Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of January 22 - January 29, 2018. The second table lists the hashes and application installers for which support was added.

Newly Supported CVEs and Product Versions as of January 29, 2018

PRODUCT VENDOR VERSION CVE CVE DETAILS CVSS SCORE
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0797 https://nvd.nist.gov/vuln/detail/CVE-2018-0797 9.3
Microsoft Word Microsoft Corporation 15 and prior CVE-2018-0795 https://nvd.nist.gov/vuln/detail/CVE-2018-0795 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0794 https://nvd.nist.gov/vuln/detail/CVE-2018-0794 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0793 https://nvd.nist.gov/vuln/detail/CVE-2018-0793 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0792 https://nvd.nist.gov/vuln/detail/CVE-2018-0792 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0802 https://nvd.nist.gov/vuln/detail/CVE-2018-0802 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0801 https://nvd.nist.gov/vuln/detail/CVE-2018-0801 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0798 https://nvd.nist.gov/vuln/detail/CVE-2018-0798 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0804 https://nvd.nist.gov/vuln/detail/CVE-2018-0804 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0805 https://nvd.nist.gov/vuln/detail/CVE-2018-0805 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0806 https://nvd.nist.gov/vuln/detail/CVE-2018-0806 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0807 https://nvd.nist.gov/vuln/detail/CVE-2018-0807 9.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0812 https://nvd.nist.gov/vuln/detail/CVE-2018-0812 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0797 https://nvd.nist.gov/vuln/detail/CVE-2018-0797 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0796 https://nvd.nist.gov/vuln/detail/CVE-2018-0796 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0795 https://nvd.nist.gov/vuln/detail/CVE-2018-0795 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0794 https://nvd.nist.gov/vuln/detail/CVE-2018-0794 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0793 https://nvd.nist.gov/vuln/detail/CVE-2018-0793 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0792 https://nvd.nist.gov/vuln/detail/CVE-2018-0792 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0791 https://nvd.nist.gov/vuln/detail/CVE-2018-0791 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0802 https://nvd.nist.gov/vuln/detail/CVE-2018-0802 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0801 https://nvd.nist.gov/vuln/detail/CVE-2018-0801 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0798 https://nvd.nist.gov/vuln/detail/CVE-2018-0798 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0804 https://nvd.nist.gov/vuln/detail/CVE-2018-0804 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0805 https://nvd.nist.gov/vuln/detail/CVE-2018-0805 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0806 https://nvd.nist.gov/vuln/detail/CVE-2018-0806 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0807 https://nvd.nist.gov/vuln/detail/CVE-2018-0807 9.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0812 https://nvd.nist.gov/vuln/detail/CVE-2018-0812 9.3
Microsoft Excel Microsoft Corporation 16 and prior CVE-2018-0796 https://nvd.nist.gov/vuln/detail/CVE-2018-0796 9.3
Microsoft Outlook Microsoft Corporation 16 and prior CVE-2018-0791 https://nvd.nist.gov/vuln/detail/CVE-2018-0791 9.3
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2698 https://nvd.nist.gov/vuln/detail/CVE-2018-2698 4.1
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2688 https://nvd.nist.gov/vuln/detail/CVE-2018-2688 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2687 https://nvd.nist.gov/vuln/detail/CVE-2018-2687 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2686 https://nvd.nist.gov/vuln/detail/CVE-2018-2686 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2685 https://nvd.nist.gov/vuln/detail/CVE-2018-2685 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2676 https://nvd.nist.gov/vuln/detail/CVE-2018-2676 4.3
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2689 https://nvd.nist.gov/vuln/detail/CVE-2018-2689 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2690 https://nvd.nist.gov/vuln/detail/CVE-2018-2690 4.4
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2693 https://nvd.nist.gov/vuln/detail/CVE-2018-2693 4.1
Oracle VM VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2694 https://nvd.nist.gov/vuln/detail/CVE-2018-2694 4.1
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2698 https://nvd.nist.gov/vuln/detail/CVE-2018-2698 4.1
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2688 https://nvd.nist.gov/vuln/detail/CVE-2018-2688 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2687 https://nvd.nist.gov/vuln/detail/CVE-2018-2687 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2686 https://nvd.nist.gov/vuln/detail/CVE-2018-2686 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2685 https://nvd.nist.gov/vuln/detail/CVE-2018-2685 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2676 https://nvd.nist.gov/vuln/detail/CVE-2018-2676 4.3
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2689 https://nvd.nist.gov/vuln/detail/CVE-2018-2689 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2690 https://nvd.nist.gov/vuln/detail/CVE-2018-2690 4.4
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2693 https://nvd.nist.gov/vuln/detail/CVE-2018-2693 4.1
VirtualBox Oracle Corporation 5.1.18 and prior CVE-2018-2694 https://nvd.nist.gov/vuln/detail/CVE-2018-2694 4.1

Download all

Newly Supported Hashes as of January 29, 2018

HASH CVES
FDDE679EAF8108BD0F04E23F1AD53235A02489C4 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
C6D74392F03406113604388760E35D1BD9939463 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
2BF2F08939BB2D5E0D81EAAEBB2A0F7907C30CD5 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
7281C360D3A0E89CD386CE4123F83514A44F5D34 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
E2E7070E133024270E7B1BBD591DF9653BF406C2 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
9213DD40AD7B5F000F5C92376AAC0D5962412002 CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
4853A61D704D13088535395CF9F8C3ECF5320C2C CVE-2017-9806, CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524, ...
B923F13090F321BA1E05A276F647CCB3077A1AF3 CVE-2015-6184, CVE-2015-6161, CVE-2015-6154, CVE-2015-6151, CVE-2015-6150, ...
9626AF0B33E5225DBD28FD4265B53AB6A4DCE99A CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
D10DEAD9262048BF16E6765B76B65CF6432596C1 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
2332C0BBF12C6541B0EC6D1C8FF34A3714F5AA36 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
FEFDBBA6C808FADFBC0BF4D041AA211D2D62F090 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
69B7B2A2D3576E7C3D75BD95683ABD8644755334 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
1615040F455176CD84C407F2D918718470207C83 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
4A09FE2AC469FE263B6FA3066CF6209E4D3FB813 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
BBE3C90B6ADE2F22552B9DE6F23647D87298D8E8 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
0539B67D23E837FD145419E53B29EB330463702B CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
BE34FC61BBC1695AAD3640F1D1B3DC8E11A43591 CVE-2016-3364, CVE-2016-3235, CVE-2016-0012, CVE-2015-2503
93A8B08CF01176D599F94335C492CA7CFFE9BF17 CVE-2010-4370
1C18B40E2FB97008352B93233451A747F4B72276 CVE-2017-8310, CVE-2017-10699, CVE-2016-5108
5C525D83B9431E78102634336C7B0C71C33393F9 CVE-2017-8310, CVE-2017-10699, CVE-2016-5108
0DA0D583724CE80E1FBCDB922F755EC3A12413E7 CVE-2017-8310, CVE-2017-10699, CVE-2016-5108
CE08FCB16B14F0EE83C03AD968E653F42990F4AB CVE-2017-8310, CVE-2017-10699, CVE-2016-5108
B09E192F91D69ED811A580C750390C7EC4D3ED00 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
B66408190EEF86A5F7EE18A0F589FED92C596426 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
34928ACA73A2848D8A866CC7937311589F19E774 CVE-2018-0802, CVE-2018-0801, CVE-2018-0798
743719DB632F46655921275F4A3642724C30788B CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
F65E254A2765A06AA82F3BCA309850BCEBB21458 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
1C6126F47979C0C56A7F848988163E6A52210EC7 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
64BBC214C60F5A03A91E1C72A2E59AAF38233A25 CVE-2011-3560, CVE-2011-3558, CVE-2011-3557, CVE-2011-3556, CVE-2011-3554, ...
F9F4DD4E647C5ED7D65BCB960506A656F63F4D19 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
D4D284C7EC63E446534755198AC79527B30273BE CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
35A821BB68C76FEF00F2C6607448094940954022 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
AEC6A8CCC7AB08C58720497005548611B145DA73 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
A1D964E6A4BE9082F35DE78BF4F566DCDD40DF6A CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
3AD77BE5E3CE0286F91225A9CE3F0ABDD32365F1 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
95E51E7FB748760B10178B76E42790F400FDF9F3 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
8B4C4CA1FF2CE91A22381C49ED13893A787AE30F CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
A8210D1E33CA1D72593C931ECDB31FA0F033C1EF CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
AF8C20779A7F799FAC023AFEF068F0C28F7C332A CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
1ACE82CC8EFE404735F0BD7C405C4910436BD7A8 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
72A13C7A33C9262CC60037AEAF120F54A21CDEB6 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
7164A6A007BF8EDE56A76E5EE6A0D2056F7F5CE1 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
01C35098F1E1404FEF45FB2B49F520403D1CC23B CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
9F6563AB27560E59CBB87FC8CEB688624C25E990 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
55C9110FEF9AAE6C50FB247A46C500E4E26CEF45 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
61700CA6E835B93E221EADE81FCF445664C46B75 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
536E628621E8EF7F0288074FCF5CDB2A98E853CA CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...
72430CB10D89D26860DCCCAE5CD8DBB045376870 CVE-2012-1725, CVE-2012-1724, CVE-2012-1719, CVE-2012-1716, CVE-2012-0551, ...

Download all

Vulnerability Engine
CVEs
Vulnerabilities
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i5' : ' ▴'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse', 'sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i =0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0] 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) "); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i


This post first appeared on OPSWAT, please read the originial post: here

Share the post

Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018

×

Subscribe to Opswat

Get updates delivered right to your inbox!

Thank you for your subscription

×