The OPSWAT Vulnerability Assessment technology supports file based and endpoint application vulnerability assessment. Learn how MetaDefender Kiosk and MetaDefender Access leverages this technology to protect your organization.
We continuously enhance our platform to decrease your organization's security risk and prevent malware attacks. The first table below lists the hashes of vulnerable application installers, IoT software and firmware was added to the OPSWAT database during October 13 - October 20, 2021. The second table lists the new CVEs and application versions for which support was added.
To take advantage of these capabilities, please always update your OPSWAT Vulnerability Engine to the latest version. If you have questions or interest in using the engine to better protect your organization, please contact OPSWAT.
File Based Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following vulnerable application installers, IoT software and firmware
Endpoint Application Vulnerabilities
OPSWAT Vulnerability Engine added support to detect the following application vulnerabilities
| PRODUCT | VENDOR | VERSION | CVE | CVE DETAILS | CVSS SCORE |
|---|---|---|---|---|---|
| Microsoft Visual Studio | Microsoft Corporation | 16.11 and prior | CVE-2021-41355 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41355 | 2.9 |
| Open Office | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41830 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41830 | 5.0 |
| Open Office | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41831 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41831 | 5.0 |
| Open Office | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41832 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41832 | 5.0 |
| Open Office | Apache Software Foundation | 4.1.10 and prior | CVE-2021-40439 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40439 | 4.3 |
| Open Office | Apache Software Foundation | 4.1.8 and prior | CVE-2021-28129 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-28129 | 4.6 |
| OpenOffice | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41830 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41830 | 5.0 |
| OpenOffice | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41831 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41831 | 5.0 |
| OpenOffice | Apache Software Foundation | 4.1.10.999998 and prior | CVE-2021-41832 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41832 | 5.0 |
| OpenOffice | Apache Software Foundation | 4.1.10 and prior | CVE-2021-40439 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40439 | 4.3 |
| OpenOffice | Apache Software Foundation | 4.1.8 and prior | CVE-2021-28129 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-28129 | 4.6 |
| Gajim | Gajim Development Team | 1.3.2.999998 and prior | CVE-2021-41055 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41055 | 5.0 |
| McAfee Endpoint Security | McAfee, Inc. | 10.7.0.1999.999998 and prior | CVE-2020-7322 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-7322 | 2.1 |
| McAfee VirusScan Enterprise | McAfee, Inc. | 8.8 and prior | CVE-2019-3588 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-3588 | 6.9 |
| McAfee VirusScan Enterprise | McAfee, Inc. | 8.8 and prior | CVE-2019-3585 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-3585 | 7.2 |
| Apache HTTP Server | Apache Software Foundation | 2.4.48 and prior | CVE-2021-40438 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40438 | 6.8 |
| Apache HTTP Server | Apache Software Foundation | 2.4.48 and prior | CVE-2021-32786 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-32786 | 5.8 |
| Apache HTTP Server | Apache Software Foundation | 2.4.48 and prior | CVE-2021-32785 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-32785 | 4.3 |
| Apache HTTP Server | Apache Software Foundation | 2.4.49 and prior | CVE-2021-41773 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-41773 | 4.3 |
| Apache HTTP Server | Apache Software Foundation | 2.4.50 and prior | CVE-2021-42013 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-42013 | 7.5 |
| LibreOffice | The Document Foundation | 7.1.1.999998 and prior | CVE-2021-25634 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-25634 | 5.0 |
| LibreOffice | The Document Foundation | 7.1.1.999998 and prior | CVE-2021-25633 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-25633 | 5.0 |
| LibreOffice | The Document Foundation | 7.1.1.999998 and prior | CVE-2021-25634 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-25634 | 5.0 |
| LibreOffice | The Document Foundation | 7.1.1.999998 and prior | CVE-2021-25633 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-25633 | 5.0 |
| Node.js LTS | Joyent, Inc. | 14.17.3.999998 and prior | CVE-2021-22930 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-22930 | 7.5 |
| Node.js LTS | Joyent, Inc. | 10.15.2 and prior | CVE-2018-1000168 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000168 | 5.0 |
| Node.js LTS | Joyent, Inc. | 14.17.3.999998 and prior | CVE-2021-22930 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-22930 | 7.5 |
| Node.js LTS | Joyent, Inc. | 10.15.2 and prior | CVE-2018-1000168 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000168 | 5.0 |
| com.tencent.mm | 7.0.18 and prior | CVE-2020-27874 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-27874 | 6.8 | |
| QEMU | QEMU Team | 6.1 and prior | CVE-2021-3682 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3682 | 6.0 |
| QEMU | QEMU Team | 6.1 and prior | CVE-2021-3713 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3713 | 4.6 |
| QEMU | QEMU Team | 6 and prior | CVE-2021-3545 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3545 | 2.1 |
| QEMU | QEMU Team | 6 and prior | CVE-2021-3546 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3546 | 4.6 |
| QEMU | QEMU Team | 6 and prior | CVE-2021-3544 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-3544 | 2.1 |
| RarZilla Free Unrar | Philipp Winterberg | 0.0.1 and prior | CVE-2017-11189 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-11189 | 4.3 |
| UnRAR | Alexander Roshal | 0.0.1 and prior | CVE-2017-14121 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2017-14121 | 4.3 |
| org.telegram.messenger | Telegram FZ-LLC | 5.10.999999.999998 and prior | CVE-2019-16248 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2019-16248 | 2.1 |
| MySQL Server | Oracle Corporation | 8.0.21 and prior | CVE-2020-11080 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2020-11080 | 5.0 |
| Node.js | OpenJS Foundation | 10.15.2 and prior | CVE-2018-1000168 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000168 | 5.0 |
| Node.js Current | Joyent, Inc. | 10.15.2 and prior | CVE-2018-1000168 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000168 | 5.0 |
| Node.js Current | Joyent, Inc. | 10.15.2 and prior | CVE-2018-1000168 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2018-1000168 | 5.0 |
| Xen | Linux Foundation | 4.15.1 and prior | CVE-2021-28702 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-28702 | 4.6 |
| Xen | Citrix Systems, Inc. | 4.15.1 and prior | CVE-2021-28702 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-28702 | 4.6 |
| Adobe Acrobat DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40725 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40725 | 6.8 |
| Adobe Acrobat DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40726 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40726 | 6.8 |
| Adobe Acrobat DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40725 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40725 | 6.8 |
| Adobe Acrobat DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40726 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40726 | 6.8 |
| Adobe Acrobat Reader DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40725 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40725 | 6.8 |
| Adobe Acrobat Reader DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40726 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40726 | 6.8 |
| Adobe Acrobat Reader DC Classic 2017 | Adobe Systems Inc. | 17.011.30199 and prior | CVE-2021-40725 | https://metadefender.opswat.com/vulnerabilities#!/CVE-2021-40725 | 6.8 |
