OPSWAT CVEs, Hashes, Application Installers Update: June 23 – June 30, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during June 23 – June 30, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES07BD8249545F07C99079E574D0EF435ACFE12021 CVE-2013-5854, CVE-2013-5852, CVE-2013-5851, CVE-2013-5850, CVE-2013-5849, … 0915C72A41CCD993EE0B8D8E2B9D5AA0D41AD3A3 CVE-2018-3139, CVE-2018-3136 0981EBA3D7A2D91287EBA3FCB9145D1F2A2B4251 CVE-2013-5854

Scroll to Top