Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Vulnerabilities: CVEs, Hashes, Application Installers Report March 19-26, 2018

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the MetaDefender database during the week of March 19-26, 2018. The second table lists the hashes and application installers for which support was added.

Newly Supported CVEs and Product Versions as of March 26, 2018

PRODUCT VENDOR VERSION CVE CVE DETAILS CVSS SCORE
Python Python Software Foundation 3.6.4 and prior CVE-2017-18207 https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-18207 4.3
Adobe Acrobat Adobe Systems Inc. 17.011.30070 and prior CVE-2018-4897 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-4897 4.3
Adobe Reader Adobe Systems Inc. 18.009.20050 and prior CVE-2018-4897 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-4897 4.3
QEMU QEMU Team NONE and prior CVE-2018-7550 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7550 4.6
Mozilla Firefox Mozilla Corporation 46.0.1 and prior CVE-2016-2819 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-2819 6.8
Mozilla Firefox Mozilla Corporation 44.0.2 and prior CVE-2016-1960 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1960 6.8
Mozilla Firefox Mozilla Corporation 39.0.3 and prior CVE-2015-4473 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4473 10.0
Mozilla Firefox Mozilla Corporation 46.0.1 and prior CVE-2016-2819 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-2819 6.8
Mozilla Firefox Mozilla Corporation 44.0.2 and prior CVE-2016-1960 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1960 6.8
Mozilla Firefox Mozilla Corporation 39.0.3 and prior CVE-2015-4473 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4473 10.0
Thunderbird Mozilla Corporation 38.6.0 and prior CVE-2016-1960 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1960 6.8
Thunderbird Mozilla Corporation 38.6.0 and prior CVE-2016-1960 https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1960 6.8

 

Newly Supported Hashes as of March 26, 2018

HASH CVES
47AEE1BC865751F91DC5A53B245C0567346BEC4A CVE-2015-0836, CVE-2015-0835, CVE-2015-0834, CVE-2015-0833, CVE-2015-0832, ...
7A4826C535E9D8ABF47A964B0C43ED3D0D66BD31 CVE-2018-0862, CVE-2018-0853, CVE-2018-0852, CVE-2018-0851, CVE-2018-0850, ...
8DAF5E491193A73AA89C999085758739FDB3CDD2 CVE-2015-2503
532181B0DE7A0BFC1E434BD1BD8D211285B51771 CVE-2017-8743, CVE-2017-8742, CVE-2016-0012, CVE-2015-2503
9F3A2457BBC1E963E8E5AF5DA7E5F5A7EC4C713D CVE-2016-3315, CVE-2015-2503
D9D1C5DA55D2CB0CC0E95932CBF556B6D851FDEF CVE-2016-3364, CVE-2016-3235, CVE-2016-0012, CVE-2015-2503
5D438614D19B715DBD94984F63AD6C9A4CDAC580 CVE-2018-0796, CVE-2017-8632, CVE-2017-8631, CVE-2017-8510, CVE-2017-8502, ...
0D3EE05EC91023F661531F60954E44199243C275 CVE-2018-0796, CVE-2017-8632, CVE-2017-8502, CVE-2017-8501, CVE-2017-0194, ...
F75C794AA4C672F92657C0CD86338053699C485C CVE-2018-0796, CVE-2017-8632, CVE-2017-8631, CVE-2017-8502, CVE-2017-8501, ...
E49ABC0B24E69426C407ABED6DB85766F3D9BB51 CVE-2018-0862, CVE-2018-0849, CVE-2018-0848, CVE-2018-0845, CVE-2018-0812, ...
DE289C89BF2D12179E6326C43DA269BCB2DCA1CC CVE-2018-0862, CVE-2018-0849, CVE-2018-0848, CVE-2018-0845, CVE-2018-0812, ...
797CC20985B56162ABD804AB272F8FAE7B1D3DCA CVE-2017-7160, CVE-2017-13870, CVE-2017-13866, CVE-2017-13864, CVE-2017-13856, ...
52EB8317B06987BCA69BFF7D0169A0C926E1D4E6 CVE-2017-7160, CVE-2017-13870, CVE-2017-13866, CVE-2017-13864, CVE-2017-13856, ...
3657F846BC85359A7BAA6C214855316B9386586A CVE-2014-1684
C97BD3370F80A6C71CC4F98976EDA11BB4A11E7B CVE-2014-1684
B68819745B30322420A715CD6CE930159C0245B6 CVE-2014-1684
07414421B7B011E8F7BECD4ABDBB7FF01C27B8EF CVE-2014-1684
B6D5200E40A97EF6EE179F17701EB5A7D04B5E77 CVE-2014-1684
76B528FA4B930C87DF626D0433683FA286C4BD44 CVE-2014-1684
E744FB16C7729959829ED55FEAF142E639B01FEB CVE-2014-1684
5C95FA981419D0C49C93065973F84FE28B8448C5 CVE-2014-1684
393F15CF8282853CA3FD08053AF18F84B764CCDD CVE-2014-1684
150905EDFE3CB7659278FDFCDA417A9E7C69E3DC CVE-2014-1684
112F760F37C7FC282B42F20563137FB5EDAFD446 CVE-2014-1684
ACA4BEAFF77BB907BA59C35D7B31902B965438A7 CVE-2014-1684
18704071A506AD675F78BC095BD4F1454FF7FC78 CVE-2014-1684
BC4E8DE77BE750A3D9D606FBB38F69B6F1342E4B CVE-2014-1684
04E34D659CEF8BE2266BEBFD6BACC6B8A372C2D5 CVE-2014-1684
5447539B2A177D41EA16E7F8200934DE03B1F4FD CVE-2014-1684
078CFEA9BFE505E6013AFC93D4A92244D1280D69 CVE-2014-1684
0D938FEF501BC1F38CCA07749CF3069C029ADBF0 CVE-2014-1684
1F7B62F7F5E8F8FC274FDC878C72846D90136974 CVE-2014-1684
0D49FE78AD467D60CEAC46AB524D07D5C21A4A9D CVE-2014-1684
397A2A2CDC90FC2BEAD84B8020A21A92F61CC143 CVE-2014-1684
BF8F6C28EB84942655DA3899ADAF3B3FCF593C22 CVE-2014-1684
D68429D30803CAB1923E4740CA35F03878451FFE CVE-2014-1684
63476F2F3317E2C0A2FB88456B1090ED22A63C44 CVE-2014-1684
8581FA8243A822C5149EFF4BCB818AFD88693164 CVE-2014-1684
3952E9352FD0F4BCFD7723D47B4F94F01A29FD0B CVE-2014-1684
F0F560F508063B9FFB1BC8E91170558853980ADD CVE-2014-1684
CA4CFDB56CD9CA63BAE57ACA50D0D6DE1B0892A8 CVE-2014-1684
505114CE38BA21E841DDD7E2E42DE697CE7FCF69 CVE-2014-1684
0475868B05680BB869EBD4E7BB50A94131E2C210 CVE-2014-1684
85085F3F6D9B248DE4EC3CCFEE990003601A8434 CVE-2014-1684
9DBFDF08B602F30C8F6208B417CF7E1D2FE05BF7 CVE-2014-1684
CFDE771F093AF93D5D4CA926675DE1636F5AD63D CVE-2014-1684
09AE4452659EDBEB8C93A5EE8235FD0777AC20BC CVE-2014-1684
7ECA367D4B5775DCE55C36A653C6463D5D84E0AD CVE-2014-1684
50FD09122DCB7F365E3917B35C838C4547E9C7A0 CVE-2014-1684

Download Full List

Vulnerability Engine
CVEs
Vulnerabilities
Vulnerabilities
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i5' : ' ▴'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse', 'sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i =0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0] 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) "); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i


This post first appeared on OPSWAT, please read the originial post: here

Share the post

Vulnerabilities: CVEs, Hashes, Application Installers Report March 19-26, 2018

×

Subscribe to Opswat

Get updates delivered right to your inbox!

Thank you for your subscription

×