AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

OESIS Framework May 30, 2023 Release

by Duy Vo, Senior Software Engineering Manager
Share this Post

Product Overview

OESIS Framework is a cross-platform, versatile and modular framework that enables software engineers and technology vendors to build advanced endpoint security products.

Anti-Keylogger Module Updates

    Internal fixes and optimizations

Anti-Screen Capture Module Updates

    Internal fixes and optimizations

Vulnerability Module Updates

    CVE-2023-32784

    • Vendor: Dominik Reichl
    • Affected products: KeePass
    • Score:
    • Affected versions: 2.53.999998 and prior

    CVE-2022-42336

    • Vendor: Citrix Systems, Inc.
    • Affected products: Xen
    • Score:
    • Affected versions: 4.17 and prior

    CVE-2023-33240

    • Vendor: Foxit Software
    • Affected products: Foxit Reader
    • Score:
    • Affected versions: 12.1.1.15289 and prior

    CVE-2023-32990

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:azure-vm-agents
    • Score:
    • Affected versions: 852.v8d35f0960a 43 and prior

    CVE-2022-44512

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44513

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44514

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44515

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44516

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44517

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44518

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44519

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2022-44520

    • Vendor: Adobe Systems Inc.
    • Affected products: Adobe Acrobat DC Continuous, Adobe Acrobat Reader DC Continuous, Adobe Acrobat DC Classic 2020, Adobe Acrobat Reader DC Classic 2020, Adobe Acrobat DC Classic 2017, Adobe Acrobat Reader DC Classic 2017
    • Score:
    • Affected versions: 22.001.20111.999998 and prior

    CVE-2023-2857

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

    CVE-2023-2858

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

    CVE-2023-2879

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

    CVE-2023-2854

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

    CVE-2023-2855

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

    CVE-2023-0950

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score:
    • Affected versions: 7.5.2.999998 and prior

    CVE-2023-2255

    • Vendor: The Document Foundation
    • Affected products: LibreOffice
    • Score:
    • Affected versions: 7.5.2.999998 and prior

    CVE-2023-32997

    • Vendor: org.jenkins-ci.plugins
    • Affected products: org.jenkins-ci.plugins:cas-plugin
    • Score:
    • Affected versions: 1.6.2 and prior

    CVE-2023-2856

    • Vendor: The Wireshark developer community
    • Affected products: Wireshark
    • Score:
    • Affected versions: 4.0.5.999998 and prior

Patch Management Module

    Internal fixes and optimizations

AppRemover Module Updates

    Internal fixes and optimizations

Removable Media Protection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Advanced Malware Detection Module Updates

Windows

    Internal fixes and optimizations

Mac

    Internal fixes and optimizations

Device Compliance Module Updates

Windows

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 25.5.15.21 for G Data TotalSecurity

    • Vendor: G Data Software AG
    • Product: G Data TotalSecurity

    Added Tested Point 4.5.29.268 for Malwarebytes Anti-Malware

    • Vendor: Malwarebytes Corporation
    • Product: Malwarebytes Anti-Malware

    Added Tested Point 99.0.4788.31 for Opera

    • Vendor: Opera Software
    • Product: Opera

    Added Tested Point 26.0.35.174 for Bitdefender Total Security

    • Vendor: Bitdefender
    • Product: Bitdefender Total Security

macOS

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Added Tested Point 75.0 for Google Drive

    • Vendor: Google Inc.
    • Product: Google Drive

    Added Tested Point 11.0.30 for VIPRE Endpoint Security

    • Vendor: J2 Global, Inc
    • Product: VIPRE Endpoint Security

    Added Tested Point 13.4 for Gatekeeper

    • Vendor: Apple Inc.
    • Product: Gatekeeper

Linux

SDK updates:

    Internal fixes and optimizations

Products updates:

    Internal fixes and optimizations

Products support:

    Internal fixes and optimizations

Release Details

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.