AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

OESIS Framework April 25, 2023 Release

by Duy Vo, Senior Software Engineering Manager
Share this Post

Product Overview

OESIS Framework is a cross-platform, versatile and modular framework that enables software engineers and technology vendors to build advanced endpoint security products.

Anti-Keylogger Module Updates

    Internal fixes and optimizations

Anti-Screen Capture Module Updates

    Internal fixes and optimizations

Vulnerability Module Updates

    CVE-2023-22002

    • Vendor: Oracle Corporation
    • Affected products: VirtualBox, Oracle VM VirtualBox
    • Score:
    • Affected versions: 7.0.7r999998 and prior

    CVE-2023-21999

    • Vendor: Oracle Corporation
    • Affected products: VirtualBox, Oracle VM VirtualBox
    • Score:
    • Affected versions: 7.0.7r999998 and prior

    CVE-2023-21990

    • Vendor: Oracle Corporation
    • Affected products: VirtualBox, Oracle VM VirtualBox
    • Score:
    • Affected versions: 7.0.7r999998 and prior

    CVE-2023-21988

    • Vendor: Oracle Corporation
    • Affected products: VirtualBox, Oracle VM VirtualBox
    • Score:
    • Affected versions: 7.0.7r999998 and prior

    CVE-2023-21987

    • Vendor: Oracle Corporation
    • Affected products: VirtualBox, Oracle VM VirtualBox
    • Score:
    • Affected versions: 7.0.7r999998 and prior

    CVE-2023-27912

    • Vendor: Autodesk, Inc.
    • Affected products: AutoCAD
    • Score:
    • Affected versions: 2023.1.2.999998 and prior

    CVE-2023-27913

    • Vendor: Autodesk, Inc.
    • Affected products: AutoCAD
    • Score:
    • Affected versions: 2023.1.2.999998 and prior

    CVE-2023-27914

    • Vendor: Autodesk, Inc.
    • Affected products: AutoCAD
    • Score:
    • Affected versions: 2023.1.2.999998 and prior

    CVE-2023-27915

    • Vendor: Autodesk, Inc.
    • Affected products: AutoCAD
    • Score:
    • Affected versions: 2023.1.2.999998 and prior

    CVE-2023-29067

    • Vendor: Autodesk, Inc.
    • Affected products: AutoCAD
    • Score:
    • Affected versions: 2023.1.2.999998 and prior

    CVE-2023-21980

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score:
    • Affected versions: 8.0.32 and prior

    CVE-2023-21930

    • Vendor: Oracle Corporation
    • Affected products: Java, Java SE Development Kit
    • Score:
    • Affected versions: 20.0.0.0 and prior

    CVE-2023-27830

    • Vendor: GlavSoft LLC.
    • Affected products: TightVNC
    • Score:
    • Affected versions: 2.8.74.999998 and prior

    CVE-2023-1992

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.4.999998 and prior

    CVE-2023-1993

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.4.999998 and prior

    CVE-2023-1994

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.4.999998 and prior

    CVE-2023-30513

    • Vendor: org.csanchez.jenkins.plugins
    • Affected products: org.csanchez.jenkins.plugins:kubernetes
    • Score:
    • Affected versions: 3909.v1f2c633e8590 and prior

    CVE-2023-26422

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26423

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26424

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26425

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26418

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26419

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26420

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26421

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26406

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26407

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26408

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26417

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26396

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26397

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26405

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

    CVE-2023-26395

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Classic 2020, Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat Reader DC Continuous
    • Score:
    • Affected versions: 20.005.30441 and prior

Patch Management Module

    Internal fixes and optimizations

AppRemover Module Updates

    Internal fixes and optimizations

Removable Media Protection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Advanced Malware Detection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Device Compliance Module Updates

Windows

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 23.3 for WithSecure Elements EPP for Servers

    • Vendor: WithSecure Corporation
    • Product: WithSecure Elements EPP for Servers

    Added Tested Point 12.2.2.8012 for COMODO Internet Security Pro

    • Vendor: COMODO Security Solutions
    • Product: COMODO Internet Security Pro

macOS

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 6.0.2979.15 for Vivaldi

    • Vendor: Vivaldi Technologies
    • Product: Vivaldi

    Added Tested Point 4.18.1.0 for McAfee Internet Security

    • Vendor: McAfee, Inc.
    • Product: McAfee Internet Security

Linux

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Internal fixes and optimizations

Release Details

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.