OPSWAT CVEs, Hashes, Application Installers Update: September 22 – September 29, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during September 22 – September 29, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES05A1B04FE96ED090CF6E35AF8C830F3FE0B53B94 CVE-2015-7985, CVE-2015-4016 0BCAC0E7B2BFA3F5B5645C2033FF405E8B573685 CVE-2015-7985, CVE-2015-4016 1CC4C5CCBF62FEFEA464A5F32A03AC4EA063E885 CVE-2015-7985, CVE-2015-4016 1E14A3A5845D4D07693886D76CEFE1FA4FA8CE54 CVE-2015-7985, CVE-2015-401

Scroll to Top