OPSWAT CVEs, Hashes, Application Installers Update: January 2 - January 9, 2019
The OPSWAT Vulnerability Engine continuously identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine enables system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, thereby significantly expediting remediation.
Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the OPSWAT database during January 2 - January 9, 2019. The second table lists the hashes and application installers for which support was added.
At OPSWAT, we continuously enhance our security platform to maximize detection rates and prevent malware attacks. To take advantage of these capabilities, please ensure that your OPSWAT solution has Vulnerability Assessment activated. If you have questions, please contact OPSWAT.
Newly Supported CVEs and Product Versions as of January 9, 2019
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
Microsoft Office | Microsoft Corporation | 2019 and prior | CVE-2018-8587 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8587 | 9.3 |
Microsoft Office | Microsoft Corporation | 2019 and prior | CVE-2018-8598 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8598 | 2.6 |
Microsoft Office | Microsoft Corporation | 2019 and prior | CVE-2018-8627 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8627 | 4.3 |
Microsoft Office | Microsoft Corporation | 2019 and prior | CVE-2018-8628 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8628 | 9.3 |
Microsoft Office | Microsoft Corporation | 2019 and prior | CVE-2018-8597 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8597 | 9.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8598 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8598 | 2.6 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8627 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8627 | 4.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-8597 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8597 | 9.3 |
Microsoft Excel | Microsoft Corporation | 2019 and prior | CVE-2018-8636 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8636 | 9.3 |
SourceTree | Atlassian | 2.999999.999999.999998 and prior | CVE-2018-13397 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-13397 | 9.0 |
QEMU | QEMU Team | 3.0.999999.999998 and prior | CVE-2018-16867 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-16867 | 4.6 |
NoMachine | NoMachine | 6.4.5.999998 and prior | CVE-2018-20029 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-20029 | 4.9 |
Internet Explorer | Microsoft Corporation | 9 and prior | CVE-2018-8619 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8619 | 7.6 |
Internet Explorer | Microsoft Corporation | 9 and prior | CVE-2018-8625 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8625 | 7.6 |
Internet Explorer | Microsoft Corporation | 9 and prior | CVE-2018-8653 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8653 | 7.6 |
Internet Explorer | Microsoft Corporation | 9 and prior | CVE-2018-8631 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8631 | 7.6 |
Internet Explorer | Microsoft Corporation | 9 and prior | CVE-2018-8643 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8643 | 7.6 |
Microsoft PowerPoint | Microsoft Corporation | 16 and prior | CVE-2018-8628 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-8628 | 9.3 |
ALZip | ESTsoft Corp. | 10.76 and prior | CVE-2018-5196 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-5196 | 6.8 |
Newly Supported Hashes as of January 9, 2019

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure