AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

OESIS Framework February 07, 2023 Release

by Duy Vo, Senior Software Engineering Manager
Share this Post

Product Overview

OESIS Framework is a cross-platform, versatile and modular framework that enables software engineers and technology vendors to build advanced endpoint security products.

Anti-Keylogger Module Updates

    Internal fixes and optimizations

Anti-Screen Capture Module Updates

    Internal fixes and optimizations

Vulnerability Module Updates

    CVE-2010-2806

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score: 6.8
    • Affected versions: 4.1.999998 and prior

    CVE-2010-2808

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score: 6.8
    • Affected versions: 4.1.999998 and prior

    CVE-2012-0841

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score: 5.0
    • Affected versions: 6.1.4 and prior

    CVE-2022-40304

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score:
    • Affected versions: 15.7.1.999998 and prior

    CVE-2013-2033

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 2.1
    • Affected versions: 1.513.999998 and prior

    CVE-2013-2034

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 6.8
    • Affected versions: 1.513 and prior

    CVE-2012-6074

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 3.5
    • Affected versions: 1.480.3.1 and prior

    CVE-2014-3680

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 4.0
    • Affected versions: 1.582 and prior

    CVE-2013-0327

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 6.8
    • Affected versions: 1.501 and prior

    CVE-2013-0329

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 7.5
    • Affected versions: 1.501 and prior

    CVE-2014-3662

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 5.0
    • Affected versions: 1.582 and prior

    CVE-2014-3663

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 6.0
    • Affected versions: 1.582 and prior

    CVE-2014-3665

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 6.8
    • Affected versions: 1.586 and prior

    CVE-2013-0328

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 4.3
    • Affected versions: 1.501 and prior

    CVE-2012-4563

    • Vendor: com.google.gwt
    • Affected products: com.google.gwt:gwt
    • Score: 4.3
    • Affected versions: 2.4-beta and prior

    CVE-2013-4204

    • Vendor: com.google.gwt
    • Affected products: com.google.gwt:gwt
    • Score: 4.3
    • Affected versions: 2.5.1-RC0.999998 and prior

    CVE-2011-2901

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 5.5
    • Affected versions: 3.3.0 and prior

    CVE-2017-2615

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen, QEMU
    • Score: 9.0
    • Affected versions: 7.1 and prior

    CVE-2015-5307

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen, VirtualBox, Oracle VM VirtualBox
    • Score: 4.9
    • Affected versions: 4.6.6 and prior

    CVE-2012-5513

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 6.9
    • Affected versions: 4.2.0 and prior

    CVE-2015-5154

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen, QEMU
    • Score: 7.2
    • Affected versions: 4.5.1 and prior

    CVE-2012-3515

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen, QEMU
    • Score: 7.2
    • Affected versions: 4.1.0 and prior

    CVE-2012-0029

    • Vendor: KVM
    • Affected products: KVM
    • Score: 7.4
    • Affected versions: 0.12 and prior

    CVE-2010-0435

    • Vendor: KVM
    • Affected products: KVM
    • Score: 4.6
    • Affected versions: 83 and prior

    CVE-2012-0067

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.6.4 and prior

    CVE-2011-1590

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.4.4 and prior

    CVE-2011-1957

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.4.6 and prior

    CVE-2011-1958

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.4.6 and prior

    CVE-2011-2698

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.6.0 and prior

    CVE-2009-3550

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.2.2 and prior

    CVE-2009-3551

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 5.0
    • Affected versions: 1.2.1 and prior

    CVE-2015-3182

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.10.14 and prior

    CVE-2012-1595

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 4.3
    • Affected versions: 1.6.5 and prior

    CVE-2011-0024

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 9.3
    • Affected versions: 1.0.16 and prior

    CVE-2011-0713

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 6.8
    • Affected versions: 1.4.3 and prior

    CVE-2023-0411

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0412

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0413

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0414

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0415

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0417

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2023-0416

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.2 and prior

    CVE-2012-0830

    • Vendor: The PHP Group
    • Affected products: PHP
    • Score: 7.5
    • Affected versions: 5.3.9 and prior

    CVE-2012-2336

    • Vendor: The PHP Group
    • Affected products: PHP
    • Score: 5.0
    • Affected versions: 5.4.2 and prior

    CVE-2009-3546

    • Vendor: The PHP Group
    • Affected products: PHP
    • Score: 9.3
    • Affected versions: 5.3.0 and prior

    CVE-2007-2872

    • Vendor: The PHP Group
    • Affected products: PHP
    • Score: 6.8
    • Affected versions: 5.2.2 and prior

    CVE-2012-1149

    • Vendor: The Document Foundation
    • Affected products: LibreOffice, Open Office, OpenOffice
    • Score: 7.5
    • Affected versions: 3.5.2 and prior

    CVE-2012-2334

    • Vendor: The Document Foundation
    • Affected products: LibreOffice, Open Office, OpenOffice
    • Score: 6.8
    • Affected versions: 3.5.2 and prior

    CVE-2014-0247

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score: 10.0
    • Affected versions: 4.2.4 and prior

    CVE-2010-2936

    • Vendor: Apache Software Foundation
    • Affected products: Open Office
    • Score: 9.3
    • Affected versions: 3.2.1 and prior

    CVE-2012-0818

    • Vendor: org.jboss.resteasy
    • Affected products: org.jboss.resteasy:resteasy-jaxrs
    • Score: 5.0
    • Affected versions: 2.3 and prior

    CVE-2010-1624

    • Vendor: Edgewall Software
    • Affected products: Pidgin
    • Score: 5.0
    • Affected versions: 2.6.6 and prior

    CVE-2011-1091

    • Vendor: Edgewall Software
    • Affected products: Pidgin
    • Score: 4.0
    • Affected versions: 2.7.10 and prior

    CVE-2008-2927

    • Vendor: Edgewall Software
    • Affected products: Pidgin
    • Score: 6.8
    • Affected versions: 2.4.2 and prior

    CVE-2008-2956

    • Vendor: Edgewall Software
    • Affected products: Pidgin
    • Score: 5.0
    • Affected versions: 2.0.0 and prior

    CVE-2010-1640

    • Vendor: ClamWin Pty Ltd
    • Affected products: Clamav
    • Score: 4.3
    • Affected versions: 0.96 and prior

    CVE-2011-0706

    • Vendor: Oracle Corporation
    • Affected products: Java SE Development Kit
    • Score: 7.5
    • Affected versions: 6.0.0.0 and prior

    CVE-2011-1751

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.4
    • Affected versions: 1.1 and prior

    CVE-2011-2212

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.4
    • Affected versions: 0.14.0 and prior

    CVE-2017-7539

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 5.0
    • Affected versions: 2.10.0.999998 and prior

    CVE-2016-1568

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 6.9
    • Affected versions: 2.5.1.1 and prior

    CVE-2016-4020

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.6.2 and prior

    CVE-2016-7466

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 1.9
    • Affected versions: 2.7.1 and prior

    CVE-2016-8669

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.7.1 and prior

    CVE-2016-9911

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.9
    • Affected versions: 2.7.1 and prior

    CVE-2013-4148

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2014-0142

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.0.0 and prior

    CVE-2014-0143

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.4
    • Affected versions: 1.7.1 and prior

    CVE-2014-0182

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2015-5225

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.2
    • Affected versions: 2.4.0 and prior

    CVE-2015-7512

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 6.8
    • Affected versions: 2.5.0 and prior

    CVE-2016-9921

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.8.0 and prior

    CVE-2017-5579

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.9
    • Affected versions: 2.9.0 and prior

    CVE-2015-1779

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.8
    • Affected versions: 2.3.0 and prior

    CVE-2016-9922

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.8.0 and prior

    CVE-2011-1750

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.4
    • Affected versions: 0.14.0 and prior

    CVE-2010-4172

    • Vendor: org.apache.tomcat
    • Affected products: org.apache.tomcat:catalina, org.apache.tomcat:tomcat-catalina
    • Score: 4.3
    • Affected versions: 6.0.29 and prior

    CVE-2011-0013

    • Vendor: org.apache.tomcat
    • Affected products: org.apache.tomcat:catalina, org.apache.tomcat:tomcat-catalina, tomcat:catalina
    • Score: 4.3
    • Affected versions: 6.0.29 and prior

    CVE-2010-1622

    • Vendor: org.springframework
    • Affected products: org.springframework:spring-core
    • Score: 6.0
    • Affected versions: 3.0.2.999998 and prior

    CVE-2009-1308

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 3.0beta5 and prior

    CVE-2008-3836

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox
    • Score: 7.5
    • Affected versions: 2.0.0.16 and prior

    CVE-2008-5511

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, SeaMonkey, Thunderbird
    • Score: 4.3
    • Affected versions: 3.0.4.999998 and prior

    CVE-2008-5513

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, SeaMonkey, Thunderbird
    • Score: 4.3
    • Affected versions: 3.0.4.999998 and prior

    CVE-2008-5019

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 3.0.3.999998 and prior

    CVE-2019-11757

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, Thunderbird, Mozilla Firefox ESR
    • Score: 6.8
    • Affected versions: 69.999999.999998 and prior

    CVE-2019-11759

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, Thunderbird, Mozilla Firefox ESR
    • Score: 6.8
    • Affected versions: 69.999999.999998 and prior

    CVE-2019-11760

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, Thunderbird, Mozilla Firefox ESR
    • Score: 6.8
    • Affected versions: 69.999999.999998 and prior

    CVE-2019-11761

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, Thunderbird, Mozilla Firefox ESR
    • Score: 5.8
    • Affected versions: 69.999999.999998 and prior

    CVE-2019-11762

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, Thunderbird, Mozilla Firefox ESR
    • Score: 5.8
    • Affected versions: 69.999999.999998 and prior

    CVE-2007-3847

    • Vendor: Apache Software Foundation
    • Affected products: Apache HTTP Server
    • Score: 5.0
    • Affected versions: 2.2.5.999998 and prior

    CVE-2019-11706

    • Vendor: Mozilla Corporation
    • Affected products: Thunderbird
    • Score: 5.0
    • Affected versions: 60.7.0.999998 and prior

    CVE-2019-11705

    • Vendor: Mozilla Corporation
    • Affected products: Thunderbird
    • Score: 7.5
    • Affected versions: 60.7.0.999998 and prior

    CVE-2023-24445

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:openid
    • Score:
    • Affected versions: 2.4 and prior

    CVE-2023-24444

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:openid
    • Score:
    • Affected versions: 2.4 and prior

    CVE-2023-24446

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:openid
    • Score:
    • Affected versions: 2.4 and prior

    CVE-2018-1047

    • Vendor: org.wildfly
    • Affected products: org.wildfly:wildfly-undertow
    • Score: 2.1
    • Affected versions: 12.0.0.Alpha0.999998 and prior

    CVE-2012-5615

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.0
    • Affected versions: 5.5.19 and prior

    CVE-2019-2910

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.3
    • Affected versions: 5.7.27 and prior

    CVE-2019-2911

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2914

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2982

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2967

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2968

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2969

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 2.1
    • Affected versions: 8.0.16 and prior

    CVE-2019-2991

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.5
    • Affected versions: 8.0.17 and prior

    CVE-2019-2993

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 3.5
    • Affected versions: 8.0.17 and prior

    CVE-2019-2997

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2998

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-3003

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.16 and prior

    CVE-2019-3004

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-3009

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-3011

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2946

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2948

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.16 and prior

    CVE-2019-2950

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.16 and prior

    CVE-2019-3018

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 3.5
    • Affected versions: 8.0.17 and prior

    CVE-2019-2957

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2960

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2963

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2966

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 4.0
    • Affected versions: 8.0.17 and prior

    CVE-2014-0022

    • Vendor: GNU
    • Affected products: Yum
    • Score: 5.0
    • Affected versions: 3.4.3 and prior

    CVE-2014-3678

    • Vendor: org.jvnet.hudson.plugins
    • Affected products: org.jvnet.hudson.plugins:monitoring
    • Score: 4.3
    • Affected versions: 1.52.1 and prior

    CVE-2013-2165

    • Vendor: org.richfaces
    • Affected products: org.richfaces:richfaces
    • Score: 7.5
    • Affected versions: 5.0.0.Alpha3 and prior

    CVE-2013-1808

    • Vendor: jonrohan
    • Affected products: zeroclipboard
    • Score: 4.3
    • Affected versions: 1.0.6.999998 and prior

    CVE-2023-24434

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:ghprb
    • Score:
    • Affected versions: 1.42.2 and prior

    CVE-2023-24436

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:ghprb
    • Score:
    • Affected versions: 1.42.2 and prior

    CVE-2023-24435

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:ghprb
    • Score:
    • Affected versions: 1.42.2 and prior

    CVE-2018-3970

    • Vendor: SurfRight B.V.
    • Affected products: HitmanPro.Alert
    • Score: 2.1
    • Affected versions: 3.7.6.744 and prior

    CVE-2018-3971

    • Vendor: SurfRight B.V.
    • Affected products: HitmanPro.Alert
    • Score: 7.2
    • Affected versions: 3.7.6.744 and prior

    CVE-2019-14889

    • Vendor: Oracle Corporation
    • Affected products: MySQL Workbench
    • Score: 9.3
    • Affected versions: 8.0.19 and prior

    CVE-2019-6447

    • Vendor: estrongs
    • Affected products: com.estrongs.android.pop
    • Score: 4.8
    • Affected versions: 4.1.9.7.4 and prior

    CVE-2019-13767

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 6.8
    • Affected versions: 79.0.3945.87.999998 and prior

    CVE-2020-6574

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.6
    • Affected versions: 85.0.4183.101.999998 and prior

    CVE-2019-5624

    • Vendor: Rapid7
    • Affected products: Metasploit
    • Score: 6.5
    • Affected versions: 4.14.0 and prior

    CVE-2019-5458

    • Vendor: unclechu
    • Affected products: http-file-server
    • Score: 3.5
    • Affected versions: 0.2.6 and prior

    CVE-2018-1000413

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:config-file-provider
    • Score: 3.5
    • Affected versions: 3.1 and prior

    CVE-2019-18426

    • Vendor: WhatsApp LLC
    • Affected products: WhatsApp
    • Score: 5.8
    • Affected versions: 0.3.9308.999998 and prior

    CVE-2023-24422

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:script-security
    • Score:
    • Affected versions: 1229.v4880b b e905a 5.999998 and prior

    CVE-2019-13754

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.3
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-13750

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.3
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-13725

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 6.8
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-13744

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.3
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-13746

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.3
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-13748

    • Vendor: Google Inc.
    • Affected products: Google Chrome
    • Score: 4.3
    • Affected versions: 79.0.3945.78.999998 and prior

    CVE-2019-18422

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 8.5
    • Affected versions: 4.12.1 and prior

    CVE-2019-17349

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 4.9
    • Affected versions: 4.12.1 and prior

    CVE-2019-17341

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 6.9
    • Affected versions: 4.11.2 and prior

    CVE-2019-17342

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 4.4
    • Affected versions: 4.11.2 and prior

    CVE-2019-17350

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 4.9
    • Affected versions: 4.12.1 and prior

    CVE-2019-17347

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 4.6
    • Affected versions: 4.11.2 and prior

    CVE-2019-17348

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 4.9
    • Affected versions: 4.11.2 and prior

    CVE-2019-17346

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 7.2
    • Affected versions: 4.11.2 and prior

    CVE-2013-4355

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score: 1.5
    • Affected versions: 4.3.0 and prior

    CVE-2016-3712

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen, QEMU
    • Score: 2.1
    • Affected versions: 7.0 and prior

    CVE-2020-6806

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 6.8
    • Affected versions: 68.5.999999.999998 and prior

    CVE-2019-11763

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 68.1.999998 and prior

    CVE-2020-15658

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 78.0.999998 and prior

    CVE-2020-15653

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 78.0.999998 and prior

    CVE-2020-15654

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 4.3
    • Affected versions: 78.0.999998 and prior

    CVE-2020-15656

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox ESR, Thunderbird, Mozilla Firefox, Firefox
    • Score: 9.3
    • Affected versions: 78.0.999998 and prior

    CVE-2007-5960

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox, SeaMonkey
    • Score: 4.3
    • Affected versions: 2.0.0.9 and prior

    CVE-2008-5504

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox
    • Score: 7.5
    • Affected versions: 2.0.0.18 and prior

    CVE-2009-0354

    • Vendor: Mozilla Corporation
    • Affected products: Mozilla Firefox, Firefox
    • Score: 2.6
    • Affected versions: 3.0.5 and prior

    CVE-2019-2920

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.0
    • Affected versions: 8.0.17 and prior

    CVE-2019-2922

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.0
    • Affected versions: 5.7.27 and prior

    CVE-2019-2923

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.0
    • Affected versions: 5.7.27 and prior

    CVE-2019-2924

    • Vendor: Oracle Corporation
    • Affected products: MySQL Server
    • Score: 5.0
    • Affected versions: 5.7.27 and prior

    CVE-2020-10593

    • Vendor: The Tor Project
    • Affected products: Tor Browser
    • Score: 5.0
    • Affected versions: 0.4.2.7 and prior

    CVE-2008-3932

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score: 5.0
    • Affected versions: 1.0.2 and prior

    CVE-2008-2050

    • Vendor: The PHP Group
    • Affected products: PHP
    • Score: 10.0
    • Affected versions: 5.2.5 and prior

    CVE-2016-1014

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Flash Player
    • Score: 6.9
    • Affected versions: 21.0.0.197 and prior

    CVE-2023-24426

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:azure-ad
    • Score:
    • Affected versions: 303.va 91ef20ee49f and prior

    CVE-2023-24424

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:oic-auth
    • Score:
    • Affected versions: 2.4.999998 and prior

    CVE-2023-24423

    • Vendor: com.sonyericsson.hudson.plugins.gerrit
    • Affected products: com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger
    • Score:
    • Affected versions: 2.38.0.999998 and prior

    CVE-2019-5447

    • Vendor: unclechu
    • Affected products: http-file-server
    • Score: 5.0
    • Affected versions: 0.2.6 and prior

    CVE-2019-10160

    • Vendor: Python Software Foundation
    • Affected products: Python 3.6, Python 3.7, Python 3.8, Python 3.5
    • Score: 5.0
    • Affected versions: 3.6.8.999998 and prior

    CVE-2016-0718

    • Vendor: Python Software Foundation
    • Affected products: Python 3.6, Python 3.5
    • Score: 7.5
    • Affected versions: 3.6.1.999998 and prior

    CVE-2016-5126

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.6
    • Affected versions: 2.6.2 and prior

    CVE-2016-6835

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.5.999999.999998 and prior

    CVE-2016-7422

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.7.1 and prior

    CVE-2016-8576

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.7.1 and prior

    CVE-2016-8909

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.7.1 and prior

    CVE-2016-8910

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.7.1 and prior

    CVE-2016-9907

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.9
    • Affected versions: 2.7.1 and prior

    CVE-2017-15124

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.8
    • Affected versions: 2.11.0 and prior

    CVE-2018-10839

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.0
    • Affected versions: 3.0.0 and prior

    CVE-2015-8817

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.3.1 and prior

    CVE-2015-8818

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.3.1 and prior

    CVE-2016-1714

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 6.9
    • Affected versions: 2.3.0 and prior

    CVE-2016-1981

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.5.1.1 and prior

    CVE-2016-2857

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 3.6
    • Affected versions: 2.5.1.1 and prior

    CVE-2015-7504

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.6
    • Affected versions: 2.5.0 and prior

    CVE-2014-8106

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.6
    • Affected versions: 2.1.2 and prior

    CVE-2014-7840

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 2.1.3 and prior

    CVE-2014-2894

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.2
    • Affected versions: 1.7.1 and prior

    CVE-2014-3461

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 6.8
    • Affected versions: 1.6.2 and prior

    CVE-2014-3640

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 2.1
    • Affected versions: 2.1.1 and prior

    CVE-2014-0145

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.6
    • Affected versions: 2.0.0 and prior

    CVE-2014-0146

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 1.9
    • Affected versions: 2.0.0 and prior

    CVE-2014-0222

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2014-0223

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 4.6
    • Affected versions: 1.7.1 and prior

    CVE-2013-4149

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-4150

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-4151

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-4527

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-4529

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-4542

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2013-6399

    • Vendor: QEMU Team
    • Affected products: QEMU
    • Score: 7.5
    • Affected versions: 1.7.1 and prior

    CVE-2016-8612

    • Vendor: Apache Software Foundation
    • Affected products: Apache HTTP Server
    • Score: 3.3
    • Affected versions: 2.4.22.999998 and prior

    CVE-2017-12171

    • Vendor: Apache Software Foundation
    • Affected products: Apache HTTP Server
    • Score: 6.4
    • Affected versions: 2.2.15-60 and prior

    CVE-2008-2939

    • Vendor: Apache Software Foundation
    • Affected products: Apache HTTP Server
    • Score: 4.3
    • Affected versions: 2.2.9 and prior

    CVE-2016-5388

    • Vendor: org.apache.tomcat
    • Affected products: org.apache.tomcat:tomcat, org.apache.tomcat:tomcat-catalina
    • Score: 5.1
    • Affected versions: 8.5.4 and prior

    CVE-2016-0794

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score: 9.3
    • Affected versions: 5.0.3 and prior

    CVE-2016-0795

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score: 9.3
    • Affected versions: 5.0.4 and prior

    CVE-2014-3693

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score: 7.5
    • Affected versions: 4.3.2 and prior

    CVE-2016-4447

    • Vendor: Apple Inc.
    • Affected products: iTunes, iOS
    • Score: 5.0
    • Affected versions: 12.4.1 and prior

    CVE-2016-4448

    • Vendor: Apple Inc.
    • Affected products: iTunes, iOS, iCloud
    • Score: 10.0
    • Affected versions: 12.4.1 and prior

    CVE-2015-7499

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score: 5.0
    • Affected versions: 9.2.1 and prior

    CVE-2015-7500

    • Vendor: Apple Inc.
    • Affected products: iOS
    • Score: 5.0
    • Affected versions: 9.2.1 and prior

    CVE-2014-3661

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 5.0
    • Affected versions: 1.582 and prior

    CVE-2014-3664

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 4.0
    • Affected versions: 1.582 and prior

    CVE-2014-3667

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 4.0
    • Affected versions: 1.582 and prior

    CVE-2014-3681

    • Vendor: org.jenkins-ci.main
    • Affected products: org.jenkins-ci.main:jenkins-core
    • Score: 4.3
    • Affected versions: 1.582.999998 and prior

    CVE-2014-3596

    • Vendor: axis
    • Affected products: axis:axis, org.apache.axis:axis
    • Score: 5.8
    • Affected versions: 1.4 and prior

    CVE-2014-3530

    • Vendor: org.picketlink
    • Affected products: org.picketlink:picketlink-common, org.picketlink:picketlink-core, org.picketlink:picketlink-fed-core
    • Score: 7.5
    • Affected versions: 3.0.0-2013Feb19.999998 and prior

    CVE-2014-0248

    • Vendor: org.jboss.seam
    • Affected products: org.jboss.seam:jboss-seam
    • Score: 6.8
    • Affected versions: 2.3.1.Final and prior

    CVE-2013-6372

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:subversion, org.jvnet.hudson.plugins:subversion
    • Score: 2.1
    • Affected versions: 1.53.999998 and prior

    CVE-2019-10388

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:relution-publisher
    • Score: 4.3
    • Affected versions: 1.24 and prior

    CVE-2018-3786

    • Vendor: eggjs
    • Affected products: egg-scripts
    • Score: 10.0
    • Affected versions: 2.8.0.999998 and prior

    CVE-2018-3785

    • Vendor: stevemao
    • Affected products: git-dummy-commit
    • Score: 10.0
    • Affected versions: 1.3.0 and prior

    CVE-2019-0820

    • Vendor: Microsoft Corporation
    • Affected products: Microsoft .NET Core Runtime 3.1, Microsoft .NET Core Runtime 2.1
    • Score: 5.0
    • Affected versions: 2.1.10.999998 and prior

Patch Management Module

    Internal fixes and optimizations

AppRemover Module Updates

    Internal fixes and optimizations

Removable Media Protection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Advanced Malware Detection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Device Compliance Module Updates

Windows

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 9.0.0 for PeaZip (x64)

    • Vendor: Giorgio Tani
    • Product: PeaZip

    Added Tested Point 9.0.0 for PeaZip (x86)

    • Vendor: Giorgio Tani
    • Product: PeaZip

    Added Tested Point 0.78 for PuTTY (x64)

    • Vendor: PuTTY
    • Product: PuTTY

    Added Tested Point 0.78 for PuTTY (x86)

    • Vendor: PuTTY
    • Product: PuTTY

    Added Tested Point 23.011.0115.0009 for Microsoft OneDrive

    • Vendor: Microsoft Corporation
    • Product: Microsoft OneDrive

    Added Tested Point 23.007.0109.0004 for Microsoft OneDrive

    • Vendor: Microsoft Corporation
    • Product: Microsoft OneDrive

    Added Tested Point 1.6.00.376 for Microsoft Teams

    • Vendor: Microsoft Corporation
    • Product: Microsoft Teams

    Added Tested Point 4.18.2211.5 for Windows Defender

    • Vendor: Microsoft Corporation
    • Product: Windows Defender

    Added Tested Point 16.0.16026.20146 for Microsoft Lync

    • Vendor: Microsoft Corporation
    • Product: Microsoft Lync

    Added Tested Point 11.2.2300.2 for ManageEngine Patch Manager Plus

    • Vendor: ZOHO Corp
    • Product: ManageEngine Patch Manager Plus

    Added Tested Point 13 for HDClone

    • Vendor: Miray Software AG
    • Product: HDClone

macOS

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 6.50.16304.0 for CrowdStrike Falcon

    • Vendor: CrowdStrike, Inc.
    • Product: CrowdStrike Falcon

Linux

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 22.4.2.4 for Sentinel Agent

    • Vendor: SentinelOne
    • Product: Sentinel Agent

Release Details

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.