Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Vulnerabilities: CVEs, Hashes, Application Installers Report January 29-Febuary 5, 2018

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of January 29 - Febuary 5, 2018. The second table lists the hashes and application installers for which support was added.

Newly Supported CVEs and Product Versions as of Febuary 5, 2018

PRODUCT VENDOR VERSION CVE CVE DETAILS CVSS SCORE
Wireshark The Wireshark developer community 2.2.6 and prior CVE-2018-5334 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-5334 4.3
Wireshark The Wireshark developer community 2.2.6 and prior CVE-2018-5335 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-5335 4.3
Wireshark The Wireshark developer community 2.2.6 and prior CVE-2018-5336 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-5336 4.3
Wireshark The Wireshark developer community 2.4.2 and prior CVE-2017-17084 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-17084 5.0
Wireshark The Wireshark developer community 2.4.2 and prior CVE-2017-17085 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-17085 5.0
Wireshark The Wireshark developer community 2.4.2 and prior CVE-2017-17083 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-17083 5.0
Wireshark The Wireshark developer community 2.2.7 and prior CVE-2017-11408 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-11408 5.0
Open Office Apache Software Foundation 4.1.2 and prior CVE-2017-12607 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-12607 6.8
Open Office Apache Software Foundation 4.1.2 and prior CVE-2017-12608 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-12608 6.8
Java Oracle Corporation 9.0.00 and prior CVE-2017-10388 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10388 5.1
Java Oracle Corporation 9.0.00 and prior CVE-2017-10349 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10349 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10350 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10350 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10355 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10355 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10356 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10356 2.1
Java Oracle Corporation 9.0.00 and prior CVE-2017-10357 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10357 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10346 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10346 6.8
Java Oracle Corporation 9.0.00 and prior CVE-2017-10347 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10347 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10348 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10348 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10274 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10274 4.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10281 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10281 5.0
Java Oracle Corporation 9.0.00 and prior CVE-2017-10285 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10285 6.8
Java Oracle Corporation 9.0.00 and prior CVE-2017-10295 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10295 4.3
Java Oracle Corporation 9.0.00 and prior CVE-2017-10345 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-10345 2.6
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2677 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2677 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2663 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2663 4.3
Java Oracle Corporation 7.0.1610 and prior CVE-2018-2657 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2657 5.0
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2639 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2639 6.8
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2638 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2638 5.1
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2637 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2637 5.8
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2634 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2634 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2633 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2633 5.1
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2629 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2629 2.6
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2627 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2627 3.7
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2618 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2618 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2603 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2603 5.0
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2641 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2641 2.6
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2678 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2678 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2581 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2581 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2582 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2582 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2579 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2579 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2588 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2588 4.0
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2599 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2599 5.8
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2602 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2602 3.7
Python Python Software Foundation 2.7.13 and prior CVE-2017-1000158 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-1000158 7.5
Adobe Reader Adobe Systems Inc. 11.0.15 and prior CVE-2016-1051 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1051 10.0
Adobe Acrobat Adobe Systems Inc. 15.010.20060 and prior CVE-2016-1051 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1051 10.0
Google Chrome Google Inc. 9.0.600.0 and prior CVE-2015-1290 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-1290 9.3
Google Chrome Google Inc. 56.0.2924 and prior CVE-2017-1000460 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-1000460 4.3
Google Chrome Google Inc. 40.0.2214.85 and prior CVE-2014-9654 https://metadefender.opswat.com/vulnerabilities#!/CVE-2014-9654 7.5
Google Chrome Google Inc. 9.0.600.0 and prior CVE-2015-1290 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-1290 9.3

Download full list

Newly Supported Hashes as of Febuary 5, 2018

HASH CVES
C505D62F3CD9597AE646DB2185096C7E34F93F14 CVE-2018-0819
B9341BC8A76C6204D6D16B4D8A738F8428EF9980 CVE-2018-0819
E5A1CD0125D7A49DB9599EBC75002188BDAA39B6 CVE-2018-0819
1BDE6D0EAA8AC2CAA784368018ED464D33DD79A8 CVE-2018-0819
1E8876ED04C21A05D334BE59A670E17EF29E11FD CVE-2018-0819
826BA3F0A30AAFDBA5DD6391A8FBE3B7F5BCF78E CVE-2018-0819
5BC22BBA4A7D74A9BF49825998E98A6A3EF801C6 CVE-2018-0819
8B7A3D57CE5B280B0A1ACE45178D8BA43893BC36 CVE-2018-0819
5CC797100E05C89A9DBC350DF4CC9FF4B26E4F88 CVE-2018-0819
CBF9811F2DC707E37AFACA794B4799E1D255FC47 CVE-2018-0819
835AB32C981DFBFF063514561E0C005CFD95C4BF CVE-2018-0819
94B4EC168E5D75B2D5BE44F11AD1EFC5F938E58F CVE-2018-0819
0E5F3681F9B46A6C469223802B51819665B78CA9 CVE-2018-0819
605387C44EACD0AB71560469011C43273E925484 CVE-2018-0819
2ABE7EA9368150F08DE19FD7007A606BAC62AE37 CVE-2018-0819
E4714D7ED0661C76C3B7FDC2A1F9DDB4CEE2BCBD CVE-2018-0819
86E9AA4557F613F304E8FE76D9D2426E9F545F8C CVE-2018-0819
55878A4A366233ACBF3E1789C8DB46AF22254ABA CVE-2018-0819
31243C00A55A2EC2537589F3DDD62AF8AFB19C20 CVE-2015-2503
A5A33E321EA52E6E35392EB5113D4E8070EA4397 CVE-2015-2503
8100DD547B3D2998BB9E7C4890C780BD301F5C61 CVE-2017-8743, CVE-2017-8742, CVE-2016-0012, CVE-2015-2503
FC26CE3E84A8F106DA60CD2A4DDC82EA18CFBCB6 CVE-2017-8743, CVE-2017-8742, CVE-2016-0012, CVE-2015-2503
3EB1427DE0BE4471BD20D3F81C86AEE462C1EBEC CVE-2016-3315, CVE-2015-2503
3DF141CC42A87F0F3AE7BA227F2980B4676ED5AF CVE-2016-3315, CVE-2015-2503
3522008B7B54E8AFC8585043CA6CDF5E1F1FF5E5 CVE-2016-3364, CVE-2016-3235, CVE-2016-0012, CVE-2015-2503
B695A97A5E7EE75B2897BC9977EC601EDFEED5E0 CVE-2018-0796, CVE-2017-8632, CVE-2017-8631, CVE-2017-8502, CVE-2017-8501, ...
1D325C9039F107DFFE42707C9CF466669BE1C9FD CVE-2018-0796, CVE-2017-8632, CVE-2017-8631, CVE-2017-8502, CVE-2017-8501, ...
298C12907148592A624A0CDB42F52337E1522E2D CVE-2018-0812, CVE-2018-0807, CVE-2018-0806, CVE-2018-0805, CVE-2018-0804, ...
EB5C8197B139622FE8A55B128989D348A204AF94 CVE-2018-0812, CVE-2018-0807, CVE-2018-0806, CVE-2018-0805, CVE-2018-0804, ...
EF7637A3F86561F003D2288562C27356408D94D8 CVE-2018-0772, CVE-2018-0762, CVE-2017-8750, CVE-2017-8749, CVE-2017-8747, ...
05652A12A44DC2F33DB35AC385E31EE4ED4EB11D CVE-2018-0791, CVE-2017-8663, CVE-2017-8572, CVE-2017-8571, CVE-2017-8545, ...
794E356F4BFE96E7F8D9EB6D12054BBDCC6A7404 CVE-2018-0791, CVE-2017-8663, CVE-2017-8572, CVE-2017-8571, CVE-2017-8545, ...
99F2CB8EC8E66380834DB22BED4D5EB8C2043775 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
743719DB632F46655921275F4A3642724C30788B CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
F65E254A2765A06AA82F3BCA309850BCEBB21458 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
1C6126F47979C0C56A7F848988163E6A52210EC7 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
78178C9E78F69E20E2C675C7DF5C818B33CE78FF CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
60BD3272327E41E95FBCFB0D2825112920BFA112 CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
10B0945A55A43A087E7F3564469C358D92D197EA CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
A35A94A1473128465BEE43F5C024A4152693D210 CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
B992B19B82DF42D9BA21C4F2019EF70CB97A0F1F CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
470F2F413DADABB3B6B28AA29E3F28B6A33456CD CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
0E481C8E96FC88DBE6882BEC3F4F3B4B1BE2055A CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
53B3641689B9F32DD6FD2BADC4780D2D78BE63CD CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
08655485548ABEACD46D0D6FE97536FB2471B4B2 CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
13F1C7D8A3D1E8A07EAE4693DAC8EFCC81416FB4 CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
A650D39C2E744C4DC1B3AB81C57B88BF2DB20FF3 CVE-2013-5852, CVE-2013-5850, CVE-2013-5849, CVE-2013-5843, CVE-2013-5842, ...
89EDF2CAB2BA32BE58789398B9BC13F82E7752C9 CVE-2018-0791
4AC4AC1C516299563D86F2E100590DAF80EB3550 CVE-2018-0791

Download full list

CVEs
Vulnerability Engine
Vulnerabilities
JS: 
var stIsIE = /*@[email protected]*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i5' : ' ▴'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse', 'sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i =0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0] 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) "); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i


This post first appeared on OPSWAT, please read the originial post: here

Share the post

Vulnerabilities: CVEs, Hashes, Application Installers Report January 29-Febuary 5, 2018

×

Subscribe to Opswat

Get updates delivered right to your inbox!

Thank you for your subscription

×