OPSWAT CVEs, Hashes, Application Installers Update: May 25 – June 1, 2022

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization. We continuously enhance our platform to decrease your organization’s security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during May 25 – June 1, 2022. The second table lists the new CVEs and application versions for which support was added. To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT. File Based Vulnerabilities OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware HASHCVES088BB44F0C82A90A915F82C88C8CEE84BF4389C2 CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21341, CVE-2022-21340, … 1B88C1A84600D5C4BC416343311F51A4B49C3982 CVE-2021-2369 21CAAEBAAC60E44BC1E1B2FB2CE0DADF104F52F9 CVE-2022-21366, CVE-2022-21365

Scroll to Top