OPSWAT CVEs, Hashes, Application Installers Update: March 23 – March 30, 2022

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during March 23 – March 30, 2022. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES0076558C44D87B1FDAEE1B20A1F503DDE08A8373 CVE-2020-10146 013A4F7C9C325EA7A197DA26B46E284C66C84BAB CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21341, CVE-2022-21340, … 2251D3A0C4474C42651B4509663C7BCD11108FD8 CVE-2020-10146 2FAEC756F23C8D2F07BD39E2536AAA90801B553

Scroll to Top