OPSWAT CVEs, Hashes, Application Installers Update: April 27 - May 4, 2022
The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization.
We continuously enhance our platform to decrease your organization's security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during April 27 - May 4, 2022. The second table lists the new CVEs and application versions for which support was added.
To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT.
File Based Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware
HASH | CVES |
---|---|
029F2C3344E2D602FF7468AFD84D0D084D4C416A | CVE-2022-25795 |
0C7688CA38270DAFFFBD756028FA3BEAFA234092 | CVE-2022-25795 |
0E3D4E1DF98B9064A5AC6DE7EDD0CD41A0E778DE | CVE-2022-25795 |
14E5F497EE26789FA58B489BF03849BAE472D90C | CVE-2022-25795 |
177E80E2816C86829582111F88D28324A4213183 | CVE-2022-25795 |
1A8CC943998A68ABA478D406DF5595B2F7E50BA3 | CVE-2022-25795 |
1B818D219A7C96057243413EAED6EB63028D3622 | CVE-2022-25795 |
1E2EE34B6856506E93A217C62EB4753C49E1818D | CVE-2022-25795 |
1F7B2D43948B7B51375DEAAB62EA574FDF22232D | CVE-2022-25795 |
2091F370860CACDB04FAB6ECDF8424994C5A4F07 | CVE-2022-25795 |
216A3CC33E25C645D2D525DFDB8ADAEF7EED7AB2 | CVE-2022-25795 |
288E4F2A835772BA6A69828F55306ED89BFF1080 | CVE-2022-25795 |
29571C7D7F237C7FEA0FA89FAA922758D27C8D93 | CVE-2022-25795 |
2B47832F69A71D09A225BF19F157C782163956DB | CVE-2022-25795 |
2F1D6776CAD7521C0538D5352D02A6080D4992D6 | CVE-2022-25795 |
3354C4247A081D34EC36A3E95318146726D709EB | CVE-2022-25795 |
33A6E99D569662498A720C17550327827B015B48 | CVE-2022-25795 |
3B257CCDA2DA7D1C5B145649362EC784A1F725CC | CVE-2022-25795 |
3DEEBEBE534DA37E084029D68DED554D213D1846 | CVE-2022-25795 |
4077014190AA7845C2416A8D6685825EC2E867D1 | CVE-2022-25795 |
4481C7D898D7A25734E2E81F11FDDF9F0DE21A7E | CVE-2022-25795 |
454127A585AFCFE0AA8DF38B1C4FFF3D7B9673EB | CVE-2022-25795 |
461C4D81FDDB1D2D541B4C002129D80C9ABE27AC | CVE-2022-25795 |
473F40EF0F7CE5352CBFAB456DF61DE520F096E6 | CVE-2022-25795 |
497954E908D37B40A3B4912878173E1285584255 | CVE-2022-25795 |
4C3AE5675A44D97FC78414C374993BF43A160A27 | CVE-2022-25795 |
4E9098537B680BF9F8D69BDF0D66F6ED7063C3C4 | CVE-2022-25795 |
4EF235BCCD144D69A623869DE88D2D7EE2D51CD1 | CVE-2022-25795 |
4EFF4876D44DA495C5F6B3FA80E6FDBD4E69A08C | CVE-2022-25795 |
4F29C1A015EEACD00B8971AE14F42AF3F03A5536 | CVE-2022-25795 |
4F78F68A935DCA1D18FF9B0EFABB22AE3BECBA62 | CVE-2022-25795 |
50A4CE2857A9EB43DB7525DBBD651898C73C33A0 | CVE-2022-25795 |
51D00FD1587DA3550C505379985AF43F83A7A420 | CVE-2022-25795 |
58EC02AEE88DC30A941F6E1A0C48CDD783CBA7CD | CVE-2022-25795 |
5BC1BEE22F50F7ED310C686E0B966CD649B55563 | CVE-2022-25795 |
5E53127E9D227B2CC9839DA05D90327D0B1B1171 | CVE-2022-25795 |
60C9A3AD64ACF3A3F814DC358CB06625425B3ECC | CVE-2022-25795 |
625744ED338CC60C1A3A9970265215CF4605CE07 | CVE-2022-25795 |
6413438CA50C55C2287879773297EEED7C8E0B66 | CVE-2022-25795 |
677023BFB87C5B96A24B021FD0BADB183CEC20C2 | CVE-2022-25795 |
67FE45E1E5BE1F5EA75833AAC5D482F3B0568517 | CVE-2022-25795 |
68A2F3E82BF5374B0FF91E58586635A618F3BE50 | CVE-2022-25795 |
6AC88E158F3B7E04888788CB03253F7C4C191189 | CVE-2022-25795 |
6C5C6764C1A365BD54D26F2D08CC0E46C0FD5B32 | CVE-2022-25795 |
7075D48E70ECBB109C7F0491E553D72C73F9DBE4 | CVE-2022-25795 |
72A7FD8486AF4660A2A3B8535694D2DE67E4A260 | CVE-2022-25795 |
75A350A866D9992DE5DAC2380FF9C52A95C77AD2 | CVE-2022-25795 |
7873980B129E73418D66301758C025937AE389CB | CVE-2022-25795 |
7DA95785717AC9C37B285F3F799C122883BBC10E | CVE-2022-25795 |
Endpoint Application Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following application vulnerabilities
PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
---|---|---|---|---|---|
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10895 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10895 | 5.0 |
Wireshark | The Wireshark developer community | 3.0.0 and prior | CVE-2019-10899 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-10899 | 5.0 |
Wireshark | The Wireshark developer community | 3.0.1 and prior | CVE-2019-12295 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-12295 | 5.0 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6448 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6448 | 6.8 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6454 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6454 | 6.8 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6448 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6448 | 6.8 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6454 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6454 | 6.8 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6448 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6448 | 6.8 |
Google Chrome | Google Inc. | 81.0.4044.91.999998 and prior | CVE-2020-6454 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-6454 | 6.8 |
Amazon Corretto | Amazon.com | 11.0.7.10.0.999998 and prior | CVE-2020-2757 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2757 | 4.3 |
Amazon Corretto | Amazon.com | 11.0.7.10.0.999998 and prior | CVE-2020-2756 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2756 | 4.3 |
Java SE Development Kit | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2757 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2757 | 4.3 |
Java SE Development Kit | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2756 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2756 | 4.3 |
Java SE Development Kit | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21449 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21449 | 5.0 |
Java SE Development Kit | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21426 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21426 | 5.0 |
Java SE Development Kit | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21476 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21476 | 5.0 |
Java SE Development Kit | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21496 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21496 | 5.0 |
Java | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2757 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2757 | 4.3 |
Java | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2756 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2756 | 4.3 |
Java | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21426 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21426 | 5.0 |
Java | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2757 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2757 | 4.3 |
Java | Oracle Corporation | 14.0.0.0 and prior | CVE-2020-2756 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-2756 | 4.3 |
Java | Oracle Corporation | 18.0.0.0 and prior | CVE-2022-21426 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-21426 | 5.0 |
Zoom | Zoom Video Communications, Inc. | 4.6.11 and prior | CVE-2020-11876 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11876 | 5.0 |
Zoom | Zoom Video Communications, Inc. | 4.6.11 and prior | CVE-2020-11877 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11877 | 5.0 |
Zoom | Zoom Video Communications, Inc. | 5.8.3.999998 and prior | CVE-2021-34423 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-34423 | 7.5 |
Zoom | Zoom Video Communications, Inc. | 5.8.3.999998 and prior | CVE-2021-34424 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-34424 | 5.0 |
OpenVPN | OpenVPN Technologies, Inc. | 2.4.3 and prior | CVE-2017-12166 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-12166 | 6.8 |
OpenVPN | OpenVPN Technologies, Inc. | 2.4.8.999998 and prior | CVE-2020-11810 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11810 | 4.3 |
OpenVPN | OpenVPN Technologies, Inc. | 2.5.1.999998 and prior | CVE-2020-15078 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15078 | 5.0 |
OpenVPN | OpenVPN Technologies, Inc. | 2.5.5.999998 and prior | CVE-2022-0547 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-0547 | 7.5 |
Xen | Linux Foundation | 4.13.0 and prior | CVE-2020-11740 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11740 | 2.1 |
Xen | Linux Foundation | 4.13.0 and prior | CVE-2020-11741 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11741 | 6.9 |
Xen | Linux Foundation | 4.13.0 and prior | CVE-2020-11739 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11739 | 6.9 |
Xen | Linux Foundation | 4.13.1 and prior | CVE-2020-15563 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15563 | 4.7 |
Xen | Linux Foundation | 4.13.1 and prior | CVE-2020-15564 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15564 | 4.9 |
Xen | Linux Foundation | 4.13.1 and prior | CVE-2020-15567 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15567 | 4.4 |
Xen | Linux Foundation | 4.15.999999.999998 and prior | CVE-2022-26356 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-26356 | 4.0 |
Xen | Linux Foundation | 4.15.999999.999998 and prior | CVE-2022-26357 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-26357 | 6.2 |
Xen | Linux Foundation | 4.14.0 and prior | CVE-2020-25599 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-25599 | 4.4 |
Xen | Linux Foundation | 4.14.0 and prior | CVE-2020-25600 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-25600 | 4.9 |
Xen | Linux Foundation | 4.14.0 and prior | CVE-2020-25601 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-25601 | 4.9 |
Xen | Linux Foundation | 4.14.0 and prior | CVE-2020-25603 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-25603 | 4.6 |
Xen | Citrix Systems, Inc. | 4.13.0 and prior | CVE-2020-11740 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11740 | 2.1 |
Xen | Citrix Systems, Inc. | 4.13.0 and prior | CVE-2020-11741 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11741 | 6.9 |
Xen | Citrix Systems, Inc. | 4.13.0 and prior | CVE-2020-11739 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11739 | 6.9 |
Xen | Citrix Systems, Inc. | 4.13.1 and prior | CVE-2020-15563 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15563 | 4.7 |
Xen | Citrix Systems, Inc. | 4.13.1 and prior | CVE-2020-15564 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15564 | 4.9 |
Xen | Citrix Systems, Inc. | 4.13.1 and prior | CVE-2020-15567 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-15567 | 4.4 |
Xen | Citrix Systems, Inc. | 4.15.999999.999998 and prior | CVE-2022-26356 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2022-26356 | 4.0 |
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 143
- Company Culture 15
- CVEs 285
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 131
- Product Announcements 349
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?