OPSWAT CVEs, Hashes, Application Installers Update: February 22 - March 1, 2023
The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization.
We continuously enhance our platform to decrease your organization's security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during February 22 - March 1, 2023. The second table lists the new CVEs and application versions for which support was added.
To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT.
File Based Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware
HASH | CVES |
---|---|
B0E0107838AF59F72A6342733536B843ABC707F5 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
131D1F26AC10B13CFD7A1BA17A6FD646B9355135 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
1775CA41ABB92AB61A807752C82BFE2E632445F6 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
1CFAFFEA469F4820111D6E21984535371B15BA67 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
1E7852C51260877C9ACF50A527310C7B39B934FE | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
32DAAF8DC90EB16A9A7FC47ED240A8F5C3804EF1 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
40BF9E6A75DAC03593A54CFF15AF68DA41D7A543 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
812D301ABDA9B6AEADF42B709536C88D1D1D059A | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
9B87170A920B82ABABE8EA6564E748AE0D6204A9 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
A00C0A13EACAA0F9824846934C71E37F404DEB3A | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
B849CDA334BB3818CF9BF3D872A75DBCE018F0AA | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
D2963A682398721D84D73B3A876BF5F15DDF8494 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
D5378CB1B1B4D58B289F33D14DB7AC422E82D009 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
DF7EB39ECE34EDBDDBC89226D98F6F97BAF1A740 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
EA1F216A82C269E4C86DD9CC72E4B7DB78FD4811 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
FCBE33DE0BA9ABF83E8EF8B00F30CEF50D8E1D1C | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
182A919517DD462387AC79061926FB7B1DB31EA5 | CVE-2022-3200, CVE-2022-3199, CVE-2022-3198, CVE-2022-3197, CVE-2022-3196, ... |
A88FAAF345C0846EC24ECA061DF583C85D19173A | CVE-2022-33890, CVE-2022-27530, CVE-2022-27529, CVE-2022-25795, CVE-2022-25792, ... |
2D011D0049F61923472409FB26EC001DF4F46ABC | CVE-2022-3200, CVE-2022-3199, CVE-2022-3198, CVE-2022-3197, CVE-2022-3196, ... |
72F087290A7F929EA3FDA19B48C1AB7BC0943CC6 | CVE-2022-33890, CVE-2022-27530, CVE-2022-27529, CVE-2022-25795, CVE-2022-25792, ... |
F07207AE9DD1E4B84E78C116EBC17B211FFC5CDB | CVE-2022-33890, CVE-2022-27530, CVE-2022-27529, CVE-2022-25795, CVE-2022-25792, ... |
149B7D4464F3D278C9B74CC88A136ED2621DD8B4 | CVE-2022-33890, CVE-2022-27530, CVE-2022-27529, CVE-2022-25795, CVE-2022-25792, ... |
5287B6FB2CB84FDD992E1C1EBCB7A5975145A2ED | CVE-2022-3200, CVE-2022-3199, CVE-2022-3198, CVE-2022-3197, CVE-2022-3196, ... |
5012703C7DFC41018AD7D63EF7B30E3FEA6FD362 | CVE-2022-3200, CVE-2022-3199, CVE-2022-3198, CVE-2022-3197, CVE-2022-3196, ... |
7F7EEA7F045817908A36AB0D62FFBBE70AD889B5 | CVE-2022-3200, CVE-2022-3199, CVE-2022-3198, CVE-2022-3197, CVE-2022-3196, ... |
0CE8FD8B09E568590632EC0446AC8580D2E92132 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
122731CE1A18B159A9C507E6E75B866198FACF1E | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
15A2BCA334351ECCF8EB9FD1A649BD4A3AA4D9D5 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
183A46243F55CE51B669EE9FD383916F3E73D880 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
20BEEB86E6E823438A916ACB7D3DADC8A499D621 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
33568DABF539FE5FFFAA0BB628CBB19C9668538A | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
4748DA4DFD966DC3C0519FCE105C1638812EBF91 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
486EFBFE75547EDA28CCB4A40F64053206871E08 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
48BF41C0E8E6F2587978282414261A09F44B9777 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
643D78142E3508995B710CE3836392AA98F81391 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
6D99244E95186B27EF35CFCA842D27B6C546A4CC | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
745D283C21DD203338545B565747FAB747739584 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
7EEA647784E8557093F323B8B2A45B864EFA5E0F | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
88E820F73FD8A41F324785A054A789980AFBFD33 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
97D4C04121C46C80442392D9AE5C8B38AD1B21E3 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
AD1D645AC414CC8EAF607DBF1B61A82894F59A47 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
B0B6D2545C223BA578D26D2F1E789EBFA0026FC8 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
BEBCB260FA736D7E2A4D79EC4B52BEF3CA0458B3 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
C70DD6DC64418716C03C5EF2140A53C5278F57D6 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
CB0EBA69C0556AFC1A93878E9DCCB11085953E72 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
E77E9E32E5FBF36DBBD62D65C416CCE25D7101BB | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
E7BADDD6E24A122C411B86CB1F5868CF3E419143 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
F2097B32EA06085D316683A0021D9A96BB218C85 | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
F47DB6C27936C8B0C09B5348D1AA3A9A205F576D | CVE-2022-21571, CVE-2022-21554, CVE-2022-21491, CVE-2022-21488, CVE-2022-21487, ... |
Endpoint Application Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following application vulnerabilities
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
node-srv | nim579 | 2.1.0 and prior | CVE-2018-3714 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3714 | 4.0 |
connect | senchalabs | 2.13.999999.999998 and prior | CVE-2018-3717 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3717 | 3.5 |
serve | zeit | 6.5.1.999998 and prior | CVE-2018-3718 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3718 | 5.0 |
angular-http-server | simonh1000 | 1.4.2 and prior | CVE-2018-3713 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3713 | 4.0 |
fastify | Matteo Collina | 0.37.999999.999998 and prior | CVE-2018-3711 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3711 | 5.0 |
sexstatic | gstack | and prior | CVE-2018-3755 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3755 | 4.3 |
atob | AJ ONeal | 2.0.3 and prior | CVE-2018-3745 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3745 | 6.4 |
crud-file-server | omphalos | 0.8.999999.999998 and prior | CVE-2018-3733 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3733 | 5.0 |
simplehttpserver | Teemu Ikonen | 0.2.0.999998 and prior | CVE-2018-3787 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3787 | 5.0 |
aedes | mcollina | 0.35.0.999998 and prior | CVE-2018-3778 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3778 | 5.0 |
markdown-pdf | alanshaw | 8.999999.999999.999998 and prior | CVE-2018-3770 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3770 | 2.1 |
buttle | jtrussell | 0.2.0 and prior | CVE-2018-3766 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3766 | 5.0 |
resolve-path | pillarjs | 1.3.999999.999998 and prior | CVE-2018-3732 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3732 | 5.0 |
assign-deep | jonschlinkert | 0.4.6.999998 and prior | CVE-2018-3720 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3720 | 6.5 |
626 | tarsisdelima | 1.1.1 and prior | CVE-2018-3727 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3727 | 5.0 |
localhost-now | DCKT | 1.0.1 and prior | CVE-2018-3729 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3729 | 5.0 |
mixin-deep | jonschlinkert | 1.3.0.999998 and prior | CVE-2018-3719 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-3719 | 6.5 |
Clamav | ClamWin Pty Ltd | 0.104.2.999998 and prior | CVE-2022-20803 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-20803 | |
Wireshark | The Wireshark developer community | 3.6.7.999998 and prior | CVE-2022-3190 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-3190 | |
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10894 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10894 | 5.0 |
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10896 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10896 | 5.0 |
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10901 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10901 | 5.0 |
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10903 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10903 | 5.0 |
QEMU | QEMU Team | 6.1.50 and prior | CVE-2020-14394 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-14394 | |
QEMU | QEMU Team | 6.1.0 and prior | CVE-2021-3638 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3638 | 2.1 |
QEMU | QEMU Team | 7.1.0 and prior | CVE-2022-3872 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-3872 | |
com.fasterxml.jackson.core:jackson-databind | com.fasterxml.jackson.core | 2.9.9.1.999998 and prior | CVE-2019-14439 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-14439 | 5.0 |
MySQL Workbench | Oracle Corporation | 8.0.23 and prior | CVE-2021-3450 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3450 | 5.8 |
MySQL Workbench | Oracle Corporation | 8.0.26 and prior | CVE-2021-3537 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3537 | 4.3 |
Mozilla Firefox | Mozilla Corporation | 75.999999.999998 and prior | CVE-2020-12388 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-12388 | 7.5 |
Mozilla Firefox | Mozilla Corporation | 67.999999.999998 and prior | CVE-2019-9811 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-9811 | 5.1 |
Mozilla Firefox | Mozilla Corporation | 67.999999.999998 and prior | CVE-2019-11717 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11717 | 5.0 |
Mozilla Firefox | Mozilla Corporation | 73.999999.999998 and prior | CVE-2020-6812 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6812 | 5.0 |
Mozilla Firefox ESR | Mozilla Corporation | 68.7.999999.999998 and prior | CVE-2020-12388 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-12388 | 7.5 |
Mozilla Firefox ESR | Mozilla Corporation | 60.7.999998 and prior | CVE-2019-9811 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-9811 | 5.1 |
Mozilla Firefox ESR | Mozilla Corporation | 60.7.999999.999998 and prior | CVE-2019-11717 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11717 | 5.0 |
Mozilla Firefox ESR | Mozilla Corporation | 68.5.999999.999998 and prior | CVE-2020-6812 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6812 | 5.0 |
Thunderbird | Mozilla Corporation | 68.7.999999.999998 and prior | CVE-2020-12397 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-12397 | 4.3 |
Thunderbird | Mozilla Corporation | 60.7.999998 and prior | CVE-2019-9811 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-9811 | 5.1 |
Thunderbird | Mozilla Corporation | 60.7.999999.999998 and prior | CVE-2019-11717 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11717 | 5.0 |
Thunderbird | Mozilla Corporation | 91.2.999999.999998 and prior | CVE-2021-43529 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-43529 | |
Thunderbird | Mozilla Corporation | 68.5.999999.999998 and prior | CVE-2020-6812 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6812 | 5.0 |
Thunderbird | Mozilla Corporation | 91.3.999999.999998 and prior | CVE-2021-43527 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-43527 | 7.5 |
Thunderbird | Mozilla Corporation | 68.7.999999.999998 and prior | CVE-2020-12397 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-12397 | 4.3 |
Thunderbird | Mozilla Corporation | 60.7.999998 and prior | CVE-2019-9811 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-9811 | 5.1 |
Thunderbird | Mozilla Corporation | 60.7.999999.999998 and prior | CVE-2019-11717 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-11717 | 5.0 |
Thunderbird | Mozilla Corporation | 91.2.999999.999998 and prior | CVE-2021-43529 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-43529 | |
Thunderbird | Mozilla Corporation | 68.5.999999.999998 and prior | CVE-2020-6812 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6812 | 5.0 |
Thunderbird | Mozilla Corporation | 91.3.999999.999998 and prior | CVE-2021-43527 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-43527 | 7.5 |
Thunderbird | Mozilla Corporation | 68.7.999999.999998 and prior | CVE-2020-12397 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-12397 | 4.3 |

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure