OPSWAT CVEs, Hashes, Application Installers Update: July 4 - July 11, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.
Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of July 4 - July 11, 2018. The second table lists the hashes and application installers for which support was added.
Newly Supported CVEs and Product Versions as of July 11, 2018
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
PHP | The PHP Group | 7.2.2 and prior | CVE-2015-9253 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2015-9253 | 6.8 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-7584 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-7584 | 7.5 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10549 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10549 | 6.8 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10546 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10546 | 5.0 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10548 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10548 | 5.0 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10545 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10545 | 1.9 |
PHP | The PHP Group | 7.2.1 and prior | CVE-2018-10547 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-10547 | 4.3 |
Python | Python Software Foundation | 3.6 and prior | CVE-2016-2183 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2016-2183 | 5.0 |
Newly Supported Hashes as of July 11, 2018
HASH | CVES |
---|---|
28F04431168CFB4027C81755CC55F81C92C68F1A | CVE-2018-1000030, CVE-2014-9365, CVE-2014-7185, CVE-2014-1912, CVE-2013-7040, ... |
891EAAF36392454F1CAE276236092B463FB4B108 | CVE-2018-1000030, CVE-2014-9365, CVE-2014-7185, CVE-2014-1912, CVE-2013-7040, ... |
DCFFA7629334AE0BA155D41612ED4FE53AA93F69 | CVE-2018-1000030, CVE-2014-9365, CVE-2014-7185, CVE-2014-1912, CVE-2013-7040, ... |
6C1F4FCF68080043394B605EC8602748861A4621 | CVE-2018-1000030, CVE-2014-9365, CVE-2014-7185, CVE-2014-1912, CVE-2013-7040, ... |
0CB258594E5CEC7FFF57262C9B56D3D59FA9AEAF | CVE-2018-1000030, CVE-2014-9365, CVE-2014-7185, CVE-2014-1912, CVE-2013-7040, ... |
6D4450958F913B2C80A10DB576B533B82FF94B61 | CVE-2017-13088, CVE-2017-13087, CVE-2017-13086, CVE-2017-13084, CVE-2017-13083, ... |
B5FA7E16246F5FEC4F43B7903FD00BAFC3A290EF | CVE-2017-5754, CVE-2017-5753 |
C941C472D60987E6057B96DEDCC81EA6F71BA84B | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
4D85A406F84F24D0D87DF2B2744E06ABC9E73652 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
56E66F4050E85F04634FBAFD92936F325DD363B8 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
36B0F37020D18F31B2912AC470C499DC83E15C5B | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
97A789E72D5255A3F286DD3E5C22FA917FF9D1C7 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
5F49FC4E0BA54BA88A354A97D42132E3943B9308 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
5991F660DA84B3FE2DE9ABB83118FD83F74A0EDA | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
51ECF2F24AEC50CD970BC75308226712DD92306D | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
C90FB94DAED87300EAF7A26C4C63A891195B47AC | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
F9E6A26D190477DA6F1DAD640E715883ABBD9990 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
295EB9FA321CA008428BACB28D6730560AE05827 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
49F5EBB26A95160FFAD41D3811C07D18D4A25205 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
B734D904F2D6121A06D7C50E88D413B5470DE7F2 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
78797F6F7898F9FF71BF31F7B4FF8E82AA7A8D33 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
0FD58D6B273ABA597F9EDB9A05368D6FE1740F7A | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
FFDA202ECA74824290AA7F02DC4B28C92F613D61 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
926017E6804DE72A91052245867EFD69B1D90957 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
B79842004B75492527DC54678A1B59E628E564B7 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |
1259FFA0EAA4F6F1A24D20C6A8A2C240601DBBD4 | CVE-2017-5754, CVE-2017-5753, CVE-2017-5715 |

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure