Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.
Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the MetaDefender database during the week of January 22 - January 29, 2018. The second table lists the hashes and application installers for which support was added.
Newly Supported CVEs and Product Versions as of January 29, 2018
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0797 | https://nvd.nist.gov/vuln/detail/CVE-2018-0797 | 9.3 |
Microsoft Word | Microsoft Corporation | 15 and prior | CVE-2018-0795 | https://nvd.nist.gov/vuln/detail/CVE-2018-0795 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0794 | https://nvd.nist.gov/vuln/detail/CVE-2018-0794 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0793 | https://nvd.nist.gov/vuln/detail/CVE-2018-0793 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0792 | https://nvd.nist.gov/vuln/detail/CVE-2018-0792 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0802 | https://nvd.nist.gov/vuln/detail/CVE-2018-0802 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0801 | https://nvd.nist.gov/vuln/detail/CVE-2018-0801 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0798 | https://nvd.nist.gov/vuln/detail/CVE-2018-0798 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0804 | https://nvd.nist.gov/vuln/detail/CVE-2018-0804 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0805 | https://nvd.nist.gov/vuln/detail/CVE-2018-0805 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0806 | https://nvd.nist.gov/vuln/detail/CVE-2018-0806 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0807 | https://nvd.nist.gov/vuln/detail/CVE-2018-0807 | 9.3 |
Microsoft Word | Microsoft Corporation | 16 and prior | CVE-2018-0812 | https://nvd.nist.gov/vuln/detail/CVE-2018-0812 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0797 | https://nvd.nist.gov/vuln/detail/CVE-2018-0797 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0796 | https://nvd.nist.gov/vuln/detail/CVE-2018-0796 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0795 | https://nvd.nist.gov/vuln/detail/CVE-2018-0795 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0794 | https://nvd.nist.gov/vuln/detail/CVE-2018-0794 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0793 | https://nvd.nist.gov/vuln/detail/CVE-2018-0793 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0792 | https://nvd.nist.gov/vuln/detail/CVE-2018-0792 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0791 | https://nvd.nist.gov/vuln/detail/CVE-2018-0791 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0802 | https://nvd.nist.gov/vuln/detail/CVE-2018-0802 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0801 | https://nvd.nist.gov/vuln/detail/CVE-2018-0801 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0798 | https://nvd.nist.gov/vuln/detail/CVE-2018-0798 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0804 | https://nvd.nist.gov/vuln/detail/CVE-2018-0804 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0805 | https://nvd.nist.gov/vuln/detail/CVE-2018-0805 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0806 | https://nvd.nist.gov/vuln/detail/CVE-2018-0806 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0807 | https://nvd.nist.gov/vuln/detail/CVE-2018-0807 | 9.3 |
Microsoft Office | Microsoft Corporation | 16 and prior | CVE-2018-0812 | https://nvd.nist.gov/vuln/detail/CVE-2018-0812 | 9.3 |
Microsoft Excel | Microsoft Corporation | 16 and prior | CVE-2018-0796 | https://nvd.nist.gov/vuln/detail/CVE-2018-0796 | 9.3 |
Microsoft Outlook | Microsoft Corporation | 16 and prior | CVE-2018-0791 | https://nvd.nist.gov/vuln/detail/CVE-2018-0791 | 9.3 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2698 | https://nvd.nist.gov/vuln/detail/CVE-2018-2698 | 4.1 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2688 | https://nvd.nist.gov/vuln/detail/CVE-2018-2688 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2687 | https://nvd.nist.gov/vuln/detail/CVE-2018-2687 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2686 | https://nvd.nist.gov/vuln/detail/CVE-2018-2686 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2685 | https://nvd.nist.gov/vuln/detail/CVE-2018-2685 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2676 | https://nvd.nist.gov/vuln/detail/CVE-2018-2676 | 4.3 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2689 | https://nvd.nist.gov/vuln/detail/CVE-2018-2689 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2690 | https://nvd.nist.gov/vuln/detail/CVE-2018-2690 | 4.4 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2693 | https://nvd.nist.gov/vuln/detail/CVE-2018-2693 | 4.1 |
Oracle VM VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2694 | https://nvd.nist.gov/vuln/detail/CVE-2018-2694 | 4.1 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2698 | https://nvd.nist.gov/vuln/detail/CVE-2018-2698 | 4.1 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2688 | https://nvd.nist.gov/vuln/detail/CVE-2018-2688 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2687 | https://nvd.nist.gov/vuln/detail/CVE-2018-2687 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2686 | https://nvd.nist.gov/vuln/detail/CVE-2018-2686 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2685 | https://nvd.nist.gov/vuln/detail/CVE-2018-2685 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2676 | https://nvd.nist.gov/vuln/detail/CVE-2018-2676 | 4.3 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2689 | https://nvd.nist.gov/vuln/detail/CVE-2018-2689 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2690 | https://nvd.nist.gov/vuln/detail/CVE-2018-2690 | 4.4 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2693 | https://nvd.nist.gov/vuln/detail/CVE-2018-2693 | 4.1 |
VirtualBox | Oracle Corporation | 5.1.18 and prior | CVE-2018-2694 | https://nvd.nist.gov/vuln/detail/CVE-2018-2694 | 4.1 |
Newly Supported Hashes as of January 29, 2018

- Academy 10
- Advanced Threat Prevention 54
- CEO's Blog 20
- Certification 28
- Company Announcements 30
- CTO's Blog 23
- CVEs 183
- Deep CDR 40
- Email Threat Prevention 21
- Kiosk & USB Security 31
- Product Announcements 169
- Reports 28
- Secure Access 22
- Technology Partnerships 36
- Vulnerabilities 21
- Secure Data Storage 3
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- OPSWAT Released a New Advanced Email Security Comparison Guide
- Infographic: File Upload Security – A Mission Against Malware
- Can You Spot the Social Engineering Techniques in a Phishing Email?
- Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- Police Handing Out Malware-Infected USBs Is Not an Isolated Incident
- 10 Things to Include in Your Employee Cyber Security Policy
- 11 of the Largest Data Breaches of All Time (Updated)