registration for DMZ Single site license would fail

    Remote Agent

    • Fixed an issue where under certain conditions Remote Agents could experience memory leaks

    • Fixed an issue where under certain conditions a Remote Agent could enter an infinite loop when trying to write to the log

    • Fixed an issue where UTF-8 characters in remote agent rules were not supported

    SFTP

    • Fixed an issue where SFTP connections would not handle directly listing correctly with the STAT command

    SSL

    • Fixed an issue where FTP via SSL connections could cause performance issues with certain clients

    Workspaces

    • Fixed an issue where guest user Workspaces registration would fail when passwords contained # character

    • Fixed an issue where Workspaces users were unable to attach web file request in the reply portal

    • Fixed an issue where the WTC page would not display correct error when accessing a workspace invite after workspaces is disabled

    WTC

    • Fixed an issue where WTC would fail to generate an appropriate error message when a password match a dictionary word

    • Fixed an issue where EFT would pass windows reserved paths accessible via WTC

    • Fixed an issue where under certain conditions exercising the forgot password option could SPAM a user account

    • Fixed an issue where WTC will now provide a prompt when a user account is blocked due to invalid login attempts

    • Fixed an issue where password complexity UI would not properly display for guest accounts

    • Fixed an issue where WTC users could not change their password when configured with an empty password

Back to Top

 

GoAnywhere


Version 7.0.3

August 31, 2022

Fixes
  • Fixed an issue with Web Client legacy API request parsing.

  • Fixed an issue where the Environment Name and System Name were not rendering correctly in the Admin Client page header.

  • Fixed an issue where users couldn't download files from Secure Forms responses when submitting a form and accessing files anonymously.

  • Fixed an issue where selecting certain locales in Global Settings would cause a 500 error on the admin client.

  • Fixed an issue where FileCatalyst downloads were not able to complete when the "Transfer with Temp Names" option was enabled.

  • Fixed an issue where the scrollbar was not available in the Agent Manager.

  • Fixed an issue that prevented Cloud Connectors from being upgraded or reverted via change history.

Version 7.0.2

August 4, 2022

Enhancements
  • Enhanced the Diagnostics Thread Dump process to output the entire stack.

  • Changed the temp file extension that is used while the Global AV is processing files to ensure that end users are not aware that ICAP scanning is happening.

  • Version 3 of GoFast now supports connections through Gateway.

  • Updated the text on the Antivirus Settings Service Limits tab to reflect that the GoFast service is supported.

Fixes
  • Fixed an issue with Global Antivirus that caused uploads to Amazon S3 Virtual Folders to fail.

  • Fixed an issue with SFTP and Global Antivirus that caused rejected ICAP file uploads to be improperly handled.

  • Fixed an issue with SCP Uploads that prevented Triggers from accessing the target file and Antivirus scanning from accurately reporting failures.

  • Fixed an issue where an invalid add-on type would break the ability to import add-ons via xml.

  • Fixed an issue where the custom header logo would display at a lower size than the actual file. This was introduced in 7.0.

  • Fixed an issue where certain trigger conditions with GoFast were not getting processed properly.

  • Fixed an issue where large file downloads through the FileCatalyst integration would fail with a "No room in queue" error message.

  • Fixed an issue where zero-byte file transfers in the GoFast Task were reporting the wrong transfer time amount.

GoAnywhere Agents

Version 1.7.2

August 31, 2022

Enhancements
  • Java version 11 is now required for Agents starting in version 1.7.2.

Updates
  • Updated GoFast and FileCatalyst libraries to handle transfers through Gateway.

GoAnywhere Gateway

Version 2.9.1

August 3, 2022

  • Enhanced the UDP server to allow for bi-directional proxy flow, specifically to support GoFast V3 powered by File Catalyst.

Back to Top

 

IBM Partnership


Rational Developer for i (RDi)

Version: 9.6.0.12

August 23, 2022

Enhancements
  • Editor support added for RPG language updates includes:
    • ON-EXCP and SND-MSG op-codes
    • %MSG and %TARGET built in functions
  • For toggling edit/browse mode, in a source member, right-click and select Source > Toggle Browse/Edit.

  • In the object table view, right-click a member and select Compare With > Compare (Prompt). Then browse or enter values for the member to compare.

  • Error list support for CRTPGM, CRTSRVPGM

  • Object Table quick filter entry fields support CTRL+V, CTRL+C for Paste, Copy.

  • Editing ILE RPG:

    • Comment out unused variables

    • Create missing variables and procedures

    • Added a keyboard short-cut [alt]+[shft]+t to the Extract Constants menu action

    • Extract Procedure: support embedded SQL statements in selection

  • Editing CL - Recognize control statement in MONMSG EXEC(...) when filtering view by control.

  • Added LPEX filter for subroutines and procedures. (IBMI-I-105)

  • Added preference for default case for Context Assist insertions. (IBMI-I 284)

  • Added preference to change default insert mode for editor. (IBMI-I 364)

  • Left Hand Indicators included in Outline. (IBMI-I 436)

  • Outline shows data structure query modified by an xml-into statement. (IBMI-I 511)

  • Display name of file in hover text for record formats. (IBMI-I 576)

  • Display the contents of the save file (SAVF). (IBMI-I 707)

Fixes
  • RDI 9.6.0.4 Unable to set a file association other than dspf for screen designer (SE70061)

  • RDI 9.6.0.4 Remote system lpex editor find dialog opens as a tab on mac os x (SE70062)

  • RDI 9.6.0.6 ILE RPG Content assist fails inside a proc when the line is missing a required semi-colon (SE71463)

  • Incorrect ILE RPG Block comment behavior in RDI 9.6.0.6 WITH INSERT * INTO COLUMN 7 and shift line by one columns (SE72724)

  • RDI 9.6.0.7 RPGLE Editor refactor rename action does not change **CTDATA array name (SE73160)

  • Rational Developer for System i-editing RPG: Z-ADD With length define not shown as a modify reference in outline view (SE73235)

  • RDI 9.6.0.7 Remote systems LPEX editor may incorrectly show references to external files in ILE RPG source as unused (SE73321)

  • RDI 9.6.0.8 ILE RPG Procedure Wizard fails to insert correct description text and type for program procedure (SE73640)

  • RDI 9.6.0.8 Content assist for embedded SQL statements replaces remaining line content if no parameter separator is specified (SE73744)

  • RDI 9.6.0.8 CL Prompter is incorrectly diagnosing PARM clause SPCVAL((*ABC -1)) (SE73959)

  • RDI 9.6.0.8 ILE RPG content assist may not offer correct keywords for a parameter statement (SE74753)

  • RDI 9.6.0.10 COPY from I Project, paste to remote member corrupts extended characters (SE75819)

  • RDI 9.6.0.10-ILE RPG output specification and/or conditioning lines cause blank outline view (SE76157)

  • RDI 9.6.0.11 Remote systems LPEX editor does not resequence on save (SE76203)

  • RDI 9.6.0.11 Opens editor in edit mode when it should be browse mode (SE76229)

  • RDI 9.6.0.11 CL Prompter command entry does not handle pasted line separator characters (SE76234)

  • RDI 9.6.0.11 Editor should add columns 1-5 change signature to embedded SQL lines in ILE RPG source (SE76308)

  • RDI 9.6.0.11 NULLPOINTEREXCEPTION when opening screen designer editor on DSPF source (SE76312)

  • RDI 9.6.0.11 RPG refactor rename action should allow choosing a duplicate name with warning (SE76366)

  • RDI 9.6.0.11 I Project member compare to corresponding remote member leaves member locked (SE76375)

  • RDI 9.6.0.11 CL prompter is incorrectly diagnosing the PARM clause SPCVAL((* A)) (SE76389)

  • RDI 9.6.0.11 Editing RPG Source containing double byte literals using a profile with CCSID 1399 gets parser error (SE76517)

  • RDI-editing RPGLE-F1 help on selected built-in function name does not link to its help page (SE76646)

  • RPG REFACTOR > Extract procedure dialog does not enable controls for like definition for return value (SE76946)

  • RDI 9.6.0 RDI Locks up at startup when RPG and DDS source editors left open from last RDI shutdown (SE77334 )

  • RDI 9.6.0.11 Member compare shows corrupted characters when member has no type (SE77389)

  • RDI 9.6.0.11 Parsing jobs for I Project RPG source files being edited at RDI startup never complete (SE77608)

  • RDI 9.6.0.11 RDI 9.6.0.11 NullPointerException when Toggle Memory Mode is enabled in the Monitors View while debugging (SE77814)

  • RDI 9.6.0.11 Debug emits MSG DBGE0004 or CRRDG3044 after monitor memory of data structure subfield (SE77101)

Back to Top

 

Powertech


Antivirus for IBM i

Version 8.08

August 16, 2022

Fixes
  • Fixed an integration failure with Powertech Antivirus GUI when:

    • Powertech Antivirus for IBM i 8.06 is updated to a higher release.

    • The Powertech Antivirus for IBM i *ALLOBJ user profile setting is modified from the default value.

    • A permanent license key is used for Powertech Antivirus for IBM i.

  • Fixed an issue with scanning failures on systems running POWER7 hardware.

  • Fixed the AVSVR job failure issue when the Powertech Antivirus for IBM i *ALLOBJ user profile setting is modified from the default value.

Multi-Factor Authentication

Version 1.5.1

August 16, 2022

Fixes
  • Updated to Apache Log4j to 2.17.2, ActiveMQ 5.17, and Tomcat 9 to resolve vulnerabilities.

  • Windows Authentication Manager: The command to stop services has been simplified to significantly reduce the stop and restart time.

Version R01M08

August 16, 2022

Fixes
  • Updated the IBM i Agent for compatibility with Powertech MFA 1.5.1.
  • Changed the API to provide the authentication result as an output parameter, which can be used by the calling program. If the fourth parameter contains the value 1, the authentication was successful; any other integer value means the authentication failed.

  • Multiple Exit Point programs are now shipped with the correct *PUBLIC *USE authority.

  • The return code is now reset within the authentication API at the start of each use.

  • Fixed the use of emergency override within the authentication API.

Version 1.5.1

August 16, 2022

Fixes
  • Updated the Desktop Agent for compatibility with Powertech MFA 1.5.1.
  • Updated to Apache Log4j to 2.17.2.

Command Security for IBM i

Version 1.16

August 9, 2022

Fixes
  • Fixed an issue where, in rare instances, jobs could halt when a monitored command was executed in them.

  • Fixed the “Processing command failure” error on the WRKMBRPDM command. This error occurs if the STRSEU command is configured as a monitored command.

Back to Top

 

Robot


Performance Navigator

Version: 19.2 D

August 3, 2022

Other Fixes
  • Minor bug fix with automated jobs in schedule application.

Robot Console

Version 7.09

August 1, 2022

Enhancements
  • USRDFN resource program added to check job resource with actual job statuses. For more information, see RBTCONLIB/RBCUDSRC member (UDR_INSTRU).

Fixes
  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Fixed issue with message reports missing information when copying and pasting.

Robot Network

Version 13.04

August 1, 2022

Fixes
  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Fixed issue with RBNOVRHOST failing when node is in iASP.

  • *Ovr.txt files now gathered with RSLGETLOGS.

Robot Schedule

Version 13.14

August 1, 2022

Fixes
  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Fixed issue with jobs reporting abnormal completion when they completed normally.

  • Windows GUI enhanced with JRE/JVM that is AdoptOpenJDK.

Robot Schedule Enterprise

Version 3.02

August 1, 2022

Enhancements
  • AdoptOpenJDK vendor and any Java that conforms to OPENJDK standards are now allowed.

  • Windows GUI enhanced with JRE/JVM that is AdoptOpenJDK.

Fixes
  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Fixed issue with error connecting to GUI when Schedule is in an iASP.

  • Ports 8470-8476 can now be restricted.

  • Fixed issue with RE1097M2 receiving MCH3601 error after converting to Schedule Enterprise 3.

Robot Space

Version 3.50

August 1, 2022

Fixes
  • Updated to log4j 2.17.1 to resolve vulnerabilities.

  • Fixed issue with error MCH1210 'Receiver value too small' when running a collection.

  • Fixed issue with corrupted GUI screen.

Back to Top

 

Showcase


Showcase 9

Version: 9.7.0.0 Server Install

August 8, 2022

Enhancements
  • Log4j has been updated to version 2.17.1.

  • IBM i 7.5 support added.

NOTE:

This server version is compatible with the Showcase client version 9.1.0.16.

Version: 9.1.0.16 Client Patch

August 8, 2022

Fixes
  • Log4j has been updated to version 2.17.1.

  • Java has been updated to version 1.8.

The following patch updates are also included:

9.1.0.15 Client Patch (June 2019)

  • An issue editing column headings in the Report Writer that was introduced on Windows 10 with updates has been fixed.

9.1.0.14 Client Patch (April 2019)

  • Windows Server 2016 support added.
  • Copy paste from Showcase Query 9.1.0.13 (using Ctrl-C) to either Excel or iSeries screen adds a question mark '?' in front of the data.

9.1.0.13 Client Patch (March 2018)

  • There is a new configuration option where the Showcase 9 server can be setup to reject requests from down level Client version. This is a new feature in the 9.4.0.2 server build and 9.1.0.13 client build. An entry can be added to the configuration file, showcase.cfg, on the server, that would only accept connections from Showcase 9.1.0.13 or higher Client versions.

9.1.0.12 Client Patch (December 2017)

  • Error when connecting to Query using the 9.1.0.11 patch with JDE World A 9.3 when an invalid Environment is selected.
  • Issue resolved when saving query results to Text-Unicode the BOM marker was missing.

9.1.0.11 Client Patch (March 22, 2016)

  • Issue resolved where query client crashed when results were saved to Excel 4.0 if there were zero rows.
  • Unicode Byte Order Marker (BOM) now included when saving results to CSV-Unicode format, ensuring proper translation of double-byte character sets when opening in Excel.

9.1.0.10 Client Patch (August 5, 2015)

  • The default JDE Environment is always the last one in the list presented to EnterpriseOne users in Query. It has been changed to default to the most recent Environment selected.
  • The Query client timeout value set in Warehouse Manager (Resource Settings) now works for times more than 59 minutes.

9.1.0.9 Client Patch (January 6, 2015)

  • Showcase Addin for Excel:
    • Using VBA scripts to refresh queries failed after upgrading Client to 9.1.0.7 or 9.1.0.8.
    • Using the keyboard shortcuts Ctrl-C and Ctrl-V to copy and paste data from a query to Excel, generated an error similar to “Showcase Query The item, Data.R1C1:R3C1637348, does not match the Query application.”

9.1.0.8 Client Patch (November 19, 2014)

  • When editing the SQL of a Warehouse Builder Definition, the user selects Source\Query Editor and making valid changes to the SQL, clicking OK gives ‘X Encountered an improper argument’.
  • Queries with SQLServer data source are crashing or locking up Showcase Query client when the DBQ was created in a version of Showcase prior to version 8.0 (missing database owner name, which was not required in older versions), or if the Collection/Database name have changed (i.e. from lower case to mixed case).
  • Users open and run multiple queries against JDE data at a time. If they open and run a query, then immediately open another one, they get an error similar to ‘Column <”GLDCT01”> is not found in table’ specifying a UDC column.
  • Java Heap memory error when saving Query results to Excel 8.0 or 12.0 when the result set is very large (in excess of 300,000 rows and 160 columns). This requires setting the Java heap size on the client.

9.1.0.7 Client Patch (July 16, 2014)

  • Support added for SQL Server 2012. See the document, SQL Server Fix for Showcase 9.3 for details.

9.1.0.6 Client Patch (June 17, 2014)

  • Support for Roles added to JD Edwards World A9.3 (requires 9.2.0.1 Server Patch).
  • Query title is truncated to 31 characters when printing. Introduced in 9.1.

9.1.0.5 Client Patch (April 16, 2014)

  • One Showcase registry key value refers to IBM – corrected to remove that name.
  • On Windows7 64-bit PC’s, after printing to XPS or PDF output, Excel may hang when adding Showcase Query references.
  • Date format was incorrect when saving Query results to XLSX.

9.1.0.4 Client Patch (February 11, 2014)

  • JDE OneWorld or EnterpriseOne environments using Showcase with non-iSeries JDE profiles had batch jobs fail with SQL error, ‘Column “ XXXXXX” not in specified tables’.
  • The Warehouse Builder SET fails with a non DB2 datasource (SQL Server) with error, “An error was returned from the SQL CLI procedure SQLConnect. The SQL state is: HY000. The native error code is: 0. The message text is Unknown error attempting to access server SCVD02:43419: null..”
  • Enterprise Server log shows passwords in plain text
  • On Windows7 64-bit the File \ Send Mail option is missing from Query. The code was rewritten so that both Query and Report Writer will check for the presence of MAPI configuration in the Windows registry. If it can’t find that, it looks in the win.ini for MAPI settings. Finding either of these will cause the Send Mail option to be displayed.
  • Support for Windows 8.1 added.

9.1.0.3 Client Patch (December 17, 2013)

  • In version 9.1, every time a BATCHQUERY job is run, a QPRINT output file, with “Error opening debug file” in the text, gets created.
  • Pass the IP address for submitted jobs to the Showcase exit point program.
  • Batch query fails with an error similar to ‘The batch job failed due to a SQL error’. This same query will run fine interactively. The QSQSRVR job log attached shows an error, “Library not found.”

9.1.0.2 Client Patch (November 18, 2013)

  • Windows 8 Support.
  • Passwords in the scserver.log file will be encrypted.

9.1.0.1 Client Patch (August 19, 2013)

  • Improved query performance when running the same query simultaneously over large files (million plus records).
  • Saving query results to Excel with more than one million rows gives error: Excel found unreadable content in ‘file1.xlsx’.
  • DBQs created in 9.0.0.3 for SQLServer datasource which were created without OWNER name, now do not open in 9.1.0.0.
  • Report Writer doesn’t display the number of Most Recently Used (MRU) files that is configured in the Tools \ Options settings. It will not display any more than 4 previously open files regardless of what is configured for the number of files to display.
  • Removed nuisance message when creating Data Views (Server patch 9.1.0.1 required).

Back to Top

 

Titus


Titus Classification Suite for Windows

Version 2021.4 HF1

August 31, 2022

Fixes
  • Entrust S/MIME action does not work properly when opening/sending message previously saved in Drafts

  • Update .config references to allow use of Log4Net 2.0.14 as used by Titus Data Detection Engine 2022.0

Back to Top

Data Classification Reporting Server

Version 2.0

August 5, 2022

New Features
  • Updated Boldon James Reporting Server product name to HelpSystems Data Classification Reporting Server to reflect that multiple product lines can use this product, for example, Boldon James and Titus.

  • Updated Reporting Server user interface to provide a new modern look-and-feel that is consistent with other HelpSystems products.

  • Added support for SQL Server encrypted connections using SSL/TLS Certificates.

Enhancements
  • Added support for .NET Desktop Runtime 6.0 and ASP.Net Core Runtime 6.0-Hosting Bundle.

Illuminate Intelligence Pack

Version 1.0

August 5, 2022

New Feature

The Titus Illuminate Intelligence Pack contains the following dashboards and reports:

  • Illuminate scan overview

  • Illuminate scan detected content

  • Illuminate scan applied classifications

  • Illuminate scan suggested classifications

  • Illuminate scan issues

  • Illuminate summary report

The Illuminate Intelligence pack reports on data stored in the SQL database used by Illuminate 2022.0 The required views and stored procedures are created when the 'Create Database' option is used in the Illuminate 2022.0 installation.

Titus Reporting Collector Intelligence Pack

Version 1.0

August 5, 2022

New Feature

The Titus Reporting Collector Intelligence Pack contains the following dashboards:

  • Overview of Classification Product Usage

  • Downgrade/Upgrade

  • Location of Classified Documents

  • Classification Usage

The Intelligence Pack also comes with a TitusReportingView.sql file that must be added to your database. See the Titus Reporting Collector Intelligence Pack Deployment Guide for more information.