Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Vulnerabilities: CVEs, Hashes, Application Installers Report March 26 - April 11, 2018

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that are sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the MetaDefender database during the week of March 26 - April 11, 2018. The second table lists the hashes and application installers for which support was added.

Newly Supported CVEs and Product Versions as of April 11, 2018

PRODUCT VENDOR VERSION CVE CVE DETAILS CVSS SCORE
Clamav ClamWin Pty Ltd 0.99.3 and prior CVE-2018-1000085 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000085 4.3
Freeplane Freeplane 1.5.9 and prior CVE-2018-1000069 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000069 4.3
Microsoft Word Microsoft Corporation 16 and prior CVE-2018-0919 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0919 4.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0919 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0919 4.3
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0903 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0903 6.8
Microsoft Office Microsoft Corporation 16 and prior CVE-2018-0907 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0907 6.8
Internet Explorer Microsoft Corporation 9 and prior CVE-2018-0935 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0935 7.6
Internet Explorer Microsoft Corporation 9 and prior CVE-2018-0889 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0889 7.6
Internet Explorer Microsoft Corporation 11 and prior CVE-2018-0932 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0932 4.3
Internet Explorer Microsoft Corporation 9 and prior CVE-2018-0929 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0929 4.3
Internet Explorer Microsoft Corporation 11 and prior CVE-2018-0927 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0927 4.3
Internet Explorer Microsoft Corporation 9 and prior CVE-2018-0891 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0891 4.3
Internet Explorer Microsoft Corporation 11 and prior CVE-2018-0942 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0942 2.1
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2641 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2641 2.6
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2663 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2663 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2678 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2678 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2677 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2677 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2637 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2637 5.8
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2603 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2603 5.0
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2633 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2633 5.1
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2588 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2588 4.0
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2629 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2629 2.6
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2602 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2602 3.7
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2618 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2618 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2634 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2634 4.3
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2599 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2599 5.8
Java Oracle Corporation 9.0.01.0 and prior CVE-2018-2579 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2579 4.3
Microsoft Edge Microsoft Corporation NONE and prior CVE-2018-0876 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0876 7.6
Microsoft Edge Microsoft Corporation NONE and prior CVE-2018-0879 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0879 5.0
Microsoft Excel Microsoft Corporation 16 and prior CVE-2018-0907 https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-0907 6.8
Opera Opera Software NONE and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Google Chrome Google Inc. NONE and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Mozilla Firefox Mozilla Corporation 39.0 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
SeaMonkey Mozilla Corporation 2.35 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
SeaMonkey Mozilla Corporation 2.35 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Opera Opera Software NONE and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Google Chrome Google Inc. NONE and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Mozilla Firefox Mozilla Corporation 39.0 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Thunderbird Mozilla Corporation 38.1 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3
Thunderbird Mozilla Corporation 38.1 and prior CVE-2015-4000 https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-4000 4.3

Newly Supported Hashes as of April 11, 2018

HASH CVES
9E585DB0B5A3DCBAF84EE5788FFD38B5EE8528E4 CVE-2017-9805
FE3DA3277991FD10D4B913283B3260A150BBA5AC CVE-2017-16420, CVE-2017-16419, CVE-2017-16418, CVE-2017-16417, CVE-2017-16416, ...
42980197C0D1E9A4F9512738F16CDECB9CD011AF CVE-2017-16420, CVE-2017-16419, CVE-2017-16418, CVE-2017-16417, CVE-2017-16416, ...
644931990466F6D6FD1EC76AF0513778893BA608 CVE-2018-0919
9A0BFAA152F8AD903D5EF7BD50AA51509941C630 CVE-2018-0919
B18228581174D15F14AB6D0DFDB00492F938A38F CVE-2018-0919
A3A19A4AB4EB4848F451F0A4381C90EA749DDC81 CVE-2018-0919
99F2CB8EC8E66380834DB22BED4D5EB8C2043775 CVE-2015-8104, CVE-2015-5307, CVE-2015-4896, CVE-2015-4856, CVE-2015-4813, ...
81F158954A21AC74035A38071A348C4AF23553A2 CVE-2017-12608, CVE-2017-12607, CVE-2014-3575, CVE-2014-3524
6D4450958F913B2C80A10DB576B533B82FF94B61 CVE-2017-13088, CVE-2017-13087, CVE-2017-13086, CVE-2017-13084, CVE-2017-13083, ...
B5FA7E16246F5FEC4F43B7903FD00BAFC3A290EF CVE-2017-5754, CVE-2017-5753
C941C472D60987E6057B96DEDCC81EA6F71BA84B CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
4D85A406F84F24D0D87DF2B2744E06ABC9E73652 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
56E66F4050E85F04634FBAFD92936F325DD363B8 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
36B0F37020D18F31B2912AC470C499DC83E15C5B CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
97A789E72D5255A3F286DD3E5C22FA917FF9D1C7 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
5F49FC4E0BA54BA88A354A97D42132E3943B9308 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
5991F660DA84B3FE2DE9ABB83118FD83F74A0EDA CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
51ECF2F24AEC50CD970BC75308226712DD92306D CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
C90FB94DAED87300EAF7A26C4C63A891195B47AC CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
F9E6A26D190477DA6F1DAD640E715883ABBD9990 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
295EB9FA321CA008428BACB28D6730560AE05827 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
49F5EBB26A95160FFAD41D3811C07D18D4A25205 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
B734D904F2D6121A06D7C50E88D413B5470DE7F2 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
78797F6F7898F9FF71BF31F7B4FF8E82AA7A8D33 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
0FD58D6B273ABA597F9EDB9A05368D6FE1740F7A CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
DEB6C103CCB47ABD8B55C71C24106979134DAF68 CVE-2018-0786, CVE-2018-0764, CVE-2017-5754, CVE-2017-5753, CVE-2017-5715, ...
FFDA202ECA74824290AA7F02DC4B28C92F613D61 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
926017E6804DE72A91052245867EFD69B1D90957 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
1BD1290E074CF9058CA0AD604FB904F513F7B78C CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
DB0A598990C9E212FDD9EBA5A9187E46AFB39ABD CVE-2018-0786, CVE-2018-0764, CVE-2017-5754, CVE-2017-5753, CVE-2017-5715, ...
B79842004B75492527DC54678A1B59E628E564B7 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
1259FFA0EAA4F6F1A24D20C6A8A2C240601DBBD4 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715
BAE04C7CD61847CF2C5330C52D93A7D7A2A0FC44 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715, CVE-2016-3373, CVE-2016-3372, ...
220039721CC5DAEA826FE6C8E0AB4B350015F8B0 CVE-2017-5754, CVE-2017-5753, CVE-2017-5715, CVE-2016-3373, CVE-2016-3372, ...
991C2632A39325F55C0D35E59F8271D9EAF655D6 CVE-2015-7204, CVE-2015-7200, CVE-2015-7199, CVE-2015-7198, CVE-2015-7197, ...
4750F25C6DCC86F0E3DD5D07F96ECE6DD53EFD06 CVE-2017-3065, CVE-2017-3057, CVE-2017-3056, CVE-2017-3055, CVE-2017-3054, ...
420C81159C72E31F774BD752D6C8E34DBC3BFD69 CVE-2018-0889
4DF5D604CD027C78ECAC1428745E1C951E8479C4 CVE-2018-0889
A2BB78EEE1367FE94701D4B6AE9120583B06B7C5 CVE-2018-0862, CVE-2018-0851, CVE-2018-0849, CVE-2018-0848, CVE-2018-0845, ...
A640DBC0DC075417858784AD7BFA348DC6CE51FD CVE-2018-0862, CVE-2018-0851, CVE-2018-0849, CVE-2018-0848, CVE-2018-0845, ...
D60D9DEEF971AD5F85EB0B000B13B2A75EE1C2ED CVE-2018-0919
C5C97A95E522F77D9D7DF367A20144E1139E50F7 CVE-2018-0919
0536C3DA32B22DE51C37E875FBDDBD31D4242623 CVE-2018-0919
A7CB7322BB77F218CE5D9D5A68BE0EBAEF0354E2 CVE-2018-0919
43537297E1F34B0AB09125AB29340F065D6F0A86 CVE-2018-0919
6FC490429FD908ACCD06A50F679661842ECDA60D CVE-2018-0919
763C29BB02239BFA05F45C3A1EF02538535AEEA6 CVE-2018-0919
37CE782CC743D4EA9DDB878F849224C288C669A0 CVE-2018-0919

Download Full List

Vulnerability Engine
CVEs
Vulnerabilities
Vulnerabilities
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i5' : ' ▴'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse', 'sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp6' : ' ▾'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i =0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0] 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) "); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i


This post first appeared on OPSWAT, please read the originial post: here

Share the post

Vulnerabilities: CVEs, Hashes, Application Installers Report March 26 - April 11, 2018

×

Subscribe to Opswat

Get updates delivered right to your inbox!

Thank you for your subscription

×