OPSWAT CVEs, Hashes, Application Installers Update: August 25 – September 1, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during August 25 – September 1, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES029C8942A77B3BF75B54D2E457BC3A4AFFDE6BD1 CVE-2019-2426, CVE-2019-2422, CVE-2018-11212 04639597B197709AA27C7385E13F04F4ADA6CE61 CVE-2019-2426, CVE-2019-2422, CVE-2018-11212 09056730782CDC4A52DE216B862E0E16CBAC695E CVE-2019-2426, CVE-2019-2422, CVE-2018-1121

Scroll to Top