June 15 Catalog Update #20250614 - Easy2Patch
New Products
Last updated
New Products
Last updated
Our catalog with #20250615 (Catalog version 3.4.364 ) is available to our Easy2Patch customers.
This week, 8 new software updates are provided in the E2P catalog. We support 495 products of 300 individual manufacturers in total. We are updating 657 products with 32/64-bit and language options.
Note: VirusTotal and Kaspersky Opentip scans are the responsibility of the manufacturer. E2P Bilisim has no responsibility or liability for the virus scanning results of the files.
JetBrains
DataGrip 2025.1.3
JetBrains
IntelliJ IDEA CE 25.2.0 EAP 4
JetBrains
IntelliJ IDEA UE 25.2.0 EAP 4
JetBrains
PyCharm 2025.1.2 CE RC 2
JetBrains
PyCharm 2025.1.2 RC 2
KNIME AG
KNIME Analytics Platform 5.4.4
PDFgear
PDFgear 2.1.12
Santesoft
Sante DICOM Viewer Pro 14.2.3
More Info:
Support Info:
VirusTotal:
Kaspersky:
DataGrip 2025.1.3 (251.26094.87 build) Release Notes Data Editor/Viewer Bug DBE-22433 Unable to input alternative forms of PostgreSQL UUID type in Data Editor(grid) Query Console Bug DBE-23278 Run SQL script fails with "Read access is allowed from inside read-action" exception Items mentioned here 2 DBE-22433 Unable to input alternative forms of PostgreSQL UUID type in Data Editor(grid) DBE-23278 Run SQL script fails with "Read access is allowed from inside read-action" exception
IntelliJ IDEA 2025.2 EAP 4 (252.19874.12 build) Release Notes Build. Maven Bug IDEA-368896 Maven run configuration doesn't respect the Run target Bug IDEA-371537 Cannot build artifact because of circular dependency between .main and .test:war exploded artifacts Frameworks. FlyWay Bug IDEA-372503 Oracle-Flyway and liquibase Migration [no changes detected] with , schema = "schema_name"
IntelliJ IDEA 2025.2 EAP 4 (252.19874.12 build) Release Notes Build. Maven Bug IDEA-368896 Maven run configuration doesn't respect the Run target Bug IDEA-371537 Cannot build artifact because of circular dependency between .main and .test:war exploded artifacts Frameworks. FlyWay Bug IDEA-372503 Oracle-Flyway and liquibase Migration [no changes detected] with , schema = "schema_name"
Smarter data work starts with AI you can trust Empower users with an AI agent (K-AI) that collaborates on and builds analytical workflows. Workflows serve as a transparent, documented summary of every action performed on data to give your users trust in AI’s work.
Version 2.1.12 January 10, 2025 Fixed several bugs to enhance overall stability. Version 2.1.11 December 30, 2024 Resolved launch issues on specific operating systems. Fixed multiple bugs to improve overall stability.
PyCharm 2025.1.2 RC 2 (251.26094.114 build) Release Notes AI Assistant Bug PY-80672 Jupyter: Freeze UI if click add AI cells on big 500+ cells Code Insight Bug PY-70855 support type matching ParamSpeced Protocols - FastAPI/starlette Middleware Bug PY-80728 documentation for collections.abc.Mapping (et al) says it's from typing Bug PY-80775 paramspec in a Protocol doesn't match Feature PY-77223 Suggest stubs packages
PyCharm 2025.1.2 RC 2 (251.26094.114 build) Release Notes AI Assistant Bug PY-80672 Jupyter: Freeze UI if click add AI cells on big 500+ cells Code Insight Bug PY-70855 support type matching ParamSpeced Protocols - FastAPI/starlette Middleware Bug PY-80728 documentation for collections.abc.Mapping (et al) says it's from typing Bug PY-80775 paramspec in a Protocol doesn't match Feature PY-77223 Suggest stubs packages
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process.
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky:
More Info:
Support Info:
VirusTotal:
Kaspersky: