Questa pagina contiene un log delle modifiche di manutenzione. Memorystore for Redis rilascia
aggiornamenti di manutenzione per nuove funzionalità, patch di sicurezza, correzioni di bug, miglioramenti
delle prestazioni e altro ancora.
Gli aggiornamenti di manutenzione possono essere eseguiti da te utilizzando la
manutenzione self-service o da
Memorystore for Redis tramite aggiornamenti di manutenzione pianificati che vengono eseguiti una volta
ogni qualche mese. Per gli aggiornamenti di manutenzione pianificati, puoi impostare finestre per
quando si verificano gli aggiornamenti di manutenzione. Per maggiori dettagli, vedi Individuazione e impostazione dei periodi di manutenzione.
Per scoprire di più sugli aggiornamenti di manutenzione, consulta la sezione
Informazioni sulla manutenzione di Memorystore for Redis.
Per ricevere gli ultimi aggiornamenti di manutenzione, aggiungi il seguente URL al tuo
aggregatore di feed: https://cloud.google.com/feeds/memorystore-for-redis-maintenance-changelog.xml
.
20250806_01_00
Date released |
Tipo di release |
2025-08-29 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le seguenti vulnerabilità CVE |
Patch di sicurezza
CVE-2025-6965,
CVE-2025-32463,
CVE-2025-32462,
CVE-2025-32023,
CVE-2025-29768,
CVE-2025-27423,
CVE-2025-26603,
CVE-2025-24014,
CVE-2025-23266,
CVE-2025-22134,
CVE-2025-1215,
CVE-2024-5742,
CVE-2024-26130
20250701_00_01
Date released |
Tipo di release |
2025-07-23 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e i processi secondari per risolvere i seguenti CVE |
Patch di sicurezza
CVE-2025-21999,
CVE-2025-47273,
CVE-2025-21997,
CVE-2025-21922,
CVE-2024-23653,
CVE-2025-1377,
CVE-2025-21726,
CVE-2024-52006,
CVE-2025-22056,
CVE-2025-46836,
CVE-2024-40635,
CVE-2025-48060,
CVE-2025-4598,
CVE-2024-53427,
CVE-2025-5914,
CVE-2024-57979,
CVE-2025-21964,
CVE-2025-21760,
CVE-2025-1372,
CVE-2025-21887,
CVE-2025-21756,
CVE-2025-21763,
CVE-2024-36903,
CVE-2025-22005,
CVE-2024-57977,
CVE-2016-1585,
CVE-2025-22035,
CVE-2025-21959,
CVE-2025-1365,
CVE-2025-1371,
CVE-2025-21812,
CVE-2024-26739,
CVE-2025-1181,
CVE-2024-43840,
CVE-2024-8176,
CVE-2024-36927,
CVE-2025-21853,
CVE-2025-21796,
CVE-2025-21920,
CVE-2024-56549,
CVE-2023-45288,
CVE-2024-24786,
CVE-2024-26783,
CVE-2025-21898,
CVE-2025-32415,
CVE-2025-22870,
CVE-2025-21980,
CVE-2024-35866,
CVE-2024-50349,
CVE-2025-21762,
CVE-2023-52927,
CVE-2024-48615,
CVE-2025-32728,
CVE-2025-21891,
CVE-2024-58083,
CVE-2025-21727,
CVE-2024-50063,
CVE-2025-22868,
CVE-2025-21919,
CVE-2025-32414,
CVE-2025-21962,
CVE-2025-3198,
CVE-2025-1632,
CVE-2025-21963,
CVE-2025-21867,
CVE-2025-37785,
CVE-2025-21764,
CVE-2024-0553,
CVE-2021-37600,
CVE-2024-2961,
CVE-2023-39804,
CVE-2024-28085,
CVE-2025-6965,
CVE-2025-29087,
CVE-2024-37371,
CVE-2024-27280,
CVE-2018-12886,
CVE-2021-32740,
CVE-2021-31799,
CVE-2020-1751,
CVE-2021-41817,
CVE-2019-3843,
CVE-2019-3844,
CVE-2019-12290,
CVE-2021-22569,
CVE-2023-32731,
CVE-2023-50387,
CVE-2023-1428,
CVE-2024-37370,
CVE-2020-10663,
CVE-2020-25613,
CVE-2023-33953,
CVE-2024-7254,
CVE-2022-4415,
CVE-2021-3997,
CVE-2020-8130,
CVE-2022-3171,
CVE-2023-32732,
CVE-2023-5678,
CVE-2022-24795,
CVE-2018-1000654,
CVE-2024-0727,
CVE-2021-36086,
CVE-2019-9923,
CVE-2023-4039,
CVE-2021-36085,
CVE-2021-33560,
CVE-2019-9893,
CVE-2024-2398,
CVE-2021-36087,
CVE-2018-7169,
CVE-2007-2379,
CVE-2020-14155,
CVE-2021-22922,
CVE-2021-36084,
CVE-2023-29383,
CVE-2013-4235,
CVE-2019-13627,
CVE-2019-19882,
CVE-2022-1304,
CVE-2017-11164,
CVE-2022-48303,
CVE-2017-16231,
CVE-2021-22923,
CVE-2023-28320,
CVE-2019-20386,
CVE-2023-4806,
CVE-2020-13529,
CVE-2023-4813,
CVE-2019-20838,
CVE-2019-15847,
CVE-2018-18405,
CVE-2019-8457,
CVE-2019-14855,
CVE-2024-26462,
CVE-2019-17543,
CVE-2020-16156,
CVE-2017-7246,
CVE-2023-4641,
CVE-2021-20193,
CVE-2023-45918,
CVE-2023-7008,
CVE-2019-18276,
CVE-2017-7245,
CVE-2020-19909,
CVE-2024-2511,
CVE-2023-50868,
CVE-2024-33599,
CVE-2024-5535,
CVE-2024-33602,
CVE-2024-27282,
CVE-2024-4741,
CVE-2024-33601,
CVE-2024-33600,
CVE-2024-27281
20250326_00_00
Date released |
Tipo di release |
2025-03-26 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le seguenti vulnerabilità CVE |
Patch di sicurezza
CVE-2023-44487,
CVE-2023-45288,
CVE-2024-0131,
CVE-2024-0134,
CVE-2024-0147,
CVE-2024-0149,
CVE-2024-0150,
CVE-2024-10524,
CVE-2024-11053,
CVE-2024-12084,
CVE-2024-12085,
CVE-2024-12086,
CVE-2024-12087,
CVE-2024-12088,
CVE-2024-12747,
CVE-2024-13176,
CVE-2024-23653,
CVE-2024-26982,
CVE-2024-40896,
CVE-2024-40945,
CVE-2024-45306,
CVE-2024-45310,
CVE-2024-45337,
CVE-2024-46981,
CVE-2024-47745,
CVE-2024-47814,
CVE-2024-49861,
CVE-2024-49878,
CVE-2024-49926,
CVE-2024-49927,
CVE-2024-49946,
CVE-2024-49948,
CVE-2024-49949,
CVE-2024-49952,
CVE-2024-49954,
CVE-2024-49959,
CVE-2024-49994,
CVE-2024-49996,
CVE-2024-50010,
CVE-2024-50014,
CVE-2024-50024,
CVE-2024-50036,
CVE-2024-50038,
CVE-2024-50047,
CVE-2024-50055,
CVE-2024-50060,
CVE-2024-50072,
CVE-2024-50082,
CVE-2024-50083,
CVE-2024-50095,
CVE-2024-50099,
CVE-2024-50101,
CVE-2024-50110,
CVE-2024-50115,
CVE-2024-50131,
CVE-2024-50138,
CVE-2024-50141,
CVE-2024-50142,
CVE-2024-50143,
CVE-2024-50147,
CVE-2024-50151,
CVE-2024-50153,
CVE-2024-50154,
CVE-2024-50162,
CVE-2024-50163,
CVE-2024-50164,
CVE-2024-50186,
CVE-2024-50191,
CVE-2024-50192,
CVE-2024-50194,
CVE-2024-50195,
CVE-2024-50215,
CVE-2024-50228,
CVE-2024-50251,
CVE-2024-50256,
CVE-2024-50257,
CVE-2024-50262,
CVE-2024-50271,
CVE-2024-50272,
CVE-2024-50278,
CVE-2024-50279,
CVE-2024-50304,
CVE-2024-50602,
CVE-2024-53042,
CVE-2024-53052,
CVE-2024-53054,
CVE-2024-53066,
CVE-2024-53082,
CVE-2024-53093,
CVE-2024-53096,
CVE-2024-53099,
CVE-2024-53100,
CVE-2024-53113,
CVE-2024-53119,
CVE-2024-53121,
CVE-2024-53124,
CVE-2024-53128,
CVE-2024-53135,
CVE-2024-53136,
CVE-2024-53140,
CVE-2024-53166,
CVE-2024-53170,
CVE-2024-53589,
CVE-2024-53869,
CVE-2024-56664,
CVE-2024-57841,
CVE-2024-57890,
CVE-2024-57949,
CVE-2024-57951,
CVE-2024-57996,
CVE-2024-58005,
CVE-2024-58017,
CVE-2024-9287,
CVE-2024-9341,
CVE-2024-9407,
CVE-2024-9675,
CVE-2024-9681,
CVE-2025-0395,
CVE-2025-0840,
CVE-2025-21631,
CVE-2025-21665,
CVE-2025-21666,
CVE-2025-21667,
CVE-2025-21669,
CVE-2025-21671,
CVE-2025-21683,
CVE-2025-21690,
CVE-2025-21716,
CVE-2025-21745,
CVE-2025-21779,
CVE-2025-21785,
CVE-2025-21791,
CVE-2025-21814,
CVE-2025-21844,
CVE-2025-21846,
CVE-2025-21858,
CVE-2025-21864,
CVE-2025-22869,
CVE-2025-26465,
CVE-2025-26466,
CVE-2025-27113
20241107_00_00
Date released |
Tipo di release |
2024-12-17 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis per risolvere le seguenti vulnerabilità CVE |
Patch di sicurezza
CVE-2023-27043,
CVE-2023-52889,
CVE-2023-7256,
CVE-2024-0126,
CVE-2024-0132,
CVE-2024-0133,
CVE-2024-2511,
CVE-2024-31227,
CVE-2024-31228,
CVE-2024-31449,
CVE-2024-37370,
CVE-2024-37371,
CVE-2024-38632,
CVE-2024-39472,
CVE-2024-41012,
CVE-2024-41057,
CVE-2024-41058,
CVE-2024-41073,
CVE-2024-41098,
CVE-2024-41957,
CVE-2024-41965,
CVE-2024-42268,
CVE-2024-42269,
CVE-2024-42270,
CVE-2024-42283,
CVE-2024-42285,
CVE-2024-42302,
CVE-2024-42307,
CVE-2024-42316,
CVE-2024-43817,
CVE-2024-43828,
CVE-2024-43837,
CVE-2024-43853,
CVE-2024-43854,
CVE-2024-43855,
CVE-2024-43856,
CVE-2024-43871,
CVE-2024-43873,
CVE-2024-43882,
CVE-2024-43889,
CVE-2024-43892,
CVE-2024-43893,
CVE-2024-43914,
CVE-2024-44940,
CVE-2024-44944,
CVE-2024-44947,
CVE-2024-44952,
CVE-2024-44958,
CVE-2024-44965,
CVE-2024-44970,
CVE-2024-44983,
CVE-2024-44985,
CVE-2024-44986,
CVE-2024-44987,
CVE-2024-44989,
CVE-2024-44990,
CVE-2024-45000,
CVE-2024-45003,
CVE-2024-45018,
CVE-2024-45021,
CVE-2024-45022,
CVE-2024-45025,
CVE-2024-45490,
CVE-2024-45491,
CVE-2024-45492,
CVE-2024-4603,
CVE-2024-46679,
CVE-2024-46686,
CVE-2024-46721,
CVE-2024-46737,
CVE-2024-46738,
CVE-2024-46743,
CVE-2024-46744,
CVE-2024-46750,
CVE-2024-46763,
CVE-2024-46800,
CVE-2024-46829,
CVE-2024-46848,
CVE-2024-46855,
CVE-2024-4741,
CVE-2024-47678,
CVE-2024-47679,
CVE-2024-47682,
CVE-2024-47684,
CVE-2024-47685,
CVE-2024-47692,
CVE-2024-47693,
CVE-2024-47696,
CVE-2024-47701,
CVE-2024-47705,
CVE-2024-47706,
CVE-2024-47707,
CVE-2024-47710,
CVE-2024-47727,
CVE-2024-47728,
CVE-2024-47734,
CVE-2024-47737,
CVE-2024-47739,
CVE-2024-47742,
CVE-2024-47743,
CVE-2024-48957,
CVE-2024-48958,
CVE-2024-49850,
CVE-2024-49851,
CVE-2024-49858,
CVE-2024-49860,
CVE-2024-49870,
CVE-2024-49875,
CVE-2024-49881,
CVE-2024-49883,
CVE-2024-49884,
CVE-2024-49889,
CVE-2024-49936,
CVE-2024-49967,
CVE-2024-49975,
CVE-2024-49978,
CVE-2024-49983,
CVE-2024-49993,
CVE-2024-50000,
CVE-2024-50001,
CVE-2024-50002,
CVE-2024-50006,
CVE-2024-50015,
CVE-2024-50019,
CVE-2024-50033,
CVE-2024-50035,
CVE-2024-50039,
CVE-2024-50045,
CVE-2024-50046,
CVE-2024-5535,
CVE-2024-6119,
CVE-2024-6197,
CVE-2024-6232,
CVE-2024-6345,
CVE-2024-6602,
CVE-2024-7264,
CVE-2024-7592,
20240411_00_00
Date released |
Tipo di release |
2024-04-12 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240328_00_00
Date released |
Tipo di release |
2024-03-28 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240220_00_00
Date released |
Tipo di release |
2024-02-20 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-294-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-40547,
CVE-2023-40548,
CVE-2023-40551,
CVE-2023-46838,
CVE-2024-1085,
CVE-2024-1086,
CVE-2022-42010,
CVE-2022-42011,
CVE-2022-42012,
CVE-2023-1077,
CVE-2023-2156,
CVE-2023-31022,
CVE-2023-34324,
CVE-2023-34969,
CVE-2023-35945,
CVE-2023-40546,
CVE-2023-40549,
CVE-2023-40550,
CVE-2023-42754,
CVE-2023-44487,
CVE-2023-45322,
CVE-2023-46218,
CVE-2023-46813,
CVE-2023-46862,
CVE-2023-4733,
CVE-2023-4734,
CVE-2023-4735,
CVE-2023-4736,
CVE-2023-4738,
CVE-2023-4750,
CVE-2023-4752,
CVE-2023-4781,
CVE-2023-48795,
CVE-2023-51384,
CVE-2023-51385,
CVE-2023-52071,
CVE-2023-5344,
CVE-2023-5441,
CVE-2023-5535,
CVE-2023-5678,
CVE-2023-5717,
CVE-2023-6040,
CVE-2023-6111,
CVE-2023-6531,
CVE-2023-6817,
CVE-2023-6915,
CVE-2023-6931,
CVE-2023-6932,
CVE-2023-7104,
CVE-2023-7192,
CVE-2024-0193,
CVE-2024-0584,
CVE-2024-0646,
CVE-2024-22195
20231114_00_00
Date released |
Tipo di release |
2023-11-14 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.14. |
Solo istanze Redis 7.0 |
Imposta la versione della patch OSS Redis su 7.0.14. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-226-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2022-4415,
CVE-2023-0361,
CVE-2022-29458,
CVE-2022-3821,
CVE-2018-1121,
CVE-2018-17075,
CVE-2018-17142,
CVE-2018-17143,
CVE-2018-17846,
CVE-2018-17847,
CVE-2018-17848,
CVE-2020-22916,
CVE-2022-4269,
CVE-2022-47007,
CVE-2022-47008,
CVE-2022-47010,
CVE-2022-47011,
CVE-2022-48063,
CVE-2022-48064,
CVE-2022-48065,
CVE-2023-2163,
CVE-2023-23914,
CVE-2023-28736,
CVE-2023-28938,
CVE-2023-29499,
CVE-2023-3117,
CVE-2023-32611,
CVE-2023-32636,
CVE-2023-32643,
CVE-2023-32665,
CVE-2023-3338,
CVE-2023-38039,
CVE-2023-38545,
CVE-2023-39189,
CVE-2023-39192,
CVE-2023-39194,
CVE-2023-4015,
CVE-2023-4016,
CVE-2023-40217,
CVE-2023-4206,
CVE-2023-4207,
CVE-2023-4208,
CVE-2023-4244,
CVE-2023-42752,
CVE-2023-42753,
CVE-2023-42756,
CVE-2023-4569,
CVE-2023-45863,
CVE-2023-4622,
CVE-2023-4623,
CVE-2023-4921
20230821_00_00
Date released |
Tipo di release |
2023-08-21 |
Manutenzione automatica |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-23. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-4128,
CVE-2023-3812,
CVE-2023-4387,
CVE-2023-4147,
CVE-2023-29491,
CVE-2023-4004,
CVE-2023-38408,
CVE-2023-3611,
CVE-2023-3776,
CVE-2023-3623,
CVE-2016-4074,
CVE-2015-8863,
CVE-2022-28737,
CVE-2022-3623,
CVE-2023-4194,
CVE-2023-3995,
CVE-2023-3817,
CVE-2023-1206,
CVE-2023-4459
20230727_00_00
Date released |
Tipo di release |
2023-07-27 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.13. |
Solo istanze Redis 7.0 |
Imposta la versione patch di OSS Redis su 7.0.12. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-4. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2015-20107,
CVE-2020-10735,
CVE-2021-28861,
CVE-2022-24834,
CVE-2022-45061,
CVE-2023-1786,
CVE-2023-1972,
CVE-2023-20867,
CVE-2023-2124,
CVE-2023-2426,
CVE-2023-24329,
CVE-2023-25515,
CVE-2023-25516,
CVE-2023-2609,
CVE-2023-2610,
CVE-2023-2650,
CVE-2023-27534,
CVE-2023-28319,
CVE-2023-28320,
CVE-2023-28321,
CVE-2023-28322,
CVE-2023-28484,
CVE-2023-28856,
CVE-2023-29402,
CVE-2023-29403,
CVE-2023-29404,
CVE-2023-29405,
CVE-2023-29491,
CVE-2023-3090,
CVE-2023-31248,
CVE-2023-32233,
CVE-2023-3268,
CVE-2023-3390,
CVE-2023-34256,
CVE-2023-35001,
CVE-2023-36824
20230508_00_00
Date released |
Tipo di release |
2023-05-08 |
Manutenzione automatica |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 5.x |
Imposta la versione della patch OSS Redis su 5.0.14. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-1-71. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2004-0971,
CVE-2018-25032,
CVE-2020-17437,
CVE-2021-20270,
CVE-2021-27291,
CVE-2021-33574,
CVE-2021-3997,
CVE-2021-3999,
CVE-2021-4122,
CVE-2021-4160,
CVE-2021-43396,
CVE-2022-1154,
CVE-2022-1160,
CVE-2022-1304,
CVE-2022-1381,
CVE-2022-1420,
CVE-2022-1586,
CVE-2022-1587,
CVE-2022-1616,
CVE-2022-1619,
CVE-2022-1620,
CVE-2022-1621,
CVE-2022-1629,
CVE-2022-1664,
CVE-2022-1674,
CVE-2022-1720,
CVE-2022-1733,
CVE-2022-1735,
CVE-2022-1769,
CVE-2022-1771,
CVE-2022-1785,
CVE-2022-1796,
CVE-2022-1851,
CVE-2022-1886,
CVE-2022-1898,
CVE-2022-1927,
CVE-2022-1942,
CVE-2022-2124,
CVE-2022-2125,
CVE-2022-2126,
CVE-2022-2129,
CVE-2022-22943,
CVE-2022-23218,
CVE-2022-23219,
CVE-2022-26280,
CVE-2022-2928,
CVE-2022-2929,
CVE-2022-29824,
CVE-2022-34903,
CVE-2022-3715,
CVE-2022-37434,
CVE-2022-37454,
CVE-2022-40768,
CVE-2022-41723,
CVE-2022-41725,
CVE-2022-42898,
CVE-2022-43750,
CVE-2022-44638,
CVE-2023-0180,
CVE-2023-0183,
CVE-2023-0184,
CVE-2023-0185,
CVE-2023-0187,
CVE-2023-0188,
CVE-2023-0189
20230322_00_00
Date released |
Tipo di release |
2023-03-29 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.11. La patch include le correzioni CVE CVE-2023-25155 e CVE-2022-36021. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-97-16919-235-36. |
Patch di sicurezza
CVE-2023-28466,
CVE-2023-26604,
CVE-2023-25155,
CVE-2023-23931,
CVE-2023-23586,
CVE-2023-23454,
CVE-2023-1355,
CVE-2023-1264,
CVE-2023-1175,
CVE-2023-1170,
CVE-2023-1127,
CVE-2023-0512,
CVE-2023-0461,
CVE-2023-0433,
CVE-2023-0288,
CVE-2023-0286,
CVE-2023-0215,
CVE-2023-0054,
CVE-2023-0051,
CVE-2023-0049,
CVE-2022-48303,
CVE-2022-47946,
CVE-2022-47929,
CVE-2022-4696,
CVE-2022-46663,
CVE-2022-4450,
CVE-2022-43945,
CVE-2022-4378,
CVE-2022-4304,
CVE-2022-4292,
CVE-2022-42915,
CVE-2022-4285,
CVE-2022-42329,
CVE-2022-42328,
CVE-2022-4141,
CVE-2022-41222,
CVE-2022-40897,
CVE-2022-40320,
CVE-2022-40304,
CVE-2022-40303,
CVE-2022-39188,
CVE-2022-3821,
CVE-2022-3705,
CVE-2022-36946,
CVE-2022-3625,
CVE-2022-36123,
CVE-2022-36021,
CVE-2022-35977,
CVE-2022-3586,
CVE-2022-35737,
CVE-2022-35260,
CVE-2022-35252,
CVE-2022-3524,
CVE-2022-33744,
CVE-2022-33743,
CVE-2022-3352,
CVE-2022-3324,
CVE-2022-3297,
CVE-2022-3296,
CVE-2022-3278,
CVE-2022-3256,
CVE-2022-3235,
CVE-2022-3234,
CVE-2022-32296,
CVE-2022-32221,
CVE-2022-32208,
CVE-2022-32207,
CVE-2022-32206,
CVE-2022-32205,
CVE-2022-32149,
CVE-2022-3176,
CVE-2022-3169,
CVE-2022-3153,
CVE-2022-3134,
CVE-2022-3107,
CVE-2022-3104,
CVE-2022-31030,
CVE-2022-3099,
CVE-2022-30594,
CVE-2022-3037,
CVE-2022-3028,
CVE-2022-3016,
CVE-2022-30115,
CVE-2022-29869,
CVE-2022-2982,
CVE-2022-2980,
CVE-2022-2977,
CVE-2022-2959,
CVE-2022-29582,
CVE-2022-29581,
CVE-2022-2946,
CVE-2022-29458,
CVE-2022-2938,
CVE-2022-2923,
CVE-2022-29217,
CVE-2022-29162,
CVE-2022-29154,
CVE-2022-2905,
CVE-2022-28893,
CVE-2022-2889,
CVE-2022-2874,
CVE-2022-2862,
CVE-2022-2849,
CVE-2022-2845,
CVE-2022-2819,
CVE-2022-2817,
CVE-2022-2816,
CVE-2022-27782,
CVE-2022-27781,
CVE-2022-27780,
CVE-2022-27779,
CVE-2022-27778,
CVE-2022-27776,
CVE-2022-27775,
CVE-2022-27774,
CVE-2022-27666,
CVE-2022-27239,
CVE-2022-2602,
CVE-2022-2598,
CVE-2022-2581,
CVE-2022-2580,
CVE-2022-2571,
CVE-2022-2526,
CVE-2022-2522,
CVE-2022-2509,
CVE-2022-2503,
CVE-2022-24769,
CVE-2022-24448,
CVE-2022-23960,
CVE-2022-23648,
CVE-2022-23471,
CVE-2022-2345,
CVE-2022-2344,
CVE-2022-2343,
CVE-2022-23308,
CVE-2022-2327,
CVE-2022-2304,
CVE-2022-2289,
CVE-2022-2288,
CVE-2022-2287,
CVE-2022-2286,
CVE-2022-2285,
CVE-2022-2284,
CVE-2022-2264,
CVE-2022-22576,
CVE-2022-2257,
CVE-2022-2231,
CVE-2022-2210,
CVE-2022-2208,
CVE-2022-2207,
CVE-2022-2206,
CVE-2022-2183,
CVE-2022-2182,
CVE-2022-2175,
CVE-2022-21505,
CVE-2022-2097,
CVE-2022-2068,
CVE-2022-20409,
CVE-2022-1998,
CVE-2022-1786,
CVE-2022-1729,
CVE-2022-1516,
CVE-2022-1508,
CVE-2022-1353,
CVE-2022-1292,
CVE-2022-1271,
CVE-2022-1116,
CVE-2022-1055,
CVE-2022-1012,
CVE-2022-1011,
CVE-2022-0995,
CVE-2022-0943,
CVE-2022-0886,
CVE-2022-0854,
CVE-2022-0850,
CVE-2022-0847,
CVE-2022-0778,
CVE-2022-0729,
CVE-2022-0714,
CVE-2022-0696,
CVE-2022-0696,
CVE-2022-0685,
CVE-2022-0629,
CVE-2022-0617,
CVE-2022-0572,
CVE-2022-0494,
CVE-2022-0492,
CVE-2022-0443,
CVE-2022-0413,
CVE-2022-0408,
CVE-2022-0407,
CVE-2022-0393,
CVE-2022-0392,
CVE-2022-0368,
CVE-2022-0361,
CVE-2022-0359,
CVE-2022-0319,
CVE-2022-0318,
CVE-2022-0264,
CVE-2022-0261,
CVE-2022-0185,
CVE-2022-0168,
CVE-2022-0158,
CVE-2022-0156,
CVE-2022-0128,
CVE-2022-0002,
CVE-2022-0001,
CVE-2021-46848,
CVE-2021-46828,
CVE-2021-45485,
CVE-2021-45402,
CVE-2021-45346,
CVE-2021-43816,
CVE-2021-43784,
CVE-2021-43618,
CVE-2021-43527,
CVE-2021-4209,
CVE-2021-4203,
CVE-2021-4193,
CVE-2021-4192,
CVE-2021-4187,
CVE-2021-4173,
CVE-2021-4166,
CVE-2021-41617,
CVE-2021-4159,
CVE-2021-4157,
CVE-2021-4155,
CVE-2021-4154,
CVE-2021-4148,
CVE-2021-4136,
CVE-2021-41190,
CVE-2021-41103,
CVE-2021-4083,
CVE-2021-4069,
CVE-2021-40528,
CVE-2021-4037,
CVE-2021-4019,
CVE-2021-4002,
CVE-2021-4001,
CVE-2021-3984,
CVE-2021-3974,
CVE-2021-3973,
CVE-2021-3968,
CVE-2021-3928,
CVE-2021-3927,
CVE-2021-3903,
CVE-2021-3875,
CVE-2021-3872,
CVE-2021-38561,
CVE-2021-38205,
CVE-2021-3753,
CVE-2021-3743,
CVE-2021-3732,
CVE-2021-3711,
CVE-2021-3669,
CVE-2021-3580,
CVE-2021-35477,
CVE-2021-34556,
CVE-2021-33656,
CVE-2021-31879,
CVE-2021-28715,
CVE-2021-28714,
CVE-2021-26341,
CVE-2021-22926,
CVE-2021-22924,
CVE-2021-22898,
CVE-2021-22897,
CVE-2021-22890,
CVE-2021-22876,
CVE-2021-22600,
CVE-2021-22570,
CVE-2021-22543,
CVE-2021-20322,
CVE-2021-20321,
CVE-2021-20208,
CVE-2020-36516,
CVE-2020-14387,
CVE-2020-13529,
CVE-2019-9924,
CVE-2019-18276,
CVE-2019-17595,
CVE-2019-17594