Metadefender CVEs, Hashes, Application Installers Report: May 30 - June 6, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.
Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of May 30 - June 6, 2018. The second table lists the hashes and application installers for which support was added.
Newly Supported CVEs and Product Versions as of June 6, 2018
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
Wireshark | The Wireshark developer community | 2.4.5 and prior | CVE-2018-9264 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-9264 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.5 and prior | CVE-2018-9273 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-9273 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.5 and prior | CVE-2018-9261 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-9261 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.4 and prior | CVE-2018-7320 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7320 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.4 and prior | CVE-2018-7334 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7334 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.4 and prior | CVE-2018-7419 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7419 | 5.0 |
Wireshark | The Wireshark developer community | 2.4.4 and prior | CVE-2018-7335 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7335 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11358 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11358 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11362 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11362 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11360 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11360 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11359 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11359 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11356 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11356 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11357 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11357 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11361 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11361 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11354 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11354 | 5.0 |
Wireshark | The Wireshark developer community | 2.6.0 and prior | CVE-2018-11355 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-11355 | 5.0 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8157 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8157 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8158 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8158 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8161 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8161 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8150 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8150 | 4.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8163 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8163 | 4.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8162 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8162 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8148 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8148 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-8147 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8147 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-8161 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8161 | 9.3 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10547 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10547 | 4.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8163 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8163 | 4.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8162 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8162 | 9.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8148 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8148 | 9.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8147 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8147 | 9.3 |
AhnLab V3 Internet Security | AhnLab, Inc. | 8.0.7.5 and prior | CVE-2013-3947 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2013-3947 | 7.2 |
QEMU | QEMU Team | 2.8.1.1 and prior | CVE-2016-9602 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-9602 | 9.0 |
QEMU | QEMU Team | 2.8.1.1 and prior | CVE-2017-18043 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-18043 | 2.1 |
QEMU | QEMU Team | 2.10.0 and prior | CVE-2017-15268 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-15268 | 5.0 |
QEMU | QEMU Team | 2.9.1 and prior | CVE-2017-15038 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-15038 | 1.9 |
QEMU | QEMU Team | 2.11.0 and prior | CVE-2017-15124 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-15124 | 7.8 |
Apache HTTP Server | Apache Software Foundation | 2.4.27 and prior | CVE-2017-9798 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-9798 | 5.0 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2018-1303 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1303 | 5.0 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2018-1283 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1283 | 3.5 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2018-1312 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1312 | 6.8 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2018-1302 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1302 | 4.3 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2018-1301 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1301 | 4.3 |
Apache HTTP Server | Apache Software Foundation | 2.4.18 and prior | CVE-2016-1546 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-1546 | 4.3 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2017-15715 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-15715 | 6.8 |
Apache HTTP Server | Apache Software Foundation | 2.4.29 and prior | CVE-2017-15710 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-15710 | 5.0 |
Apache HTTP Server | Apache Software Foundation | 2.4.25 and prior | CVE-2017-3169 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-3169 | 7.5 |
Apache HTTP Server | Apache Software Foundation | 2.4.25 and prior | CVE-2017-7668 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-7668 | 7.5 |
Apache HTTP Server | Apache Software Foundation | 2.4.25 and prior | CVE-2017-7679 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-7679 | 7.5 |
Apache HTTP Server | Apache Software Foundation | 2.4.25 and prior | CVE-2017-7659 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-7659 | 5.0 |
Apache HTTP Server | Apache Software Foundation | 2.4.20 and prior | CVE-2016-4979 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-4979 | 5.0 |
Newly Supported Hashes as of June 6, 2018

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure