OPSWAT CVEs, Hashes, Application Installers Update: June 30 – July 7, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during June 30 – July 7, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES0405362BD96D21C5830D944A00B8C01C30A4909E CVE-2020-15732 08D13CCEAA2A5FFEA952F0C5078C3E54CC101D85 CVE-2020-15732 08E209FFB11A8733351BB25F54E78CA5508661A2 CVE-2020-15732 0CB68D60FCDD1DE53AB5066B334FCB50F49F4D1D CVE-2020-15732 0CDF20D581FD2A3A84A0CA116AD2E4C5BFD8702B CVE-2020-15732 0DC027E43C436B45A093EE2BC7193F8F7817463C CVE-2020-1573

Scroll to Top