OPSWAT CVEs, Hashes, Application Installers Update: April 3 - April 10, 2019
The OPSWAT Vulnerability Assessment technology enables system administrators to identify vulnerabilities in applications and files being brought into a secure network and on endpoints within a network, thereby significantly expediting remediation. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization.
Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the OPSWAT database during April 3 - April 10, 2019. The second table lists the hashes and application installers for which support was added.
At OPSWAT, we continuously enhance our security platform to maximize detection rates and prevent malware attacks. To take advantage of these capabilities, please ensure that your OPSWAT solution has the latest Vulnerability Assessment Engine deployed and activated. If you have questions, please contact OPSWAT.
Newly Supported CVEs and Product Versions as of April 10, 2019
Newly Supported Hashes as of April 10, 2019
HASH | CVES |
---|---|
F741981C7227BE008A28EB909EA765E4DCF52F8F | CVE-2018-5407 |
648DF38F7599B3980FF76EF66ACD498FDBDDAFEF | CVE-2018-5407 |
992600D22D1BD20CBC9A3B7A2DAAF8D5D3FAB20E | CVE-2018-5407 |
81F5BDA60386861E27E01B9A14F99ED4564441D4 | CVE-2018-5407 |
514688E7ADBB49DC12B8E745B9F1D04E5DF033E6 | CVE-2018-5407 |
AA40968E4CCA46824CA12E7233F1C61D87E6421E | CVE-2018-5407 |
743719DB632F46655921275F4A3642724C30788B | CVE-2018-5407 |
12E08A6648C452D7E61DF59943B69C97A3B4186C | CVE-2018-5407 |
98FD48777D6B565161C6C520CC675760CFDE138C | CVE-2018-5407 |
5F257B733FE546C964031E78D39CDB0EAD729B79 | CVE-2018-5407 |
EF4D5626993F65D0AC17783175361D82609428D7 | CVE-2018-5407 |
1FBA696AB01CDFC3F7F80A0FDF8A284CAD8E7F05 | CVE-2018-5407 |
1FA3104F40257879C661BA5BE830B85B60057F18 | CVE-2018-5407 |
1E4512A4ABEB076D1037E90C3E0546B174D1A401 | CVE-2018-5407 |
243D4717F14F4FAA70D3AB6B9DE03DA432E288E7 | CVE-2018-5407 |
19F1F49ADCEB97F409D53FAAD2B954D5F0428431 | CVE-2018-5407 |
4D3C60CF7024578665AF2E6D15FD9A623750BCF8 | CVE-2018-5407 |
136F2D39374C2C9509750C47A69C83CA9C8F8178 | CVE-2018-5407 |
7D2116BD527C6890FAE4A82DED052263C2DBBA12 | CVE-2018-5407 |
14F7D0911FFC7425FBA57631B6D5770D5A212309 | CVE-2018-5407 |
12FEC070E7E025BF1594A909373BC9235CEDF453 | CVE-2018-5407 |
7233A8AFC612572E4C6A2EC7ADB15DFED61C7691 | CVE-2018-5407 |
12A5BD80FFF1BC7E2105B5AF59F7BE65F1E22BE5 | CVE-2018-5407 |
E3CD2ED1023C819D262D4B1DAC7203FBC090245C | CVE-2018-5407 |
66B8E73B7B49BFC180FE229E69ADABB64898B4CE | CVE-2018-5407 |
3F435F2D51D63DDC5093E5372B88C7202262B47C | CVE-2018-5407 |
41814607269FF9236B88459DF0E73F4E95EE1F18 | CVE-2018-5407 |
4FE8F546B44AAF6CA654CB88B7AD153227381FF3 | CVE-2018-5407 |
362217543124FE6E44513921E8E757F7AF9EF601 | CVE-2018-5407 |
35EDCF59B7DBD7E1EC50BE1DB984AA81F4CB7BB7 | CVE-2018-5407 |
B6630EFFE4DC5A383FA6CD5EE9CB94A901A0CBB3 | CVE-2018-5407 |
BA0383EDD49F6DA8BD5A1A4637EB43E0DC92B955 | CVE-2018-5407 |
E46EDADC31778C2FF5148A40B57FBFADA001065E | CVE-2018-5407 |
BCF5920257BD280484432798E7F6ED70DBC85F9A | CVE-2018-5407 |
FAA05F4EF6B5F904854E9399F61AB09EF33F9AAA | CVE-2018-5407 |
1FD134B513C36798EC1077C7AB7CD0164761EC9A | CVE-2018-5407 |
C464184A75C2BDD0B45A2B45E5D120A0F37CFC63 | CVE-2018-5407 |
717E5126DABBAAE80F8C0E429335861EAF5BBF89 | CVE-2018-5407 |
D78829D0C4BEF9134B3F41D8948E65FBD4B78202 | CVE-2018-5407 |
0EEC3D43EC0E5037DCB7213D790C50C99713BD5D | CVE-2018-5407 |
EB87868C96BCB929C8FBB8113A6287E4008D4552 | CVE-2018-5407 |
6C354B69C8D2AC0B25081DE43BFD15EC38DE799E | CVE-2018-5407 |
76E48E6035F08DE82567B2932BF55F9E70B2D15B | CVE-2018-5407 |
4C54B81C9909EC8BE682D37F458EDF9D8B381FD6 | CVE-2018-5407 |
F65E254A2765A06AA82F3BCA309850BCEBB21458 | CVE-2018-5407 |
F9826C2E94DB44611B041D2BCD8EBC394D7E8A81 | CVE-2018-5407 |
FD7510BA2A486CEBFDE80335CA061BA0B266C8BD | CVE-2018-5407 |
1590210CA5ACD3C68E181B3F7B79275C6D9A3A7B | CVE-2018-5407 |
F564341BDAACF46ED415AC2F46099B4DB9BA9FB5 | CVE-2018-5407 |

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure