OPSWAT Expands Vietnam Presence, Opens First Critical Infrastructure Protection Lab in Asia. Read More

OPSWAT CVEs, Hashes, Application Installers Update: November 25 - December 2, 2020

The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaAccess leverages this technology to protect your organization.

We continuously enhance our platform to decrease your organization's security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during November 25 - December 2, 2020. The second table lists the new CVEs and application versions for which support was added.

To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT.

File Based Vulnerabilities

OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware

HASHCVES
028D548FF92189F1E30A801C20E7325E6776C1E5CVE-2020-27622
03C49FB51A90248C6C7D9DB2E0B12C1A950B61E5CVE-2020-27622
03D570CDB5997C2F3A564A057676B4AEBC825FEECVE-2020-27622
04DF8B165FA7FC1EAEC6F58A3CA470DF755D0B33CVE-2020-27622
0B39F3674F398F8A0FEC4499294B2A3F1AD752CBCVE-2020-27622
11EF326DC466559628E7591EC531CD85DF0D481CCVE-2020-27622
1344B4D9F2FB4A3AC1493990787347887B613B48CVE-2020-27622
13F2E7D25DB97FAE4205BDF1C453E2B0A5EF8498CVE-2020-27622
14842BC73DB828752343BF37F378D179B60C29CBCVE-2020-27622
149543EDF869D045EDB8C1F25E8A9EA99018ACD9CVE-2020-27622
154365D3561D6453DC8C425F6EE185F439711E91CVE-2020-27622
1646770EC14E8CC381417B78B382830066549967CVE-2020-27622
19DC7610F2B4C09CEC4D555FED212DED76C6689ECVE-2020-27622
1A45D9314399C08C74382A501139C6DDFC1DE457CVE-2020-27622
1C0D7579CCAF55FFAA72CAC35F3A0311BE30291ACVE-2020-27622
1C8126166B2311BA4948C9C55702C48161F1FA8CCVE-2020-27622
1DA1F114F110AFCC2813BFBA2F270C5735D50723CVE-2020-27622
20040D7C904179D443CBC6843654EA8FA3DD06DFCVE-2020-27622
27CF7740ACD65E339CDF98DCF1C3E65EB17D4DDDCVE-2020-27622
27EE9C80A847B1EAB059193F025A0FA5255B3D2ACVE-2020-27622
2D6904216F5755CD311DCBAD531C03824AB17559CVE-2020-27622
2E522F69F70595A3A104C2CF0545692706F48EB4CVE-2020-27622
2EE4DEEFB938982455ABDE54F04DC3C8B4C1AF1BCVE-2020-27622
3201F81E75467DB0C88719DB60482D62C694265ECVE-2020-27622
33189A011A93B5945F65BF673B531126FC0A2145CVE-2020-27622
3ADC04435B6F3E91249D990D24F8154180C92C72CVE-2020-27622
3F34D263D855E71A56095B123029A736F237E05BCVE-2020-27622
3F622F33DBB1B5D90EFC83FCB20338B69D307299CVE-2020-27622
40F6A30442D6B7F79CC69019BB38B12BE299F92FCVE-2020-27622
42881C0B49F179E1091CF36A5FD06CC55608D92BCVE-2020-27622
42E4A379CA03E4AAD157AC2B4F0BDDB3681BEE52CVE-2020-27622
42FC3A37D5EE99A40FB304A905BEF56FA983130DCVE-2020-27622
4509EA9DE4F3DEE0711F571D33F79CC90ECA651DCVE-2020-27622
4624D004BF1462DD5808478E2A95DF9412E7CA4ACVE-2020-27622
47E7D9A17C270C44AC46A13FDB3BCBDD6C39C31DCVE-2020-27622
5116019A1C32DFC98F69C9B2589C555658463DF7CVE-2020-27622
5578ACA47B3B93C318CA4580BCD0CE616D358F96CVE-2020-27622
564B1CBA28597C8D691FDEFCF6EFC00A38EA7C62CVE-2020-27622
5B0753A4EEB3BDC3030A39353FB852D9FDE737F2CVE-2020-27622
5D00F2F4763A5188A993F0F20D0D5E029FC6076DCVE-2020-27622
5E41DBE3A4DAF169ABB181C776BEBA0893231ECDCVE-2020-27622
63DD11824D7A24EFEFD1360570072F47306EAE5DCVE-2020-27622
641819723E0F15E7D70AC5146DAA93AD97FA0E58CVE-2020-27622
6424A8F493958E68A7F2740284B45C3FE4569D3CCVE-2020-27622
6691893FFBE0C7F72652601D1A9E0047B50C9275CVE-2020-27622
66B24F0B3CC8E3881210EFA073F08269C436297ACVE-2020-27622
69B52D121D7008BF2352AB1A8C1421AACDEA4153CVE-2020-27622
6B9A702CAB9B4A57BD5BB2A9E00A8C9E30D9FAD4CVE-2020-27622
6BA56B10834892C45F0CC0DC7C3A9B30FDA43FA3CVE-2020-27622


Download full list

Endpoint Application Vulnerabilities

OPSWAT Vulnerability Engine added support to detect the following application vulnerabilities

PRODUCTVENDORVERSIONCVECVE DETAILSCVSS SCORE
axiosaxios0.21 and priorCVE-2020-28168https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-281684.3
Node.js LTSJoyent, Inc.15.2.0.999998 and priorCVE-2020-8277https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-82775.0
Node.js CurrentJoyent, Inc.15.2.0.999998 and priorCVE-2020-8277https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-82775.0
QEMUQEMU Team5 and priorCVE-2020-25085https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-250854.4
QEMUQEMU Team5 and priorCVE-2020-25625https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-256254.7
QEMUQEMU Team4.2.1 and priorCVE-2020-27617https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-276174.0
SafariApple Inc.13.999999.999998 and priorCVE-2020-9983https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-99836.8
SafariApple Inc.13.999999.999998 and priorCVE-2020-9983https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-99836.8
Foxit ReaderFoxit Software9.0.1.1049 and priorCVE-2018-9958https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-99586.8
Foxit PhantomPDFFoxit Software9.0.1.1049 and priorCVE-2018-9958https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-99586.8

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.