OESIS Framework September 06, 2022 Release
Product Overview
OESIS Framework is a cross-platform, versatile and modular framework that enables software engineers and technology vendors to build advanced endpoint security products.
Anti-Keylogger Module Updates
- Internal fixes and optimizations
Anti-Screen Capture Module Updates
- Internal fixes and optimizations
Vulnerability Module Updates
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: Microsoft Corporation
- Affected products: Microsoft .NET Core Runtime 3.1, Microsoft .NET Core Runtime 2.1
- Score: 5.0
- Affected versions: 3.1.7 and prior
- Vendor: Python Software Foundation
- Affected products: Python 3.10, Python 3.7, Python 3.9, Python 3.8
- Score: 4.4
- Affected versions: 3.10.2 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 2.1
- Affected versions: 5.0.1 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 1.9
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 3.6
- Affected versions: 6.1.19r999998 and prior
- Vendor: Joyent, Inc.
- Affected products: Node.js LTS
- Score: 1.9
- Affected versions: 4.3.1.999998 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score:
- Affected versions: 6.2.0-6.999998 and prior
- Vendor: TRENDnet
- Affected products: TEW-733GR
- Score:
- Affected versions: 1.03b01 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 4.3
- Affected versions: 3.2.5.999998 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 4.4
- Affected versions: 6.1.19r999998 and prior
- Vendor: Apple Inc.
- Affected products: iTunes, iCloud, iOS
- Score: 6.8
- Affected versions: 12.10.7.999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 1.9
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score:
- Affected versions: 5.999999.999999.999998 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 5.0
- Affected versions: 3.4.1 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 5.0
- Affected versions: 3.4.0 and prior
- Vendor: The PHP Group
- Affected products: PHP
- Score: 5.0
- Affected versions: 5.3.3.999998 and prior
- Vendor: Joyent, Inc.
- Affected products: Node.js Current, Node.js LTS, Node.js
- Score: 4.3
- Affected versions: 9.3 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 4.4
- Affected versions: 5.0.0 and prior
- Vendor: Joyent, Inc.
- Affected products: Node.js Current, Node.js LTS, Node.js
- Score: 2.6
- Affected versions: 6.0.0 and prior
- Vendor: The PHP Group
- Affected products: PHP
- Score: 5.0
- Affected versions: 5.3.0.999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 4.4
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: Joyent, Inc.
- Affected products: Node.js LTS
- Score: 2.6
- Affected versions: 6.9.4.999998 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 5.0
- Affected versions: 3.4.0 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 2.1
- Affected versions: 5.0.0 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 1.9
- Affected versions: 6.1.19r999998 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 2.1
- Affected versions: 5.0.1 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 6.8
- Affected versions: 6.1.19r999998 and prior
- Vendor: MikroTik
- Affected products: RouterOS
- Score:
- Affected versions: 6.48.3 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score:
- Affected versions: 6.1.0 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 5.0
- Affected versions: 3.4.0 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 4.4
- Affected versions: 5.0.0 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Oracle Corporation
- Affected products: Oracle VM VirtualBox, VirtualBox
- Score: 4.4
- Affected versions: 6.1.19r999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 2.1
- Affected versions: 5.0.0 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 4.6
- Affected versions: 6.1.19r999998 and prior
- Vendor: The PHP Group
- Affected products: PHP
- Score: 5.0
- Affected versions: 7.1.6.999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: TRENDnet
- Affected products: TEW-733GR
- Score:
- Affected versions: 1.03b01 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.0.999998 and prior
- Vendor: The Wireshark developer community
- Affected products: Wireshark
- Score: 5.0
- Affected versions: 3.4.0 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 3.6
- Affected versions: 6.0.0 and prior
- Vendor: Oracle Corporation
- Affected products: VirtualBox, Oracle VM VirtualBox
- Score: 2.1
- Affected versions: 6.1.19r999998 and prior
- Vendor: Foxit Software
- Affected products: Foxit Reader
- Score:
- Affected versions: 11.2.1.999998 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 3.3
- Affected versions: 5.1.0 and prior
- Vendor: QEMU Team
- Affected products: QEMU
- Score: 2.1
- Affected versions: 5.1.1 and prior
- Vendor: Joyent, Inc.
- Affected products: Node.js LTS
- Score: 2.1
- Affected versions: 4.5.999999.999998 and prior
CVE-2021-2312
CVE-2021-41781
CVE-2020-1045
CVE-2022-26488
CVE-2020-15469
CVE-2021-2297
CVE-2021-2283
CVE-2021-2264
CVE-2016-0702
CVE-2022-0358
CVE-2022-38556
CVE-2020-17498
CVE-2021-2145
CVE-2020-9883
CVE-2021-2285
CVE-2021-2296
CVE-2021-2287
CVE-2021-2280
CVE-2022-0216
CVE-2020-26422
CVE-2021-41782
CVE-2021-2281
CVE-2021-41785
CVE-2020-26421
CVE-2010-3436
CVE-2017-15897
CVE-2020-25624
CVE-2016-2107
CVE-2009-3294
CVE-2021-2309
CVE-2021-2286
CVE-2021-2306
CVE-2021-40326
CVE-2016-7055
CVE-2020-26418
CVE-2020-28916
CVE-2021-2282
CVE-2021-2291
CVE-2020-13253
CVE-2021-2279
CVE-2022-36522
CVE-2021-3735
CVE-2020-26420
CVE-2020-25085
CVE-2021-2266
CVE-2021-2310
CVE-2021-41780
CVE-2020-25084
CVE-2021-2250
CVE-2017-9229
CVE-2021-41784
CVE-2022-37053
CVE-2021-41783
CVE-2020-26419
CVE-2021-3507
CVE-2021-2284
CVE-2022-25641
CVE-2020-29443
CVE-2020-25723
CVE-2016-2178
Patch Management Module
- Internal fixes and optimizations
AppRemover Module Updates
- Internal fixes and optimizations
Removable Media Protection Module Updates
Windows
- Internal fixes and optimizations
Mac
- Internal fixes and optimizations
Advanced Malware Detection Module Updates
Windows
- Internal fixes and optimizations
Mac
- Internal fixes and optimizations
Device Compliance Module Updates
Windows
SDK updates:
- Internal fixes and optimizations
Products updates:
- Internal fixes and optimizations
Products support:
- Vendor: SentinelOne
- Product: Sentinel Agent
Added Tested Point 22.2.1.129 for Sentinel Agent
macOS
SDK updates:
- Internal fixes and optimizations
Products updates:
- Internal fixes and optimizations
Products support:
- Internal fixes and optimizations
Linux
SDK updates:
- Internal fixes and optimizations
Products updates:
- Internal fixes and optimizations
Products support:
- Internal fixes and optimizations
Release Details
- Product: OESIS
- Release date: September 06, 2022
- Release notes: 4.3.3093.0 for Windows, 4.3.2683.0 for macOS, 4.3.2328.0 for Linux

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure