OPSWAT CVEs, Hashes, Application Installers Update: November 24 – December 1, 2021

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during November 24 – December 1, 2021. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES07B66B744FA87662E2C168E38C839C99FC0CF2E7 CVE-2021-2388 0BDD8DA60A798438C7815538F14997EDD11B7BC9 CVE-2021-39929, CVE-2021-39928, CVE-2021-39926, CVE-2021-39925, CVE-2021-39924, … 1517DEC451B0AC34216AD51CED045755B2DF6D81 CVE-2020-15724, CVE-2020-15723

Scroll to Top