The OPSWAT File-based Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaDefender Access leverages this technology to protect your organization.
We continuously enhance our platform to decrease your organization's security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during October 16 - October 23, 2019. The second table lists the new CVEs and application versions for which support was added.
To take advantage of these capabilities, please always update your OPSWAT File-based Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT.
File Based Vulnerabilities
OPSWAT File-based Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware
| HASH | CVES |
|---|---|
| 12A118236E51726E3D30ABD314DA0098BE054F94 | CVE-2018-0619 |
| 3E5CE789AD24E87E89B6D9E29C42FC52450DB1C9 | CVE-2018-0619 |
| 4F953F664491AC2C25DE56724A11D900004A3CB3 | CVE-2015-3650, CVE-2015-2341, CVE-2015-2340, CVE-2015-2339, CVE-2015-2338, ... |
| 9C903F56F281D07FB596D8998C6D4D8C20138753 | CVE-2018-5996, CVE-2018-10172, CVE-2018-10115, CVE-2017-17969 |
| A1A4F82A0D16CC8F3479BDCA1C21A19FA41DFA4F | CVE-2017-7441, CVE-2017-6008, CVE-2017-6007 |
| C23E7469243B91A155FA78FB993E24E56AA82837 | CVE-2018-20253, CVE-2018-20252, CVE-2018-20251, CVE-2018-20250, CVE-2015-5663, ... |
| D830446BE0DF360FB0BBE78974FE7C461A39236F | CVE-2018-0619 |
| E04BCA0B4E56CCE3000A1BCC7077730731CC7503 | CVE-2018-0619 |
| FCC27F077FC7B13A43EA1C01173B4765453443AF | CVE-2015-3650, CVE-2015-2341, CVE-2015-2340, CVE-2015-2339, CVE-2015-2338, ... |
| FE0AEA785ADCAC483A83A15CF9D95A65DAAEE0DE | CVE-2018-0619 |
| FF98921AA7CDC0657097D5D6070649477F4901B3 | CVE-2015-3650, CVE-2015-2341, CVE-2015-2340, CVE-2015-2339, CVE-2015-2338, ... |
| CFC295ACC2580773CC09EE156C2C5A83B2D063DF | CVE-2019-3586, CVE-2019-3582 |
| F2C0109CB272517366A3C6611F112AFBBBD1CDC8 | CVE-2019-2877, CVE-2019-2876, CVE-2019-2875, CVE-2019-2874, CVE-2019-2873, ... |
| 863DCB1B43F9C4EB7273335CF67A7606A8A2F04D | CVE-2019-2877, CVE-2019-2876, CVE-2019-2875, CVE-2019-2874, CVE-2019-2873, ... |
| A6969F68E6A0BC80023FDDFB1BE768F1CE681387 | CVE-2019-3586, CVE-2019-3582 |
| 82CA52DC18B69752F6483F2CD0AF13D9E0560D43 | CVE-2019-3586, CVE-2019-3582 |
| BF0BD736047ECFD9D92251FD6D97185C43CED9F0 | CVE-2019-3586, CVE-2019-3582 |
| EEECCA7CB20C430F5B99E714333AAFEA9009ECD6 | CVE-2019-3586, CVE-2019-3582 |
| 37FF172018A054A622E85DC846651A69DFF67EB9 | CVE-2017-7441, CVE-2017-6008, CVE-2017-6007 |
| 47EB357C12761B00B036976B99F55A6CF3592147 | CVE-2017-3898, CVE-2017-3897 |
| 4846655F0542699762A88555BEABE6F086416BCC | CVE-2018-0619 |
| 5029DF079F0CF2DF72328E88DB83124F58F4454C | CVE-2018-0619 |
| 530227F0F3EB70B89BED9D725CD6149C46B148AE | CVE-2019-12750, CVE-2018-18366, CVE-2018-12245, CVE-2018-12239, CVE-2018-12238, ... |
| 956FF9F066F92B486A9860ACB735D5E9C302A0AD | CVE-2014-3802 |
| A1F384D131923D2A3850E2B6131A41C2CE4CA89E | CVE-2018-5407, CVE-2018-0735 |
| EE556E3377A0CE64765E866497C469F3B9B402F3 | CVE-2018-16275 |
| FF642F3D2C868DD7F98802942B22708DAB9431C5 | CVE-2017-3898, CVE-2017-3897 |
| 8D77E561E45118D91B59B20DA632C6A871F2CE92 | CVE-2019-3586, CVE-2019-3582 |
| 1C26F0B9B1A4BF81050BBF8925E7D0909550CEAA | CVE-2019-3586, CVE-2019-3582 |
| 2F1E13AC45B11610D87B6308EB123D5DC04B315E | CVE-2019-3586, CVE-2019-3582 |
| 3306453902E5C5AF0789CE03F6BFA2D9BDBA9AA2 | CVE-2019-3586, CVE-2019-3582 |
| 35244C064E6A7D400641158030BA6444B67A8F7E | CVE-2019-3586, CVE-2019-3582 |
| 3F811C37E1304CE6685D055120F30FE6015AD077 | CVE-2019-3586, CVE-2019-3582 |
| 440C360DA3829B1E6AA3250F77E9ED51AA44BD6B | CVE-2019-3586, CVE-2019-3582 |
| 4A8F95B06AEF4DE23C2D6F66EEE28615610F1B4B | CVE-2019-3586, CVE-2019-3582 |
| 4EB7D83B4819D3FDA4291BE52D847479F7D61E4C | CVE-2019-3586, CVE-2019-3582 |
| 5071C9376C781DCC233CD30FC677DD0738013A58 | CVE-2019-3586, CVE-2019-3582 |
| 55EC15C0BEBD98A31917B08BCB0E4B75DEEC35ED | CVE-2019-3586, CVE-2019-3582 |
| 9A4BB74914C41F36D528E4377F5897EA08FA95A3 | CVE-2019-3586, CVE-2019-3582 |
| C90F5BC37A3A5BEFCF6767FF04847CA326F875E9 | CVE-2019-3586, CVE-2019-3582 |
| CAAFA8C29BF05706137E500D9294983FD3D4D4EE | CVE-2019-3586, CVE-2019-3582 |
| CD859D11AA5B0650257AD869EA6FBCE7EBA1F6C2 | CVE-2019-3586, CVE-2019-3582 |
| D08771EE210D1EEB5F0359EFA87BC1631F476589 | CVE-2019-3586, CVE-2019-3582 |
| E968C79B544E59D47EBC4D796A68636FD40B1051 | CVE-2019-3586, CVE-2019-3582 |
| EB4C8BC38837DF2B5ADFA45ADC96ECCFA0DA3F8C | CVE-2019-3586, CVE-2019-3582 |
| EDF4D11AC7F6EECBE93A99847FB8AF2900ADC651 | CVE-2019-3586, CVE-2019-3582 |
| F7A923E5E9D9544630D8327A4FD2E2233CD23FD3 | CVE-2019-3586, CVE-2019-3582 |
| 26C65748BD62F4F3FAA7856001ADCC18EB2D0DF7 | CVE-2019-3586, CVE-2019-3582 |
| 43444D020DA5F91E20D3DA31CB6B70B86EBAF27D | CVE-2019-3586, CVE-2019-3582 |
Endpoint Application Vulnerabilities
OPSWAT File-based Vulnerability Engine added support to detect the following application vulnerabilities
| PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
|---|---|---|---|---|---|
| Java SE Development Kit | Oracle Corporation | 8.0.1620 and prior | CVE-2018-2799 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2799 | 5.0 |
| Java | Oracle Corporation | 8.0.1620 and prior | CVE-2018-2799 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2799 | 5.0 |
| Java | Oracle Corporation | 8.0.1620 and prior | CVE-2018-2799 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-2799 | 5.0 |
| PHP | The PHP Group | 7.2.12 and prior | CVE-2018-19518 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-19518 | 8.5 |
| PHP | The PHP Group | 7.3.7.999998 and prior | CVE-2019-11042 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11042 | 5.8 |
| PHP | The PHP Group | 7.3.7.999998 and prior | CVE-2019-11041 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11041 | 5.8 |
