Quantcast
Channel: OPSWAT blogs
Viewing all 267 articles
Browse latest View live

Metadefender CVEs, Hashes, Application Installers Report: April 10-17

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of April 10-17, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of April 17, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
WireStackWireStack2.2.0 and priorCVE-2016-7957https://nvd.nist.gov/vuln/detail/CVE-2016-79575
WireStackWireStack2.2.0 and priorCVE-2016-7958https://nvd.nist.gov/vuln/detail/CVE-2016-79585
Google ChromeGoogle Inc.31.0.1650.47 and priorCVE-2013-6629https://nvd.nist.gov/vuln/detail/CVE-2013-66295
SafariApple Inc.10.0.3 and priorCVE-2017-2460https://nvd.nist.gov/vuln/detail/CVE-2017-24606.8
SafariApple Inc.10.0.3 and priorCVE-2017-2476https://nvd.nist.gov/vuln/detail/CVE-2017-24766.8
SafariApple Inc.10.0.3 and priorCVE-2017-2459https://nvd.nist.gov/vuln/detail/CVE-2017-24596.8
SafariApple Inc.10.0.3 and priorCVE-2017-2454https://nvd.nist.gov/vuln/detail/CVE-2017-24546.8
SafariApple Inc.10.0.3 and priorCVE-2017-2455https://nvd.nist.gov/vuln/detail/CVE-2017-24556.8
SafariApple Inc.10.0.3 and priorCVE-2017-2466https://nvd.nist.gov/vuln/detail/CVE-2017-24666.8
SafariApple Inc.10.0.3 and priorCVE-2017-2471https://nvd.nist.gov/vuln/detail/CVE-2017-24716.8
SafariApple Inc.22 and priorCVE-2017-5949https://nvd.nist.gov/vuln/detail/CVE-2017-59497.5
SafariApple Inc.18 and priorCVE-2016-10226https://nvd.nist.gov/vuln/detail/CVE-2016-102265
SafariApple Inc.18 and priorCVE-2016-10222https://nvd.nist.gov/vuln/detail/CVE-2016-102225

 

Newly Supported Hashes and Installers as of April 17, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAME
C959E7D82203D234EB4912C61F05A450417C8C36碌Torrent53.2.0Installer for uTorrent #installeruTorrent-3.2.0.exe
BBD5FA59ADC718E21609DC597AE4D05C44DE154E碌Torrent53.2.1.28086Installer for uTorrent #installeruTorrent-3.2.1.28086.exe
58129736B0B7BFD26B41A4129E0FCDF89C86CD7F碌Torrent53.2.2.28595Installer for uTorrent #installeruTorrent-3.2.2.28595.exe
3176D4803E93F04FB2A4882D78EE4117650B8A32碌Torrent53.2.3.28705Installer for uTorrent #installeruTorrent-3.2.3.28705.exe
D2408C8A09A2BD9704AF39F818EC7AC9E9CCA46E碌Torrent53.3.0.29677Installer for uTorrent #installeruTorrent-3.3.0.29677.exe
730403C01155DC4458231B29EE5E946C659264A1碌Torrent53.3.1.30017Installer for uTorrent #installeruTorrent-3.3.1.30017.exe
3FC0194F5C0DC4AA9D0204670739C2668F1D893B碌Torrent53.3.2.30586Installer for uTorrent #installeruTorrent-3.3.2.30586.exe
B630E7655C122021DAD84EF677BD056AB44A352B碌Torrent53.4.0.30660Installer for uTorrent #installeruTorrent-3.4.0.30660.exe
46B0575E671C7251654651A7161074EE374E9605碌Torrent53.4.1.31395Installer for uTorrent #installeruTorrent-3.4.1.31395.exe
46A3486892A2CA36503B7BF3711250D7DB646EE4碌Torrent53.4.2.31515Installer for uTorrent #installeruTorrent-3.4.2.31515.exe
1F9AB83EDEB4B8AE3A0CE040A18A2D2FA780AD13碌Torrent53.4.2.35702Installer for uTorrent #installeruTorrent-3.4.2.35702.exe
290A546F9DDEE15492BAED3247C57665EF160334碌Torrent53.4.2.39744Installer for uTorrent #installeruTorrent-3.4.2.39744.exe
477546F75761C3FB17630D0F7401BA46B6992A69碌Torrent53.4.3.39944Installer for uTorrent #installeruTorrent-3.4.3.39944.exe
47E74CBFFC55C43A0D0BA2F9085FEF934A89A0E4碌Torrent53.4.3.40633Installer for uTorrent #installeruTorrent-3.4.3.40633.exe
3319376D63663C6FB678884D226FF3851895BBCA碌Torrent53.4.4.40911Installer for uTorrent #installeruTorrent-3.4.4.40911.exe
9AD3FF714D627FFF64A4A0AE28DD0873B41FD67A碌Torrent53.4.5.41073Installer for uTorrent #installeruTorrent-3.4.5.41073.exe
C1B83954974E8BDD58F4AECBA2D8CF49787B8E9C碌Torrent53.4.5.41865Installer for uTorrent #installeruTorrent-3.4.5.41865.exe
8E2A07DC9A2EFD34A1BE3803FD64CE3EBB4230D2碌Torrent53.4.6.42178Installer for uTorrent #installeruTorrent-3.4.6.42178.exe
6DC1263A9A015273E4433A551260F9DF532F308A碌Torrent53.4.7.42330Installer for uTorrent #installeruTorrent-3.4.7.42330.exe
B670548BAE6AB222F9C02C42371CA4BC127AE528碌Torrent53.4.8.42548Installer for uTorrent #installeruTorrent-3.4.8.42548.exe
672E90D2BA663691A04AF30E527E6E5A30E6CEFE碌Torrent53.4.8.42576Installer for uTorrent #installeruTorrent-3.4.8.42576.exe
74E32C0A7078B749DD72FBF78ACBF57A4AED8889碌Torrent53.4.9.42606Installer for uTorrent #installeruTorrent-3.4.9.42606.exe
A2F899C2E7B8BF71A3DB849883BE4A296427D62E碌Torrent53.4.9.43295Installer for uTorrent #installeruTorrent_3.4.9.43295.exe
BE9BCA8AE0FF6119D6CFEF763331F2D8B4AFD241碌Torrent53.4.9.43388Installer for uTorrent #installeruTorrent_3.4.9.43388.exe
ECD4762C7709BBE9328681DB439B515963FB6E5F碌Torrent53.5.0.43534Installer for uTorrent #installeruTorrent_3.5.0.43534.exe
AB6D3F8444D8B4BAF71472127CC7EC1DE621A524碌Torrent53.5.0.43580Installer for uTorrent #installeruTorrent_3.5.0.43580.exe
AC5E7F806A14B2C3C2EAD8999887D5C49990A412BitTorrent37.8.2.30489Installer for BitTorrent #installerbittorrent_7.8.2.30489.exe
EEB59D011C7EFCFF927266E3607E9548C6F6898EBitTorrent37.8.2.30545Installer for BitTorrent #installerbittorrent_7.8.2.30545.exe
4645241E879E2A5A7FD601A92169738F1D46A4B7BitTorrent37.8.2.30571Installer for BitTorrent #installerbittorrent_7.8.2.30571.exe
B91662209DE3858DC5984058086F439F6B2EB16BBitTorrent37.8.2.30587Installer for BitTorrent #installerBitTorrent_7.8.2.30587.exe
3FD0E5B366B23B95E74EF1F9614C16C23184C1E4BitTorrent37.9.0.30621Installer for BitTorrent #installerBitTorrent_7.9.0.30621.exe
CA3E6069992FAAB6BB8AD8D4E8F0776B7A5F717FBitTorrent37.9.0.30637Installer for BitTorrent #installerBitTorrent_7.9.0.30637.exe
17163F51304FE6F67830F6E86D8CBF55ADFC24CFBitTorrent37.9.0.30659Installer for BitTorrent #installerBitTorrent_7.9.0.30659.exe
CECDCABEE460D75C95028661A9D36B2A55521EC1BitTorrent37.9.1.30739Installer for BitTorrent #installerBitTorrent_7.9.1.30739.exe
2C0800DF3A43E4001CC8ACA7186D4DC3DD2F75A3BitTorrent37.9.1.30769Installer for BitTorrent #installerBitTorrent_7.9.1.30769.exe
90EA4CB84686573696B1B369DA61EBC5162BE7C5BitTorrent37.9.1.30889Installer for BitTorrent #installerBitTorrent_7.9.1.30889.exe
B835518BF6F88265F956E4B048D08440B5CDE0F6BitTorrent37.9.1.31141Installer for BitTorrent #installerBitTorrent_7.9.1.31141.exe
13127F5081FD0D717F8C17670A19B484A684343DBitTorrent37.9.1.31228Installer for BitTorrent #installerBitTorrent_7.9.1.31228.exe
25EA3B20C88ECB00C4D1FBD1C86EFF3E5AF65A1CBitTorrent37.9.1.31396Installer for BitTorrent #installerBitTorrent_7.9.1.31396.exe
7BF752B6CEE510D0CFA88839143BE2F0E838F791BitTorrent37.9.2.31516Installer for BitTorrent #installerBitTorrent_7.9.2.31516.exe
8893580829AE06F0CAC42303D43E1B73841EE19BBitTorrent37.9.2.31638Installer for BitTorrent #installerBitTorrent_7.9.2.31638.exe
2A940F0E32B54B27A29CB9B69D05DD9870135865BitTorrent37.9.2.31744Installer for BitTorrent #installerBitTorrent_7.9.2.31744.exe
33725DC101115C7F61C35062DDAD596CD3AC22D6BitTorrent37.9.2.31897Installer for BitTorrent #installerBitTorrent_7.9.2.31897.exe
C761D8D9D47C9343989D5C95288322F8C2948A2BBitTorrent37.9.2.32087Installer for BitTorrent #installerBitTorrent_7.9.2.32087.exe
5D8675E6BFA2C2B233CBE5B7C17EC545C150C8E8BitTorrent37.9.2.32241Installer for BitTorrent #installerBitTorrent_7.9.2.32241.exe
0F56A85F9C5F6FB102E194BB1980AD9C120465A3BitTorrent37.9.1.32344Installer for BitTorrent #installerBitTorrent_7.9.1.32344.exe
DF5F0F8A7DF24E14A872B5037E5C0F227DB2E4D2BitTorrent37.9.2.32355Installer for BitTorrent #installerBitTorrent_7.9.2.32355.exe
19E8FB9ACACBAF3498A8AA9D55D2F91ED3A2E637BitTorrent37.9.2.32507Installer for BitTorrent #installerBitTorrent_7.9.2.32507.exe
16495C1A60A99EF10749795A9F78795618B4707ABitTorrent37.9.1.32550Installer for BitTorrent #installerBitTorrent_7.9.1.32550.exe
F4E4A6463FD1C441823741F87B375F08B814F408BitTorrent37.9.2.32692Installer for BitTorrent #installerBitTorrent_7.9.2.32692.exe
9F40E92A0247E3582AC66AD83BA18D1217C528CCBitTorrent37.9.2.32895Installer for BitTorrent #installerBitTorrent_7.9.2.32895.exe
8EAE2EE63C8CAFFB8757A702FC7355F938806C0CBitTorrent37.9.2.33028Installer for BitTorrent #installerBitTorrent_7.9.2.33028.exe
F1266515A6C2AE856962184B5A0FF03EA9BA016CBitTorrent37.10.0.43581Installer for BitTorrent #installerBitTorrent_7.10.0.43581.exe
AF8DABD1F989E328BEC8678B35F59E09B200AFB9BitTorrent37.9.9.43389Installer for BitTorrent #installerBitTorrent_7.9.9.43389.exe
A114EB483B636C13A863DA93E857853451A73267BitTorrent37.9.9.43364Installer for BitTorrent #installerBitTorrent_7.9.9.43364.exe
74AB8F001F405C2C831995BD8845BC9F789CC8BFBitTorrent37.9.9.43296Installer for BitTorrent #installerBitTorrent_7.9.9.43296.exe
B7E0B1FCDD2BC2DB49CE1FB5224957F402B6C734BitTorrent37.9.9.43086Installer for BitTorrent #installerBitTorrent_7.9.9.43086.exe
D219DB0BFB99B1BD1DE6855793E40B6741215F0FBitTorrent37.9.9.42974Installer for BitTorrent #installerBitTorrent_7.9.9.42974.exe
36B22B359CC06A55D6D9D254879CDEB094F66505BitTorrent37.9.9.42924Installer for BitTorrent #installerBitTorrent_7.9.9.42924.exe
CA6F5687645639C6A14FD618706F023A83E4251EBitTorrent37.9.9.42607Installer for BitTorrent #installerBitTorrent_7.9.9.42607.exe
FE078A8B85AE07A229806EA9DB68C7A93718455CBitTorrent37.9.8.42577Installer for BitTorrent #installerBitTorrent_7.9.8.42577.exe
83B3EF9310B6429B9D87C291EC68A17598A0791EBitTorrent37.9.8.42549Installer for BitTorrent #installerBitTorrent_7.9.8.42549.exe
4B770AC8BE3F8B92D51B217011207C84637DDDB9BitTorrent37.9.8.42502Installer for BitTorrent #installerBitTorrent_7.9.8.42502.exe
04CAFDEBE4D862C5A90BFBE1FDCF523FCE18F7E6BitTorrent37.9.7.42331Installer for BitTorrent #installerBitTorrent_7.9.7.42331.exe
E5C3C49DB7A6F41E84A3B82DD256F67950C2136BBitTorrent37.9.6.42179Installer for BitTorrent #installerBitTorrent_7.9.6.42179.exe
A24A66BDC9ED2BC9F8BCA1308F422477D0C04C98BitTorrent37.9.6.42095Installer for BitTorrent #installerBitTorrent_7.9.6.42095.exe
ADFAD296A7D4FBE43691E428985EB74D2A19B449BitTorrent37.9.5.41866Installer for BitTorrent #installerBitTorrent_7.9.5.41866.exe
5CEAD6E0B152C512E9E16849FB8F365B8AFCFD0EBitTorrent37.9.5.41822Installer for BitTorrent #installerBitTorrent_7.9.5.41822.exe
79FD29B69B5F6F1E81949EEE683279E4D9F6A4D4BitTorrent37.9.5.41802Installer for BitTorrent #installerBitTorrent_7.9.5.41802.exe
DBF1156C9DC942723C167070EF2F4272276AD420BitTorrent37.9.5.41713Installer for BitTorrent #installerBitTorrent_7.9.5.41713.exe
6B37830CCB903E29974A058CC0D987C9FD7A3C7FBitTorrent37.9.5.41629Installer for BitTorrent #installerBitTorrent_7.9.5.41629.exe
DBB2CF6AC35886A30E4E84F5A21573193A5C7B22BitTorrent37.9.5.41373Installer for BitTorrent #installerBitTorrent_7.9.5.41373.exe
CFF989B71728CFDD0ADD54004298C6F5D00408AABitTorrent37.9.5.41203Installer for BitTorrent #installerBitTorrent_7.9.5.41203.exe
D69872975493247A3F282115E0D1E035FAECF974BitTorrent37.9.5.41163Installer for BitTorrent #installerBitTorrent_7.9.5.41163.exe
AFBAB84B382CB895B5F44A3A62F5168BFA186828BitTorrent37.9.5.41074Installer for BitTorrent #installerBitTorrent_7.9.5.41074.exe
6C97C9CE8CB57B16DB6E5D7D6CC92394990B879ABitTorrent37.9.4.40912Installer for BitTorrent #installerBitTorrent_7.9.4.40912.exe
C551E68892CD9F0374D3DD87B692300A228FD00BBitTorrent37.9.3.40761Installer for BitTorrent #installerBitTorrent_7.9.3.40761.exe
4DA392AB4FD43C43F58E954E125DB25F16D9A622BitTorrent37.9.3.40634Installer for BitTorrent #installerBitTorrent_7.9.3.40634.exe
9B270BE1FD4C1EDB289D58E91589C7F7647D7B1ABitTorrent37.9.3.40299Installer for BitTorrent #installerBitTorrent_7.9.3.40299.exe
7A8425D8DAD8E153088D6BB5A296B0BFA0B8D1C4BitTorrent37.9.3.40209Installer for BitTorrent #installerBitTorrent_7.9.3.40209.exe
C80EFFBE5A703258661716817E9815EE818528FCBitTorrent37.9.3.40101Installer for BitTorrent #installerBitTorrent_7.9.3.40101.exe
CB0EC9D95A20DB5282801C560FAC7B2831B98862BitTorrent37.9.3.39947Installer for BitTorrent #installerBitTorrent_7.9.3.39947.exe
336038F36184B071A7DCC795F49FCA5122B6CE77BitTorrent37.9.2.39745Installer for BitTorrent #installerBitTorrent_7.9.2.39745.exe
435FDDD534A1D707986120F7A7FCD0A86DA9B113BitTorrent37.9.2.39589Installer for BitTorrent #installerBitTorrent_7.9.2.39589.exe
B8561199EC154D63BEC6E7A647DBA6C7D329F151BitTorrent37.9.2.38914Installer for BitTorrent #installerBitTorrent_7.9.2.38914.exe
8ACB255C418EF2CB1F106C1054C9CF5649D13EA9BitTorrent37.9.2.38759Installer for BitTorrent #installerBitTorrent_7.9.2.38759.exe
B3D6C7751E31EE2EBF9F1482B340186C9A484B5EBitTorrent37.9.2.38657Installer for BitTorrent #installerBitTorrent_7.9.2.38657.exe
9A6A49BE3E9314D3E1451D9A4A77360406BE56B0BitTorrent37.9.2.38430Installer for BitTorrent #installerBitTorrent_7.9.2.38430.exe
A4F6F34286089862D7958E6A680B10541E8EC47CBitTorrent37.9.2.38398Installer for BitTorrent #installerBitTorrent_7.9.2.38398.exe
CF7890268BEFBC5BA71D5EA48E65C89D481856DABitTorrent37.9.2.38258Installer for BitTorrent #installerBitTorrent_7.9.2.38258.exe
B9851797901FDF99AC155A4C0A6973DAC7B0B516BitTorrent37.9.2.37954Installer for BitTorrent #installerBitTorrent_7.9.2.37954.exe
7094CA3E6DB9CE2F9477D70FD426205D9CE889C3BitTorrent37.9.2.37755Installer for BitTorrent #installerBitTorrent_7.9.2.37755.exe
2CAC0414C63F7D5C7709C8323264F05E5ABE016BBitTorrent37.9.2.37596Installer for BitTorrent #installerBitTorrent_7.9.2.37596.exe
5B7FE73DB85FE677E4892759CF3334290D279C7DBitTorrent37.9.2.37251Installer for BitTorrent #installerBitTorrent_7.9.2.37251.exe
8BA9F62B98DD4AE6EF86485A114C73CEEE75DF59BitTorrent37.9.2.37124Installer for BitTorrent #installerBitTorrent_7.9.2.37124.exe
95A14507D38F2954C0D3570D96761857E91D1B22BitTorrent37.9.2.36804Installer for BitTorrent #installerBitTorrent_7.9.2.36804.exe
0F8C6F8A0D3A82EAB930D24FF8A1EA3786DCF3ABBitTorrent37.9.2.36618Installer for BitTorrent #installerBitTorrent_7.9.2.36618.exe
BC115F42CCF4F257FDB7238A4D46816A07345E50BitTorrent37.9.2.36321Installer for BitTorrent #installerBitTorrent_7.9.2.36321.exe
2926B0B17410ABC903B30E3ED106F5189D7C8EABBitTorrent37.9.2.36047Installer for BitTorrent #installerBitTorrent_7.9.2.36047.exe
E5723566D49B7A3398ECEA1F3C46DCC1E00016A2BitTorrent37.9.2.35704Installer for BitTorrent #installerBitTorrent_7.9.2.35704.exe
905349DD1BDCC07FFB0843E74CFE0DC4758813C8BitTorrent37.9.2.35144Installer for BitTorrent #installerBitTorrent_7.9.2.35144.exe
7E2E324E64CBEDB7AC3F30421712509404B312DABitTorrent37.9.2.34947Installer for BitTorrent #installerBitTorrent_7.9.2.34947.exe
300EC3AE57BFDEB08C31AA8CF78F16CEAAE2BD76BitTorrent37.9.2.34728Installer for BitTorrent #installerBitTorrent_7.9.2.34728.exe
0D4D444F63BB0130A5C6ACEE0D0753B7FFD81BABBitTorrent37.9.2.34543Installer for BitTorrent #installerBitTorrent_7.9.2.34543.exe
50DCAC6A9F24FE8030A3FD209E4E2875D9CE6038BitTorrent37.9.2.34312Installer for BitTorrent #installerBitTorrent_7.9.2.34312.exe
93050B79639E58BF31EDFDD10158EA2DF2577DFDBitTorrent37.9.2.34026Installer for BitTorrent #installerBitTorrent_7.9.2.34026.exe
E5F734415517A4B58E2E2BF43E95155C3CCB248EBitTorrent37.9.2.33876Installer for BitTorrent #installerBitTorrent_7.9.2.33876.exe
6FEDC331EE8F7CA9A526D8C9AC3F08A366E6BA75BitTorrent37.9.2.33798Installer for BitTorrent #installerBitTorrent_7.9.2.33798.exe
1616E6FD0D81664AE66C2E48AD4ABCF283DE6B22BitTorrent37.9.2.33498Installer for BitTorrent #installerBitTorrent_7.9.2.33498.exe
D7477FF56AC58FBE3B407F6B674A4708BE8E78DDBitTorrent37.9.2.33395Installer for BitTorrent #installerBitTorrent_7.9.2.33395.exe
0A11A9C66A649AD8CBBBFDACE2586218DBCAF2FBBitTorrent37.9.2.33263Installer for BitTorrent #installerBitTorrent_7.9.2.33263.exe
609C6576C3005343EDB69FDA2EF975BEE3D8F3BCBitTorrent37.9.2.33081Installer for BitTorrent #installerBitTorrent_7.9.2.33081.exe
E9A111E5BB1DA930244364C14BDF284EDF7D9EADActivePerl2965.22.2.2203Installer for ActivePerl x86 #installerActivePerl-5.22.2.2203-MSWin32-x86-64int-401627.exe
9B473674E08363B88E0788A2FB42D56D4FEFBCF3ActivePerl2965.22.2.2203Installer for ActivePerl x64 #installerActivePerl-5.22.2.2203-MSWin32-x64-401627.exe
15055066072C24702BDFBE1331D6EC9437DFE250ActivePerl2965.22.3.2204Installer for ActivePerl x64 #installerActivePerl-5.22.3.2204-MSWin32-x64-401627.exe
0A3ED7F4A0A816404165E8C6895F17E88610BE4AActivePerl2965.22.3.2204Installer for ActivePerl x86 #installerActivePerl-5.22.3.2204-MSWin32-x86-64int-401627.exe
15F466EEA0479D717E45190FED32AE58E8E2B894ActivePerl2965.24.0.2401Installer for ActivePerl x64 #installerActivePerl-5.24.0.2401-MSWin32-x64-401627.exe
0E638DE7FF7F09926B44BD0C23A9A9EA4116D744ActivePerl2965.24.0.2401Installer for ActivePerl x86 #installerActivePerl-5.24.0.2401-MSWin32-x86-64int-401627.exe
35192E311659A5BE6F867AF0AFB704E040EA2337ActivePerl2965.24.1.2402Installer for ActivePerl x64 #installerActivePerl-5.24.1.2402-MSWin32-x64-401627.exe
662819839060C0BB0B3CE58822AE7FE7DB398B54ActivePerl2965.24.1.2402Installer for ActivePerl x86 #installerActivePerl-5.24.1.2402-MSWin32-x86-64int-401627.exe
ECFD21C5D080788C22D5C5E5FAB9147B3BAB45D7Adobe AIR10525.0.0.134Installer for Adobe Air #installerAdobeAIRInstaller_25.0.0.134.exe
DA3710BE1BB1C64E89B43DED9BE9F5A5FD737A40Adobe AIR10524.0.0.180Installer for Adobe Air #installerAdobeAIRInstaller_24.0.0.180.exe
6D21C5F7C6B5854B8460288F9210ACDA7C0E5B40Adobe AIR10523.0.0.257Installer for Adobe Air #installerAdobeAIRInstaller_23.0.0.257.exe
B62579B7C01F0F954D374C60C6B09E8A33D9AA32Adobe AIR10522.0.0.153Installer for Adobe Air #installerAdobeAIRInstaller_22.0.0.153.exe
D8360785C749BD37FB246016BDC5A76761E0A2CDAdobe AIR10521.0.0.215Installer for Adobe Air #installerAdobeAIRInstaller_21.0.0.215.exe
2FDD561556FE881C4E5538D4EE37F523871BEFD3Adobe AIR10520.0.0.260Installer for Adobe Air #installerAdobeAIRInstaller_20.0.0.260.exe
7161FB8B47721485882F52720F8B41DBFE3B69D0Adobe AIR10520.0.0.233Installer for Adobe Air #installerAdobeAIRInstaller_20.0.0.233.exe
9C10B7BE43771869C381C73197C9A0FCD1B727CFAdobe AIR10520.0.0.204Installer for Adobe Air #installerAdobeAIRInstaller_20.0.0.204.exe
ED0E55D3913F9EEAE09C367FA5B796B6025945A4Adobe AIR10519.0.0.241Installer for Adobe Air #installerAdobeAIRInstaller_19.0.0.241.exe
3BC2A568204A3A9B59CA347AB49585F0C5FAB279Adobe AIR10519.0.0.213Installer for Adobe Air #installerAdobeAIRInstaller_19.0.0.213.exe
6C8DD3EDE44B6A254C87D93E53754D34411391D6Adobe AIR10518.0.0.199Installer for Adobe Air #installerAdobeAIRInstaller_18.0.0.199.exe
73A32A408630CD7D5F3CA65DEA955D7F20717059Adobe AIR10518.0.0.180Installer for Adobe Air #installerAdobeAIRInstaller_18.0.0.180.exe
D0C7844F0D455599C073063ABF6A5FECA79A64F1Adobe AIR10518.0.0.144Installer for Adobe Air #installerAdobeAIRInstaller_18.0.0.144.exe
3AF3BCF6145D4EBCA19D7F8B4CD11EE21B67F734Adobe AIR10517.0.0.172Installer for Adobe Air #installerAdobeAIRInstaller_17.0.0.172.exe
17D0C6106450EF1092377232A61738ABFD9BA7F0Adobe AIR10517.0.0.1Installer for Adobe Air #installerAdobeAIRInstaller_17.0.0.144.exe
C0E6B8B1ED5FFA282945D21B21F8A5E03FEBC904Adobe AIR10515.0.0.356Installer for Adobe Air #installerAdobeAIRInstaller_15.0.0.356.exe
46341F1358BC6E0B9DDEAE3591662A2AC68DC360Adobe AIR10515.0.0.293Installer for Adobe Air #installerAdobeAIRInstaller_15.0.0.293.exe
9CC98648C6FD2AEEB25AD7AB733BC7470BFC9CDDAdobe AIR10515.0.0.249Installer for Adobe Air #installerAdobeAIRInstaller_15.0.0.249.exe
E12781925D91B34F8587EE87BF7DE243C2FC1B47Adobe AIR10514.0.0.178Installer for Adobe Air #installerAdobeAIRInstaller_14.0.0.178.exe
A74677E3ED65316DEB15115FE205ADD3B6ADAF8CAdobe AIR10514.0.0.110Installer for Adobe Air #installerAdobeAIRInstaller_14.0.0.110.exe
065B6B5CF75625900D85CF1FAC4EAAB296E014DAAdobe AIR10513.0.0.111Installer for Adobe Air #installerAdobeAIRInstaller_13.0.0.111.exe
1D6A34D48F3526088DBE6A2D24852705051778D4Adobe AIR10513.0.0.83Installer for Adobe Air #installerAdobeAIRInstaller_13.0.0.83.exe
0034BDD4E0B2CE0FA6198B0B715FBA85754D9A57Adobe AIR1054.0.0.1390Installer for Adobe Air #installerAdobeAIRInstaller_4.0.0.1390.exe
CA29838C0870913100D7342FCA8E2415B997399DAdobe AIR1053.9.0.1380Installer for Adobe Air #installerAdobeAIRInstaller_3.9.0.1380.exe
706133251F49ED9F3B9722A078128BEF1C7A3BACAdobe AIR1053.9.0.1210Installer for Adobe Air #installerAdobeAIRInstaller_3.9.0.1210.exe
9CA7ADD6BC71A80CC11776E0BCB5C2C43C57E6BFAdobe AIR1053.9.0.1030Installer for Adobe Air #installerAdobeAIRInstaller_3.9.0.1030.exe
87FFF0F3429125A0462F8687A3FF9877BE3CBF76Adobe AIR1053.8.0.870Installer for Adobe Air #installerAdobeAIRInstaller_3.8.0.870.exe
9268CB998C9FC259B3CF45C28DE0FEF27595A7ABAdobe AIR1053.7.0.2090Installer for Adobe Air #installerAdobeAIRInstaller_3.7.0.2090.exe
7B93AEDAF48AD7854940E7A4E7D9394A255E888BAdobe AIR1052.0.2.12610Installer for Adobe Air #installerAdobeAIRInstaller_2.0.2.12610.exe
36E074582EF965236B3B27939D7726EE2241D194Adobe AIR1052.0.3.13070Installer for Adobe Air #installerAdobeAIRInstaller_2.0.3.13070.exe
30777FB08CDA81DBD279F50CF00E3F3F2577ABE0Adobe AIR1052.0.4.13090Installer for Adobe Air #installerAdobeAIRInstaller_2.0.4.13090.exe
ED083681B56DEEBBD8D79B161DC9D92B1FFC5316Adobe AIR1052.5.0.16600Installer for Adobe Air #installerAdobeAIRInstaller_2.5.0.16600.exe
2664207CA8E836F5070EE356064829A39785A92EAdobe AIR1052.5.1.17730Installer for Adobe Air #installerAdobeAIRInstaller_2.5.1.17730.exe
EE5E2158791BDE4B24D33C4754626C6D9496475BAdobe AIR1052.6.0.19120Installer for Adobe Air #installerAdobeAIRInstaller_2.6.0.19120.exe
3D9C2F9D8F3533424CFEA84D61FCB9464278D9FCAdobe AIR1052.6.0.19140Installer for Adobe Air #installerAdobeAIRInstaller_2.6.0.19140.exe
16CFBFAAE4A4C10AA5F5D0133B9C9734C37C0011Adobe AIR1052.7.0.19480Installer for Adobe Air #installerAdobeAIRInstaller_2.7.0.19480.exe
FF094D2A4DB221BED03CF7AD615EE97C74C4BC0AAdobe AIR1052.7.0.19530Installer for Adobe Air #installerAdobeAIRInstaller_2.7.0.19530.exe
DFA337D4B53E9D924356FEBC116450190FA183DDAdobe AIR1052.7.1.19610Installer for Adobe Air #installerAdobeAIRInstaller_2.7.1.19610.exe
9DFB19581C50EF3B6C72AD5B541F65969E1EB622Adobe AIR1053.0.0.4080Installer for Adobe Air #installerAdobeAIRInstaller_3.0.0.4080.exe
186C6C85F870A6E16C83788CFB5C2E56DE71C77EAdobe AIR1053.1.0.4880Installer for Adobe Air #installerAdobeAIRInstaller_3.1.0.4880.exe
166324BEA5FF3FEF9B62F7FD70B6C987D6AB2CE8Adobe AIR1053.2.0.2070Installer for Adobe Air #installerAdobeAIRInstaller_3.2.0.2070.exe
79E343179B81802EB6B055836EA4C04966A2E529Adobe AIR1053.3.0.3670Installer for Adobe Air #installerAdobeAIRInstaller_3.3.0.3670.exe
9E319E72AF7894E5E0FC593E7228BC26FB2B73E8Adobe AIR1053.4.0.2540Installer for Adobe Air #installerAdobeAIRInstaller_3.4.0.2540.exe
7E92E8E2D25479C116D63A776083A29B756F3AB9Adobe AIR1053.4.0.2710Installer for Adobe Air #installerAdobeAIRInstaller_3.4.0.2710.exe
E67BDD4FD8BD6B1BBC06024B0626FF19C069B5E8Adobe AIR1053.5.0.600Installer for Adobe Air #installerAdobeAIRInstaller_3.5.0.600.exe
95FC68C3E2D0E3E5102CD9F4DB63B014F9157B0FAdobe AIR1053.5.0.880Installer for Adobe Air #installerAdobeAIRInstaller_3.5.0.880.exe
48EF2618F0ECB9B87FB65F9B93066E0DE7E4D1D3Adobe AIR1053.5.0.1060Installer for Adobe Air #installerAdobeAIRInstaller_3.5.0.1060.exe
BE45AFA3B29A6BB211D9CAD8F5D8E6E12A4DF99BAdobe AIR1053.6.0.6090Installer for Adobe Air #installerAdobeAIRInstaller_3.6.0.6090.exe
0D70CFC4D00FE3C0D117ECFD70758DEA6A8C4E49Adobe AIR1053.7.0.1530Installer for Adobe Air #installerAdobeAIRInstaller_3.7.0.1530.exe
E118081BD6087FA5C0228D3506E2BD5F63A0F820Adobe AIR1053.7.0.1860Installer for Adobe Air #installerAdobeAIRInstaller_3.7.0.1860.exe
B45317CFA6F4673E1E0E609A0DCEB3C32DAAFF8CAdobe AIR1053.0.0.4080Installer for Adobe Air SDK #installerAdobeAIRSDK_3.0.0.4080.zip
597AE7B595E89659582F979A9846629F97BE8228Adobe AIR1053.2.0.2070Installer for Adobe Air SDK #installerAdobeAIRSDK_3.2.0.2070.zip
1D56E01F541E5581CA6AFE936C9D946559BFBF55Adobe AIR1053.3.0.3670Installer for Adobe Air SDK #installerAdobeAIRSDK_3.3.0.3670.zip
E44E35DA4B38FCB41132019E9A8B7D68C2FA325CAdobe AIR1053.4.0.2710Installer for Adobe Air SDK #installerAdobeAIRSDK_3.4.0.2710.zip
48392160AA69FC3AAC0326BB1B87CC1C29D89B05Adobe AIR1053.5.0.1060Installer for Adobe Air SDK #installerAdobeAIRSDK_3.5.0.1060.zip
648D125E265D496AA2BF7935E22E0B53F7496F10Adobe AIR1053.6.0.6090Installer for Adobe Air SDK #installerAdobeAIRSDK_3.6.0.6090.zip
15B7B7C551EC8EEF94FC6D44160944179BC8F34CAdobe AIR1053.7.0.2090Installer for Adobe Air SDK #installerAdobeAIRSDK_3.7.0.2090.zip
019A996CC1F2B30945A5666C3C9FFB4B773428B4Adobe AIR1053.8.0.1430Installer for Adobe Air SDK #installerAdobeAIRSDK_3.8.0.1430.zip
6835A6E4D145638C52FA5AE367FD2D93F80D84C6Adobe AIR1053.9.0.1380Installer for Adobe Air SDK #installerAdobeAIRSDK_3.9.0.1380.zip
6B630AAFCDCAC670169D0CEC7F599F3C05C75F2DAdobe AIR1054.0.0.1628Installer for Adobe Air SDK #installerAdobeAIRSDK_4.0.0.1628.zip
74C2B91734843BE238F027468E3CE0DBFBE7DCC2Adobe AIR10513.0.0.111Installer for Adobe Air SDK #installerAdobeAIRSDK_13.0.0.111.zip
DC7AE10F3244EA68D1FDA0111EFF93A2160ABAFEAdobe AIR10514.0.0.178Installer for Adobe Air SDK #installerAdobeAIRSDK_14.0.0.178.zip
F7412B3369E68A6CAD81C8B1F8F3ED50486FACCBAdobe AIR10515.0.0.356Installer for Adobe Air SDK #installerAdobeAIRSDK_15.0.0.356.zip
A9BC3198B1EF70096D237991EF9B8D3EF7D98D4CAdobe AIR1053.6.0.6090Adobe Air SDK and CompilerAIRSDK_Compiler_3.6.0.6090.zip
CE9FD7E5DE553DF5E8228A4792566B2EB04D8CC4Adobe AIR10515.0.0.356Adobe Air SDK and CompilerAIRSDK_Compiler_15.0.0.356.zip
6DFD6FA91D9863620A360D504B1B0A7D45CA8CBCGoToMeeting14128.3.0build6749Installer for GoToMeeing #installerG2MSetup8.3.0build6749_IT.msi
0533060E3A85A98D068468FA8F16D8BAADA2597FGoToMeeting14128.2.0build6634Installer for GoToMeeing #installerG2MSetup8.2.0build6634_IT.msi
B81A1990460CA67D0DA0C7F55ECB6242E28A0D1EGoToMeeting14128.1.0build6519Installer for GoToMeeing #installerG2MSetup8.1.0build6519_IT.msi
F521977125BE93B644599690E871227E857DAF81GoToMeeting14128.0.0build6441Installer for GoToMeeing #installerG2MSetup8.0.0build6441_IT.msi
C91F988A2419322355642931CCC8C1B4231B012DGoToMeeting14127.31.0build6291Installer for GoToMeeing #installerG2MSetup7.31.0build6291_IT.msi
1AACCF07EF6ADD1C875B6691239E0128C3A47812GoToMeeting14127.30.0build6140Installer for GoToMeeing #installerG2MSetup7.30.0build6140_IT.msi
BA2FD73E4456BCD55CE3A4DEE8FDC1802D6E8327GoToMeeting14127.28.0build6039Installer for GoToMeeing #installerG2MSetup7.28.0build6039_IT.msi
4BC075B0B4391D9DEDB7BD4EAD1931A3BDDF7669GoToMeeting14127.27.0build5922Installer for GoToMeeing #installerG2MSetup7.27.0build5922_IT.msi
6266BCB3942AC6C458C4CBF14943023EF6D458B8GoToMeeting14127.25.0build5742Installer for GoToMeeing #installerG2MSetup7.25.0build5742_IT.msi
1433F0DD01E548DCD9B3B2936F48B22F90E7377EGoToMeeting14127.24.0build5636Installer for GoToMeeing #installerG2MSetup7.24.0build5636_IT.msi
B5CDB5160D063427C403AF280D48E91478042BC0Dropbox1130.7.110Installer for Dropbox #installerDropbox 0.7.110.exe
23F4C8C73649C82A2521D9A1370503C961914FC0Dropbox254316.4.29Installer for Dropbox #installerDropbox 16.4.29.exe
8A8399D9CD5E407EDCBDC5A3C5B6FB3F603EDE56Dropbox254316.4.30Installer for Dropbox #installerDropbox 16.4.30.exe
C11AC81DC09695232D9330864CDA1861574C0E8DDropbox254317.4.33Installer for Dropbox #installerDropbox 17.4.33.exe
5BE8C6DEC64E45E7020A7123CE3B94E2BAF1320DDropbox254318.4.32Installer for Dropbox #installerDropbox 18.4.32.exe
9B1847AC5A2F5B2CE63CF32A4CB12C29AAE37675Dropbox254319.4.12Installer for Dropbox #installerDropbox 19.4.12.exe
E9FD469786BC14FC8E0D89AFCF00A7AD9E1FC1F0Dropbox254319.4.13Installer for Dropbox #installerDropbox 19.4.13.exe
E72B1FC1F9AF3FB4A9D0293948C6A706F910C371Dropbox254320.4.19Installer for Dropbox #installerDropbox 20.4.19.exe
6E0BD3FDF75995407D977920F7DAD23AF3A0E980Dropbox254321.4.25Installer for Dropbox #installerDropbox 21.4.25.exe
D8AA49AAC47465F1876A005C2893801880F2CE5ADropbox254323.4.17Installer for Dropbox #installerDropbox 23.4.17.exe
2D93666FD38FD57FF076DEF3ADA7E0058B3C08C8Dropbox254323.4.18Installer for Dropbox #installerDropbox 23.4.18.exe
CD2A6EE665F583973C4A99FE507EDCC935DFE267Silverlight1792.0.31005.0Installer for Silverlight x86 #installerSilverlight_2.0.31005.0.exe
4E0B53B32C4D1527B72A96D9DF8BAE4916F88DBBSilverlight1792.0.40115.0Installer for Silverlight x86 #installerSilverlight_2.0.40115.0.exe
E05A10EB3612021238F7A6FFDD632B4C4D4FC01FSilverlight1793.0.40624.0Installer for Silverlight x86 #installerSilverlight_3.0.40624.0.exe
3B2F5A27986F99871BC4A267F1A0B910CBB9E2A2Silverlight1793.0.40723.0Installer for Silverlight x86 #installerSilverlight_3.0.40723.0.exe
575187BC22CB23A051CDCFA237EE0D10D12E1E58Silverlight1793.0.40818.0Installer for Silverlight x86 #installerSilverlight_3.0.40818.0.exe
B2087200BDAD45A56EB1876D28C9318CB8058A7DSilverlight1793.0.50106.0Installer for Silverlight x86 #installerSilverlight_3.0.50106.0.exe
EC1DE49C23FE5DBAEF7E8D683357EB564BE5619DSilverlight1794.0.50401.0Installer for Silverlight x86 #installerSilverlight_4.0.50401.0.exe
E82E3266E7363707FFFB03D1A639B08D55FF5B28Silverlight1794.0.50524.0Installer for Silverlight x86 #installerSilverlight_4.0.50524.0.exe
8FDD43359550371664F14AC684CDA946A063AA60Silverlight1794.0.50826.0Installer for Silverlight x86 #installerSilverlight_4.0.50826.0.exe
99FA630130D20D2D848CE85A99B0F1FDD714C76ESilverlight1794.0.50917.0Installer for Silverlight x86 #installerSilverlight_4.0.50917.0.exe
8C290015896A1E20186D9795CE68BA82CCDD2CDCSilverlight1794.0.51204.0Installer for Silverlight x86 #installerSilverlight_4.0.51204.0.exe
06C01E36FBAC83FBDFE78F7DE548D1092442D5A2Silverlight1794.0.60129.0Installer for Silverlight x86 #installerSilverlight_4.0.60129.0.exe
BDC18E77EEB0BC240A6A9912F29695FD58FDE10FSilverlight1794.0.60310.0Installer for Silverlight x86 #installerSilverlight_4.0.60310.0.exe
4024A89498552165C280922A78484B0866429A6ESilverlight1794.0.60531.0Installer for Silverlight x86 #installerSilverlight_4.0.60531.0.exe
746439261B3DE6C527DA44013EF15B8DB6A78713Silverlight1794.0.60831.0Installer for Silverlight x86 #installerSilverlight_4.0.60831.0.exe
A0103619835BA3AFA884841565090811167A2888Silverlight1794.1.10111.0Installer for Silverlight x86 #installerSilverlight_4.1.10111.0.exe
74E650EC96B4BB9138352CCE9D6E8DA761D13E17Silverlight1795.0.60401.0Installer for Silverlight x86 #installerSilverlight_5.0.60401.0.exe
2F298CAE25D2E0E08A28779CBC74DE4E499C4834Silverlight1795.0.60818.0Installer for Silverlight x86 #installerSilverlight_5.0.60818.0.exe
19F4373FBA2807D7AACD08FA5CA6630F6D9735C3Silverlight1795.0.60818.0Installer for Silverlight x64 #installerSilverlight_x64_5.0.60818.0.exe
C98499E2A2F9AC0F8B70D301E3DEE4D4CC4A5F86Silverlight1795.0.61118.0Installer for Silverlight x64 #installerSilverlight_x64_5.0.61118.0.exe
F0C3C1BCE3802ADDCA966783A33DB1B668261FB5Silverlight1795.0.61118.0Installer for Silverlight x86 #installerSilverlight_5.0.61118.0.exe
7A811B061F742479D2E25CE5AC1A9908F5745BF1Silverlight1795.1.50906.0Installer for Silverlight x86 #installerSilverlight_5.1.50906.0.exe
D10A077BF0043A846F2F2A75962C2E068A060F10Silverlight1795.1.50906.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.50906.0.exe
16712886955BAB475549184015D425E3091A6357Silverlight1795.1.50905.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.50905.0.exe
97B56D4E390241AE1BAABE65D41E4080270BCB1BSilverlight1795.1.50905.0Installer for Silverlight x86 #installerSilverlight_5.1.50905.0.exe
A055DEAC127335F6C37683E8A3490413810B4620Silverlight1795.1.50901.0Installer for Silverlight x86 #installerSilverlight_5.1.50901.0.exe
F87EC374D924541B2EAEE2F33F1773DB72A40F6CSilverlight1795.1.50901.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.50901.0.exe
6E7C5E763EC6DBA646ADEC4A0BCBD88059750658Silverlight1795.1.50709.0Installer for Silverlight x86 #installerSilverlight_5.1.50709.0.exe
0222EC109D882A612D65C8EF8DAA04AF2F72F8FASilverlight1795.1.50709.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.50709.0.exe
DA10804AA6241288382BF860211D7DE591B4AED0Silverlight1795.1.50428.0Installer for Silverlight x86 #installerSilverlight_5.1.50428.0.exe
55BC2DF6024FDA20E62771ADA3966D513D077937Silverlight1795.1.50428.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.50428.0.exe
22B0BEAAAF181FCAF0166DDCDE8CBDC96D38DE52Silverlight1795.1.41212.0Installer for Silverlight x86 #installerSilverlight_5.1.41212.0.exe
55FD768B40CCF1286DD7555398E4116F2888FB3ASilverlight1795.1.41212.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.41212.0.exe
195336084CA1D97DF15A77AB07413C84EFF223BCSilverlight1795.1.41105.0Installer for Silverlight x86 #installerSilverlight_5.1.41105.0.exe
B393CC43946550F254C32A68D3489578C7B950C8Silverlight1795.1.41105.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.41105.0.exe
FE99D4C9C41E3445B2E50E8054F1C601DA310ACDSilverlight1795.1.40728.0Installer for Silverlight x86 #installerSilverlight_5.1.40728.0.exe
519637AF50CC4088894F514650951406075086D3Silverlight1795.1.40728.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.40728.0.exe
45F07952E2E6CF8BD972A733AACB213871D086F1Silverlight1795.1.40620.0Installer for Silverlight x86 #installerSilverlight_5.1.40620.0.exe
56ADE2A82B7083383C9E4453AF1DA0301B48AC53Silverlight1795.1.40620.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.40620.0.exe
5E77FD1CD6EBCC223B0BA9D6AAB9E8F2C3093937Silverlight1795.1.40416.0Installer for Silverlight x86 #installerSilverlight_5.1.40416.0.exe
2F3040E5F7028C2D42CFF848F361C06F3D237376Silverlight1795.1.40416.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.40416.0.exe
417D876A2F6BE969DDF931B122BBAF3BC10BA8D7Silverlight1795.1.30214.0Installer for Silverlight x86 #installerSilverlight_5.1.30214.0.exe
5AE9C457E2EFAC6C943F23045B2F0EEEA484D7F9Silverlight1795.1.30214.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.30214.0.exe
C15E492E7368FE764A16E9D95F452C615C7508DFSilverlight1795.1.20913.0Installer for Silverlight x86 #installerSilverlight_5.1.20913.0.exe
DC33546E8492FDB5AE0AB2A3A3EBDC681263ABE2Silverlight1795.1.20913.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.20913.0.exe
9537E817A99B2A1E2522FD60DBB85A3F4C5037C8Silverlight1795.1.20513.0Installer for Silverlight x86 #installerSilverlight_5.1.20513.0.exe
5791A4F1E1A399947079A2582046E6167DDB040DSilverlight1795.1.20513.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.20513.0.exe
786B5FE03D318F0F0E04EC2BC7F329E8CFC6E761Silverlight1795.1.20125.0Installer for Silverlight x86 #installerSilverlight_5.1.20125.0.exe
9428AC799E3DF919FCE3A67B9FA3AE91413EDE75Silverlight1795.1.20125.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.20125.0.exe
36A632E4533A9B6DAECF0B99C364DACBF58AA991Silverlight1795.1.10411.0Installer for Silverlight x86 #installerSilverlight_5.1.10411.0.exe
E799CE3C7E730FF6BAF6020CAF0351922733EB38Silverlight1795.1.10411.0Installer for Silverlight x64 #installerSilverlight_x64_5.1.10411.0.exe
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

Unpatched Vulnerabilities in BYOD Environments Leave Organizations Exposed to Attacks

$
0
0

Vulnerabilities

With botnets, DDoS attacks, and secret lists of exploits being all over the news in recent months, vulnerabilities should be top of mind for anyone who's concerned with cyber security, especially vulnerabilities in consumer devices.

While CISOs, IT administrators, and other security professionals will know better than to allow unsecured, vulnerable IoT devices in internal networks, the personal devices employees connect to networks can be just as risky.

BYOD environments, according to 2016 data from the Harvard Business Review, may actually be on the decline. However, more employees than ever are bringing personal devices to the office – perhaps even in defiance of organizational security requirements. "BYOD increased from 80% to 90% overall although the 'officially allowed' [BYOD policies] dropped by 18 percentage points," wrote Jane McConnell for the Harvard Business Review.

Those personal devices are often rife with known-yet-unpatched vulnerabilities.

Android devices, for example, are rarely updated by their users. In March 2017, Wired reported that "half of Android devices [went] unpatched in 2016." Even more chilling: "Less than three percent of Android phones run the operating system's latest version, Nougat." (Devices that run iOS have low update rates as well.)

Users remain the No. 1 weak link in security architecture. User reluctance to install updates and apply patches appears to be persistent. Such reluctance leaves their devices prone to exploits, obviously – but when those devices come into contact with corporate networks, the user's exposure becomes the organization's exposure.

It is likely that the best solution to the problem of user-introduced vulnerabilities is a combination of more robust network access control and better user education.

Network access control solutions can limit or block access for noncompliant devices. OPSWAT and OPSWAT's partners offer a number of solutions for more robust network access control.

User education is another major area where much progress can be made. Users may not fully comprehend the sheer volume of threats awaiting them and their employers on the internet – the place where they shop, socialize, read, entertain themselves, and conduct business every day. And they may not realize just how important it is to install updates and keep software updated in order to patch vulnerabilities.

They may not even be familiar with the concept of "vulnerabilities" or the necessity of security patches.

Five out of 6 users are not even aware of Android security patches, according to a recent survey. User obstinance would be an uncorrectable problem; user ignorance, on the other hand, can be addressed with training and education.

And finally, solutions like Metadefender Endpoint Management can aid with the problem of vulnerable user devices by checking the security and compliance posture of all endpoint devices connected to a network.

Event Wrap-Up: 2017 OPSWAT Channel Partner Conference

$
0
0

Last week, our channel partners from all over the world joined us at our headquarters for the OPSWAT Channel Partner Conference in San Francisco, California.

Our channel partners distribute OPSWAT products, including Metadefender and all its deployments, to global markets. We partner with them to ensure that organizations around the world have access to OPSWAT's unique data sanitization (Content Disarm and Reconstruction), vulnerability assessment, and multi-scanning technologies.

OPSWAT Channel Partners Conference Seminar

OPSWAT Channel Partners Conference seminar group shot

Throughout the conference, the OPSWAT product management team led sales training sessions and product overview seminars, presenting product road map updates and case studies for all of OPSWAT's products and deployments, including Metadefender Core and Kiosk.

Additionally, several of our partners and clients presented their success stories and experiences with our team and our products.

Benny Czarny and Tory Pitts Presenting

Left: Benny Czarny, CEO and Founder of OPSWAT, presents

Right: Tory Pitts, Director of Global Channel Partner Programs at OPSWAT, gets ready to speak

OPSWAT Channel Partner Conference Seminar

Benny Czarny speaks at one of the sessions

Throughout the year, OPSWAT co-hosts events with channel partners. During last week's event, we presented our road map for these events, and shared our messaging focus and marketing strategy going forward.

You can learn more about the OPSWAT Channel Partner program here.

LEARN MORE

Metadefender Kiosk, Security for Air-Gapped Networks

Showing off Metadefender Kiosk

There was time for some fun at the conference, too. On Wednesday evening, OPSWAT employees and channel partners toured Anchor Brewing, which is located just a few blocks away from the OPSWAT office. (Anchor Brewing was originally located in OPSWAT's current headquarters!)

Anchor Brewery Tour, OPSWAT Channel Partner Conference

Touring Anchor Brewery

On Thursday afternoon, we all went on a cruise of the San Francisco Bay for dinner and drinks on the water, and on Friday, we closed out the conference with food trucks and a happy hour.

Dinner Cruise San Francisco Bay

Dining and cruising on the San Francisco Bay

Happy Hour, Channel Partners Conference

Happy hour Friday afternoon

OPSWAT Cookie

OPSWAT-themed cookies served at happy hour!

Our channel partners are a major key to OPSWAT's continued success, and we'd like to thank them for coming out to San Francisco. We look forward to continuing our mutually beneficial partnerships.

OPSWAT has several upcoming events if you'd like to meet and talk with us about our products or the channel partner program.

  • April 26: Webinar - Enhance Your Email and Web Proxy for Better Ransomware Prevention (Sign Up)
  • May 5, Dallas, Texas: Cyber Security Summit
  • May 10-12, Tokyo, Japan: Japan IT Week

See the rest of our upcoming events on the OPSWAT Events page.

Contact OPSWAT today to set up a meeting or learn more about becoming a channel partner.

OPSWAT Channel Partners Cruise Group Shot

See you at next year's conference

Metadefender CVEs, Hashes, Application Installers Report: April 17-24

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of April 17-24, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of April 24, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
Google ChromeGoogle Inc.40.0.2214.85 and priorCVE-2014-7923https://nvd.nist.gov/vuln/detail/CVE-2014-79237.5
Google ChromeGoogle Inc.40.0.2214.85 and priorCVE-2014-7926https://nvd.nist.gov/vuln/detail/CVE-2014-79267.5
TrapsPalo Alto Networks Inc.3.4.3 and priorCVE-2017-7408https://nvd.nist.gov/vuln/detail/CVE-2017-74085
Microsoft OutlookMicrosoft Corporation16 and priorCVE-2017-0204https://nvd.nist.gov/vuln/detail/CVE-2017-02044.3
Microsoft OutlookMicrosoft Corporation16 and priorCVE-2017-0106https://nvd.nist.gov/vuln/detail/CVE-2017-01069.3
Microsoft ExcelMicrosoft Corporation14 and priorCVE-2017-0194https://nvd.nist.gov/vuln/detail/CVE-2017-01944.3
Microsoft OneNoteMicrosoft Corporation14 and priorCVE-2017-0197https://nvd.nist.gov/vuln/detail/CVE-2017-01979.3
Internet ExplorerMicrosoft Corporation11 and priorCVE-2017-0202https://nvd.nist.gov/vuln/detail/CVE-2017-02027.6
Internet ExplorerMicrosoft Corporation9 and priorCVE-2017-0201https://nvd.nist.gov/vuln/detail/CVE-2017-02017.6
Internet ExplorerMicrosoft Corporation11 and priorCVE-2017-0210https://nvd.nist.gov/vuln/detail/CVE-2017-02104.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3022https://nvd.nist.gov/vuln/detail/CVE-2017-30224.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3027https://nvd.nist.gov/vuln/detail/CVE-2017-30279.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3034https://nvd.nist.gov/vuln/detail/CVE-2017-30349.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3029https://nvd.nist.gov/vuln/detail/CVE-2017-30294.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3033https://nvd.nist.gov/vuln/detail/CVE-2017-30334.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3025https://nvd.nist.gov/vuln/detail/CVE-2017-30259.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3040https://nvd.nist.gov/vuln/detail/CVE-2017-30409.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3026https://nvd.nist.gov/vuln/detail/CVE-2017-30269.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3038https://nvd.nist.gov/vuln/detail/CVE-2017-30389.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3041https://nvd.nist.gov/vuln/detail/CVE-2017-30419.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3036https://nvd.nist.gov/vuln/detail/CVE-2017-30369.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3035https://nvd.nist.gov/vuln/detail/CVE-2017-30359.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3032https://nvd.nist.gov/vuln/detail/CVE-2017-30324.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3030https://nvd.nist.gov/vuln/detail/CVE-2017-30309.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3031https://nvd.nist.gov/vuln/detail/CVE-2017-30314.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3023https://nvd.nist.gov/vuln/detail/CVE-2017-30239.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3039https://nvd.nist.gov/vuln/detail/CVE-2017-30399.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3028https://nvd.nist.gov/vuln/detail/CVE-2017-30289.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3024https://nvd.nist.gov/vuln/detail/CVE-2017-30249.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3037https://nvd.nist.gov/vuln/detail/CVE-2017-303710
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3065https://nvd.nist.gov/vuln/detail/CVE-2017-30659.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3057https://nvd.nist.gov/vuln/detail/CVE-2017-30579.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3056https://nvd.nist.gov/vuln/detail/CVE-2017-30569.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3055https://nvd.nist.gov/vuln/detail/CVE-2017-30559.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3054https://nvd.nist.gov/vuln/detail/CVE-2017-30549.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3053https://nvd.nist.gov/vuln/detail/CVE-2017-30534.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3052https://nvd.nist.gov/vuln/detail/CVE-2017-30524.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3051https://nvd.nist.gov/vuln/detail/CVE-2017-30519.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3050https://nvd.nist.gov/vuln/detail/CVE-2017-30509.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3049https://nvd.nist.gov/vuln/detail/CVE-2017-30499.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3048https://nvd.nist.gov/vuln/detail/CVE-2017-30489.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3047https://nvd.nist.gov/vuln/detail/CVE-2017-30479.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3046https://nvd.nist.gov/vuln/detail/CVE-2017-30464.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3045https://nvd.nist.gov/vuln/detail/CVE-2017-30454.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3044https://nvd.nist.gov/vuln/detail/CVE-2017-30449.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3043https://nvd.nist.gov/vuln/detail/CVE-2017-30434.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3042https://nvd.nist.gov/vuln/detail/CVE-2017-30429.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3015https://nvd.nist.gov/vuln/detail/CVE-2017-30159.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3018https://nvd.nist.gov/vuln/detail/CVE-2017-30189.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3012https://nvd.nist.gov/vuln/detail/CVE-2017-30129.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3013https://nvd.nist.gov/vuln/detail/CVE-2017-30139.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3017https://nvd.nist.gov/vuln/detail/CVE-2017-30179.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3014https://nvd.nist.gov/vuln/detail/CVE-2017-30149.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3019https://nvd.nist.gov/vuln/detail/CVE-2017-30199.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3021https://nvd.nist.gov/vuln/detail/CVE-2017-30214.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3020https://nvd.nist.gov/vuln/detail/CVE-2017-30204.3
Adobe AcrobatAdobe Systems Inc.11.0.19 and priorCVE-2017-3011https://nvd.nist.gov/vuln/detail/CVE-2017-30119.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3022https://nvd.nist.gov/vuln/detail/CVE-2017-30224.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3027https://nvd.nist.gov/vuln/detail/CVE-2017-30279.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3034https://nvd.nist.gov/vuln/detail/CVE-2017-30349.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3029https://nvd.nist.gov/vuln/detail/CVE-2017-30294.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3033https://nvd.nist.gov/vuln/detail/CVE-2017-30334.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3025https://nvd.nist.gov/vuln/detail/CVE-2017-30259.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3040https://nvd.nist.gov/vuln/detail/CVE-2017-30409.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3026https://nvd.nist.gov/vuln/detail/CVE-2017-30269.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3038https://nvd.nist.gov/vuln/detail/CVE-2017-30389.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3041https://nvd.nist.gov/vuln/detail/CVE-2017-30419.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3036https://nvd.nist.gov/vuln/detail/CVE-2017-30369.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3035https://nvd.nist.gov/vuln/detail/CVE-2017-30359.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3032https://nvd.nist.gov/vuln/detail/CVE-2017-30324.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3030https://nvd.nist.gov/vuln/detail/CVE-2017-30309.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3031https://nvd.nist.gov/vuln/detail/CVE-2017-30314.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3023https://nvd.nist.gov/vuln/detail/CVE-2017-30239.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3039https://nvd.nist.gov/vuln/detail/CVE-2017-30399.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3028https://nvd.nist.gov/vuln/detail/CVE-2017-30289.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3024https://nvd.nist.gov/vuln/detail/CVE-2017-30249.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3037https://nvd.nist.gov/vuln/detail/CVE-2017-303710
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3065https://nvd.nist.gov/vuln/detail/CVE-2017-30659.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3057https://nvd.nist.gov/vuln/detail/CVE-2017-30579.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3056https://nvd.nist.gov/vuln/detail/CVE-2017-30569.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3055https://nvd.nist.gov/vuln/detail/CVE-2017-30559.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3054https://nvd.nist.gov/vuln/detail/CVE-2017-30549.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3053https://nvd.nist.gov/vuln/detail/CVE-2017-30534.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3052https://nvd.nist.gov/vuln/detail/CVE-2017-30524.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3051https://nvd.nist.gov/vuln/detail/CVE-2017-30519.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3050https://nvd.nist.gov/vuln/detail/CVE-2017-30509.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3049https://nvd.nist.gov/vuln/detail/CVE-2017-30499.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3048https://nvd.nist.gov/vuln/detail/CVE-2017-30489.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3047https://nvd.nist.gov/vuln/detail/CVE-2017-30479.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3046https://nvd.nist.gov/vuln/detail/CVE-2017-30464.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3045https://nvd.nist.gov/vuln/detail/CVE-2017-30454.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3044https://nvd.nist.gov/vuln/detail/CVE-2017-30449.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3043https://nvd.nist.gov/vuln/detail/CVE-2017-30434.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3042https://nvd.nist.gov/vuln/detail/CVE-2017-30429.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3015https://nvd.nist.gov/vuln/detail/CVE-2017-30159.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3018https://nvd.nist.gov/vuln/detail/CVE-2017-30189.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3012https://nvd.nist.gov/vuln/detail/CVE-2017-30129.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3013https://nvd.nist.gov/vuln/detail/CVE-2017-30139.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3017https://nvd.nist.gov/vuln/detail/CVE-2017-30179.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3014https://nvd.nist.gov/vuln/detail/CVE-2017-30149.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3019https://nvd.nist.gov/vuln/detail/CVE-2017-30199.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3021https://nvd.nist.gov/vuln/detail/CVE-2017-30214.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3020https://nvd.nist.gov/vuln/detail/CVE-2017-30204.3
Adobe ReaderAdobe Systems Inc.11.0.19 and priorCVE-2017-3011https://nvd.nist.gov/vuln/detail/CVE-2017-30119.3
WireStackWireStack2.2.5 and priorCVE-2017-7748https://nvd.nist.gov/vuln/detail/CVE-2017-77487.8
WireStackWireStack2.2.5 and priorCVE-2017-7747https://nvd.nist.gov/vuln/detail/CVE-2017-77475
WireStackWireStack2.2.5 and priorCVE-2017-7746https://nvd.nist.gov/vuln/detail/CVE-2017-77467.8
WireStackWireStack2.2.5 and priorCVE-2017-7745https://nvd.nist.gov/vuln/detail/CVE-2017-77457.8
WireStackWireStack2.2.5 and priorCVE-2017-7705https://nvd.nist.gov/vuln/detail/CVE-2017-77057.8
WireStackWireStack2.2.5 and priorCVE-2017-7704https://nvd.nist.gov/vuln/detail/CVE-2017-77047.8
WireStackWireStack2.2.5 and priorCVE-2017-7703https://nvd.nist.gov/vuln/detail/CVE-2017-77035
WireStackWireStack2.2.5 and priorCVE-2017-7702https://nvd.nist.gov/vuln/detail/CVE-2017-77027.8
WireStackWireStack2.2.5 and priorCVE-2017-7701https://nvd.nist.gov/vuln/detail/CVE-2017-77017.8
WireStackWireStack2.2.5 and priorCVE-2017-7700https://nvd.nist.gov/vuln/detail/CVE-2017-77007.1
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3064https://nvd.nist.gov/vuln/detail/CVE-2017-30649.3
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3063https://nvd.nist.gov/vuln/detail/CVE-2017-306310
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3062https://nvd.nist.gov/vuln/detail/CVE-2017-306210
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3061https://nvd.nist.gov/vuln/detail/CVE-2017-306110
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3060https://nvd.nist.gov/vuln/detail/CVE-2017-306010
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3059https://nvd.nist.gov/vuln/detail/CVE-2017-305910
Adobe Flash PlayerAdobe Systems Inc.25.0.0.127 and priorCVE-2017-3058https://nvd.nist.gov/vuln/detail/CVE-2017-30589.3

 

Newly Supported Hashes and Installers as of April 24, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAME
0553AEFC3E4CC55BC6AD7B50F4B9B324F63AC252iTunes41912.6.0.95Installer for iTunes 32 bit #installeriTunesSetup_12.6.0.95.exe
20489A6CB02A498673D4212882F4781B34BA2265iTunes41912.5.5.5Installer for iTunes 32 bit #installeriTunesSetup_12.5.5.5.exe
2FC52A247472499499895EEF190B194C5D4D94C1iTunes41911.2.2.2Installer for iTunes 32 bit #installeriTunesSetup_11.2.2.2.exe
FDB6C8624C5DF93AB68F4CA4845EC9531E306EACiTunes41911.2.2.3Installer for iTunes 64 bit #installeriTunes64Setup_11.2.2.3.exe
01C4C0AA5288C2491E92D0594A71F20A642FA3D7iTunes41912.5.5.5Installer for iTunes 64 bit #installeriTunes64Setup_12.5.5.5.exe
49986E965D1F1059A87CAE98918BAD125A5F5741WinRAR1085.40.0Installer for WinRAR x86 #installerwrar540_5.40.0.exe
99D44930477155ED5F613AD6F213D4C7EA7A5D58WinRAR1085.31.0Installer for WinRAR x86 #installerwrar531_5.31.0.exe
E55B97177CD2BD02B1F82722167CAD2A7253F4A6WinRAR1085.30.0Installer for WinRAR x86 #installerwrar530_5.30.0.exe
03DBD3FA588464C4B91729C7A232684AFC43C9EFWinRAR1085.50.1Installer for WinRAR x86 #installerwrar55b1_5.50.1.exe
E2DF6EB8DC8C48BC74D9D8A0D411755E1F4F017AWinRAR1085.40.4Installer for WinRAR x86 #installerwrar54b4_5.40.4.exe
687B6D5A426CEC536A61A3EA2F045824711AA838WinRAR1085.40.3Installer for WinRAR x86 #installerwrar54b3_5.40.3.exe
3E1AB6CDBE62595F3237F7F4EB9BE3799A85BA4FWinRAR1085.40.2Installer for WinRAR x86 #installerwrar54b2_5.40.2.exe
2EA342F13B619524F4B15B985B2EA2EC9897A1BFWinRAR1085.40.1Installer for WinRAR x86 #installerwrar54b1_5.40.1.exe
CDA2AD22FE8FEBB265B26F3F027D8E1813BE4466WinRAR1085.30.6Installer for WinRAR x86 #installerwrar53b6_5.30.6.exe
55AA6ECCFBEE1134B639AB7BD63BD359B1A852B7WinRAR1085.30.5Installer for WinRAR x86 #installerwrar53b5_5.30.5.exe
9FD7FEBDB86EAE6F5AC5606112ECF4A25D65FF85WinRAR1085.40.0Installer for WinRAR x64 #installerwinrar-x64-540_5.40.0.exe
B8DB4B7B959B8C9C5D4E591D9EA902AC814506A7WinRAR1085.31.0Installer for WinRAR x64 #installerwinrar-x64-531_5.31.0.exe
6455CAF84E72F32616068DF713FC9D413B73ED9BWinRAR1085.30.0Installer for WinRAR x64 #installerwinrar-x64-530_5.30.0.exe
BD2BE3320075AFFD29594058EABF2CC9CD46AAB6WinRAR1085.50.1Installer for WinRAR x64 #installerwinrar-x64-55b1_5.50.1.exe
CB89BCC15092194993B40E894221CE896AD10154WinRAR1085.40.4Installer for WinRAR x64 #installerwinrar-x64-54b4_5.40.4.exe
9B6476E8AF9906AE4957AFB7DB9E15F53A70185EWinRAR1085.40.3Installer for WinRAR x64 #installerwinrar-x64-54b3_5.40.3.exe
7C26AF930543DEA890754234CC9094FD07CCA326WinRAR1085.40.2Installer for WinRAR x64 #installerwinrar-x64-54b2_5.40.2.exe
2B5961215BE8A324912281DB6989C386AA237415WinRAR1085.40.1Installer for WinRAR x64 #installerwinrar-x64-54b1_5.40.1.exe
AF09F442203BDD48BD491AB0E33F454CC203BC39WinRAR1085.30.6Installer for WinRAR x64 #installerwinrar-x64-53b6_5.30.6.exe
8EB57BDFB4103B7CA5E25FF2E1F52F5B8D935643WinRAR1085.30.5Installer for WinRAR x64 #installerwinrar-x64-53b5_5.30.5.exe
485B5A9C7F7EC52912B268770DEF6DEDF88E73F8iTunes4194.1.0.52Installer for iTunes 32 bit #installeriTunesSetup_4.1.0.52.exe
F0E57825736DAE36518AE0CFB9EA4F213EA40B1BiTunes4194.2.0.72Installer for iTunes 32 bit #installeriTunesSetup_4.2.0.72.exe
F98B588ABB21D83D39707E780B25204C4193DE85iTunes4194.6.0.15Installer for iTunes 32 bit #installeriTunesSetup_4.6.0.15.exe
BACEEA19B435D2A6F7BD4506822E30DEDDAA331DiTunes4194.7.0.42Installer for iTunes 32 bit #installeriTunesSetup_4.7.0.42.exe
12582D193B27991C8F069331AB12D107C569BDE2iTunes4194.8.0.31Installer for iTunes 32 bit #installeriTunesSetup_4.8.0.31.exe
BFE9F8C16038426DE06E557EAD32CE215D8E0E88iTunes4194.9.0.17Installer for iTunes 32 bit #installeriTunesSetup_4.9.0.17.exe
95C2BAC490108F6844BD9BBA89700D6FCAEF95A3iTunes4195.0.0.35Installer for iTunes 32 bit #installeriTunesSetup_5.0.0.35.exe
64E58824CE9F9A3C0C45EE6F396E0A20CEA070A9iTunes4195.0.1.4Installer for iTunes 32 bit #installeriTunesSetup_5.0.1.4.exe
90B10CFCDA38264FDE447AEF8AD48FC04F7EBA11iTunes4196.0.0.18Installer for iTunes 32 bit #installeriTunesSetup_6.0.0.18.exe
56BC7F7D8F293E703FB3801CB07EC16AAAAD20C5iTunes4196.0.1.3Installer for iTunes 32 bit #installeriTunesSetup_6.0.1.3.exe
1F7D1942FEC2C3C205079916DC47B254E508DE4EiTunes4196.0.2.23Installer for iTunes 32 bit #installeriTunesSetup_6.0.2.23.exe
663A9286D88029AFEA7B2F6D5BDDCCE958DDAA05iTunes4196.0.3.5Installer for iTunes 32 bit #installeriTunesSetup_6.0.3.5.exe
1D63F5F403BAC11330989373EF0F7BB0B8CF8904iTunes4196.0.4.42Installer for iTunes 32 bit #installeriTunesSetup_6.0.4.42.exe
0A82011B904E9FEA33B1482DEAEA93094E008D96iTunes4196.0.5.20Installer for iTunes 32 bit #installeriTunesSetup_6.0.5.20.exe
5CDC86B2EDB1411B9A022F05B1BFBE858FBCF901iTunes4197.0.0.70Installer for iTunes 32 bit #installeriTunesSetup_7.0.0.70.exe
9B6800B490C550D02DC590516B5718DA0D3C3F46iTunes4197.0.1.8Installer for iTunes 32 bit #installeriTunesSetup_7.0.1.8.exe
590FA2D4BA73D06A98A6F95EC36D18AB9E845153iTunes4197.0.2.16Installer for iTunes 32 bit #installeriTunesSetup_7.0.2.16.exe
0A32A8C929CD8F893793A5C260D437726728FE0DiTunes4197.1.0.59Installer for iTunes 32 bit #installeriTunesSetup_7.1.0.59.exe
528BE70403B1675597E8563BAFE2F9F728EDA6DDiTunes4197.1.1.5Installer for iTunes 32 bit #installeriTunesSetup_7.1.1.5.exe
C7A0603A731DA09714A1BB73824EC82CF55D4E6EiTunes4197.2.0.34Installer for iTunes 32 bit #installeriTunesSetup_7.2.0.34.exe
333BE2547B5EB9FE3DDF65115B14756A7F72690AiTunes4197.3.0.54Installer for iTunes 32 bit #installeriTunesSetup_7.3.0.54.exe
77144B39B768143CB4882B7B6F463724F87FCBD8iTunes4197.3.1.3Installer for iTunes 32 bit #installeriTunesSetup_7.3.1.3.exe
7A2F987FE25E98DB6017942E772300ADC32BE751iTunes4197.3.2.6Installer for iTunes 32 bit #installeriTunesSetup_7.3.2.6.exe
FEFE391446A8D8010D0A26E9819E893A76319DA6iTunes4197.4.0.28Installer for iTunes 32 bit #installeriTunesSetup_7.4.0.28.exe
2C57AA25DB4085569368E8485B97002705DBEFB1iTunes4197.4.1.2Installer for iTunes 32 bit #installeriTunesSetup_7.4.1.2.exe
828BB0DFA6727D05F80CF338538DBA5A9E90C0D9iTunes4197.4.2.4Installer for iTunes 32 bit #installeriTunesSetup_7.4.2.4.exe
908CCBB1544799825D80DF899E2E9F1EABFA8899iTunes4197.4.3.1Installer for iTunes 32 bit #installeriTunesSetup_7.4.3.1.exe
B38005B53E608DCD2B4FE18B44CC419FEFBC9411iTunes4197.5.0.20Installer for iTunes 32 bit #installeriTunesSetup_7.5.0.20.exe
EEC2AA5C7B502D7FCD959317508ED7B1C6FCA207iTunes4197.6.0.29Installer for iTunes 32 bit #installeriTunesSetup_7.6.0.29.exe
598282BD4CB48A06A38A87645FEDFE9AB26E8D57iTunes4197.6.1.9Installer for iTunes 32 bit #installeriTunesSetup_7.6.1.9.exe
FF2A3C234D164F30F8B1D05297A49A55F3F4E8C0iTunes4197.6.2.9Installer for iTunes 32 bit #installeriTunesSetup_7.6.2.9.exe
EB2FA90ED5A99519184A5443B0AE4228100D0D46iTunes4197.7.0.43Installer for iTunes 32 bit #installeriTunesSetup_7.7.0.43.exe
23F34BE26870BB2B46472551C6965909CB4548ECiTunes4197.7.1.11Installer for iTunes 32 bit #installeriTunesSetup_7.7.1.11.exe
09BD8DD0B055F1B63205D5C9C9A00E4D42E38A3EiTunes4198.0.0.35Installer for iTunes 32 bit #installeriTunesSetup_8.0.0.35.exe
7342C1AA7C458DB14C67E8635EE475ADCC1D38BEiTunes4198.0.1.11Installer for iTunes 32 bit #installeriTunesSetup_8.0.1.11.exe
3C0DE1135A6F7324FF691E99A8FEFA385219BB0AiTunes4198.0.2.20Installer for iTunes 64 bit #installeriTunes64Setup_8.0.2.20.exe
96113274F450DFE2893805353663B2436161B15AiTunes4198.0.2.20Installer for iTunes 32 bit #installeriTunesSetup_8.0.2.20.exe
FB07309A0196B424ED434BE1143F9E8BCD978D62iTunes4198.1.0.51Installer for iTunes 64 bit #installeriTunes64Setup_8.1.0.51.exe
562BCC78760C4055F84D53730089A62DFA9C3FCFiTunes4198.1.0.51Installer for iTunes 32 bit #installeriTunesSetup_8.1.0.51.exe
CD61EF5E5A6FD350D2AC4366A31DE5D110DEFDFFiTunes4198.1.0.52Installer for iTunes 64 bit #installeriTunes64Setup_8.1.0.52.exe
00BD8842CF0F2026CC4590EF434F6846EECA7FA4iTunes4198.1.0.52Installer for iTunes 32 bit #installeriTunesSetup_8.1.0.52.exe
40A82BA08885BD8797F70B8199DF5526F3F2D409iTunes4198.1.1.10Installer for iTunes 64 bit #installeriTunes64Setup_8.1.1.10.exe
CAD92E6882B5FB49D710D342F315D7D6293E2B0AiTunes4198.1.1.10Installer for iTunes 32 bit #installeriTunesSetup_8.1.1.10.exe
B8739F847F2B66835F4F4B542B3308DE96D418EDiTunes4198.2.0.23Installer for iTunes 64 bit #installeriTunes64Setup_8.2.0.23.exe
16F5B1E787B36AECE842EA5AE80BFC6BF2B32B19iTunes4198.2.0.23Installer for iTunes 32 bit #installeriTunesSetup_8.2.0.23.exe
8985AFCE9AB6D4483C43308CF34E6217E903000AiTunes4198.2.1.6Installer for iTunes 64 bit #installeriTunes64Setup_8.2.1.6.exe
797DA9711CAF87D114E2A5B88523FA825753B530iTunes4198.2.1.6Installer for iTunes 32 bit #installeriTunesSetup_8.2.1.6.exe
9A492DADC7F396BD92BDFC7CB0FF4DE15DB1B2C2iTunes4199.0.0.70Installer for iTunes 64 bit #installeriTunes64Setup_9.0.0.70.exe
68C84DD8D910CE6CC1508F41CB86D20DE839F2E3iTunes4199.0.0.70Installer for iTunes 32 bit #installeriTunesSetup_9.0.0.70.exe
85F8C516CB45024292CDE1F48E88FD392E25626FiTunes4199.0.1.8Installer for iTunes 64 bit #installeriTunes64Setup_9.0.1.8.exe
25D04FF5A63A808CA56875CDF9A9474B9B845F1DiTunes4199.0.1.8Installer for iTunes 32 bit #installeriTunesSetup_9.0.1.8.exe
9696C68639B320758A56DC8A79D2883E2E2F3DF8iTunes4199.0.3.15Installer for iTunes 64 bit #installeriTunes64Setup_9.0.3.15.exe
E6B5DDD1E6F21DDCF7117ADEC72E47701633B1CBiTunes4199.1.0.79Installer for iTunes 64 bit #installeriTunes64Setup_9.1.0.79.exe
F33C2AB507844CEC611B02202110F50F2BAAE302iTunes4199.1.1.11Installer for iTunes 64 bit #installeriTunes64Setup_9.1.1.11.exe
FEE32B82F0F9AFBEDFE37231B78B65083CA7C024iTunes4199.2.0.61Installer for iTunes 64 bit #installeriTunes64Setup_9.2.0.61.exe
183F3CE3A543BD3ECBA99E4A22A443A6C37F4729iTunes4199.2.1.4Installer for iTunes 64 bit #installeriTunes64Setup_9.2.1.4.exe
8103E9A3DA41789F57ADCCE7EF973E9812C02E6FiTunes41910.0.0.68Installer for iTunes 64 bit #installeriTunes64Setup_10.0.0.68.exe
274420F8131E5E99742092AFCB3B89AFF88367B6iTunes41910.0.1.22Installer for iTunes 64 bit #installeriTunes64Setup_10.0.1.22.exe
441E061B5D74194CADD8FD7E9F79790F05D6B103iTunes41910.1.0.54Installer for iTunes 64 bit #installeriTunes64Setup_10.1.0.54.exe
C1ECCFFC393BAEFAB6962E47A625CC1156C703B9iTunes41910.1.1.4Installer for iTunes 64 bit #installeriTunes64Setup_10.1.1.4.exe
68D6DA0CF38554C451C7914F8AD82003F8D65798iTunes41910.1.2.17Installer for iTunes 64 bit #installeriTunes64Setup_10.1.2.17.exe
EFC23FC7D92EB95A1F2588B8A6506D99B726C9EAiTunes41910.2.0.34Installer for iTunes 64 bit #installeriTunes64Setup_10.2.0.34.exe
40281DC78AA4113C239C182B34D471EE0F882DABiTunes41910.2.1.1Installer for iTunes 64 bit #installeriTunes64Setup_10.2.1.1.exe
10D04B03E9733827E69A20BCF46F5E7EA97E0CD3iTunes41910.2.2.12Installer for iTunes 64 bit #installeriTunes64Setup_10.2.2.12.exe
4203125A7BEC7D0DAEEC12D8DD3FBDBD4FC42A43iTunes41910.3.0.54Installer for iTunes 64 bit #installeriTunes64Setup_10.3.0.54.exe
CA6256D385C703E21E3DC6BCBCA0AA94276F2C54iTunes41910.3.1.55Installer for iTunes 64 bit #installeriTunes64Setup_10.3.1.55.exe
2340455C6B8AC0AAABA068AB028C03A9FBEC17BBiTunes41910.4.0.80Installer for iTunes 64 bit #installeriTunes64Setup_10.4.0.80.exe
21E302B198B9B4431EB314622BE6F4C092151A14iTunes41910.4.1.10Installer for iTunes 64 bit #installeriTunes64Setup_10.4.1.10.exe
AB400AD27A537613B3B5306EA026763A93D57FDFiTunes41910.5.0.142Installer for iTunes 64 bit #installeriTunes64Setup_10.5.0.142.exe
C3E70EB77AB400470EF9451803C0E411EED6A689iTunes41910.5.1.42Installer for iTunes 64 bit #installeriTunes64Setup_10.5.1.42.exe
247E0910F9AF8D1500BDE249E6F0D48013C41DC2iTunes41910.5.2.11Installer for iTunes 64 bit #installeriTunes64Setup_10.5.2.11.exe
CE760EF011AD2738DA9260349CA0342F1109DB58iTunes41910.5.3.3Installer for iTunes 64 bit #installeriTunes64Setup_10.5.3.3.exe
DE3A2349E88546385F8E028DAB2787C3152BD274iTunes41910.6.0.40Installer for iTunes 64 bit #installeriTunes64Setup_10.6.0.40.exe
628E4C8FCFDBCED4D1F1D25ABA2D3EAD1A28FD1AiTunes41910.6.1.7Installer for iTunes 64 bit #installeriTunes64Setup_10.6.1.7.exe
3806AF762A066FDE3D7E83F86A429AE40175561EiTunes41910.6.3.25Installer for iTunes 64 bit #installeriTunes64Setup_10.6.3.25.exe
8064C57911309934BF7F6EF15312C0A1F231DAF8iTunes41911.0.0.163Installer for iTunes 64 bit #installeriTunes64Setup_11.0.0.163.exe
36004574AD0C0E44AEDE9146183FA005E402E1F6iTunes41911.0.1.12Installer for iTunes 64 bit #installeriTunes64Setup_11.0.1.12.exe
DB9B80788FBAF432ED10C281CB94C263373FB0D5iTunes41911.0.2.25Installer for iTunes 64 bit #installeriTunes64Setup_11.0.2.25.exe
6669044BD50C1F753C8412A02556A70BE09FD9F8iTunes41911.0.3.42Installer for iTunes 64 bit #installeriTunes64Setup_11.0.3.42.exe
7EA7D22CE2F19E0F52814D37C27B354E2706D739iTunes41911.0.4.4Installer for iTunes 64 bit #installeriTunes64Setup_11.0.4.4.exe
7771ED8E147411BDEA37A73EBD5C5EA9555ED2DEiTunes41911.0.5.5Installer for iTunes 64 bit #installeriTunes64Setup_11.0.5.5.exe
5EFE95A1F1DF32F3833E5972DB02E37CA7BFC43DiTunes41911.1.0.126Installer for iTunes 64 bit #installeriTunes64Setup_11.1.0.126.exe
AF67D7FA006D55E3BEEF5B21B30FE155B22A523AiTunes41911.1.1.11Installer for iTunes 64 bit #installeriTunes64Setup_11.1.1.11.exe
8CCBAC69E821724EF911DB1E2944D5B04B3A2A29iTunes41911.1.3.8Installer for iTunes 64 bit #installeritunes64Setup_11.1.3.8.exe
2611656871FE51B2DC00982F170952191774F584iTunes41912.1.3.6Installer for iTunes 64 bit #installeriTunes6464Setup_12.1.3.6.exe
01FA1A675B169DF62078F550808953A6A748CB0AiTunes41912.6.0.95Installer for iTunes 64 bit #installeriTunes6464Setup_12.6.0.95.exe
0E1AD1C48CE9354F18EFC6B1D02B70C8E7435CFBiTunes4199.0.2.25Installer for iTunes 32 bit #installeriTunesSetup_9.0.2.25.exe
BFEDC440ED45F8DDB3377445DF46C8EE8DDB22A0iTunes4199.0.3.15Installer for iTunes 32 bit #installeriTunesSetup_9.0.3.15.exe
80E64F3222703E5DA2D613541170BCD6C300E801iTunes4199.1.0.79Installer for iTunes 32 bit #installeriTunesSetup_9.1.0.79.exe
AD740FB89CEF03743E698DBA0DD6370B8C4BB677iTunes4199.1.1.11Installer for iTunes 32 bit #installeriTunesSetup_9.1.1.11.exe
36B0BAB6592437BB90D3BF0C8E2475D9F707F20BiTunes4199.2.0.61Installer for iTunes 32 bit #installeriTunesSetup_9.2.0.61.exe
0CF297F0FEA951F7EAB22D1BD5C34699E5CF756BiTunes4199.2.1.4Installer for iTunes 32 bit #installeriTunesSetup_9.2.1.4.exe
9BAE2670A66E04BEB87DE7D7A645C9ABFF2F5B0BiTunes41910.0.0.68Installer for iTunes 32 bit #installeriTunesSetup_10.0.0.68.exe
8C2441A65BFD46D68D3FFEBB89AF49AFD6AF7894iTunes41910.0.1.22Installer for iTunes 32 bit #installeriTunesSetup_10.0.1.22.exe
96B50376ECD8C02EEB5DFB55AB7A25902325D12FiTunes41910.1.0.54Installer for iTunes 32 bit #installeriTunesSetup_10.1.0.54.exe
C03925830C2F686917F0BFE89EA13A27F6F1135DiTunes41910.1.1.4Installer for iTunes 32 bit #installeriTunesSetup_10.1.1.4.exe
B3D91FC83C51F2D01C1FF754B46A5AE5E8187642iTunes41910.1.2.17Installer for iTunes 32 bit #installeriTunesSetup_10.1.2.17.exe
1F40939EACA43648E55C137BE220FA391BB48C6CiTunes41910.2.0.34Installer for iTunes 32 bit #installeriTunesSetup_10.2.0.34.exe
30C97F21CB7EC9921B80C7DFD3A9F460B6746045iTunes41910.2.2.12Installer for iTunes 32 bit #installeriTunesSetup_10.2.2.12.exe
E11F5F13AACD17A3AC36CB18810669A2DEF1F6E7iTunes41910.3.0.54Installer for iTunes 32 bit #installeriTunesSetup_10.3.0.54.exe
493256BC58F7A3979E1A75B9CC809D82B716F62DiTunes41910.3.1.55Installer for iTunes 32 bit #installeriTunesSetup_10.3.1.55.exe
1F0D4988A688C922FA154850B751353985E01BC6iTunes41910.4.0.80Installer for iTunes 32 bit #installeriTunesSetup_10.4.0.80.exe
EF90132B669162EB61C7D7C4FE3978A6CEF3F3E3iTunes41910.4.1.10Installer for iTunes 32 bit #installeriTunesSetup_10.4.1.10.exe
BBE7ED41E62EF1EB345A12A68C1A81D351057952iTunes41910.5.1.42Installer for iTunes 32 bit #installeriTunesSetup_10.5.1.42.exe
A206BAA91707A7CF1E9851903BB31C047EB28CBFiTunes41910.5.2.11Installer for iTunes 32 bit #installeriTunesSetup_10.5.2.11.exe
533214C2276CE692E96BEBBD4080949EA3E877FDiTunes41910.5.3.3Installer for iTunes 32 bit #installeriTunesSetup_10.5.3.3.exe
1205CDA4CE9A32DB2FE02CF9F2CF2C0BF7D47BDBiTunes41910.5.0142Installer for iTunes 32 bit #installeriTunesSetup_10.5.0142.exe
6F08434B9C3680C6E583707804838976F7281B70iTunes41910.6.0.40Installer for iTunes 32 bit #installeriTunesSetup_10.6.0.40.exe
343113501555370504D654E7038A2DE568D43565iTunes41910.6.1.7Installer for iTunes 32 bit #installeriTunesSetup_10.6.1.7.exe
2618F701F1D1A853E33138A57BEC193BCD08438EiTunes41910.6.3.25Installer for iTunes 32 bit #installeriTunesSetup_10.6.3.25.exe
432F1EC928AAEC3C91C08873502D91223B29C456iTunes41911.0.0.163Installer for iTunes 32 bit #installeriTunesSetup_11.0.0.163.exe
8F4A9261BFBA2876B24763848A0745179FBA8A3AiTunes41911.0.1.12Installer for iTunes 32 bit #installeriTunesSetup_11.0.1.12.exe
2278B02524D142428182B3741CAC78ABB1600AB3iTunes41911.0.2.25Installer for iTunes 32 bit #installeriTunesSetup_11.0.2.25.exe
1E95101B584762B3C46AB597C115CD86BFD45D64iTunes41911.0.3.42Installer for iTunes 32 bit #installeriTunesSetup_11.0.3.42.exe
0FCBC773AB3C6F05CCB73468AEA96F6B5109B52DiTunes41911.0.4.4Installer for iTunes 32 bit #installeriTunesSetup_11.0.4.4.exe
F453F386A4B27D80B2BAA0206F805E64EDD4DAABiTunes41911.0.5.5Installer for iTunes 32 bit #installeriTunesSetup_11.0.5.5.exe
CEF0F1398E1D51FD2F832C12763C2BF1627379EEiTunes41911.1.0.126Installer for iTunes 32 bit #installeriTunesSetup_11.1.0.126.exe
79655BF8125C07BA01EA50DEB0145255D0AC4B5DiTunes41911.1.1.11Installer for iTunes 32 bit #installeriTunesSetup_11.1.1.11.exe
0AD7E8D40BE254AFD6465A398B9438D0E18DB188iTunes41911.1.3.8Installer for iTunes 32 bit #installeriTunesSetup_11.1.3.8.exe
C64DF8D296192EFD257DEF62E65D13C83AB150A8iTunes41912.1.3.6Installer for iTunes 32 bit #installeriTunesSetup_12.1.3.6.exe
AA6F4499FBBA012001C6F0970DBBAFF70A3DF618iTunes10030512.6Installer for iTunes on macOS #installeriTunes12.6.dmg
65A03EC45540CE6666512F62ECE0D1C3E1002D4EiTunes10030512.5.5Installer for iTunes on macOS #installeriTunes12.5.5.dmg
211DE6432AF0A47B1A82E2FD548669B66D581863iTunes10030512.5.4Installer for iTunes on macOS #installeriTunes12.5.4.dmg
77BDD0CFB73768139B6B9302D8EAF814E8E8F7B2iTunes10030512.5.3Installer for iTunes on macOS #installeriTunes12.5.3.dmg
549E72600920CC26F55BABFF3CA4FC67576B1F01iTunes10030512.5.2Installer for iTunes on macOS #installeriTunes12.5.2.dmg
C94F2386E780FDEF391D2636C9BD7B692F9CEECAiTunes10030512.5.1Installer for iTunes on macOS #installeriTunes12.5.1.dmg
1825A00FD7FB9039263B15281BD96EA41260EF22iTunes10030512.4Installer for iTunes on macOS #installeriTunes12.4.dmg
B7198AFC6630E04B5D6ED4F73572BA4450911D3BiTunes10030512.4.3Installer for iTunes on macOS #installeriTunes12.4.3.dmg
62A7F5B7D28C7B921DA8C7F5D9233335AB9AD007iTunes10030512.4.2Installer for iTunes on macOS #installeriTunes12.4.2.dmg
DAEEC7819A879FDC0E80C2696657813501E3FE9DiTunes10030512.4.1Installer for iTunes on macOS #installeriTunes12.4.1.dmg
3747C6F9B0F1E16FE083CB84A39989BAB5DE2688iTunes10030512.3Installer for iTunes on macOS #installeriTunes12.3.dmg
EBFACBA7A27CA925873B2660077A1390AC0CC2B1iTunes10030512.3.3Installer for iTunes on macOS #installeriTunes12.3.3.dmg
FEAEBF23E5031E89CE317DE007158DAF35102226iTunes10030512.3.2Installer for iTunes on macOS #installeriTunes12.3.2.dmg
2A82994D80BED7869CFEC5A73604812A646A3405iTunes10030512.3.1Installer for iTunes on macOS #installeriTunes12.3.1.dmg
E7FBBD56BFA6D1423D631D7DE1E8957B5FF0D9A8iTunes10030512.2Installer for iTunes on macOS #installeriTunes12.2.dmg
2A0EBF28843C7114670B966336F646EAB012ACF7iTunes10030512.2.2Installer for iTunes on macOS #installeriTunes12.2.2.dmg
FF9C583C17E5ADE7534FB6E0A1775CF18F2EFF5BiTunes10030512.2.1Installer for iTunes on macOS #installeriTunes12.2.1.dmg
8DA2BB4DCF428B68A34D3CD97F13F3ECADEC6CCAiTunes10030512.1Installer for iTunes on macOS #installeriTunes12.1.dmg
FA2F433E41F30AA2DCE9CAA4A799B920A0347637iTunes10030512.1.2Installer for iTunes on macOS #installeriTunes12.1.2.dmg
0B0B6B00DBCA55E272FAB2FCA3F59536CF119A8AiTunes10030512.0.1Installer for iTunes on macOS #installeriTunes12.0.1.dmg
4346ABD7F532A7F1869FEEE4437DD318A0B6F532iTunes10030511Installer for iTunes on macOS #installeriTunes11.dmg
6A4850D190B7F1E44AC4F58CA265F3845B9DF787iTunes10030511.4Installer for iTunes on macOS #installeriTunes11.4.dmg
E9E04D3B59B2713CAE3ACCA88414E589A4ADD809iTunes10030511.3Installer for iTunes on macOS #installeriTunes11.3.dmg
F27C4E65282F92726AAE28D8759DBE4334C7F7EAiTunes10030510.5.3Installer for iTunes on macOS #installeriTunes10.5.3.dmg
E673E5CBD2955130EFBC92A788FFF178E66BD155iTunes10030510.6.3Installer for iTunes on macOS #installeriTunes10.6.3.dmg
989EAE5442D64DFC6DD4CE3CED38EBA3FA9609C3iTunes10030510.6Installer for iTunes on macOS #installeriTunes10.6.dmg
0FF7C404F87122F89D49ED6C411B3692F1016E0AiTunes10030510.7Installer for iTunes on macOS #installeriTunes10.7.dmg
83E703E3AB604FDC1F8EBA492E153F4D81C5E94FiTunes10030511.0.1Installer for iTunes on macOS #installeriTunes11.0.1.dmg
836A5AAAE030A7A138D49824317B3A5F01A631D1iTunes10030511.0.2Installer for iTunes on macOS #installeriTunes11.0.2.dmg
83F4AFC5D3B5698C811C87C27B975824116BBF1DiTunes10030511.0.3Installer for iTunes on macOS #installeriTunes11.0.3.dmg
CD9F00B54F2C7B2B46083F8C3D2813E0B3BC3B30iTunes10030511.0.4Installer for iTunes on macOS #installeriTunes11.0.4.dmg
04F7E86E1621C15738EE48F817B402910E856B40iTunes10030511.0.5Installer for iTunes on macOS #installeriTunes11.0.5.dmg
3B6DEEF97465A11EE1746B59DA8EEC6F04A6C0EAiTunes10030511.1.1Installer for iTunes on macOS #installeriTunes11.1.1.dmg
63E61678CAA50DD41720751F362897195CE732B1iTunes10030511.1.2Installer for iTunes on macOS #installeriTunes11.1.2.dmg
FFDE4658DEF154EDFA479696E40588E9252E7276iTunes10030511.1.4Installer for iTunes on macOS #installeriTunes11.1.4.dmg
D731CABBE1F9213491F3169921A45986AC944E58iTunes10030511.1.5Installer for iTunes on macOS #installeriTunes11.1.5.dmg
66B75A92D234AFFAED19484810D8DC53ED4608DDiTunes10030511.1Installer for iTunes on macOS #installeriTunes11.1.dmg
D7E00140775BD15069DED529388ADD2CE6F0B538iTunes10030511.2.1Installer for iTunes on macOS #installeriTunes11.2.1.dmg
517C961FAC40D22B10EBA9F26C75DC24C114D4A8iTunes10030511.2.2Installer for iTunes on macOS #installeriTunes11.2.2.dmg
3C74F64C4AA4ADF6BA6B942B78E2C79BD2847C2DiTunes10030511.2Installer for iTunes on macOS #installeriTunes11.2.dmg
5E82560C3FD7175C5E4231DF12BFE8B64580C09FiTunes10030511.3.1Installer for iTunes on macOS #installeriTunes11.3.1.dmg
C8D1A504E4EBE37FC6093BB278183C861CAC7D61TreeSize Free13784.0.1Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_4.0.1.exe
3F6745A2A43291606B9B9E666D7614E98F87AC67TreeSize Free13784Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_4.0.exe
F89208AE38B2976A011966362E2C43F51CC2B259TreeSize Free13783.4.5Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.5.exe
BFDD40A1535BFF8A299775DC80816E525FF6C916TreeSize Free13783.4.4Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.4.exe
E8A0BD91D0F3239457E1FBBC20891DE652BDF58FTreeSize Free13783.4.3Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.3.exe
FDB2C4CDD96BDEE9D18CC8D49BCA0C35892A3F06TreeSize Free13783.4.2Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.2.exe
F995604F87F0AFB62FC6E1DB2420CA076585A73CTreeSize Free13783.4.1Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.1.exe
589CF64AAA8E7DA4847E4C0EB2BE6920086CA023TreeSize Free13783.4Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.4.exe
7360B948E1902094D98B8C7112801486AF2E95EDTreeSize Free13783.3.2Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.3.2.exe
486BD8DFCDCECCEE1AE12FC94A7328145947FC0ATreeSize Free13783.3.1Installer for TreeSize Free on Windows #installerTreeSizeFreeSetup_3.3.1.exe
8879BF56FE7A3FC107E510075A7B947ABEC466CARobomongo15521.0.0Installer for Robomongo on Windows 64 bit #installerrobomongo-1.0.0-rc1-windows-x86_64-496f5c2.exe
E83080D60E74F77F652F58E1ED0829AC8AB1B793Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-windows-x86_64-0786489.exe
6E2ED54ADA88774FFE17A9FA2A483772E8E93F82Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc10-windows-x86_64-33c89ea.exe
3CD222628F90B54DC6C8D76D9677E7BA0D435623Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc9-windows-x86_64-0bb5668.exe
985D0311EBAFC4877015626EE87190E6E5DD8162Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc8-windows-x86_64-c113244.exe
CAC3D02894A7120BC6EA25CA0E1F2AC5CF4C1D1ERobomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc7-windows-x86_64-2b7a8ca.exe
441D2E9E36636186D7152EF26827C0D6EFE0FE52Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc6-windows-x86_64-98af4fc.exe
6DBA097261FBC4A020D4B376043B40915B246CFARobomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc5-windows-x86_64-82b96f4.exe
295EDD6ABF2E7279A260A61DAB13FDE08C6B9A76Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc4-windows-x86_64-8c830b6.exe
D51DFFB3B830FCEEAF928EEBDDBFC8949FC28609Robomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc3-windows-x86_64-0476204.exe
4DB31036FF80F8AE778D35752952A4EE040186BBRobomongo15520.9.0Installer for Robomongo on Windows 64 bit #installerrobomongo-0.9.0-rc2-windows-x86_64-6a2f8c6.exe
C4C5FE48EA21B9A4B2771026C5B9AC3E674C9226FileZilla1843.25.1.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.25.1.0_win32-setup.exe
E741F75FE61E875D165F7E8F244277A3E535C4B3FileZilla1843.25.1.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.25.1.0_win64-setup.exe
E0D12A53E5B826CCE4593E7F96D5E6E293DD40F1FileZilla1843.25.0.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.25.0.0_win32-setup.exe
A0BCF500953017D577CC065C4EDFE5AFED70EA2FFileZilla1843.24.1.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.24.1.0_win32-setup.exe
A18FE0E27BB3441A5249E7F4AB9FD10D0D107422FileZilla1843.24.0.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.24.0.0_win32-setup.exe
0A0332E45ED0DAB80FF43BC39BC4A06E226ADE20FileZilla1843.23.0.2Installer for FileZilla on Windows 32 bit #installerFileZilla_3.23.0.2_win32-setup.exe
7194C0BC39BDAC81D58A899D8D702C54C8A11B9AFileZilla1843.23.0.1Installer for FileZilla on Windows 32 bit #installerFileZilla_3.23.0.1_win32-setup.exe
3BBC2213DF71FC7C9B7ECCA4908AA42357E25CCAFileZilla1843.23.0.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.23.0.0_win32-setup.exe
259A0A23BD0E4E4CD4C5D224C64AE7A5898F9A55FileZilla1843.22.2.2Installer for FileZilla on Windows 32 bit #installerFileZilla_3.22.2.2_win32-setup.exe
BDBBE36D3B4A37BEB04CDAB426D8394F3B9F02A5FileZilla1843.22.2.1Installer for FileZilla on Windows 32 bit #installerFileZilla_3.22.2.1_win32-setup.exe
B98AF994804716E0CA33109A985A5A39ADF8ED96FileZilla1843.22.2.0Installer for FileZilla on Windows 32 bit #installerFileZilla_3.22.2.0_win32-setup.exe
7891B7AA3D7DCB609E69C7646C95D23AD09638C0FileZilla1843.22.2.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.22.2.0_win64-setup.exe
3292279CCF1D2CDF2CA605E6079FD94DC6EBC769FileZilla1843.22.2.1Installer for FileZilla on Windows 64 bit #installerFileZilla_3.22.2.1_win64-setup.exe
2C28D76CA1536F5C68E0F018762D17F0FB4AAA14FileZilla1843.22.2.2Installer for FileZilla on Windows 64 bit #installerFileZilla_3.22.2.2_win64-setup.exe
ADD2915596EF9489EF6C2A36C2ED8C136B16FAC5FileZilla1843.23.0.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.23.0.0_win64-setup.exe
95A0890B0C17405802674AEB8E49C6C03A866842FileZilla1843.23.0.1Installer for FileZilla on Windows 64 bit #installerFileZilla_3.23.0.1_win64-setup.exe
086F38046693D7C3AD2528E7E579133EF6439E58FileZilla1843.23.0.2Installer for FileZilla on Windows 64 bit #installerFileZilla_3.23.0.2_win64-setup.exe
1D17EEFE66AC73ED376D4BA3BDC67A988EB57824FileZilla1843.24.0.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.24.0.0_win64-setup.exe
14671FBE4AD9C184499BCC6243BD4C0BF48628F8FileZilla1843.24.1.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.24.1.0_win64-setup.exe
4069A81143DF51F219E2C852DC595E44927C03DEFileZilla1843.25.0.0Installer for FileZilla on Windows 64 bit #installerFileZilla_3.25.0.0_win64-setup.exe
357B084FCA15BA44527C9988217E59183EE27BBEBeyond Compare1864.2Installer for Beyond Compare on Windows #installerBCompare-4.2.0.22108.exe
E2523F2CAF02A7EEC718E87E401E54F9A4D86E1BBeyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.9.21719.exe
3D30ABF5CC4E2A7AB6475EFA6BD08AE0BDB7CE04Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.8.21575.exe
91A7F9B863DBE70C2E72FAE9C4A849151424BDDDBeyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.7.21529.exe
C87F9D7A26BD56F7C8F3717796C5FE35CE04467DBeyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.6.21095.exe
7390AFEB67694323CA475D06963AE81EF259E7CBBeyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.5.21031.exe
2633665261590C0B2AFA591AFEE7D32915B1FBA1Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.4.20978.exe
44228D50680CD0C3B18DC2A8075E74FA3F05E6A7Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.3.20814.exe
CDD81A781FCDF273C08D6625A86BADB20DCA69E9Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.2.20720.exe
FD7DB8BA7C5EE11BC98651F1F052DE5F9B97AFD7Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.1.20615.exe
F0F090CE3B0F952DAB04E30C21E7286743E91CB5Beyond Compare1864.1Installer for Beyond Compare on Windows #installerBCompare-4.1.0.20575.exe
C708FF9C5B23FD93822CDD8C21BC2EE4D915FA78Beyond Compare1864Installer for Beyond Compare on Windows #installerBCompare-4.0.7.19761.exe
A29D8EEDC2A67A8CC643ACD67BAB64665A2924FBTortoiseSVN2021.9.5.27581Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.5.27581-x64-svn-1.9.5.msi
441CB4B3907F5AC79899ECA48967377F5F27B71CTortoiseSVN2021.9.4.27285Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.4.27285-x64-svn-1.9.4.msi
8005189F252F806F593A497A7CF85864751F1162TortoiseSVN2021.9.3.27038Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.3.27038-x64-svn-1.9.3.msi
D390D15F29AA9AD3ABCB758E76D3B3ECE8A48B0FTortoiseSVN2021.9.2.26806Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.2.26806-x64-svn-1.9.2.msi
7B67680F159A6A83AE426244695A0E5CA9B8C117TortoiseSVN2021.9.1.26747Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.1.26747-x64-svn-1.9.1.msi
E107FA7A5AACDBF0B36B220E2B75AB93A4332520TortoiseSVN2021.9.0.26652Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.9.0.26652-x64-svn-1.9.0.msi
D38C6D864EFCC45F341BB096A14040F41B9AE943TortoiseSVN2021.8.12.26645Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.8.12.26645-x64-svn-1.8.14.msi
546500210C0F4FE29AABA3E609B19F3B2C695EB9TortoiseSVN2021.8.9.26117Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.8.9.26117-x64-svn-1.8.11.msi
E3799C09A04F46524E24ACFC93EAC3B1B618176DTortoiseSVN2021.7.15.25753Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.7.15.25753-x64-svn-1.7.18.msi
717C69B3157700EF46F251562A5F09E215B45A1FTortoiseSVN2021.6.16.21511Installer for TortoiseSVN on Windows 64 bit #installerTortoiseSVN-1.6.16.21511-x64-svn-1.6.17.msi
BE765BFF3E7145646BD7F569D628B870C3B1751FTortoiseSVN2021.9.5.27581Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.5.27581-win32-svn-1.9.5.msi
3BB899DF3606C6005C0BE224134B14C39489FFEFTortoiseSVN2021.9.4.27285Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.4.27285-win32-svn-1.9.4.msi
63A0AE6427BDD674F5B353A998B393026820756BTortoiseSVN2021.9.3.27038Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.3.27038-win32-svn-1.9.3.msi
C8E42341E4AEDEB20A7537BB80E3DEC76CF26EEFTortoiseSVN2021.9.2.26806Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.2.26806-win32-svn-1.9.2.msi
803F8E3A36808AD2CD8F91FE505D38A9161DB939TortoiseSVN2021.9.1.26747Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.1.26747-win32-svn-1.9.1.msi
051EAAB13FDC14DFF3283D9345C94B029DE48BD5TortoiseSVN2021.9.0.26652Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.9.0.26652-win32-svn-1.9.0.msi
5CAA4CF8C30C2CED5A439016A7F43B309BF83293TortoiseSVN2021.8.12.26645Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.8.12.26645-win32-svn-1.8.14.msi
21D68EA19E0D29B791A117C0AF7CA4BA7F9EB905TortoiseSVN2021.8.9.26117Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.8.9.26117-win32-svn-1.8.11.msi
24297BC5AE6829C6C03363D176872FEEFDC6081CTortoiseSVN2021.7.15.25753Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.7.15.25753-win32-svn-1.7.18.msi
E3E5265BD0868BFD24930AC506B4AFE96E893468TortoiseSVN2021.6.16.21511Installer for TortoiseSVN on Windows 32 bit #installerTortoiseSVN-1.6.16.21511-win32-svn-1.6.17.msi
5C7B5CE90D85B066D42982209E5191A6C6F64701TortoiseGit2141.8.12.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-1.8.12.0-32bit.msi
6B7596DE6DCE47FADCE40059D7D406DBDB77B3ACTortoiseGit2141.8.13.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-1.8.13.0-32bit.msi
9642C26E4080B4C39E2DAD525AFE4B85F43C3D38TortoiseGit2141.8.14.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-1.8.14.0-32bit.msi
C7CB44427ED5EFCCDC8E72721F5CDB9D36462BE9TortoiseGit2141.8.15.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-1.8.15.0-32bit.msi
EF5AF7BB8EAA68BCB1DFFD17B4CAD23564169271TortoiseGit2141.8.16.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-1.8.16.0-32bit.msi
E3D5188E09F1CC1C8957CB49E71EC6BF9604ADBCTortoiseGit2142.0.0.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-2.0.0.0-32bit.msi
2271B8DDB6344A9B76280E3DB20BA3FFCDECE480TortoiseGit2142.1.0.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-2.1.0.0-32bit.msi
AA4457466FF28F611B738B3436B1ACF9CB8B1883TortoiseGit2142.2.0.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-2.2.0.0-32bit.msi
2EBE533597E77072000EE1AD6FEDE30BDD3290E6TortoiseGit2142.3.0.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-2.3.0.0-32bit.msi
459D246CFA24798AAD323615369F0D501E906A40TortoiseGit2142.4.0.0Installer for TortoiseGit on Windows 32 bit #installerTortoiseGit-2.4.0.0-32bit.msi
3B9AC766B00C30ABFBF866D5C5FFF5CF5FF8F083TortoiseGit2141.8.12.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-1.8.12.0-64bit.msi
C4191B85C94C91F733067EF3E8C949D923BA7051TortoiseGit2141.8.13.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-1.8.13.0-64bit.msi
2DD3D58990F98D080685FCDBA725E41E6A189CF3TortoiseGit2141.8.14.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-1.8.14.0-64bit.msi
EDA2378727F0878E10A660A808FD242354EDE893TortoiseGit2141.8.15.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-1.8.15.0-64bit.msi
E897BC9081A1BC9BB567011851D13DEEA90B12A1TortoiseGit2141.8.16.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-1.8.16.0-64bit.msi
0230F2E94D2C5F81E4FD821457B3833D957DCB9ETortoiseGit2142.0.0.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-2.0.0.0-64bit.msi
4BE11890B6E8BCD223778E3BCD9016DC7B5F4FD5TortoiseGit2142.1.0.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-2.1.0.0-64bit.msi
8E83926EDB1F6E6DD813700DADB4049AA43BE97ATortoiseGit2142.2.0.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-2.2.0.0-64bit.msi
77B2FADFB06B27A5E0B49600FDFD14626330C064TortoiseGit2142.3.0.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-2.3.0.0-64bit.msi
AD2CFCB8AFFABD28EEB44F2F4CF061EB47A95164TortoiseGit2142.4.0.0Installer for TortoiseGit on Windows 64 bit #installerTortoiseGit-2.4.0.0-64bit.msi
1B9E1C7C70BD32FC3491150957320AA9B4611F35VMware Player30812.5.5Installer for VMware Player on Windows #installerVMware-player-12.5.5-5234757.exe
13FF296369D43B00085CC905CB268F00ECC475A0VMware Player30812.5.4Installer for VMware Player on Windows #installerVMware-player-12.5.4-5192485.exe
2DA642915C72A171D52C7447988117AF2883C8B6VMware Player30812.5.3Installer for VMware Player on Windows #installerVMware-player-12.5.3-5115892.exe
482444F278513EB89692DF1F2D2636188DE2B3D3VMware Player30812.5.2Installer for VMware Player on Windows #installerVMware-player-12.5.2-4638234.exe
033337907465A38DC9A99FE43B0761DF14E109BAVMware Player30812.5.1Installer for VMware Player on Windows #installerVMware-player-12.5.1-4542065.exe
E2AAF17ED3862B6FA77C4CC7DF9C574B75BB0D34VMware Player30812.5.0Installer for VMware Player on Windows #installerVMware-player-12.5.0-4352439.exe
D63E0D2B95E1BA23AFD1A9D04137B0FF8EA58CFCVMware Player30812.1.1Installer for VMware Player on Windows #installerVMware-player-12.1.1-3770994.exe
645B4864417B0AA1DADC511D45460C4362CB19D6VMware Player30812.1.0Installer for VMware Player on Windows #installerVMware-player-12.1.0-3272444.exe
160FFC037FE92DB9E9B27EEDA39A669F549BD11AVMware Player30812.0.1Installer for VMware Player on Windows #installerVMware-player-12.0.1-3160714.exe
5F7E768B4B0C0AB66D10D6C08EE76817330D681DVMware Player30812.0.0Installer for VMware Player on Windows #installerVMware-player-12.0.0-2985596.exe
6CC1FEA02028BC55E5750CAB72B43068ED456427VMware Workstation45812.5.5build-5234757Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.5build-5234757.exe
AFB6F920D2E3AD5972AF1F67B395C05F65B042DAVMware Workstation45812.5.4build-5192485Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.4build-5192485.exe
6A41430C77F4745FE1FFAFA890E4C3C5EA73F9C7VMware Workstation45812.5.3build-5115892Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.3build-5115892.exe
512CCF2A89B74FB05807928FBF063819888EC492VMware Workstation45812.5.2build-4638234Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.2build-4638234.exe
E404617222A58370EA39EC110B7341E66DA3AE7DVMware Workstation45812.5.1build-4542065Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.1build-4542065.exe
BACAA3B74484DEA9FDAF7BD5AD02935C90841632VMware Workstation45812.5.0build-4352439Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.5.0build-4352439.exe
9569831EEDAEF9663F96274F1690ADE34EBD11D0VMware Workstation45812.1.1build-3770994Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.1.1build-3770994.exe
B8096E025E30E7015711B83644E851207A0F1D82VMware Workstation45812.1.0build-3272444Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.1.0build-3272444.exe
D2DAFF481FBF9F2D48BF9238949D899842F9EA23VMware Workstation45812.0.1build-3160714Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.0.1build-3160714.exe
40888FBC4EB50DD81D967109A4DEF76E590EEE2DVMware Workstation45812.0.0build-2985596Installer for VMware Workstation on Windows #installerVMware-workstation-full-12.0.0build-2985596.exe
BD42F465B9CA59BDEF0C0A89F04A746CED03A133vSphere Client2106.0.0.7236Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-6.0.0.7236.exe
0492E7CC33A823F2A2F414403B81E6B409D71D3EvSphere Client2106.0.0.7035Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-6.0.0.7035.exe
06E30707C03FE617604756DF0876D1DBC51A708CvSphere Client2106.0.0.6826Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-6.0.0.6826.exe
09E1AA6C18D28890F22813233715F04BA3F37609vSphere Client2106.0.0.6376Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-6.0.0.6376.exe
ECD7E41E7813E0455A5A521EB66B6FFAC02EB17DvSphere Client2106.0.0.5505Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-6.0.0.5505.exe
962AEBDF1E8AC9DC177191FC2EA4D11F21FAD487vSphere Client2105.5.0.6958Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.6958.exe
05CDFDD28EAA7F8B8F40BFA50E9538AF9727DE37vSphere Client2105.5.0.6389Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.6389.exe
653321E33858F253A8C0E6B4383B54CA1FB343A5vSphere Client2105.5.0.4216Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.4216.exe
CFD69791ED9D495A72D23360E69F3CA6D7085F5CvSphere Client2105.5.0.4090Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.4090.exe
BE4DEA581BB5B7996D45FE2E4AD74AEFA6E6F943vSphere Client2105.5.0.3937Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.3937.exe
904A4A5B1E6AC8117FA0D6F98CBEC88CF03A5B02vSphere Client2105.5.0.3936Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.3936.exe
ACDF2FC3EA5536B9E9525441AD1B89A7417339F0vSphere Client2105.5.0.3838Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.3838.exe
DCCBF3E787F05F7930ED712007375188EA99F009vSphere Client2105.5.0.3165Installer for VMware vSphere Client on Windows #installerVMware-viclient-all-5.5.0.3165.exe
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

Endurance Antivirus Receives Bronze Certification from OPSWAT

$
0
0

Endurance Antivirus Bronze Certification

Endurance Antivirus, an anti-malware solution offered by Edelweiss, has been awarded Bronze certification for the Anti-malware category by the OPSWAT Certified Security Application Program. Originally launched in 2007, OPSWAT's certification program currently supports over 1,000 applications from various anti-malware engines to ensure their compatibility with all leading access control solutions, their detection quality, and their false positive responsiveness.

Endurance Antivirus is an anti-malware solution from Romanian technology company Edelweiss. Edelweiss is constantly working hard on making the Endurance Antivirus application better and more useful for their users. OPSWAT certified Endurance Antivirus after determining it met a number of strict criteria established by OPSWAT, and Endurance Antivirus will now be listed as an OPSWAT Bronze Certified security application.

The OPSWAT Certified Security Application Program helps endpoint security applications vendors certify regularly. IT administrators can browse OPSWAT's list of certified applications to find effective, compatible applications for their security stack. The certification program was first developed after gathering compatibility requirements from over 50 OPSWAT OEM customers.

Cristina Stet, Certification Manager at OPSWAT, said, "We're excited to announce the Bronze-level certification of Endurance Antivirus. This anti-malware solution from Edelweiss is compatible with leading access control solutions and will be listed on the OPSWAT website as a certified anti-malware application."

Edelweiss and OPSWAT encourage all cyber security solution vendors to learn more about the OPSWAT Certified Security Application Program, and to certify their latest versions prior to public release. OPSWAT recommends that IT administrators check OPSWAT's index of certified security applications before buying a new solution.

About Endurance Antivirus

Endurance Antivirus scans all files and folders in a user's system thoroughly. Its scanning engine has passed all the EICAR test files and detects over 4 million kinds of malware. With the advancement of technology and the internet era, it is very likely that systems can get infected quickly, corrupting the device. Viruses can attack a system in any form, which makes it necessary to keep all files safe and uncorrupted. Endurance Antivirus has an intuitive user interface with great performance. The app quickly performs a thorough scan of all the files in a system. Upcoming releases will also focus on a new look for the product with more usability options, along with features to detect new viruses. Download the app and keep systems constantly protected from malware. The antivirus app is daily updated to detect new malware. Stay updated and stay protected with Endurance Antivirus.

About Edelweiss

Based in Bistrita, Romania, S.C. Edelweiss SRL has over a decade of experience developing its products. Edelweiss develops and sells Endurance Antivirus, which is available on the Mac App Store and through MacUpdate.

About OPSWAT

OPSWAT is a San Francisco-based cyber security software company that provides solutions to secure and manage IT infrastructure. Founded in 2002, OPSWAT has delivered solutions and technologies that protect organizations from threats and secure digital data for over a decade. OPSWAT combines next-generation Content Disarm and Reconstruction technology, its cutting-edge Vulnerability Engine, and multi-scanning with over 30 anti-malware engines in its Metadefender suite of products, and its OESIS Framework endpoint security SDK has helped secure over 200 million endpoints. To learn more about OPSWAT, visit OPSWAT.com.

Ransomware Exploits: Detecting and Exploiting CVE-2008-2992 in Adobe Acrobat Reader

$
0
0

A vulnerability is a security flaw in an application that attackers can exploit. Vulnerabilities leave software and systems open to all sorts of cyber attacks.

Software vendors repair these vulnerabilities in the form of patches or software updates, but if those updates are not installed by the user, the system will remain vulnerable to exploits. For this reason, vulnerabilities are a major security risk for many organizations. IT administrators and security officers need to be able to quickly detect and assess vulnerabilities present on endpoints in a network.

In this blog post, we will demonstrate how outdated software can be exploited in order to install ransomware, and how to prevent this with the OPSWAT Vulnerability Engine.

Exploiting a Vulnerability to Install Ransomware

 

 

For comparison, we used two systems: The first ran Windows 7 and had Acrobat Reader 17.9 installed, while the second one had Windows XP and Acrobat Reader 8.1. We created a simulated "malicious" PDF file which would exploit a vulnerability in Acrobat Reader 8.1, and we used the same file to test both systems. Such a file could be delivered to a victim via a phishing attack, or a number of other methods.

Adobe Reader 8, Adobe Reader 17

Click image to expand

Acrobat Reader 17.9 could safely and successfully open the malicious PDF like normal, without any kind of exploit taking place.

Adobe Reader 17 No Vulnerability Exploit 

Click image to expand

However, when we opened this PDF in the second system with Acrobat Reader 8.1...

Opening Malicious PDF

Click image to expand

...Adobe Reader crashed.

Adobe Reader 8 Crash

Click image to expand

Next, the malware automatically created an executable file and the file executed itself, and then...

Executable File

Click image to expand

...within seconds the executable file encrypted all the files in the system.

Ransomware Encrypts All Files

Click image to expand

Finally, the following pop-up appeared:

Ransomware Pop-up Message

Click image to expand

Basically, the malicious PDF exploited CVE-2008-2992 to cause buffer overflow, executed a script to download ransomware from a server, and then ran the ransomware!

Detect Vulnerabilities with the OPSWAT Vulnerability Engine

 

 

Let's try using the OESIS Endpoint Assessment Tool, which integrates with the OPSWAT Vulnerability Engine, to scan the two systems described above.

In the first system, the tool detected Adobe Reader 17.9.

OPSWAT Vulnerability Engine

Click image to expand

Taking a look at the details, we can see that no vulnerabilities were found in Acrobat Reader 17.9.

OPSWAT Vulnerability Engine Adobe Reader 17

Click image to expand

In the second system, the Vulnerability Engine detected Acrobat Reader 8.1.

OPSWAT Vulnerability Engine Adobe Reader 8

Click image to expand

It detected a lot of vulnerabilities in Acrobat Reader 8.1 (identified by CVE ID), and one of them is CVE-2008-2992.

CVE-2008-2992

Click image to expand

Key Takeaways

If applications are not fully patched and updated, malicious software – in this example, ransomware – can infect a system in the amount of time it takes to open a document.

This is why it is so essential to gain visibility into all vulnerabilities present on a system; typically, because any given system will have a multitude of applications installed, there will be multiple vulnerabilities of varying severity.

The OPSWAT Vulnerability Engine provides a report on the vulnerabilities present on a system or network within just a few moments.

Learn more about the OPSWAT Vulnerability Engine here.

Latest Metadefender Product Releases from OPSWAT

$
0
0

The below chart will be updated as new releases are available, so check back on our blog for regular updates.

The current releases of each Metadefender product are the following:

ProductRelease DateRelease NotesDownload on Portal
Metadefender Core10 Apr 20174.6.3Download
  • Role-based access to product features
  • Vulnerability engine available as an added custom engine, allowing Metadefender Core to identify files from applications and software that have known vulnerabilities and should be patched, eliminating vulnerabilities before they are exploited by malware
Metadefender Core v3 (legacy)27 Apr 20173.13.3Download
  • Metadefender Core now includes the new Metadefender Client
  • The Metadefender Mail Agent now supports Office365 and G Suite email servers
  • The Metadefender Mail Agent now supports installation on Microsoft Exchange servers (BETA)
Metadefender Kiosk25 Apr 20173.4.5Download
  • Encrypted drives can now be used as the "Copy To" destination
  • Drives that are being copied to can now be wiped before files are copied
  • Media boot sectors are scanned for threats
Metadefender Central Management1 Aug 20164.2.0Download
  • Supports distribution of product updates for OESIS endpoints
Metadefender Update Downloader14 Apr 20162.1.2Download
  • Offline engine definition updates for both Metadefender Core 3.x and 4.x instances
Metadefender Secure File Transfer (SFT)27 Apr 20171.1.2Download
  • Safely store files that have been brought into your secure network

Metadefender CVEs, Hashes, Application Installers Report: April 24-May 1

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of April 24-May 1, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of May 1, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5029https://nvd.nist.gov/vuln/detail/CVE-2017-50296.8
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5032https://nvd.nist.gov/vuln/detail/CVE-2017-50326.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5033https://nvd.nist.gov/vuln/detail/CVE-2017-50334.3
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5035https://nvd.nist.gov/vuln/detail/CVE-2017-50356.8
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5038https://nvd.nist.gov/vuln/detail/CVE-2017-50386.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5044https://nvd.nist.gov/vuln/detail/CVE-2017-50446.8
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5034https://nvd.nist.gov/vuln/detail/CVE-2017-50346.8
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5031https://nvd.nist.gov/vuln/detail/CVE-2017-50316.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5030https://nvd.nist.gov/vuln/detail/CVE-2017-50306.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5039https://nvd.nist.gov/vuln/detail/CVE-2017-50396.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5040https://nvd.nist.gov/vuln/detail/CVE-2017-50404.3
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5045https://nvd.nist.gov/vuln/detail/CVE-2017-50454.3
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5047https://nvd.nist.gov/vuln/detail/CVE-2017-50476.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5048https://nvd.nist.gov/vuln/detail/CVE-2017-50486.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5037https://nvd.nist.gov/vuln/detail/CVE-2017-50376.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5050https://nvd.nist.gov/vuln/detail/CVE-2017-50506.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5049https://nvd.nist.gov/vuln/detail/CVE-2017-50496.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5051https://nvd.nist.gov/vuln/detail/CVE-2017-50516.8
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5042https://nvd.nist.gov/vuln/detail/CVE-2017-50423.3
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5046https://nvd.nist.gov/vuln/detail/CVE-2017-50464.3
Google ChromeGoogle Inc.57.0.2987.100 and priorCVE-2017-5036https://nvd.nist.gov/vuln/detail/CVE-2017-50366.8
Google ChromeGoogle Inc.57.0.2987.98 and priorCVE-2017-5041https://nvd.nist.gov/vuln/detail/CVE-2017-50414.3
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5043https://nvd.nist.gov/vuln/detail/CVE-2017-50436.8
Google ChromeGoogle Inc.50.0.2661.91 and priorCVE-2016-5168https://nvd.nist.gov/vuln/detail/CVE-2016-51685
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1660https://nvd.nist.gov/vuln/detail/CVE-2016-16606.8
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1661https://nvd.nist.gov/vuln/detail/CVE-2016-16618.3
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1662https://nvd.nist.gov/vuln/detail/CVE-2016-166210
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1664https://nvd.nist.gov/vuln/detail/CVE-2016-16644.3
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1665https://nvd.nist.gov/vuln/detail/CVE-2016-16654.3
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1663https://nvd.nist.gov/vuln/detail/CVE-2016-16636.8
Google ChromeGoogle Inc.50.0.2661.87 and priorCVE-2016-1666https://nvd.nist.gov/vuln/detail/CVE-2016-16667.5
QuickTimeApple Inc.7.7.6 and priorCVE-2011-3428https://nvd.nist.gov/vuln/detail/CVE-2011-34287.5
SafariApple Inc.5.0.6 and priorCVE-2011-3438https://nvd.nist.gov/vuln/detail/CVE-2011-34386.8
OperaOpera Software36.00 and priorCVE-2016-4075https://nvd.nist.gov/vuln/detail/CVE-2016-40755.8
LINELINE Corporation4.8.2.1125 and priorCVE-2016-4850https://nvd.nist.gov/vuln/detail/CVE-2016-48506.8
KiesSamsung Electronics Co. Ltd.2015-10-30 and priorCVE-2015-8780https://nvd.nist.gov/vuln/detail/CVE-2015-87806.9

 

Newly Supported Hashes and Installers as of May 1, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAME
A50B1DE3DE7643B249967D106621FCFA46778FE4Microsoft Lync105615.0.4420.1017Installer for Lync 2013 #installeren_lync_2013_x86_x64_dvd_1134652_15.0.4420.1017.iso
D458A175DBAA912DC6A0FEACDA9AB5BB6606BFF0Microsoft Lync10564.0.7577.0Installer for Lync 2010 x64 #installeren_lync_2010_x64_598497_4.0.7577.0.exe
FFDC5B1D1C5816B2C202FB34128B677178151CB4Microsoft Lync10564.0.7577.0Installer for Lync 2010 x86 #installeren_lync_2010_x86_598490_4.0.7577.0.exe
7B803DE7CDBF437950BC382A3FD0BB99AFF73332Microsoft Visio116111Installer for Visio 2003 Pro #installeren_office_2003_visio_pro_11.0.iso
2D8BA5B71001BA2ACF70496CB2CF80F981526A67Microsoft Visio116111Installer for Visio 2003 Standard #installeren_office_2003_visio_std_11.0.iso
A710B61027E8C9DD8744372FD6C7B0E6EC1D8022Microsoft Visio116112.0.4518.1014Installer for Visio 2007 Professional #installeren_office_visio_professional_2007_cd_x12-19212_12.0.4518.1014.iso
99D86D8E1486D1571F1B326B514EF84DAF165A12Microsoft Visio116112.0.4518.1014Installer for Visio 2007 Standard #installeren_office_visio_standard_2007_cd_x12-19207_12.0.4518.1014.iso
BFC145300ECD1B409708CA9BE4E6590D3A80C2D9Microsoft Visio116114.0.6022.1000Installer for Visio 2010 with SP1 #installeren_visio_2010_with_sp1_x86_x64_dvd_730325_14.0.6022.1000.iso
86E7F534F3ED631BC426BE7A68CE0D3FF6814EE6Microsoft Visio116114.0.4756.1000Installer for Visio 2010 #installeren_visio_2010_x86_x64_dvd_516304_14.0.4756.1000.iso
B34768C2C9C8BD30425E777D71D119410FD75509Microsoft Visio116115.0.4569.1504Installer for Visio 2013 Professional with SP1 #installeren_visio_professional_2013_with_sp1_x86_and_x64_dvd_3910950_15.0.4569.1504.iso
A9057B55F1EE7D7698644092FB407F06EB9DCEDCMicrosoft Visio116115.0.4420.1017Installer for Visio 2013 Professional #installeren_visio_professional_2013_x86_x64_dvd_1134691_15.0.4420.1017.iso
5861FAC06C303ADE374F13BF67FEA54BD1D792B4Microsoft Visio116116.0.4266.1003Installer for Visio 2016 Professional #installeren_visio_professional_2016_x86_x64_dvd_6962139_16.0.4266.1003.iso
213A8A0F8849516704101CB6C49F6A027B0D6D5FMicrosoft Excel121416.0.4266.1003Installer for Office 2016 Professional Plus #installeren_office_professional_plus_2016_x86_x64_dvd_6962141.iso
48F5A9D5457EF7D9D3BDBFA56BFD515EC8B25615Microsoft PowerPoint115215.0.4454.1000Installer for Office 2013 Professional Plus with SP1 #installeren_office_professional_plus_2013_with_sp1_x86_x64_dvd_3928186.iso
422AEEEE73294E6A5B18AF5829A8219AEE2948BDMicrosoft Word122515.0.4420.1017Installer for Office 2013 Professional Plus #installeren_office_professional_plus_2013_x86_x64_dvd_1135709.iso
EAB2DB67774DA3A8136A38AECEF6AB8A2D365DEBMicrosoft Word122514.0.6024.1000Installer for Office 2010 Professional Plus with SP1 #installeren_office_professional_plus_2010_with_sp1_x86_x64_dvd_730330.iso
C9A8C94328168041E09B3F4A9A529F6A1945C270Microsoft Word122514.0.4762.1000Installer for Office 2010 Professional Plus #installeren_office_professional_plus_2010_x86_x64_dvd_515529.iso
E9FA6034C5822ED1F5B1859C57C1D677E4408327Microsoft Word122512.0.4518.1014Installer for Office 2007 Professional Plus #installeren_office_professional_plus_2007_cd_x12-38663.iso
81E8E5B08AA073287DDF5D46B3484E3626659696Microsoft Word122511.0.8169Installer for Office 2003 Professional with SP3 #installeren_office_2003_service_pack_3_x86.exe
190426EABA1CA82D40ED0E825E98B1263558EF06Microsoft Word122511.0.6568Installer for Office 2003 Professional with SP2 #installerOffice2003SP2-KB887616-FullFile-ENU.exe
07C4D5758E87715A2E120E99227D57FAA7D10B43Microsoft Word122511.0.6359Installer for Office 2003 Professional with SP1 #installeren_office_2003_sp1.iso
0D90F58105DCBC74A8972802340B3226679E7119Microsoft Word122511.0.5604Installer for Office 2003 Professional #installeren_office_2003_pro.iso
2D766739E29EA81843DB72EDDB326483B13D2B53Microsoft Word122510.0.6612Installer for Office XP with SP3 #installeren_office_xp_sp3.iso
65D06E5435E73E6B9EB74D473C52BA80DB5FDC87Microsoft Word122510.0.4219Installer for Office XP with SP2 #installeren_oxpsp2a.exe
A0610507334845DDBBF9F3638B385EDC834F830BMicrosoft Word122510.0.3416Installer for Office XP with SP1 #installeren_officexp_sp1.exe
89FD109E4D21973E256671CFCA7ACF47B33CBDC3Microsoft Word122510.0.2627Installer for Office XP #installeren_office_xp_professional_cd_x10-29102.iso
3326278A4678CE0B1A385FB14BA8688659310475Microsoft Word12259Installer for WORKS 9 #installerWORKS9.iso
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

Weekly Recap: Threats Detected and Prevented by Metadefender, April 30-May 7

$
0
0

Using data sanitization (or content disarm and reconstruction, CDR), vulnerability assessment, and multi-scanning, Metadefender detects and prevents both known and unknown threats. Each week, we recap the top threats blocked by OPSWAT's free version of Metadefender Cloud, which offers free multi-scanning and data sanitization (with some limitations).

This week, a number of archive files and compressed files are included in the scan results. Metadefender Cloud uses archive extraction to scan for threats hidden within compressed files and archive files. Be sure to click the links in the far right column to see details about threats found in the extracted files.

FILE TYPEMD5SHA1SHA256NO. OF ENGINES DETECTING THREATSDETAILS
RAR Archive5ACCC744D90A2485BAFB272C0CBA68FD1229C0F9C3DA95F629EB8609D319D36BCBD1273D4CE502DDBF924EE2B40AABE32A0E0368DE42B49F638D56B536DFC38F5666BB207/40

Original File

Extracted Files

ZIP compressed archive632FAAE5BD3620EE85DE01AC90A582BBB495329A12B2DFF1F6A54138B209525D7A9FF52B5EB7BA0024F4E2F40D944CDA5D95EB250829ACC5DEDAED94E3C7CA8D9A159B757/39

Original File

Extracted Files

Word Microsoft Office Open XML Format document8B64F03637C377BB8B2FD778D3F5B64A514784BB93457B9F29B412EBD52872D27E049E3DB0AD3D8FADE247B219D7A3C8FEE781E26742C1733DE8C00CC50254785CB71E0914/40

Original File

Extracted Files

RAR ArchiveCBA44DBAA15324228B18D3287D9C4F3DA94E5372B4745F8A076142D3736CD547660B33527AEF994D25E6EAD75362A16FDFAEDD4588A574641C13900AC8287C8A82FF42588/40

Original File

Extracted Files

RAR Archive9CE53478C6919FD38333A60719BA7C3DF67C241EEC84E6D6EC5844EDAFC821B25100E14CD4304C8281B233D946978861D4A47FAD0F6B2A0763B78839080E20219333A0AD4/40

Original File

Extracted Files

Archive fileCB561E33E066015A067B307761AA8BE5A7655A3623D52EA1261B91CF2EB6BA53EB4E141B9660C2E92A51C0504E00D3E27DAF5688C5D1E18C747FF1CFFAB52A35F14C4CAD3/40

Original File

Extracted Files

Win32 Executable MS Visual C++410C51FCA1E6BD42579D649F9C183084BCEF53C275FB1FA8ED8831C66F250290E3C0A137500F19CAF4078D7A9500C9A70E18D9542D396880F43E3BE25FD036E7F954BDCF11/40

Original File

Extracted Files

RAR ArchiveF98A4D66E8BF191B708A86520688A6418FB8C9E2C6335BD0ECC1C87F96981DA7738E223E3EFE1A6A51BAE166EDE67842B6CB02E521E47B8DEA03BAA81BD0822A295B88B17/40

Original File

Extracted Files

ZIP compressed archive7C4513ED72E5E596B39BA2ECF2BDF63E27890C3A14B9C81A44A40D5EF7E6C9DBB11B17B5C70ECD47E2E5B17E8BA6EC614256CF632FE3909F816568D37047907D0456FB5E2/40

Original File

Extracted Files

Metadefender CVEs, Hashes, Application Installers Report: May 1-8

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of May 1-8, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of May 8, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
Google ChromeGoogle Inc.40.0.2214.85 and priorCVE-2014-9654https://nvd.nist.gov/vuln/detail/CVE-2014-96547.5
Adobe Flash PlayerAdobe Systems Inc.22.0.0.211 and priorCVE-2016-4271https://nvd.nist.gov/vuln/detail/CVE-2016-42715
JavaOracle Corporation8.0.1210 and priorCVE-2017-3539https://nvd.nist.gov/vuln/detail/CVE-2017-35392.1
JavaOracle Corporation8.0.1210 and priorCVE-2017-3544https://nvd.nist.gov/vuln/detail/CVE-2017-35444.3
JavaOracle Corporation8.0.1210 and priorCVE-2017-3526https://nvd.nist.gov/vuln/detail/CVE-2017-35267.1
JavaOracle Corporation8.0.1210 and priorCVE-2017-3514https://nvd.nist.gov/vuln/detail/CVE-2017-35145.1
JavaOracle Corporation8.0.1210 and priorCVE-2017-3511https://nvd.nist.gov/vuln/detail/CVE-2017-35113.7
JavaOracle Corporation8.0.1210 and priorCVE-2017-3509https://nvd.nist.gov/vuln/detail/CVE-2017-35094
JavaOracle Corporation8.0.1210 and priorCVE-2017-3533https://nvd.nist.gov/vuln/detail/CVE-2017-35334.3
JavaOracle Corporation8.0.1210 and priorCVE-2017-3512https://nvd.nist.gov/vuln/detail/CVE-2017-35125.1

 

Newly Supported Hashes and Installers as of May 8, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAME
2E696459100AD81FC60843346A885C803800EF53Microsoft Visual Studio281814.0.24720.1Installer for Visual Studio Enterprise 2015 with update 1 #installeren_visual_studio_enterprise_2015_with_update_1_x86_x64_dvd_8234340.iso
07C949078F895CE0D9C03A1B8D55571A8C90AC94Microsoft Visual Studio281814.0.23107.0Installer for Visual Studio Enterprise 2015 #installeren_visual_studio_enterprise_2015_x86_x64_dvd_6850497.iso
07A835250E7B02DDD5351F082DD66F5484B91A1FMicrosoft Visual Studio281812.0.40629.0Installer for Visual Studio Express 2013 with update 5 #installeren_visual_studio_express_2013_for_windows_desktop_with_update_5_x86_dvd_6815504.iso
E01F364C3F21CDFCEBB25D3C028398741F08EB24Microsoft Visual Studio281814.0.23107.0Installer for Visual Studio Professional 2015 #installeren_visual_studio_professional_2015_x86_x64_dvd_6846629.iso
918EA4A911858D32C977148026E7EDB7B238E6F6Microsoft Visual Studio281812.0.40629Installer for Visual Studio Ultimate 2013 with update 5 #installeren_visual_studio_ultimate_2013_with_update_5_x86_dvd_6815896.iso
E65E779C7B4F90A018EC0D1F50691FC6E1315A24Microsoft Visual Studio281815.0.26320.2Installer for Visual Studio Enterprise 2017 #installermu_visual_studio_enterprise_2017_version_15.1_x86_x64_10331416.exe
FD82F078A82BC8D2ECEA61D72DB52B4D07AC5011Microsoft Visual Studio281815.0.26320.2Installer for Visual Studio Professional 2017 #installermu_visual_studio_professional_2017_version_15.1_x86_x64_10331419.exe
B28241CA909E909A9BB43FBEC3358C0D1BC26B5FMicrosoft Visual Studio281811.0.61219Installer for Visual Studio 2012 #installerVS2012.5.iso
C966B61E4E35210C7C186D4EC1A0450B0A0FBF9CMicrosoft Visual Studio281814.0.25123.0Installer for Visual Studio 2015 Enterprise #installervs2015.2.ent_enu.iso
68FA2C4406D681FCBB0772D96233540FF194E938Microsoft Visual Studio281814.0.25123.0Installer for Visual Studio 2015 Professional #installervs2015.2.pro_enu.iso
269FA5FE823263718DA056D465BF8EB19C87ECD8Microsoft Visual Studio281814.0.25123.0Installer for Visual Studio 2015 with update 2 #installervs2015.2.vsu.iso
40EA340070E3684935689E60D8B7669D519D49D4Microsoft Visual Studio281814.0.25420.1Installer for Visual Studio 2015 Enterprise with update 3 #installervs2015.3.ent_enu.iso
2126C6EBE83DC3065A1C499D8D0C7F253D275BF1Microsoft Visual Studio281814.0.25420.1Installer for Visual Studio 2015 Professional with update 3 #installervs2015.3.pro_enu.iso
133BF8C6E22B9DBF144A23B28D7B81E64DCEE70DSlack20592.5.2Installer for Slack on Windows 64 bit #installerSlackSetup_x64_2.5.2.exe
A6995B8CDE57C84944142E49AA2991E03CE0FDF1Slack20592.6.0Installer for Slack on Windows 64 bit #installerSlackSetup_x64_2.6.0.exe
AC9F592717006A613628BB48DD82125FA380402BSlack20592.6.0Installer for Slack on Windows 32 bit #installerSlackSetup_x86_2.6.0.exe
D7A3A6E138155F64A5E6893E632267C80EFD2397Slack20592.5.2Installer for Slack on Windows 32 bit #installerSlackSetup_x86_2.5.2.exe
7C57DAF3A6ECECFAD8DA76017C44AC0BA7C23306Zoom18724.0.29656.0413Installer for Zoom on Windows #installerZoomInstaller_4.0.29656.0413.exe
105DD330B43F1BA400BCB7F906DD187B2C6DCB9AZoom18724.0.29406.0411Installer for Zoom on Windows #installerZoomInstaller_4.0.29406.0411.exe
81B97CDA8CE15B1F44A33192F508426FD30D1A17Zoom18724.0.29183.0407Installer for Zoom on Windows #installerZoomInstaller_4.0.29183.0407.exe
C2F643932D1CD1B2B20EA8A6FF5FBE5BDDE4EF4BZoom18724.0.25958.0306Installer for Zoom on Windows #installerZoomInstaller_4.0.25958.0306.exe
C63D4A95CD1984DF804C4A9397962061D7752DB9Zoom18724.0.25513.0228Installer for Zoom on Windows #installerZoomInstaller_4.0.25513.0228.exe
86A76517232432B34FE44F11ECC4EE99611B9420Zoom18724.0.22258.0125Installer for Zoom on Windows #installerZoomInstaller_4.0.22258.0125.exe
FD97AE3CC4D07D09F1760A6C6587F6406A787161Zoom18724.0.21664.0117Installer for Zoom on Windows #installerZoomInstaller_4.0.21664.0117.exe
A3A1AD07E596F28DAAD4765CF6BC4F438C950F1AZoom18724.0.21432.0116Installer for Zoom on Windows #installerZoomInstaller_4.0.21432.0116.exe
209ECD98F467527B8E233C888106BAADAE9B85C5Zoom18723.6.17722.1229Installer for Zoom on Windows #installerZoomInstaller_3.6.17722.1229.exe
15406652DF4680250614030B94F86E2CA37D4A44Zoom18723.6.17038.1226Installer for Zoom on Windows #installerZoomInstaller_3.6.17038.1226.exe
9A60B390A60F6F93382EAD4D8B9B33FEEEF1659EBox Sync9344.0.7800.0Installer for Box Sync on Windows #installerBoxSyncSetup_4.0.7800.0.exe
7DF5D43DB482E22471456AC5CD7E4B787C861F77Box Sync9344.0.7724.0Installer for Box Sync on Windows #installerBoxSyncSetup_4.0.7724.0.exe
B3FEF4811493F8F94A7A4A3069B1F48AFB7660EBBox Sync9344.0.7702.0Installer for Box Sync on Windows #installerBoxSyncSetup_4.0.7702.0.exe
E3418D51BABC159CB34CF105933583A1B94B93C7Box Sync9344.0.7693.0Installer for Box Sync on Windows #installerBoxSyncSetup_4.0.7693.0.exe
684F39E0DAEE40D3988585660A2EC7C60618AABBBox Sync9344.0.7318.0Installer for Box Sync on Windows #installerBoxSyncSetup_4.0.7318.0.exe
1FFC8F242AA5DD6B022123A41EEAA33E07B35F47Cisco AnyConnect Secure Mobility Client1924.4.01054Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.4.01054-core-vpn-predeploy-k9.msi
30A2F4C80DC1B57A99C30B3771C5DD3D2E23386CCisco AnyConnect Secure Mobility Client1924.4.00243Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.4.00243-core-vpn-predeploy-k9.msi
7026B4FABB4C6C53E6867404BCA266C8D96BFFCFCisco AnyConnect Secure Mobility Client1924.3.04027Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.3.04027-pre-deploy-k9.msi
389E8077A02F9CA483212D5C7C41B596CAB35E9BCisco AnyConnect Secure Mobility Client1924.3.02039Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.3.02039-pre-deploy-k9.msi
CC0B9E6F47D47C0D0013DF1B42086EB3D0963E1ECisco AnyConnect Secure Mobility Client1924.3.00748Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.3.00748-pre-deploy-k9.msi
D3CA30DEA0BBE95D9527C918A6FCA85BE681BF91Cisco AnyConnect Secure Mobility Client1924.2.04018Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.2.04018-pre-deploy-k9.msi
FD34E7769F944A11549F4926591BB038DFAEF687Cisco AnyConnect Secure Mobility Client1924.2.03013Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.2.03013-pre-deploy-k9.msi
A6BA72E6C998EE4C4537B7DB800443D494B75947Cisco AnyConnect Secure Mobility Client1924.2.02075Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.2.02075-pre-deploy-k9.msi
F2A739EBADCA27ADF780FD262665686555386C6ECisco AnyConnect Secure Mobility Client1924.2.01035Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.2.01035-pre-deploy-k9.msi
24CB933D20E15DD424AF719AE163AF08080110C7Cisco AnyConnect Secure Mobility Client1924.2.01022Installer for AnyConnect Secure Mobility Client on Windows #installeranyconnect-win-4.2.01022-pre-deploy-k9.msi
030DF82390E7962177FCEF66FC1A0FD1A3BA4090QQ International3371.91.1369.0Installer for QQ International on Windows #installerQQintl2.11_1.91.1369.0.exe
7A9F585B4D54C3B69FB1049570D9FC59BA25477AQQ International3371.75.2626.0Installer for QQ International on Windows #installerQQIntl1.6_1.75.2626.0.exe
56C2981D3888F05AEEC71828FB888973A6017D04QQ International3371.75.2582.0Installer for QQ International on Windows #installerQQIntl1.4_1.75.2582.0.exe
7A95E068D9E47EB51D25408C123FDE59169615C5QQ1638.9.19990.0Installer for QQ on Windows #installerQQ_8.9.19990.0.exe
3A953DD36C4A8AB2FAB9829408C7B93CDCA23EC8Adobe Acrobat281915.7.20033.133275Installer for Acrobat Reader DC on Windows #installerAcroRdrDC1500720033_MUI_15.7.20033.133275.exe
62C9F8540C242B55E7B1C7EFCE75D76EDF9A7321Adobe Acrobat281915.8.20082.147029Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1500820082_MUI_15.8.20082.147029.msp
D99944507DA48EC362D6ABA642C9170EE9CDF71EAdobe Acrobat281915.9.20069.159242Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1500920069_MUI_15.9.20069.159242.msp
9B9A6530C2051DD875BEFFDDDFF86026EAE24343Adobe Acrobat281915.9.20077.160923Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1500920077_MUI_15.9.20077.160923.msp
92B9C20B74F8B4B17CB4E143560E4D8411561E3CAdobe Acrobat281915.9.20077.160923Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1500920079_MUI_15.9.20077.160923.msp
E1C51CFCBB17126AAD4F3B9407CFF2E0FAB486CCAdobe Acrobat281915.10.20056.167417Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501020056_MUI_15.10.20056.167417.msp
18817DCB7FE06C651F8A0897BA98BB26761B7676Adobe Acrobat281915.10.20056.167417Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501020059_MUI_15.10.20056.167417.msp
809F88B2840B0598485A9E1E36064BF16FA54A62Adobe Acrobat281915.10.20056.167417Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501020060_MUI_15.10.20056.167417.msp
87719906D9407F22DECBDA8C06DD149D1B57ACE5Adobe Acrobat281915.16.20039.185268Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501620039_MUI_15.16.20039.185268.msp
EF566842DEC648417C900F76C79358F606CAC13BAdobe Acrobat281915.16.20039.185268Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501620041_MUI_15.16.20039.185268.msp
0C1CD0317F2A53E672689E30AFD12D9D20BB0859Adobe Acrobat281915.16.20045.188096Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501620045_MUI_15.16.20045.188096.msp
3C2DBA7B62E64B4BD36820A9A34641104E2ED255Adobe Acrobat281915.17.20050.192152Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501720050_MUI_15.17.20050.192152.msp
A1E411B571DD7CD3FF7F7A0613BA67DA5D22C9D9Adobe Acrobat281915.17.20050.192152Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1501720053_MUI_15.17.20050.192152.msp
F92228B3843899C4745AEBD49FA3F33C4FE2E2CCAdobe Acrobat281915.20.20039.203716Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1502020039_MUI_15.20.20039.203716.msp
0A9A395EBF8E83469A3D5D18CDBE13AC709C99ECAdobe Acrobat281915.20.20042.205528Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1502020042_MUI_15.20.20042.205528.msp
A500BFAB3EA5CD0E36120224D54951F28B293242Adobe Acrobat281915.23.20053.211670Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1502320053_MUI_15.23.20053.211670.msp
799F1285AC2DE07EDB1F15E4C7FDF3F132A5F747Adobe Acrobat281915.23.20056.213124Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1502320056_MUI_15.23.20056.213124.msp
8C6569AABE0C57B222803F1F46AA4ABA71065E6FAdobe Acrobat281915.23.20070.215641Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1502320070_MUI_15.23.20070.215641.msp
2267F4C9207DF81A4B73CB4362FE74A3A212AF45Adobe Acrobat281917.9.20044.222436Installer for Acrobat Reader DC on Windows #installerAcroRdrDCUpd1700920044_MUI_17.9.20044.222436.msp
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

Important Updates Made to Metadefender.com

$
0
0

Metadefender Cloud

OPSWAT has been making improvements to Metadefender.com. Updates include changing the layout and user interface slightly for easier navigation, and adding new pages that display our latest threat research.

Metadefender Cloud is OPSWAT's threat intelligence platform. At Metadefender.com, users can test out Metadefender Cloud technology by uploading files for data sanitization and multi-scanning, looking up a hash, or checking an IP address's reputation. All these functionalities, and more, are available in the commercial and enterprise versions of Metadefender Cloud.

Changes made to Metadefender.com include:

New Vulnerabilities Section

Metadefender Cloud detects and assesses vulnerabilities in over 15,000 applications and application versions. In the new Vulnerabilities section of Metadefender.com, we list all vulnerabilities supported by Metadefender Cloud, with information about each vulnerability.

List of Supported CVE Vulnerabilities

This new page allows users to easily browse all supported CVEs using a simple interface. See the page here.

New Reports Section

Metadefender.com has added two newreports over the last five months: the Content Disarm & Reconstruction Report and the Malware Outbreak Report. With four different reports now hosted on Metadefender.com, we have created a new reports section to consolidate our team's research.

On this page, users can browse:

  • Multi-scanning Statistics
  • the Windows Anti-malware Market Share Report
  • the Content Disarm & Reconstruction Report
  • the Malware Outbreak Report

View all of these reports here.

Metadefender Email Security Cloud: Free Demo

Metadefender Email Security Cloud is a free demo of Metadefender Email Security technology – just forward suspicious emails with or without attachments to sanitize@metadefender.com, and a scanned, sanitized version of the email and the attachments will be sent to you automatically.

On the main page of Metadefender.com, we've added a quick link to send emails to sanitize@metadefender.com:

Metadefender Email Security Cloud

Learn more about Metadefender Email Security here.

New Panels Section

We added a new section at the bottom of Metadefender.com:

Metadefender.com

This new layout makes it simple to navigate to the reports section, Metadefender Threat Intelligence Feeds, Metadefender Cloud Client, and the other offerings hosted on Metadefender.com. Click on each of the panels to access these pages.

Visit Metadefender.com to see the website's new look, and learn more about Metadefender Cloud here.

How to Prevent 'WannaCry' Ransomware and Similar Attacks

$
0
0

Ransomware

Since last week, users and organizations in over 100 countries, including major corporations and various government agencies, have fallen victim to the "Wanna Decryptor" or "WannaCry" ransomware attack. This ransomware was initially introduced to systems via phishing emails and spreads using a known Windows vulnerability.

Initial reports last Friday said that the United Kingdom National Health Service was infected by the ransomware, affecting up to 16 U.K. hospitals. Such an attack would have been disastrous enough on its own, but the ransomware has since spread to companies and government agencies all over the world. Wanna Decryptor is a ransomware attack of unprecedented scale, and it is currently ongoing.

MalwareTech found a simple way to disable an earlier version of the ransomware (h/t Ars Technica). However, new versions of Wanna Decryptor that cannot be disabled in this way have now been seen in the wild (h/t Wired).

The ransomware uses Windows vulnerability MS17-010. Windows issued a patch for this vulnerability on March 14, but many systems had not been updated. (Patching this vulnerability will help keep a system from being infected.)

OPSWAT Technology Helps Block 'WannaCry'

Many of our customers have been asking us if OPSWAT technology would have blocked this ransomware attack.

From the most current research available, there are a large number of malicious executables in the wild that were vehicles to install this ransomware. OPSWAT has been collecting and reviewing these files. As of this writing, Metadefender Cloud has detected every one of these files as malicious, which means if you had used it to scan incoming files you would have caught them.

What about our Metadefender on-premises solutions? As one would expect, the larger the Metadefender multi-scanning package, the more likely it is that the ransomware would be caught. According to our research, Metadefender Core 16 and Metadefender Core 20 flag all of the files associated with Wanna Decryptor as malicious.

Additionally, the Metadefender Workflow Engine enables administrators to set policies blocking executable files altogether. Metadefender data sanitization strips malicious content from all kinds of files. With these two technologies, malicious files that spread ransomware can be blocked or rendered harmless.

Metadefender Email Security renders phishing emails harmless by removing malicious hyperlinks and sanitizing all email attachments. This would have rendered useless whatever phishing emails were used to spread Wanna Decryptor.

How to Block Ransomware with Metadefender

Ransomware like WannaCry/Wanna Decryptor can enter a system in any number of ways. That's why organizations should:

  • Increase their email security in order to detect, block, or remove malicious email content. Employees receive phishing emails constantly, and Metadefender Email Security will block malicious content in these emails.
  • Improve their IPS, proxy, and storage server security to protect their data. Metadefender ICAP Server efficiently and effectively accomplishes this.
  • Add protection from malicious files uploads and downloads. Metadefender ICAP Server also provides this.
  • Block threats on portable media such as USB drives. Metadefender Kiosk is deployed in many critical infrastructure facilities for this purpose.
  • Acquire development tools to create powerful customized cyber security solutions. OPSWAT enables organizations to do this with Metadefender APIs and OESIS Framework.

    Contact the OPSWAT sales team today to prevent ransomware attacks like Wanna Cryptor/WannaCry.

    CONTACT SALES

Metadefender CVEs, Hashes, Application Installers Report: May 8-15

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of May 8-15, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of May 15, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3070https://nvd.nist.gov/vuln/detail/CVE-2017-307010
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3069https://nvd.nist.gov/vuln/detail/CVE-2017-306910
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3068https://nvd.nist.gov/vuln/detail/CVE-2017-306810
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3071https://nvd.nist.gov/vuln/detail/CVE-2017-307110
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3072https://nvd.nist.gov/vuln/detail/CVE-2017-307210
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3073https://nvd.nist.gov/vuln/detail/CVE-2017-307310
Adobe Flash PlayerAdobe Systems Inc.25.0.0.163 and priorCVE-2017-3074https://nvd.nist.gov/vuln/detail/CVE-2017-307410
IrfanViewIrfan Skiljan4.44 and priorCVE-2017-7721https://nvd.nist.gov/vuln/detail/CVE-2017-77212.6
PythonPython Software Foundation3.6 and priorCVE-2016-2183https://nvd.nist.gov/vuln/detail/CVE-2016-21835
Google ChromeGoogle Inc.57.0.2987.75 and priorCVE-2017-5031https://nvd.nist.gov/vuln/detail/CVE-2017-50316.8

 

Newly Supported Hashes and Installers as of May 15, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAME
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
BFC98B82D38CE7A736AAD745A8AF64245853D5F1---smb2.sys file of the Windows 7srv2_windows_7_smb2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
00104387CC7501593A39E6FC1671EF27E7232739---Smb 2.0 Server Driver File of the Windows 8.1 EnterpriseWin8.1_Enterprise_srv2.sys
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

OPSWAT Enhances Metadefender Cloud Client with Release of Detection for WannaCry Vulnerability

$
0
0

Metadefender Cloud Client MS17-010 Support

Metadefender Cloud Client - Click image to expand

OPSWAT today announced the release of Metadefender Cloud Client 4.0.6. The new release includes support for detection of Microsoft Windows vulnerability MS17-010, the vulnerability exploited by the recent WannaCry ransomware. Adding support for this vulnerability will help organizations confirm their endpoints are not vulnerable to the ransomware, in addition to the powerful endpoint protection that Metadefender Cloud Client already provides for application-level vulnerabilities.

The WannaCry ransomware has spread extremely quickly around the globe, infecting over 300,000 computers in over 150 countries in less than a week since its first reported appearance on Friday, May 12. Although a patch for MS17-010 was made available by Microsoft on March 14, systems impacted by WannaCry have not had the patch applied. This latest product release from OPSWAT provides a quick and easy check to see if an endpoint is at risk.

Benny Czarny, Founder and CEO of OPSWAT, said, "With a threat like WannaCry that has spread so quickly and has such global reach, it is important for security professionals to make sure their systems are not exposed to the threat. Time is of the essence in making that determination and remediating any systems that could become compromised.

"We are proud that OPSWAT is able to provide this free tool to help administrators check for vulnerabilities in the systems they are managing. This is true not only for the immediate threat posed by the WannaCry ransomware, but also for other known application vulnerabilities that could be the target of the next ransomware outbreak. By using tools such as Metadefender Cloud Client, these vulnerabilities can be identified and patched in advance of attacks by malware seeking to exploit known vulnerabilities."

When Metadefender Cloud Client is downloaded from OPSWAT.com and launched, it scans the endpoint for threats and vulnerabilities using the multi-scanning and vulnerability detection of Metadefender Cloud. With this release, Metadefender Cloud Client will also check for the Windows operating system vulnerability that is exploited by the WannaCry ransomware so that users will know to apply the operating system patch.

Visit this page for more information about Metadefender Cloud Client and for a free download of the tool. The product release notes are on this page.

To learn more about how OPSWAT products protect organizations from ransomware, be sure to attend OPSWAT's upcoming webinar "The Age of Ransomware: Detect and Prevent Threats" on Monday, May 22 at 11 AM PT. Sign up for the webinar here.

About OPSWAT

OPSWAT is a global cyber security company providing solutions for enterprises since 2002 to identify, detect, and remediate advanced security threats from data and devices coming into and out of their networks. Trusted by over 1,000 organizations worldwide for this secure data flow, OPSWAT prevents advanced security threats across multiple channels of file transfer and data flow with flexible options of Metadefender® solutions and API-based development and threat intelligence platforms. With over 30 anti-malware engines, 100+ data sanitization engines, and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization (Content Disarm and Reconstruction), vulnerability detection, multi-scanning, device compliance, and cloud access control. To learn more about OPSWAT, please visit www.OPSWAT.com.

Weekly Recap: Threats Detected and Prevented by Metadefender, May 13-20

$
0
0

Using data sanitization (or content disarm and reconstruction, CDR), vulnerability assessment, and multi-scanning, Metadefender detects and prevents both known and unknown threats. Each week, we present data on some of the threats blocked by OPSWAT's free version of Metadefender Cloud, which offers free multi-scanning and data sanitization (with some limitations).

Metadefender Cloud detected these malware outbreaks with multi-scanning:

FILE TYPEMD5SHA1SHA256NO. OF ENGINES DETECTING THREATSDETAILS
Win32 Executable Borland Delphi 64B4C4AF713C8F2606C1989B87569600BB1A425D3B576B5B8467DB94DE7E8CE1F90A110FA12A8516AB2A1430AD9F4ABD6B43D7FEEB0D6067FAE5FCF457747DD6F838287BE37/40Link
Win32 Executable MS Visual C++42C7A26DB85059785CBE285D5FE18F5B49961BB696357A2B44ACBB4E0BF77A106771676E0633E81DAD1C0D385B4C21E92071461F8605FE9AF00D18DCEEC8FBF4E20E67E534/40Link
Generic Win/DOS Executable2C690C61C1AD69B63FC36ADF69A5EC11DCB60E71E67C53B0B5F05E5EB4B6A2A12D3282CB3EFAFE13DBFC00AFE99B5895F3CB3FEE97386C622811E629A25EEFA8C579BB1134/40Link
Win32 Executable MS Visual C++509C41EC97BB81B0567B059AA2F50FE887420A2791D18DAD3F18BE436045280A4CC16FC409A46B3E1BE080745A6D8D88D6B5BD351B1C7586AE0DC94D0C238EE36421CAFA32/40Link
Win64 Executable8495400F199AC77853C53B5A3F278F3EBE5D6279874DA315E3080B06083757AAD9B32C232CA2D550E603D74DEDDA03156023135B38DA3630CB014E3D00B1263358C5F00D29/37Link
Win32 Executable MS Visual C++42F6BFD62E0DBC0C7D50E03F4978122ACCA58CF3B8CFC0D55913590B75DD022455BDE67E92B4266317EA9C697FDDA4515E2960D01F086D8E5BB2D681D170979D7F1EAF1930/40Link
Win32 Executable MS Visual C++BEC0B7AFF4B107EDD5B92767211376511E4858D9A807DDAA791516D3B7A9272EB8D8AB82E14F1A655D54254D06D51CD23A2FA57B6FFDF371CF6B828EE483B1B1D6D2107933/40Link
Win32 Dynamic Link LibraryA0A7022CAA8BD8761D6722FE3172C0AF9C694094BCBEB6E87CD8DD03B80B48AC1041ADC9D174F0C6DED55EB315320750AAA3152FC241ACBFAEF662BF691FFD0080327AB925/40Link

Metadefender CVEs, Hashes, Application Installers Report: May 15-22

$
0
0

OPSWAT Metadefender

The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify vulnerabilities in files and data being brought into a secure network and on endpoints within a network, significantly expediting remediation of the issue.

Common Vulnerabilities and Exposures (CVE) is a catalog of publicly known cyber security vulnerabilities that's sponsored by the United States Department of Homeland Security. The first table below lists the new CVEs and product versions for which support was added to the Metadefender database during the week of May 15-22, 2017. The second table lists the hashes and application installers for which support was added.

Learn more about the Metadefender Vulnerability Engine:

LEARN MORE

Newly Supported CVEs and Product Versions as of May 22, 2017

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
Google ChromeGoogle Inc.51.0.2704.106 and priorCVE-2016-5131https://nvd.nist.gov/vuln/detail/CVE-2016-51316.8

 

Newly Supported Hashes and Installers as of May 22, 2017

HASHPRODUCTSIGNATUREPRODUCT VERSIONDESCRIPTIONFILE NAMECVE
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0143
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0144
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0145
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0146
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0147
EC9D7A83986012E48F01182D8797709603938D84---srv2.sys on Windows 10srv2_windows_10.sysCVE-201-0148
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0143
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0144
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0145
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0146
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0147
E8EC64A2CD69D3E0E9708EA3E3CBB94973CE9E00---srv.sys for Windows XPsrv.sysCVE-201-0148
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0143
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0144
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0145
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0146
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0147
DA91ECEE06958A84E59E1A55BB5DF90A6325EC3C---smb2 Winfows 10srv2.sysCVE-201-0148
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0143
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0144
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0145
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0146
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0147
2798392176EACD195337C9CAFBEAAA20F070E445---Smb 2.0 Server Driver File of the Windows Server 2012srv2_windows_2012_candy.sysCVE-201-0148
JS: 
var stIsIE = /*@cc_on!@*/false; sorttable = { init: function() { // quit if this function has already been called if (arguments.callee.done) return; // flag this function so we don't do the same thing twice arguments.callee.done = true; // kill the timer if (_timer) clearInterval(_timer); if (!document.createElement || !document.getElementsByTagName) return; sorttable.DATE_RE = /^(\d\d?)[\/\.-](\d\d?)[\/\.-]((\d\d)?\d\d)$/; forEach(document.getElementsByTagName('table'), function(table) { if (table.className.search(/\bsortable\b/) != -1) { sorttable.makeSortable(table); } }); }, makeSortable: function(table) { if (table.getElementsByTagName('thead').length == 0) { // table doesn't have a tHead. Since it should have, create one and // put the first table row in it. the = document.createElement('thead'); the.appendChild(table.rows[0]); table.insertBefore(the,table.firstChild); } // Safari doesn't support table.tHead, sigh if (table.tHead == null) table.tHead = table.getElementsByTagName('thead')[0]; if (table.tHead.rows.length != 1) return; // can't cope with two header rows // Sorttable v1 put rows with a class of "sortbottom" at the bottom (as // "total" rows, for example). This is B&R, since what you're supposed // to do is put them in a tfoot. So, if there are sortbottom rows, // for backwards compatibility, move them to tfoot (creating it if needed). sortbottomrows = []; for (var i=0; i<table.rows.length; i++) { if (table.rows[i].className.search(/\bsortbottom\b/) != -1) { sortbottomrows[sortbottomrows.length] = table.rows[i]; } } if (sortbottomrows) { if (table.tFoot == null) { // table doesn't have a tfoot. Create one. tfo = document.createElement('tfoot'); table.appendChild(tfo); } for (var i=0; i<sortbottomrows.length; i++) { tfo.appendChild(sortbottomrows[i]); } delete sortbottomrows; } // work through each column and calculate its type headrow = table.tHead.rows[0].cells; for (var i=0; i<headrow.length; i++) { // manually override the type with a sorttable_type attribute if (!headrow[i].className.match(/\bsorttable_nosort\b/)) { // skip this col mtch = headrow[i].className.match(/\bsorttable_([a-z0-9]+)\b/); if (mtch) { override = mtch[1]; } if (mtch && typeof sorttable["sort_"+override] == 'function') { headrow[i].sorttable_sortfunction = sorttable["sort_"+override]; } else { headrow[i].sorttable_sortfunction = sorttable.guessType(table,i); } // make it clickable to sort headrow[i].sorttable_columnindex = i; headrow[i].sorttable_tbody = table.tBodies[0]; dean_addEvent(headrow[i],"click", sorttable.innerSortFunction = function(e) { if (this.className.search(/\bsorttable_sorted\b/) != -1) { // if we're already sorted by this column, just // reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted','sorttable_sorted_reverse'); this.removeChild(document.getElementById('sorttable_sortfwdind')); sortrevind = document.createElement('span'); sortrevind.id = "sorttable_sortrevind"; sortrevind.innerHTML = stIsIE ? '&nbsp<font face="webdings">5</font>' : '&nbsp;&#x25B4;'; this.appendChild(sortrevind); return; } if (this.className.search(/\bsorttable_sorted_reverse\b/) != -1) { // if we're already sorted by this column in reverse, just // re-reverse the table, which is quicker sorttable.reverse(this.sorttable_tbody); this.className = this.className.replace('sorttable_sorted_reverse','sorttable_sorted'); this.removeChild(document.getElementById('sorttable_sortrevind')); sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); return; } // remove sorttable_sorted classes theadrow = this.parentNode; forEach(theadrow.childNodes, function(cell) { if (cell.nodeType == 1) { // an element cell.className = cell.className.replace('sorttable_sorted_reverse',''); cell.className = cell.className.replace('sorttable_sorted',''); } }); sortfwdind = document.getElementById('sorttable_sortfwdind'); if (sortfwdind) { sortfwdind.parentNode.removeChild(sortfwdind); } sortrevind = document.getElementById('sorttable_sortrevind'); if (sortrevind) { sortrevind.parentNode.removeChild(sortrevind); } this.className += ' sorttable_sorted'; sortfwdind = document.createElement('span'); sortfwdind.id = "sorttable_sortfwdind"; sortfwdind.innerHTML = stIsIE ? '&nbsp<font face="webdings">6</font>' : '&nbsp;&#x25BE;'; this.appendChild(sortfwdind); // build an array to sort. This is a Schwartzian transform thing, // i.e., we "decorate" each row with the actual sort key, // sort based on the sort keys, and then put the rows back in order // which is a lot faster because you only do getInnerText once per row row_array = []; col = this.sorttable_columnindex; rows = this.sorttable_tbody.rows; for (var j=0; j<rows.length; j++) { row_array[row_array.length] = [sorttable.getInnerText(rows[j].cells[col]), rows[j]]; } /* If you want a stable sort, uncomment the following line */ //sorttable.shaker_sort(row_array, this.sorttable_sortfunction); /* and comment out this one */ row_array.sort(this.sorttable_sortfunction); tb = this.sorttable_tbody; for (var j=0; j<row_array.length; j++) { tb.appendChild(row_array[j][1]); } delete row_array; }); } } }, guessType: function(table, column) { // guess the type of a column based on its first non-blank row sortfn = sorttable.sort_alpha; for (var i=0; i<table.tBodies[0].rows.length; i++) { text = sorttable.getInnerText(table.tBodies[0].rows[i].cells[column]); if (text != '') { if (text.match(/^-?[£$¤]?[\d,.]+%?$/)) { return sorttable.sort_numeric; } // check for a date: dd/mm/yyyy or dd/mm/yy // can have / or . or - as separator // can be mm/dd as well possdate = text.match(sorttable.DATE_RE) if (possdate) { // looks like a date first = parseInt(possdate[1]); second = parseInt(possdate[2]); if (first > 12) { // definitely dd/mm return sorttable.sort_ddmm; } else if (second > 12) { return sorttable.sort_mmdd; } else { // looks like a date, but we can't tell which, so assume // that it's dd/mm (English imperialism!) and keep looking sortfn = sorttable.sort_ddmm; } } } } return sortfn; }, getInnerText: function(node) { // gets the text we want to use for sorting for a cell. // strips leading and trailing whitespace. // this is *not* a generic getInnerText function; it's special to sorttable. // for example, you can override the cell text with a customkey attribute. // it also gets .value for <input> fields. if (!node) return ""; hasInputs = (typeof node.getElementsByTagName == 'function') && node.getElementsByTagName('input').length; if (node.getAttribute("sorttable_customkey") != null) { return node.getAttribute("sorttable_customkey"); } else if (typeof node.textContent != 'undefined' && !hasInputs) { return node.textContent.replace(/^\s+|\s+$/g, ''); } else if (typeof node.innerText != 'undefined' && !hasInputs) { return node.innerText.replace(/^\s+|\s+$/g, ''); } else if (typeof node.text != 'undefined' && !hasInputs) { return node.text.replace(/^\s+|\s+$/g, ''); } else { switch (node.nodeType) { case 3: if (node.nodeName.toLowerCase() == 'input') { return node.value.replace(/^\s+|\s+$/g, ''); } case 4: return node.nodeValue.replace(/^\s+|\s+$/g, ''); break; case 1: case 11: var innerText = ''; for (var i = 0; i < node.childNodes.length; i++) { innerText += sorttable.getInnerText(node.childNodes[i]); } return innerText.replace(/^\s+|\s+$/g, ''); break; default: return ''; } } }, reverse: function(tbody) { // reverse the rows in a tbody newrows = []; for (var i=0; i<tbody.rows.length; i++) { newrows[newrows.length] = tbody.rows[i]; } for (var i=newrows.length-1; i>=0; i--) { tbody.appendChild(newrows[i]); } delete newrows; }, /* sort functions each sort function takes two parameters, a and b you are comparing a[0] and b[0] */ sort_numeric: function(a,b) { aa = parseFloat(a[0].replace(/[^0-9.-]/g,'')); if (isNaN(aa)) aa = 0; bb = parseFloat(b[0].replace(/[^0-9.-]/g,'')); if (isNaN(bb)) bb = 0; return aa-bb; }, sort_alpha: function(a,b) { if (a[0]==b[0]) return 0; if (a[0]<b[0]) return -1; return 1; }, sort_ddmm: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; m = mtch[2]; d = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, sort_mmdd: function(a,b) { mtch = a[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt1 = y+m+d; mtch = b[0].match(sorttable.DATE_RE); y = mtch[3]; d = mtch[2]; m = mtch[1]; if (m.length == 1) m = '0'+m; if (d.length == 1) d = '0'+d; dt2 = y+m+d; if (dt1==dt2) return 0; if (dt1<dt2) return -1; return 1; }, shaker_sort: function(list, comp_func) { // A stable sort function to allow multi-level sorting of data // see: http://en.wikipedia.org/wiki/Cocktail_sort // thanks to Joseph Nahmias var b = 0; var t = list.length - 1; var swap = true; while(swap) { swap = false; for(var i = b; i < t; ++i) { if ( comp_func(list[i], list[i+1]) > 0 ) { var q = list[i]; list[i] = list[i+1]; list[i+1] = q; swap = true; } } // for t--; if (!swap) break; for(var i = t; i > b; --i) { if ( comp_func(list[i], list[i-1]) < 0 ) { var q = list[i]; list[i] = list[i-1]; list[i-1] = q; swap = true; } } // for b++; } // while(swap) } } /* ****************************************************************** Supporting functions: bundled here to avoid depending on a library ****************************************************************** */ // Dean Edwards/Matthias Miller/John Resig /* for Mozilla/Opera9 */ if (document.addEventListener) { document.addEventListener("DOMContentLoaded", sorttable.init, false); } /* for Internet Explorer */ /*@cc_on @*/ /*@if (@_win32) document.write("<script id=__ie_onload defer src=javascript:void(0)><\/script>"); var script = document.getElementById("__ie_onload"); script.onreadystatechange = function() { if (this.readyState == "complete") { sorttable.init(); // call the onload handler } }; /*@end @*/ /* for Safari */ if (/WebKit/i.test(navigator.userAgent)) { // sniff var _timer = setInterval(function() { if (/loaded|complete/.test(document.readyState)) { sorttable.init(); // call the onload handler } }, 10); } /* for other browsers */ window.onload = sorttable.init; // written by Dean Edwards, 2005 // with input from Tino Zijdel, Matthias Miller, Diego Perini // http://dean.edwards.name/weblog/2005/10/add-event/ function dean_addEvent(element, type, handler) { if (element.addEventListener) { element.addEventListener(type, handler, false); } else { // assign each event handler a unique ID if (!handler.$$guid) handler.$$guid = dean_addEvent.guid++; // create a hash table of event types for the element if (!element.events) element.events = {}; // create a hash table of event handlers for each element/event pair var handlers = element.events[type]; if (!handlers) { handlers = element.events[type] = {}; // store the existing event handler (if there is one) if (element["on" + type]) { handlers[0] = element["on" + type]; } } // store the event handler in the hash table handlers[handler.$$guid] = handler; // assign a global event handler to do all the work element["on" + type] = handleEvent; } }; // a counter used to create unique IDs dean_addEvent.guid = 1; function removeEvent(element, type, handler) { if (element.removeEventListener) { element.removeEventListener(type, handler, false); } else { // delete the event handler from the hash table if (element.events && element.events[type]) { delete element.events[type][handler.$$guid]; } } }; function handleEvent(event) { var returnValue = true; // grab the event object (IE uses a global event object) event = event || fixEvent(((this.ownerDocument || this.document || this).parentWindow || window).event); // get a reference to the hash table of event handlers var handlers = this.events[event.type]; // execute each event handler for (var i in handlers) { this.$$handleEvent = handlers[i]; if (this.$$handleEvent(event) === false) { returnValue = false; } } return returnValue; }; function fixEvent(event) { // add W3C standard event methods event.preventDefault = fixEvent.preventDefault; event.stopPropagation = fixEvent.stopPropagation; return event; }; fixEvent.preventDefault = function() { this.returnValue = false; }; fixEvent.stopPropagation = function() { this.cancelBubble = true; } // Dean's forEach: http://dean.edwards.name/base/forEach.js /* forEach, version 1.0 Copyright 2006, Dean Edwards License: http://www.opensource.org/licenses/mit-license.php */ // array-like enumeration if (!Array.forEach) { // mozilla already supports this Array.forEach = function(array, block, context) { for (var i = 0; i < array.length; i++) { block.call(context, array[i], i, array); } }; } // generic enumeration Function.prototype.forEach = function(object, block, context) { for (var key in object) { if (typeof this.prototype[key] == "undefined") { block.call(context, object[key], key, object); } } }; // character enumeration String.forEach = function(string, block, context) { Array.forEach(string.split(""), function(chr, index) { block.call(context, chr, index, string); }); }; // globally resolve forEach enumeration var forEach = function(object, block, context) { if (object) { var resolve = Object; // default if (object instanceof Function) { // functions have a "length" property resolve = Function; } else if (object.forEach instanceof Function) { // the object implements a custom forEach method so use that object.forEach(block, context); return; } else if (typeof object == "string") { // the object is a string resolve = String; } else if (typeof object.length == "number") { // the object is array-like resolve = Array; } resolve.forEach(object, block, context); } };

SentinelOne Receives Silver Certification from OPSWAT

$
0
0

The OPSWAT Certified Security Application Program has awarded Silver certification to SentinelOne for Anti-malware. Originally launched in 2007, OPSWAT's certification program currently supports over 1,000 applications from various anti-malware engines to ensure their compatibility with all leading access control solutions, their detection quality, and their false positive responsiveness.

SentinelOne unifies endpoint threat prevention, detection, and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks. OPSWAT awarded certification to SentinelOne after determining it met strict criteria for compatibility. OPSWAT will list SentinelOne as an OPSWAT Silver Certified security application on OPSWAT.com.

OPSWAT developed the Certified Security Application Program in 2007 after compiling compatibility requirements from over 50 OPSWAT OEM customers, including industry-leading NAC, CASB, SSO, and SSL-VPN solutions from vendors such as Citrix, Pulse Secure, Cisco, IBM, and Dell. The certification program is meant to help IT administrators find compatible and effective applications for their security stack. The program also helps endpoint security applications vendors who want to certify regularly.

Cristina Stet, Certification Manager at OPSWAT, said, "SentinelOne is helping to lead the way in endpoint security, and we're excited to award Silver certification to SentinelOne for compatibility."

"SentinelOne is extremely pleased to have been awarded the Silver certification from the OPSWAT Certified Security Application Program for its anti-malware applications," said Tomer Weingarten, CEO of SentinelOne. "This recognition from OPSWAT further reinforces SentinelOne's mission to provide a unique, standalone approach to endpoint security. SentinelOne is continuing to establish itself as an industry leader by creating anti-malware solutions through its next-generation endpoint security approach to replace traditional antivirus methods."

SentinelOne and OPSWAT encourage all anti-malware, patch management, and encryption application vendors to learn more about the OPSWAT certification program and its benefits, and to certify their latest versions prior to public release. OPSWAT also recommends that all IT administrators check OPSWAT's list of certified security applications before making a purchase decision.

SentinelOne Silver Certification Anti-malware

About SentinelOne

SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention, and remediation of threats initiated by nation states, terrorists, and organized crime. SentinelOne's unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviors, protecting devices against advanced, targeted threats in real time. SentinelOne was formed by an elite team of cyber security and defense experts from IBM, Intel, Check Point Software Technologies, McAfee, and Palo Alto Networks. To learn more, visit sentinelone.com or follow us at @SentinelSec.

About OPSWAT

OPSWAT is a global cyber security company providing solutions for enterprises since 2002 to identify, detect, and remediate advanced security threats from data and devices coming into and out of their networks. Trusted by over 1,000 organizations worldwide for this secure data flow, OPSWAT prevents advanced security threats across multiple channels of file transfer and data flow with flexible options of Metadefender® solutions and API-based development and threat intelligence platforms. With over 30 anti-malware engines, 100+ data sanitization engines, and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization (Content Disarm and Reconstruction), vulnerability detection, multi-scanning, device compliance, and cloud access control. To learn more about OPSWAT, please visit www.OPSWAT.com.

Update: Most Destructive Malware of All Time

$
0
0

All malware is inherently dangerous, but there are a few threats that stand out amongst the others when it comes to inflicting damage. We took a look at some of the most destructive malware of all time from traditional viruses, worms and Trojans to increasingly prevalent PUAs such as adware and spyware. This list, while covering most of the all-time worst threats, is not all- inclusive. For example, notable threats are not on this list such as the ILOVEYOU bug, although they also rank as highly destructive. How many of these threats do you remember?

1. CIH Virus - 1998

The CIH virus, also known as the "Chernobyl virus", was named after the explosion of the nuclear plant in Russia because it was written to execute on the anniversary of the explosion. The virus worked by wiping data from the hard drives of infected devices and overwriting the BIOS chip within the computer, which rendered the device unusable. BIOS chips, originally manufactured by IBM for PCs, are a type of firmware used when a device is booted or turned on. This virus caused tremendous damage because the BIOS chip was not removable on many PCs, requiring the user to replace the entire motherboard. The virus was created by a student at the Taipei Tatung Institute of Technology, named Chen Ing Hau. Although the virus caused millions of dollars in damages, Chen was never imprisoned or fined and actually got a job at a software company through his resulting infamous creation. 

2. Melissa Worm - 1999

The Melissa worm was a macro virus that caused millions of dollars in damages to infected PCs. The virus spread via email and was supposedly created by David L. Smith, who named the virus after an exotic dancer from Florida. The virus used an enticing subject line to get its victims to open it. Once the email was opened, the virus was able to replicate and send to an additional 50 email addresses accessed through the originally infected computer. 

3. Code Red Worm - 2001

Code Red was a computer worm that affected almost 360,000 computers by targeting PCs that were running Microsoft's IIS web server. The worm was first discovered by two eEye Digital Security employees and was named for the Code Red Mountain Dew they were drinking when they discovered it. The worm targeted a vulnerability in Microsoft's IIS web server using a type of security software vulnerability called a buffer overflow

Spread of the Code Red worm from Caida

4. Slammer Worm - 2003

In January of 2003, the Slammer worm struck 75,000 users with a DoS attack. The worm targeted a vulnerability found in Microsoft SQL and spread rapidly. Denial-of-service attacks are used by malware writers to overload a companies' network with meaningless traffic, eventually causing the network to crash. Owen Maresh of Akamai is credited with being the first person to discover the destructive worm from Akamai's Network Operations Control Center. At its height, the Slammer Worm sent 55 million database requests across the globe and is said to have spread within just 15 minutes, surpassing the speed of the Code Red Worm from 2001. 

5. SoBig.F Worm - 2003

The SoBig.F Worm was a piece of malware that appeared only a few weeks before the Slammer worm mentioned above. The SoBig.F worm entered a device via email, which if opened could search the infected computer for additional email addresses, then sending messages to those aliases. The worm caused $37.1 Billion in damages and is credited with bringing down freight and computer traffic in Washington D.C, as well as Air Canada. Email subject lines used to entice users included, "Your details, Thank you!, "Re: Details, Re", "Re: My details", as well as various others. The speed at which the worm spread is said to surpass that of the ILOVEYOU virus and Anna Kournikova worm, both of which also spread via email. The worm's creator still remains unknown.

6. My Doom Worm - 2004

The My Doom worm, known as one of the fastest spreading viruses in history, passes both the ILOVEYOU bug and SoBig worm in speed. It was transmitted via email and usually contained a variety of subject lines including, "Error", "Mail Delivery System", "Test" or "Mail Transaction Failed". Though its creator still remains unknown, some speculate that it originated in Russia. The worm was first discovered and named by an employee at McAfee for the line, "mydom" that appeared in its code. 

7. Stuxnet Worm - 2010

The Stuxnet Worm entered devices through infected USB drives and thus had to be manually inserted into a device in order to spread. The dangerous thing about this particular virus is that internet connectivity was not needed for it to spread, making it particularly fatal for critical infrastructure plants. Once on a device, the worm would then run a check to see if the infected device had access to industrial control systems. If it did, the worm would then take control of plant centrifuges, causing them to eventually fail. The main victims of Stuxnet's payload were Iranian nuclear plants and a uranium enrichment plant. Although not verified, some believe that the United States and Israel were responsible for the creation of the worm, in order to hamper Iranian nuclear development. 

Stuxnet Diagram from L-Dopa

8. Cryptolocker Trojan - 2013

The Cryptolocker Trojan is ransomware that encrypts its victims' hard drives and then demands a payment. When the ransom message appears on the victim's computer, they are given a time limit in which they must pay the ransom in order to unlock their files. The Trojan enters a user's system through an email, supposedly sent by a logistics company. Within the email, there is an attached zip file which contains a PDF that requires the user to enter a provided password to open. Once opened, the Trojan begins its attack on the victim's computer. By posing as a legit company, the ransomware uses social engineering to trick the user into performing the required actions.

Cryptolocker Screenshot from Bleeping Computer

9. ZeroAccess Botnet - 2013

Known as one of the largest botnets in history, ZeroAccess affected over 1.9 million computers, using them to earn revenue through bitcoin mining and click fraud. Botnets involve a group of computers, also known as zombies, that are controlled by malicious software and used to send SPAM emails or launch HTML attacks, the first of which was utilized by the ZeroAccess Botnet. These controls are orchestrated by the BotMaster or the command center of the botnet. The SPAM emails sent by the botnets often contain malware that is then used to infect more computers. 

10. Superfish Adware - 2014

Superfish adware made its claim to fame through a class action lawsuit filed against Lenovo, the largest maker of PCs in the world. Superfish spyware came pre-installed on Lenovo machines without Lenovo customers being told of its existence. Superfish installed its own root certificate authority which allowed it to void SSL/TLS connections, creating an opening or "hole" for attackers. This exposed Lenovo users to potential cyber criminals while providing Superfish and Lenovo with a way to target unsuspecting users with tailored advertisements.

11. Locky Ransomware - 2016

2016 saw a massive increase in ransomware, and with that came Locky, a threat with a massive payload delivered via a phishing email. These emails contain a Javascript attachment with an executable that triggers the Locky ransomware attack once clicked on. Locky employed extremely strong RSA and AES encryption, encrypting files not just on the infected system but also unmapped network drives connected to the point of infection, deleting volume shadow snapshots. In other words, it anticipates remedial actions and is specifically designed to prevent you from restoring your files by deleting shadow copies.

12. WannaCry Ransomware - 2017

WannaCry, the most destructive ransomware variety of 2017 (so far), hit over 150 countries and over 100,000 organizations, including major corporations and various government agencies. This ransomware was initially introduced to systems via phishing emails and spread using a known Windows vulnerability.

Initial reports said that the United Kingdom National Health Service was infected by the ransomware, affecting up to 16 U.K. hospitals. Wanna Decryptor was a ransomware attack of unprecedented scale and sophistication. Unlike previous ransomware varieties, WannaCry uses a worm to infect other systems, spreading through an entire network. More attacks like this are expected to come in 2017. 

 

References:

1. ESET Reference
2. TCM Resource
3. PC Mag Reference
4. F-Secure Reference
5. WIRED Reference
6. CNN Reference
7. Naked Security Reference
8. IEEE Spectrum
9. Panda Security Reference
10. ZDNet Reference
11. CNET Reference
12. Fox News Reference

OPSWAT Announces Bronze Certification of Clearsight for Anti-malware

$
0
0

Clearsight Bronze Certification OPSWATThe OPSWAT Certified Security Application Program has awarded Bronze certification to Clearsight for Anti-Malware. Originally launched in 2007, OPSWAT's certification program currently supports over 1,000 applications from various anti-malware engines to ensure their compatibility with all leading access control solutions, their detection quality, and their false positive responsiveness.

Clearsight Antivirus is a Bulgarian company that was founded in 2010. The company develops anti-malware solutions to protect both consumers and enterprises. OPSWAT awarded certification to Clearsight after determining that Clearsight Antivirus met a number of strict criteria. OPSWAT will list Clearsight as a Bronze Certified security application on OPSWAT.com.

OPSWAT developed the Certified Security Application Program in 2007 after compiling compatibility requirements from over 50 OPSWAT OEM customers, including industry-leading NAC, CASB, SSO, and SSL-VPN solutions from vendors such as Citrix, Pulse Secure, Cisco, IBM, and Dell. The certification program helps IT administrators find compatible and effective applications for their security stack. The program also helps endpoint security applications vendors who want to certify regularly.

Cristina Stet, Certification Manager at OPSWAT, said, "OPSWAT's Certified Security Application Program recognizes the highest-quality security applications on the market. We're proud to award Bronze certification to Clearsight for anti-malware."

Dimitry Chendev, Chief Technology Officer at Clearsight Technologies, commented, "We have been working towards gaining OPSWAT certification and approval from one of the best anti-malware certification programs out there. I am delighted that Clearsight achieved certification of our product and put the OPSWAT seal of approval on our solution.

"Our ethos is 'keep things simple' while providing business-class antivirus solutions to protect companies worldwide. Our products are uncomplicated, easy to navigate, and feature-packed. Most users want software security products that keep their computer safe and don't require their attention until it is needed. With OPSWAT certification, we show the world our product does what we say it does."

OPSWAT and Clearsight recommend that all security application vendors learn more about the OPSWAT certification program and certify their latest versions before public release. Additionally, IT administrators can use OPSWAT's list of certified security applications as a resource before purchasing a security solution.

About Clearsight

Clearsight Antivirus was founded in 2010 and is Bulgaria's only homegrown antivirus software company. The company was started by a group of highly experienced individuals from the United Kingdom and Russia with the idea to provide uncomplicated reliable products. The company develops and provides anti-malware solutions to protect consumer and business customers, utilizing and combining best-of-breed technologies to create a simple to use reliable anti-malware solution for all. For more information, visit www.csantivirus.com.

About OPSWAT

OPSWAT is a global cyber security company providing solutions for enterprises since 2002 to identify, detect, and remediate advanced security threats from data and devices coming into and out of their networks. Trusted by over 1,000 organizations worldwide for this secure data flow, OPSWAT prevents advanced security threats across multiple channels of file transfer and data flow with flexible options of Metadefender® solutions and API-based development and threat intelligence platforms. With over 30 anti-malware engines, 100+ data sanitization engines, and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization (Content Disarm and Reconstruction), vulnerability detection, multi-scanning, device compliance, and cloud access control. To learn more about OPSWAT, please visit www.OPSWAT.com.

Blocking Malicious File Uploads, Part 1: Best Practices

$
0
0

Blocking Malicious Files

In order to keep a business running properly, you need to share files with and from internal employees, partners, and customers. File uploading is usually done by the departments that often handle sensitive data – accounting, HR, legal, etc. However, users no longer need to install a rogue application in order to get infected – that can happen by opening what appears to be a resume, an invoice, a courier receipt, or any other productivity file.

Any files coming inside an organization should be audited and analyzed, even when the sender seems to be a trusted, reliable source.

To ban file uploads altogether would be impractical. Clearly, it is necessary to make file uploading and importing more secure in order for businesses to function.

Productivity Files and File Uploads

The most commonly uploaded and shared files in office settings are:

  • Microsoft Office files: doc(x), xls(x), ppt(x), etc.
  • Images: jpeg, png, tiff, etc.
  • PDFs

Files

Most day-to-day activities rely on these file types, and at first glance, they seem harmless. But advanced features in these file formats can be exploited by attackers. Most people are aware of malicious macros, but Microsoft Office documents (and not just Word or Excel files) can contain many other kinds of advanced threats as well. For example, OLE objects disguised as embedded multimedia or script-enabled ActiveX controls can be configured by attackers to download malicious payloads. PDFs may contain JavaScript that performs malicious actions.

Below are a few examples of how easy it was for hackers using regular productivity files to target enterprises or government agencies with high-security standards:

*HWP documents are widely used in South Korea.

Additionally, malicious files can be disguised as one of these file types – these are called "spoofed" files.

First Steps to Keeping File Uploads Secure

Every organization has different workflows and different security needs. When designing a strategy to keep productivity file uploads secure, it's important to assess your unique situation. Start by asking questions like:

  • How many restrictions can you add without impacting productivity?
  • How much can you rely on user training? How confident are you that your users will actually apply everything they learn in security training?
  • Even if you will first open files in a sandbox environment, how confident are you that the simulated environment will replicate to perfection the real environment?

Also consider your use case. When and why do users need files uploaded on your portal? What formats are used? What are the risks in allowing those files to enter your organization?

If you are simply receiving scanned documents or resumes, collaborating with your partners' drafting agreements, or sharing invoices or POs:

  • Why would you allow a PDF with embedded JavaScript?
  • Are you sure you can trust a document that contains hyperlinks, macros, OLE objects, or ActiveX controls?
  • How do you know if an image is legitimate and hasn't been crafted by an attacker?

But it's one thing to decide that any files containing scripts or macros should not enter an organization; it's another thing to enforce that policy. It is not a simple matter to determine what exactly a file contains without opening it.

This is why further steps are necessary to block malicious files disguised as common productivity files.

Best Practices

Only allow certain types of file formats. This is a simple but necessary step. The idea is to block any file that will not impact your team’s productivity, while avoiding unnecessary risks. Make business-driven decisions about which kinds of files employees and users need, and which kinds are unnecessary. Doing so will eliminate only a small part of the risk of malicious file uploads, but it’s a start.

Block unnecessary file types, disguised files, and spoofed files. Identifying and verifying the true type of a file is a tricky thing. A lot of file verification solutions rely on merely reading the file extension. This is actually more dangerous than not having a solution in place at all, since users will expect that any file that comes through is safe to open. In fact that's not true – faking the true type of a file is a very old method of hiding malicious software, and any hacker worth their salt will take this step.

Additionally, with the simplified interfaces of contemporary operating systems that don't display already-known file extensions, it's even easier for a spoofed file to hide in plain sight.

It is essential to find and implement a solution that can identify the true type of a file even when it is disguised.

Don't make the exception a rule. If only the design team needs to use and upload .psd and .ai files, set customized rules for them, rather than allowing everyone to use those files. Keep the general allowed file types set to a minimum.

Set up security policies that exceed the bare minimum. This may involve creating a custom solution for your application or organization. The best approach is to integrate with anti-malware scanning software so that all file uploads are scanned for malware, and all files containing malicious content are detected. An anti-malware integration of this kind would require the use of antivirus APIs.

OPSWAT Antivirus API

Using a Metadefender API integration, all file uploads will be scanned – not just with one anti-malware engine, but with 30 or more, without significantly impacting user experience or upload speed.

 

At the end of the day, advanced threats require more advanced prevention measures. There is no one-size-fits-all solution out there.

Stay tuned for Part 2 of our look at detecting and blocking malicious file uploads.

Viewing all 267 articles
Browse latest View live