Categories

  • Announcements regarding the VulnDetect project

    14 Topics
    123 Posts
    T
    Version 3.4.0.0 is the latest Stable release. It can be downloaded from here: https://vulndetect.com/dl/agents/secteerSetup-3.4.0.0.exe https://vulndetect.com/dl/agents/secteerSetup-3.4.0.0.msi
  • Post requests for apps that are missing

    352 Topics
    2k Posts
    OLLI_SO
    Meantime Versions 2.18.4 and 2.18.5 were released. Here the version info of 2.18.5: File name and path: C:\Users\olive\AppData\Local\Programs\PLITCH\PLITCH.exe Product Name: PLITCH Internal Name: PLITCH.dll Original Filename: PLITCH.dll File Description: PLITCH Company: PLITCH Legal Copyright: Legal Trademarks: Comments: File Version String: 2.18.5.0 File Version: 2.18.5.0 Product Version String: 2.18.5+d5d023cac37e6398062fb9016f8cfbebd4401c07 Product Version: 2.18.5.0
  • Post requests for apps that you wish to see updated automatically

    23 Topics
    38 Posts
    T
    The release notes are out: https://www.adobe.com/devnet-docs/acrobatetk/tools/ReleaseNotesDC/continuous/dccontinuoussept2025qfe.html#dccontinuoussepttwentytwentyfiveqfe This is the official fix for the printing issue: 4529876: Data loss in printing PDF on Reader and Acrobat The packages for Acrobat/Reader in VulnDetect and PatchPro was released earlier this morning.
  • Announcements regarding the VulnDetect project

    57 Topics
    57 Posts
    rnzR
    With the new custom patch functionality it is possible to update your Adobe Creative Cloud suite. <content>
  • Detection errors and issues should be posted here

    451 Topics
    2k Posts
    G
    @OLLI_S -> solved 3.0.23 is now the official version
  • Detection errors and issues should be posted here

    45 Topics
    149 Posts
    G
    @Tom : Nvidia app and its former (unsafe) versions are now reported in one bundle. Unsafe 7zip version which is bundled with this soft is still not reported with Nvidia app bundle but separately.
  • This category will be used to keep track of user contributed suggestions

    143 Topics
    472 Posts
    OLLI_SO
    I am using the CSV export on a daily base, it is really very useful. But sone things should really be improved. Recommended Version For some tools (like “MiTeC Icon Explorer") the recommended version (5.2.0) is older, than the installed version (5.3.0). In the list of applications you do not show a recommended version. In my CSV export I have 15 applications, where the recommended version is different, but only for 3 entries the recommended version is newer. Therefore, the recommended version should not be exported, when it is older or equal to the installed version. Export Tool Collections All tools from "Sysinternals" are bundled as "Sysinternals Suite". The whole suite including all apps is not exported. You should export the package headline ("Sysinternals Suite") and also all included tools. I do not know if it causes trouble when the package headline ("Sysinternals Suite") has an empty column "File". Identical naming for Apps in Tool Collections All tools from Sysinternals begin with the text "Sysinternals" (like "Sysinternals DebugView" or "Sysinternals Process Explorer") what is great, when you sort the exported CSV. Also all tools from MiTeC begin with the text "MiTeC". But only some tools from NirSoft begin with the text "NirSoft" and none of the tools from Nenad Hrg begin with "Nenad Hrg". Export status "Patch" and "Update" In the UAT instance you show the status "Patch" and "Update". This status is not yet exported, but it is really very helpful! Please consider these suggestions for the CSV export.
  • This category will be used to keep track of bugs reported by users

    48 Topics
    284 Posts
    OLLI_SO
    @GregAlexandre OK, then I mark this issue as solved.
  • Feel free to discuss what was good or bad in Secunia PSI and what you expect from VulnDetect

    19 Topics
    71 Posts
    T
    The reported Notepad++ supply-chain incident, as described in public reporting, was limited to the application’s built-in auto-update mechanism. SecTeer VulnDetect does not use or depend on the Notepad++ auto-updater. All Notepad++ packages distributed through SecTeer are downloaded directly from the official vendor source and processed through SecTeer’s own validation pipeline. This includes: Verification of the Authenticode signature where the vendor provides signed binaries Malware scanning using Microsoft Defender Additional reputation-based checks as a supplementary control SecTeer packages are released independently of the vendor’s auto-update channel and are not delivered through the update mechanism involved in the reported incident. As a result, SecTeer did not distribute compromised code, and SecTeer’s distribution infrastructure was not impacted. A system could only have received the compromised update if the built-in Notepad++ auto-update feature was enabled on the system In short: SecTeer’s update mechanism was not involved in the incident, and no compromised Notepad++ packages were delivered through the SecTeer platform.