OPSWAT CVEs, Hashes, Application Installers Update: September 1 – September 8, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during September 1 – September 8, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES0306BE88086DF0B81D7D33F2017BF5B8AB464ABF CVE-2018-3139, CVE-2018-3136 07A2CAE5244C4930EDE8FCCDC4E6C278DB86495A CVE-2018-20253, CVE-2018-20252, CVE-2018-20251, CVE-2018-20250, CVE-2015-5663, … 0A880FB334267203C914B2541C128B75F0A07134 CVE-2018-2678

Scroll to Top