Questa pagina contiene un log delle modifiche di manutenzione. Memorystore for Redis
rilascia aggiornamenti di manutenzione per nuove funzionalità, patch di sicurezza, correzioni di bug,
miglioramenti delle prestazioni e altro ancora.
Puoi eseguire gli aggiornamenti di manutenzione utilizzando la manutenzione self-service. Memorystore for Redis esegue anche aggiornamenti di manutenzione pianificati una volta ogni qualche mese. Puoi impostare le finestre per gli aggiornamenti
di manutenzione. Per saperne di più, consulta Individuazione e impostazione dei periodi di manutenzione.
Per visualizzare la versione di manutenzione, utilizza il comando gcloud redis instances describe. La versione di manutenzione viene visualizzata accanto al parametro maintenanceVersion. Per saperne di più, vedi Visualizzare le informazioni sull'istanza. Inoltre, per scoprire di più
sugli aggiornamenti di manutenzione, consulta Informazioni sulla manutenzione.
Per ricevere gli ultimi aggiornamenti di manutenzione, aggiungi l'URL del file XML del log delle modifiche di manutenzione per Memorystore for Redis al tuo aggregatore di feed.
20250806_01_00
| Data di uscita |
Tipo di release |
| 2025-08-29 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le vulnerabilità CVE elencate in
Patch di sicurezza. |
Patch di sicurezza
CVE-2025-6965,
CVE-2025-32463,
CVE-2025-32462,
CVE-2025-32023,
CVE-2025-29768,
CVE-2025-27423,
CVE-2025-26603,
CVE-2025-24014,
CVE-2025-23266,
CVE-2025-22134,
CVE-2025-1215,
CVE-2024-5742,
CVE-2024-26130
20250701_00_01
| Data di uscita |
Tipo di release |
| 2025-07-23 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e i processi sidecar per risolvere i
CVE elencati in Patch di sicurezza. |
Patch di sicurezza
CVE-2025-21999,
CVE-2025-47273,
CVE-2025-21997,
CVE-2025-21922,
CVE-2024-23653,
CVE-2025-1377,
CVE-2025-21726,
CVE-2024-52006,
CVE-2025-22056,
CVE-2025-46836,
CVE-2024-40635,
CVE-2025-48060,
CVE-2025-4598,
CVE-2024-53427,
CVE-2025-5914,
CVE-2024-57979,
CVE-2025-21964,
CVE-2025-21760,
CVE-2025-1372,
CVE-2025-21887,
CVE-2025-21756,
CVE-2025-21763,
CVE-2024-36903,
CVE-2025-22005,
CVE-2024-57977,
CVE-2016-1585,
CVE-2025-22035,
CVE-2025-21959,
CVE-2025-1365,
CVE-2025-1371,
CVE-2025-21812,
CVE-2024-26739,
CVE-2025-1181,
CVE-2024-43840,
CVE-2024-8176,
CVE-2024-36927,
CVE-2025-21853,
CVE-2025-21796,
CVE-2025-21920,
CVE-2024-56549,
CVE-2023-45288,
CVE-2024-24786,
CVE-2024-26783,
CVE-2025-21898,
CVE-2025-32415,
CVE-2025-22870,
CVE-2025-21980,
CVE-2024-35866,
CVE-2024-50349,
CVE-2025-21762,
CVE-2023-52927,
CVE-2024-48615,
CVE-2025-32728,
CVE-2025-21891,
CVE-2024-58083,
CVE-2025-21727,
CVE-2024-50063,
CVE-2025-22868,
CVE-2025-21919,
CVE-2025-32414,
CVE-2025-21962,
CVE-2025-3198,
CVE-2025-1632,
CVE-2025-21963,
CVE-2025-21867,
CVE-2025-37785,
CVE-2025-21764,
CVE-2024-0553,
CVE-2021-37600,
CVE-2024-2961,
CVE-2023-39804,
CVE-2024-28085,
CVE-2025-6965,
CVE-2025-29087,
CVE-2024-37371,
CVE-2024-27280,
CVE-2018-12886,
CVE-2021-32740,
CVE-2021-31799,
CVE-2020-1751,
CVE-2021-41817,
CVE-2019-3843,
CVE-2019-3844,
CVE-2019-12290,
CVE-2021-22569,
CVE-2023-32731,
CVE-2023-50387,
CVE-2023-1428,
CVE-2024-37370,
CVE-2020-10663,
CVE-2020-25613,
CVE-2023-33953,
CVE-2024-7254,
CVE-2022-4415,
CVE-2021-3997,
CVE-2020-8130,
CVE-2022-3171,
CVE-2023-32732,
CVE-2023-5678,
CVE-2022-24795,
CVE-2018-1000654,
CVE-2024-0727,
CVE-2021-36086,
CVE-2019-9923,
CVE-2023-4039,
CVE-2021-36085,
CVE-2021-33560,
CVE-2019-9893,
CVE-2024-2398,
CVE-2021-36087,
CVE-2018-7169,
CVE-2007-2379,
CVE-2020-14155,
CVE-2021-22922,
CVE-2021-36084,
CVE-2023-29383,
CVE-2013-4235,
CVE-2019-13627,
CVE-2019-19882,
CVE-2022-1304,
CVE-2017-11164,
CVE-2022-48303,
CVE-2017-16231,
CVE-2021-22923,
CVE-2023-28320,
CVE-2019-20386,
CVE-2023-4806,
CVE-2020-13529,
CVE-2023-4813,
CVE-2019-20838,
CVE-2019-15847,
CVE-2018-18405,
CVE-2019-8457,
CVE-2019-14855,
CVE-2024-26462,
CVE-2019-17543,
CVE-2020-16156,
CVE-2017-7246,
CVE-2023-4641,
CVE-2021-20193,
CVE-2023-45918,
CVE-2023-7008,
CVE-2019-18276,
CVE-2017-7245,
CVE-2020-19909,
CVE-2024-2511,
CVE-2023-50868,
CVE-2024-33599,
CVE-2024-5535,
CVE-2024-33602,
CVE-2024-27282,
CVE-2024-4741,
CVE-2024-33601,
CVE-2024-33600,
CVE-2024-27281
20250326_00_00
| Data di uscita |
Tipo di release |
| 2025-03-26 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le
vulnerabilità CVE elencate in Patch di sicurezza. |
Patch di sicurezza
CVE-2023-44487,
CVE-2023-45288,
CVE-2024-0131,
CVE-2024-0134,
CVE-2024-0147,
CVE-2024-0149,
CVE-2024-0150,
CVE-2024-10524,
CVE-2024-11053,
CVE-2024-12084,
CVE-2024-12085,
CVE-2024-12086,
CVE-2024-12087,
CVE-2024-12088,
CVE-2024-12747,
CVE-2024-13176,
CVE-2024-23653,
CVE-2024-26982,
CVE-2024-40896,
CVE-2024-40945,
CVE-2024-45306,
CVE-2024-45310,
CVE-2024-45337,
CVE-2024-46981,
CVE-2024-47745,
CVE-2024-47814,
CVE-2024-49861,
CVE-2024-49878,
CVE-2024-49926,
CVE-2024-49927,
CVE-2024-49946,
CVE-2024-49948,
CVE-2024-49949,
CVE-2024-49952,
CVE-2024-49954,
CVE-2024-49959,
CVE-2024-49994,
CVE-2024-49996,
CVE-2024-50010,
CVE-2024-50014,
CVE-2024-50024,
CVE-2024-50036,
CVE-2024-50038,
CVE-2024-50047,
CVE-2024-50055,
CVE-2024-50060,
CVE-2024-50072,
CVE-2024-50082,
CVE-2024-50083,
CVE-2024-50095,
CVE-2024-50099,
CVE-2024-50101,
CVE-2024-50110,
CVE-2024-50115,
CVE-2024-50131,
CVE-2024-50138,
CVE-2024-50141,
CVE-2024-50142,
CVE-2024-50143,
CVE-2024-50147,
CVE-2024-50151,
CVE-2024-50153,
CVE-2024-50154,
CVE-2024-50162,
CVE-2024-50163,
CVE-2024-50164,
CVE-2024-50186,
CVE-2024-50191,
CVE-2024-50192,
CVE-2024-50194,
CVE-2024-50195,
CVE-2024-50215,
CVE-2024-50228,
CVE-2024-50251,
CVE-2024-50256,
CVE-2024-50257,
CVE-2024-50262,
CVE-2024-50271,
CVE-2024-50272,
CVE-2024-50278,
CVE-2024-50279,
CVE-2024-50304,
CVE-2024-50602,
CVE-2024-53042,
CVE-2024-53052,
CVE-2024-53054,
CVE-2024-53066,
CVE-2024-53082,
CVE-2024-53093,
CVE-2024-53096,
CVE-2024-53099,
CVE-2024-53100,
CVE-2024-53113,
CVE-2024-53119,
CVE-2024-53121,
CVE-2024-53124,
CVE-2024-53128,
CVE-2024-53135,
CVE-2024-53136,
CVE-2024-53140,
CVE-2024-53166,
CVE-2024-53170,
CVE-2024-53589,
CVE-2024-53869,
CVE-2024-56664,
CVE-2024-57841,
CVE-2024-57890,
CVE-2024-57949,
CVE-2024-57951,
CVE-2024-57996,
CVE-2024-58005,
CVE-2024-58017,
CVE-2024-9287,
CVE-2024-9341,
CVE-2024-9407,
CVE-2024-9675,
CVE-2024-9681,
CVE-2025-0395,
CVE-2025-0840,
CVE-2025-21631,
CVE-2025-21665,
CVE-2025-21666,
CVE-2025-21667,
CVE-2025-21669,
CVE-2025-21671,
CVE-2025-21683,
CVE-2025-21690,
CVE-2025-21716,
CVE-2025-21745,
CVE-2025-21779,
CVE-2025-21785,
CVE-2025-21791,
CVE-2025-21814,
CVE-2025-21844,
CVE-2025-21846,
CVE-2025-21858,
CVE-2025-21864,
CVE-2025-22869,
CVE-2025-26465,
CVE-2025-26466,
CVE-2025-27113
20241107_00_00
| Data di uscita |
Tipo di release |
| 2024-12-17 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis per risolvere i
CVE elencati in Patch di sicurezza. |
Patch di sicurezza
CVE-2023-27043,
CVE-2023-52889,
CVE-2023-7256,
CVE-2024-0126,
CVE-2024-0132,
CVE-2024-0133,
CVE-2024-2511,
CVE-2024-31227,
CVE-2024-31228,
CVE-2024-31449,
CVE-2024-37370,
CVE-2024-37371,
CVE-2024-38632,
CVE-2024-39472,
CVE-2024-41012,
CVE-2024-41057,
CVE-2024-41058,
CVE-2024-41073,
CVE-2024-41098,
CVE-2024-41957,
CVE-2024-41965,
CVE-2024-42268,
CVE-2024-42269,
CVE-2024-42270,
CVE-2024-42283,
CVE-2024-42285,
CVE-2024-42302,
CVE-2024-42307,
CVE-2024-42316,
CVE-2024-43817,
CVE-2024-43828,
CVE-2024-43837,
CVE-2024-43853,
CVE-2024-43854,
CVE-2024-43855,
CVE-2024-43856,
CVE-2024-43871,
CVE-2024-43873,
CVE-2024-43882,
CVE-2024-43889,
CVE-2024-43892,
CVE-2024-43893,
CVE-2024-43914,
CVE-2024-44940,
CVE-2024-44944,
CVE-2024-44947,
CVE-2024-44952,
CVE-2024-44958,
CVE-2024-44965,
CVE-2024-44970,
CVE-2024-44983,
CVE-2024-44985,
CVE-2024-44986,
CVE-2024-44987,
CVE-2024-44989,
CVE-2024-44990,
CVE-2024-45000,
CVE-2024-45003,
CVE-2024-45018,
CVE-2024-45021,
CVE-2024-45022,
CVE-2024-45025,
CVE-2024-45490,
CVE-2024-45491,
CVE-2024-45492,
CVE-2024-4603,
CVE-2024-46679,
CVE-2024-46686,
CVE-2024-46721,
CVE-2024-46737,
CVE-2024-46738,
CVE-2024-46743,
CVE-2024-46744,
CVE-2024-46750,
CVE-2024-46763,
CVE-2024-46800,
CVE-2024-46829,
CVE-2024-46848,
CVE-2024-46855,
CVE-2024-4741,
CVE-2024-47678,
CVE-2024-47679,
CVE-2024-47682,
CVE-2024-47684,
CVE-2024-47685,
CVE-2024-47692,
CVE-2024-47693,
CVE-2024-47696,
CVE-2024-47701,
CVE-2024-47705,
CVE-2024-47706,
CVE-2024-47707,
CVE-2024-47710,
CVE-2024-47727,
CVE-2024-47728,
CVE-2024-47734,
CVE-2024-47737,
CVE-2024-47739,
CVE-2024-47742,
CVE-2024-47743,
CVE-2024-48957,
CVE-2024-48958,
CVE-2024-49850,
CVE-2024-49851,
CVE-2024-49858,
CVE-2024-49860,
CVE-2024-49870,
CVE-2024-49875,
CVE-2024-49881,
CVE-2024-49883,
CVE-2024-49884,
CVE-2024-49889,
CVE-2024-49936,
CVE-2024-49967,
CVE-2024-49975,
CVE-2024-49978,
CVE-2024-49983,
CVE-2024-49993,
CVE-2024-50000,
CVE-2024-50001,
CVE-2024-50002,
CVE-2024-50006,
CVE-2024-50015,
CVE-2024-50019,
CVE-2024-50033,
CVE-2024-50035,
CVE-2024-50039,
CVE-2024-50045,
CVE-2024-50046,
CVE-2024-5535,
CVE-2024-6119,
CVE-2024-6197,
CVE-2024-6232,
CVE-2024-6345,
CVE-2024-6602,
CVE-2024-7264,
CVE-2024-7592,
20240411_00_00
| Data di uscita |
Tipo di release |
| 2024-04-12 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240328_00_00
| Data di uscita |
Tipo di release |
| 2024-03-28 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240220_00_00
| Data di uscita |
Tipo di release |
| 2024-02-20 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-294-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-40547,
CVE-2023-40548,
CVE-2023-40551,
CVE-2023-46838,
CVE-2024-1085,
CVE-2024-1086,
CVE-2022-42010,
CVE-2022-42011,
CVE-2022-42012,
CVE-2023-1077,
CVE-2023-2156,
CVE-2023-31022,
CVE-2023-34324,
CVE-2023-34969,
CVE-2023-35945,
CVE-2023-40546,
CVE-2023-40549,
CVE-2023-40550,
CVE-2023-42754,
CVE-2023-44487,
CVE-2023-45322,
CVE-2023-46218,
CVE-2023-46813,
CVE-2023-46862,
CVE-2023-4733,
CVE-2023-4734,
CVE-2023-4735,
CVE-2023-4736,
CVE-2023-4738,
CVE-2023-4750,
CVE-2023-4752,
CVE-2023-4781,
CVE-2023-48795,
CVE-2023-51384,
CVE-2023-51385,
CVE-2023-52071,
CVE-2023-5344,
CVE-2023-5441,
CVE-2023-5535,
CVE-2023-5678,
CVE-2023-5717,
CVE-2023-6040,
CVE-2023-6111,
CVE-2023-6531,
CVE-2023-6817,
CVE-2023-6915,
CVE-2023-6931,
CVE-2023-6932,
CVE-2023-7104,
CVE-2023-7192,
CVE-2024-0193,
CVE-2024-0584,
CVE-2024-0646,
CVE-2024-22195
20231114_00_00
| Data di uscita |
Tipo di release |
| 2023-11-14 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.14. |
| Solo istanze Redis 7.0 |
Imposta la versione della patch OSS Redis su 7.0.14. |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-226-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2022-4415,
CVE-2023-0361,
CVE-2022-29458,
CVE-2022-3821,
CVE-2018-1121,
CVE-2018-17075,
CVE-2018-17142,
CVE-2018-17143,
CVE-2018-17846,
CVE-2018-17847,
CVE-2018-17848,
CVE-2020-22916,
CVE-2022-4269,
CVE-2022-47007,
CVE-2022-47008,
CVE-2022-47010,
CVE-2022-47011,
CVE-2022-48063,
CVE-2022-48064,
CVE-2022-48065,
CVE-2023-2163,
CVE-2023-23914,
CVE-2023-28736,
CVE-2023-28938,
CVE-2023-29499,
CVE-2023-3117,
CVE-2023-32611,
CVE-2023-32636,
CVE-2023-32643,
CVE-2023-32665,
CVE-2023-3338,
CVE-2023-38039,
CVE-2023-38545,
CVE-2023-39189,
CVE-2023-39192,
CVE-2023-39194,
CVE-2023-4015,
CVE-2023-4016,
CVE-2023-40217,
CVE-2023-4206,
CVE-2023-4207,
CVE-2023-4208,
CVE-2023-4244,
CVE-2023-42752,
CVE-2023-42753,
CVE-2023-42756,
CVE-2023-4569,
CVE-2023-45863,
CVE-2023-4622,
CVE-2023-4623,
CVE-2023-4921
20230821_00_00
| Data di uscita |
Tipo di release |
| 2023-08-21 |
Manutenzione automatica |
Riepilogo
| Istanze coperte |
Riepilogo |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-23. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-4128,
CVE-2023-3812,
CVE-2023-4387,
CVE-2023-4147,
CVE-2023-29491,
CVE-2023-4004,
CVE-2023-38408,
CVE-2023-3611,
CVE-2023-3776,
CVE-2023-3623,
CVE-2016-4074,
CVE-2015-8863,
CVE-2022-28737,
CVE-2022-3623,
CVE-2023-4194,
CVE-2023-3995,
CVE-2023-3817,
CVE-2023-1206,
CVE-2023-4459
20230727_00_00
| Data di uscita |
Tipo di release |
| 2023-07-27 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.13. |
| Solo istanze Redis 7.0 |
Imposta la versione patch di OSS Redis su 7.0.12. |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-4. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2015-20107,
CVE-2020-10735,
CVE-2021-28861,
CVE-2022-24834,
CVE-2022-45061,
CVE-2023-1786,
CVE-2023-1972,
CVE-2023-20867,
CVE-2023-2124,
CVE-2023-2426,
CVE-2023-24329,
CVE-2023-25515,
CVE-2023-25516,
CVE-2023-2609,
CVE-2023-2610,
CVE-2023-2650,
CVE-2023-27534,
CVE-2023-28319,
CVE-2023-28320,
CVE-2023-28321,
CVE-2023-28322,
CVE-2023-28484,
CVE-2023-28856,
CVE-2023-29402,
CVE-2023-29403,
CVE-2023-29404,
CVE-2023-29405,
CVE-2023-29491,
CVE-2023-3090,
CVE-2023-31248,
CVE-2023-32233,
CVE-2023-3268,
CVE-2023-3390,
CVE-2023-34256,
CVE-2023-35001,
CVE-2023-36824
20230508_00_00
| Data di uscita |
Tipo di release |
| 2023-05-08 |
Manutenzione automatica |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 5.x |
Imposta la versione della patch OSS Redis su 5.0.14. |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-1-71. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2004-0971,
CVE-2018-25032,
CVE-2020-17437,
CVE-2021-20270,
CVE-2021-27291,
CVE-2021-33574,
CVE-2021-3997,
CVE-2021-3999,
CVE-2021-4122,
CVE-2021-4160,
CVE-2021-43396,
CVE-2022-1154,
CVE-2022-1160,
CVE-2022-1304,
CVE-2022-1381,
CVE-2022-1420,
CVE-2022-1586,
CVE-2022-1587,
CVE-2022-1616,
CVE-2022-1619,
CVE-2022-1620,
CVE-2022-1621,
CVE-2022-1629,
CVE-2022-1664,
CVE-2022-1674,
CVE-2022-1720,
CVE-2022-1733,
CVE-2022-1735,
CVE-2022-1769,
CVE-2022-1771,
CVE-2022-1785,
CVE-2022-1796,
CVE-2022-1851,
CVE-2022-1886,
CVE-2022-1898,
CVE-2022-1927,
CVE-2022-1942,
CVE-2022-2124,
CVE-2022-2125,
CVE-2022-2126,
CVE-2022-2129,
CVE-2022-22943,
CVE-2022-23218,
CVE-2022-23219,
CVE-2022-26280,
CVE-2022-2928,
CVE-2022-2929,
CVE-2022-29824,
CVE-2022-34903,
CVE-2022-3715,
CVE-2022-37434,
CVE-2022-37454,
CVE-2022-40768,
CVE-2022-41723,
CVE-2022-41725,
CVE-2022-42898,
CVE-2022-43750,
CVE-2022-44638,
CVE-2023-0180,
CVE-2023-0183,
CVE-2023-0184,
CVE-2023-0185,
CVE-2023-0187,
CVE-2023-0188,
CVE-2023-0189
20230322_00_00
| Data di uscita |
Tipo di release |
| 2023-03-29 |
Self-service |
Riepilogo
| Istanze coperte |
Riepilogo |
| Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.11. La patch include le correzioni CVE CVE-2023-25155 e CVE-2022-36021. |
| Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-97-16919-235-36. |
Patch di sicurezza
CVE-2023-28466,
CVE-2023-26604,
CVE-2023-25155,
CVE-2023-23931,
CVE-2023-23586,
CVE-2023-23454,
CVE-2023-1355,
CVE-2023-1264,
CVE-2023-1175,
CVE-2023-1170,
CVE-2023-1127,
CVE-2023-0512,
CVE-2023-0461,
CVE-2023-0433,
CVE-2023-0288,
CVE-2023-0286,
CVE-2023-0215,
CVE-2023-0054,
CVE-2023-0051,
CVE-2023-0049,
CVE-2022-48303,
CVE-2022-47946,
CVE-2022-47929,
CVE-2022-4696,
CVE-2022-46663,
CVE-2022-4450,
CVE-2022-43945,
CVE-2022-4378,
CVE-2022-4304,
CVE-2022-4292,
CVE-2022-42915,
CVE-2022-4285,
CVE-2022-42329,
CVE-2022-42328,
CVE-2022-4141,
CVE-2022-41222,
CVE-2022-40897,
CVE-2022-40320,
CVE-2022-40304,
CVE-2022-40303,
CVE-2022-39188,
CVE-2022-3821,
CVE-2022-3705,
CVE-2022-36946,
CVE-2022-3625,
CVE-2022-36123,
CVE-2022-36021,
CVE-2022-35977,
CVE-2022-3586,
CVE-2022-35737,
CVE-2022-35260,
CVE-2022-35252,
CVE-2022-3524,
CVE-2022-33744,
CVE-2022-33743,
CVE-2022-3352,
CVE-2022-3324,
CVE-2022-3297,
CVE-2022-3296,
CVE-2022-3278,
CVE-2022-3256,
CVE-2022-3235,
CVE-2022-3234,
CVE-2022-32296,
CVE-2022-32221,
CVE-2022-32208,
CVE-2022-32207,
CVE-2022-32206,
CVE-2022-32205,
CVE-2022-32149,
CVE-2022-3176,
CVE-2022-3169,
CVE-2022-3153,
CVE-2022-3134,
CVE-2022-3107,
CVE-2022-3104,
CVE-2022-31030,
CVE-2022-3099,
CVE-2022-30594,
CVE-2022-3037,
CVE-2022-3028,
CVE-2022-3016,
CVE-2022-30115,
CVE-2022-29869,
CVE-2022-2982,
CVE-2022-2980,
CVE-2022-2977,
CVE-2022-2959,
CVE-2022-29582,
CVE-2022-29581,
CVE-2022-2946,
CVE-2022-29458,
CVE-2022-2938,
CVE-2022-2923,
CVE-2022-29217,
CVE-2022-29162,
CVE-2022-29154,
CVE-2022-2905,
CVE-2022-28893,
CVE-2022-2889,
CVE-2022-2874,
CVE-2022-2862,
CVE-2022-2849,
CVE-2022-2845,
CVE-2022-2819,
CVE-2022-2817,
CVE-2022-2816,
CVE-2022-27782,
CVE-2022-27781,
CVE-2022-27780,
CVE-2022-27779,
CVE-2022-27778,
CVE-2022-27776,
CVE-2022-27775,
CVE-2022-27774,
CVE-2022-27666,
CVE-2022-27239,
CVE-2022-2602,
CVE-2022-2598,
CVE-2022-2581,
CVE-2022-2580,
CVE-2022-2571,
CVE-2022-2526,
CVE-2022-2522,
CVE-2022-2509,
CVE-2022-2503,
CVE-2022-24769,
CVE-2022-24448,
CVE-2022-23960,
CVE-2022-23648,
CVE-2022-23471,
CVE-2022-2345,
CVE-2022-2344,
CVE-2022-2343,
CVE-2022-23308,
CVE-2022-2327,
CVE-2022-2304,
CVE-2022-2289,
CVE-2022-2288,
CVE-2022-2287,
CVE-2022-2286,
CVE-2022-2285,
CVE-2022-2284,
CVE-2022-2264,
CVE-2022-22576,
CVE-2022-2257,
CVE-2022-2231,
CVE-2022-2210,
CVE-2022-2208,
CVE-2022-2207,
CVE-2022-2206,
CVE-2022-2183,
CVE-2022-2182,
CVE-2022-2175,
CVE-2022-21505,
CVE-2022-2097,
CVE-2022-2068,
CVE-2022-20409,
CVE-2022-1998,
CVE-2022-1786,
CVE-2022-1729,
CVE-2022-1516,
CVE-2022-1508,
CVE-2022-1353,
CVE-2022-1292,
CVE-2022-1271,
CVE-2022-1116,
CVE-2022-1055,
CVE-2022-1012,
CVE-2022-1011,
CVE-2022-0995,
CVE-2022-0943,
CVE-2022-0886,
CVE-2022-0854,
CVE-2022-0850,
CVE-2022-0847,
CVE-2022-0778,
CVE-2022-0729,
CVE-2022-0714,
CVE-2022-0696,
CVE-2022-0696,
CVE-2022-0685,
CVE-2022-0629,
CVE-2022-0617,
CVE-2022-0572,
CVE-2022-0494,
CVE-2022-0492,
CVE-2022-0443,
CVE-2022-0413,
CVE-2022-0408,
CVE-2022-0407,
CVE-2022-0393,
CVE-2022-0392,
CVE-2022-0368,
CVE-2022-0361,
CVE-2022-0359,
CVE-2022-0319,
CVE-2022-0318,
CVE-2022-0264,
CVE-2022-0261,
CVE-2022-0185,
CVE-2022-0168,
CVE-2022-0158,
CVE-2022-0156,
CVE-2022-0128,
CVE-2022-0002,
CVE-2022-0001,
CVE-2021-46848,
CVE-2021-46828,
CVE-2021-45485,
CVE-2021-45402,
CVE-2021-45346,
CVE-2021-43816,
CVE-2021-43784,
CVE-2021-43618,
CVE-2021-43527,
CVE-2021-4209,
CVE-2021-4203,
CVE-2021-4193,
CVE-2021-4192,
CVE-2021-4187,
CVE-2021-4173,
CVE-2021-4166,
CVE-2021-41617,
CVE-2021-4159,
CVE-2021-4157,
CVE-2021-4155,
CVE-2021-4154,
CVE-2021-4148,
CVE-2021-4136,
CVE-2021-41190,
CVE-2021-41103,
CVE-2021-4083,
CVE-2021-4069,
CVE-2021-40528,
CVE-2021-4037,
CVE-2021-4019,
CVE-2021-4002,
CVE-2021-4001,
CVE-2021-3984,
CVE-2021-3974,
CVE-2021-3973,
CVE-2021-3968,
CVE-2021-3928,
CVE-2021-3927,
CVE-2021-3903,
CVE-2021-3875,
CVE-2021-3872,
CVE-2021-38561,
CVE-2021-38205,
CVE-2021-3753,
CVE-2021-3743,
CVE-2021-3732,
CVE-2021-3711,
CVE-2021-3669,
CVE-2021-3580,
CVE-2021-35477,
CVE-2021-34556,
CVE-2021-33656,
CVE-2021-31879,
CVE-2021-28715,
CVE-2021-28714,
CVE-2021-26341,
CVE-2021-22926,
CVE-2021-22924,
CVE-2021-22898,
CVE-2021-22897,
CVE-2021-22890,
CVE-2021-22876,
CVE-2021-22600,
CVE-2021-22570,
CVE-2021-22543,
CVE-2021-20322,
CVE-2021-20321,
CVE-2021-20208,
CVE-2020-36516,
CVE-2020-14387,
CVE-2020-13529,
CVE-2019-9924,
CVE-2019-18276,
CVE-2019-17595,
CVE-2019-17594