Questa pagina contiene un log delle modifiche di manutenzione. Memorystore for Redis
rilascia aggiornamenti di manutenzione per nuove funzionalità, patch di sicurezza, correzioni di bug,
miglioramenti delle prestazioni e altro ancora.
Puoi eseguire gli aggiornamenti di manutenzione utilizzando la manutenzione self-service. Memorystore for Redis esegue anche aggiornamenti di manutenzione pianificati una volta ogni qualche mese. Puoi impostare le finestre per gli aggiornamenti
di manutenzione. Per saperne di più, consulta Individuazione e impostazione dei periodi di manutenzione.
Per visualizzare la versione di manutenzione, utilizza il comando gcloud redis instances describe
. La versione di manutenzione viene visualizzata accanto al parametro maintenanceVersion
. Per saperne di più, vedi Visualizzare le informazioni sull'istanza. Inoltre, per scoprire di più
sugli aggiornamenti di manutenzione, consulta Informazioni sulla manutenzione.
Per ricevere gli ultimi aggiornamenti di manutenzione, aggiungi l'URL del file XML del log delle modifiche di manutenzione per Memorystore for Redis al tuo aggregatore di feed.
20250806_01_00
Data di uscita |
Tipo di release |
2025-08-29 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le vulnerabilità CVE elencate in
Patch di sicurezza. |
Patch di sicurezza
CVE-2025-6965,
CVE-2025-32463,
CVE-2025-32462,
CVE-2025-32023,
CVE-2025-29768,
CVE-2025-27423,
CVE-2025-26603,
CVE-2025-24014,
CVE-2025-23266,
CVE-2025-22134,
CVE-2025-1215,
CVE-2024-5742,
CVE-2024-26130
20250701_00_01
Data di uscita |
Tipo di release |
2025-07-23 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e i processi sidecar per risolvere i
CVE elencati in Patch di sicurezza. |
Patch di sicurezza
CVE-2025-21999,
CVE-2025-47273,
CVE-2025-21997,
CVE-2025-21922,
CVE-2024-23653,
CVE-2025-1377,
CVE-2025-21726,
CVE-2024-52006,
CVE-2025-22056,
CVE-2025-46836,
CVE-2024-40635,
CVE-2025-48060,
CVE-2025-4598,
CVE-2024-53427,
CVE-2025-5914,
CVE-2024-57979,
CVE-2025-21964,
CVE-2025-21760,
CVE-2025-1372,
CVE-2025-21887,
CVE-2025-21756,
CVE-2025-21763,
CVE-2024-36903,
CVE-2025-22005,
CVE-2024-57977,
CVE-2016-1585,
CVE-2025-22035,
CVE-2025-21959,
CVE-2025-1365,
CVE-2025-1371,
CVE-2025-21812,
CVE-2024-26739,
CVE-2025-1181,
CVE-2024-43840,
CVE-2024-8176,
CVE-2024-36927,
CVE-2025-21853,
CVE-2025-21796,
CVE-2025-21920,
CVE-2024-56549,
CVE-2023-45288,
CVE-2024-24786,
CVE-2024-26783,
CVE-2025-21898,
CVE-2025-32415,
CVE-2025-22870,
CVE-2025-21980,
CVE-2024-35866,
CVE-2024-50349,
CVE-2025-21762,
CVE-2023-52927,
CVE-2024-48615,
CVE-2025-32728,
CVE-2025-21891,
CVE-2024-58083,
CVE-2025-21727,
CVE-2024-50063,
CVE-2025-22868,
CVE-2025-21919,
CVE-2025-32414,
CVE-2025-21962,
CVE-2025-3198,
CVE-2025-1632,
CVE-2025-21963,
CVE-2025-21867,
CVE-2025-37785,
CVE-2025-21764,
CVE-2024-0553,
CVE-2021-37600,
CVE-2024-2961,
CVE-2023-39804,
CVE-2024-28085,
CVE-2025-6965,
CVE-2025-29087,
CVE-2024-37371,
CVE-2024-27280,
CVE-2018-12886,
CVE-2021-32740,
CVE-2021-31799,
CVE-2020-1751,
CVE-2021-41817,
CVE-2019-3843,
CVE-2019-3844,
CVE-2019-12290,
CVE-2021-22569,
CVE-2023-32731,
CVE-2023-50387,
CVE-2023-1428,
CVE-2024-37370,
CVE-2020-10663,
CVE-2020-25613,
CVE-2023-33953,
CVE-2024-7254,
CVE-2022-4415,
CVE-2021-3997,
CVE-2020-8130,
CVE-2022-3171,
CVE-2023-32732,
CVE-2023-5678,
CVE-2022-24795,
CVE-2018-1000654,
CVE-2024-0727,
CVE-2021-36086,
CVE-2019-9923,
CVE-2023-4039,
CVE-2021-36085,
CVE-2021-33560,
CVE-2019-9893,
CVE-2024-2398,
CVE-2021-36087,
CVE-2018-7169,
CVE-2007-2379,
CVE-2020-14155,
CVE-2021-22922,
CVE-2021-36084,
CVE-2023-29383,
CVE-2013-4235,
CVE-2019-13627,
CVE-2019-19882,
CVE-2022-1304,
CVE-2017-11164,
CVE-2022-48303,
CVE-2017-16231,
CVE-2021-22923,
CVE-2023-28320,
CVE-2019-20386,
CVE-2023-4806,
CVE-2020-13529,
CVE-2023-4813,
CVE-2019-20838,
CVE-2019-15847,
CVE-2018-18405,
CVE-2019-8457,
CVE-2019-14855,
CVE-2024-26462,
CVE-2019-17543,
CVE-2020-16156,
CVE-2017-7246,
CVE-2023-4641,
CVE-2021-20193,
CVE-2023-45918,
CVE-2023-7008,
CVE-2019-18276,
CVE-2017-7245,
CVE-2020-19909,
CVE-2024-2511,
CVE-2023-50868,
CVE-2024-33599,
CVE-2024-5535,
CVE-2024-33602,
CVE-2024-27282,
CVE-2024-4741,
CVE-2024-33601,
CVE-2024-33600,
CVE-2024-27281
20250326_00_00
Data di uscita |
Tipo di release |
2025-03-26 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis e il binario Redis per risolvere le
vulnerabilità CVE elencate in Patch di sicurezza. |
Patch di sicurezza
CVE-2023-44487,
CVE-2023-45288,
CVE-2024-0131,
CVE-2024-0134,
CVE-2024-0147,
CVE-2024-0149,
CVE-2024-0150,
CVE-2024-10524,
CVE-2024-11053,
CVE-2024-12084,
CVE-2024-12085,
CVE-2024-12086,
CVE-2024-12087,
CVE-2024-12088,
CVE-2024-12747,
CVE-2024-13176,
CVE-2024-23653,
CVE-2024-26982,
CVE-2024-40896,
CVE-2024-40945,
CVE-2024-45306,
CVE-2024-45310,
CVE-2024-45337,
CVE-2024-46981,
CVE-2024-47745,
CVE-2024-47814,
CVE-2024-49861,
CVE-2024-49878,
CVE-2024-49926,
CVE-2024-49927,
CVE-2024-49946,
CVE-2024-49948,
CVE-2024-49949,
CVE-2024-49952,
CVE-2024-49954,
CVE-2024-49959,
CVE-2024-49994,
CVE-2024-49996,
CVE-2024-50010,
CVE-2024-50014,
CVE-2024-50024,
CVE-2024-50036,
CVE-2024-50038,
CVE-2024-50047,
CVE-2024-50055,
CVE-2024-50060,
CVE-2024-50072,
CVE-2024-50082,
CVE-2024-50083,
CVE-2024-50095,
CVE-2024-50099,
CVE-2024-50101,
CVE-2024-50110,
CVE-2024-50115,
CVE-2024-50131,
CVE-2024-50138,
CVE-2024-50141,
CVE-2024-50142,
CVE-2024-50143,
CVE-2024-50147,
CVE-2024-50151,
CVE-2024-50153,
CVE-2024-50154,
CVE-2024-50162,
CVE-2024-50163,
CVE-2024-50164,
CVE-2024-50186,
CVE-2024-50191,
CVE-2024-50192,
CVE-2024-50194,
CVE-2024-50195,
CVE-2024-50215,
CVE-2024-50228,
CVE-2024-50251,
CVE-2024-50256,
CVE-2024-50257,
CVE-2024-50262,
CVE-2024-50271,
CVE-2024-50272,
CVE-2024-50278,
CVE-2024-50279,
CVE-2024-50304,
CVE-2024-50602,
CVE-2024-53042,
CVE-2024-53052,
CVE-2024-53054,
CVE-2024-53066,
CVE-2024-53082,
CVE-2024-53093,
CVE-2024-53096,
CVE-2024-53099,
CVE-2024-53100,
CVE-2024-53113,
CVE-2024-53119,
CVE-2024-53121,
CVE-2024-53124,
CVE-2024-53128,
CVE-2024-53135,
CVE-2024-53136,
CVE-2024-53140,
CVE-2024-53166,
CVE-2024-53170,
CVE-2024-53589,
CVE-2024-53869,
CVE-2024-56664,
CVE-2024-57841,
CVE-2024-57890,
CVE-2024-57949,
CVE-2024-57951,
CVE-2024-57996,
CVE-2024-58005,
CVE-2024-58017,
CVE-2024-9287,
CVE-2024-9341,
CVE-2024-9407,
CVE-2024-9675,
CVE-2024-9681,
CVE-2025-0395,
CVE-2025-0840,
CVE-2025-21631,
CVE-2025-21665,
CVE-2025-21666,
CVE-2025-21667,
CVE-2025-21669,
CVE-2025-21671,
CVE-2025-21683,
CVE-2025-21690,
CVE-2025-21716,
CVE-2025-21745,
CVE-2025-21779,
CVE-2025-21785,
CVE-2025-21791,
CVE-2025-21814,
CVE-2025-21844,
CVE-2025-21846,
CVE-2025-21858,
CVE-2025-21864,
CVE-2025-22869,
CVE-2025-26465,
CVE-2025-26466,
CVE-2025-27113
20241107_00_00
Data di uscita |
Tipo di release |
2024-12-17 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Aggiorna la versione del sistema operativo host Redis per risolvere i
CVE elencati in Patch di sicurezza. |
Patch di sicurezza
CVE-2023-27043,
CVE-2023-52889,
CVE-2023-7256,
CVE-2024-0126,
CVE-2024-0132,
CVE-2024-0133,
CVE-2024-2511,
CVE-2024-31227,
CVE-2024-31228,
CVE-2024-31449,
CVE-2024-37370,
CVE-2024-37371,
CVE-2024-38632,
CVE-2024-39472,
CVE-2024-41012,
CVE-2024-41057,
CVE-2024-41058,
CVE-2024-41073,
CVE-2024-41098,
CVE-2024-41957,
CVE-2024-41965,
CVE-2024-42268,
CVE-2024-42269,
CVE-2024-42270,
CVE-2024-42283,
CVE-2024-42285,
CVE-2024-42302,
CVE-2024-42307,
CVE-2024-42316,
CVE-2024-43817,
CVE-2024-43828,
CVE-2024-43837,
CVE-2024-43853,
CVE-2024-43854,
CVE-2024-43855,
CVE-2024-43856,
CVE-2024-43871,
CVE-2024-43873,
CVE-2024-43882,
CVE-2024-43889,
CVE-2024-43892,
CVE-2024-43893,
CVE-2024-43914,
CVE-2024-44940,
CVE-2024-44944,
CVE-2024-44947,
CVE-2024-44952,
CVE-2024-44958,
CVE-2024-44965,
CVE-2024-44970,
CVE-2024-44983,
CVE-2024-44985,
CVE-2024-44986,
CVE-2024-44987,
CVE-2024-44989,
CVE-2024-44990,
CVE-2024-45000,
CVE-2024-45003,
CVE-2024-45018,
CVE-2024-45021,
CVE-2024-45022,
CVE-2024-45025,
CVE-2024-45490,
CVE-2024-45491,
CVE-2024-45492,
CVE-2024-4603,
CVE-2024-46679,
CVE-2024-46686,
CVE-2024-46721,
CVE-2024-46737,
CVE-2024-46738,
CVE-2024-46743,
CVE-2024-46744,
CVE-2024-46750,
CVE-2024-46763,
CVE-2024-46800,
CVE-2024-46829,
CVE-2024-46848,
CVE-2024-46855,
CVE-2024-4741,
CVE-2024-47678,
CVE-2024-47679,
CVE-2024-47682,
CVE-2024-47684,
CVE-2024-47685,
CVE-2024-47692,
CVE-2024-47693,
CVE-2024-47696,
CVE-2024-47701,
CVE-2024-47705,
CVE-2024-47706,
CVE-2024-47707,
CVE-2024-47710,
CVE-2024-47727,
CVE-2024-47728,
CVE-2024-47734,
CVE-2024-47737,
CVE-2024-47739,
CVE-2024-47742,
CVE-2024-47743,
CVE-2024-48957,
CVE-2024-48958,
CVE-2024-49850,
CVE-2024-49851,
CVE-2024-49858,
CVE-2024-49860,
CVE-2024-49870,
CVE-2024-49875,
CVE-2024-49881,
CVE-2024-49883,
CVE-2024-49884,
CVE-2024-49889,
CVE-2024-49936,
CVE-2024-49967,
CVE-2024-49975,
CVE-2024-49978,
CVE-2024-49983,
CVE-2024-49993,
CVE-2024-50000,
CVE-2024-50001,
CVE-2024-50002,
CVE-2024-50006,
CVE-2024-50015,
CVE-2024-50019,
CVE-2024-50033,
CVE-2024-50035,
CVE-2024-50039,
CVE-2024-50045,
CVE-2024-50046,
CVE-2024-5535,
CVE-2024-6119,
CVE-2024-6197,
CVE-2024-6232,
CVE-2024-6345,
CVE-2024-6602,
CVE-2024-7264,
CVE-2024-7592,
20240411_00_00
Data di uscita |
Tipo di release |
2024-04-12 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240328_00_00
Data di uscita |
Tipo di release |
2024-03-28 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 7.2 |
Aggiunge miglioramenti di affidabilità e prestazioni per la ricerca vettoriale. |
20240220_00_00
Data di uscita |
Tipo di release |
2024-02-20 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-294-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-40547,
CVE-2023-40548,
CVE-2023-40551,
CVE-2023-46838,
CVE-2024-1085,
CVE-2024-1086,
CVE-2022-42010,
CVE-2022-42011,
CVE-2022-42012,
CVE-2023-1077,
CVE-2023-2156,
CVE-2023-31022,
CVE-2023-34324,
CVE-2023-34969,
CVE-2023-35945,
CVE-2023-40546,
CVE-2023-40549,
CVE-2023-40550,
CVE-2023-42754,
CVE-2023-44487,
CVE-2023-45322,
CVE-2023-46218,
CVE-2023-46813,
CVE-2023-46862,
CVE-2023-4733,
CVE-2023-4734,
CVE-2023-4735,
CVE-2023-4736,
CVE-2023-4738,
CVE-2023-4750,
CVE-2023-4752,
CVE-2023-4781,
CVE-2023-48795,
CVE-2023-51384,
CVE-2023-51385,
CVE-2023-52071,
CVE-2023-5344,
CVE-2023-5441,
CVE-2023-5535,
CVE-2023-5678,
CVE-2023-5717,
CVE-2023-6040,
CVE-2023-6111,
CVE-2023-6531,
CVE-2023-6817,
CVE-2023-6915,
CVE-2023-6931,
CVE-2023-6932,
CVE-2023-7104,
CVE-2023-7192,
CVE-2024-0193,
CVE-2024-0584,
CVE-2024-0646,
CVE-2024-22195
20231114_00_00
Data di uscita |
Tipo di release |
2023-11-14 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.14. |
Solo istanze Redis 7.0 |
Imposta la versione della patch OSS Redis su 7.0.14. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-226-10. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2022-4415,
CVE-2023-0361,
CVE-2022-29458,
CVE-2022-3821,
CVE-2018-1121,
CVE-2018-17075,
CVE-2018-17142,
CVE-2018-17143,
CVE-2018-17846,
CVE-2018-17847,
CVE-2018-17848,
CVE-2020-22916,
CVE-2022-4269,
CVE-2022-47007,
CVE-2022-47008,
CVE-2022-47010,
CVE-2022-47011,
CVE-2022-48063,
CVE-2022-48064,
CVE-2022-48065,
CVE-2023-2163,
CVE-2023-23914,
CVE-2023-28736,
CVE-2023-28938,
CVE-2023-29499,
CVE-2023-3117,
CVE-2023-32611,
CVE-2023-32636,
CVE-2023-32643,
CVE-2023-32665,
CVE-2023-3338,
CVE-2023-38039,
CVE-2023-38545,
CVE-2023-39189,
CVE-2023-39192,
CVE-2023-39194,
CVE-2023-4015,
CVE-2023-4016,
CVE-2023-40217,
CVE-2023-4206,
CVE-2023-4207,
CVE-2023-4208,
CVE-2023-4244,
CVE-2023-42752,
CVE-2023-42753,
CVE-2023-42756,
CVE-2023-4569,
CVE-2023-45863,
CVE-2023-4622,
CVE-2023-4623,
CVE-2023-4921
20230821_00_00
Data di uscita |
Tipo di release |
2023-08-21 |
Manutenzione automatica |
Riepilogo
Istanze coperte |
Riepilogo |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-23. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2023-4128,
CVE-2023-3812,
CVE-2023-4387,
CVE-2023-4147,
CVE-2023-29491,
CVE-2023-4004,
CVE-2023-38408,
CVE-2023-3611,
CVE-2023-3776,
CVE-2023-3623,
CVE-2016-4074,
CVE-2015-8863,
CVE-2022-28737,
CVE-2022-3623,
CVE-2023-4194,
CVE-2023-3995,
CVE-2023-3817,
CVE-2023-1206,
CVE-2023-4459
20230727_00_00
Data di uscita |
Tipo di release |
2023-07-27 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.13. |
Solo istanze Redis 7.0 |
Imposta la versione patch di OSS Redis su 7.0.12. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-156-4. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2015-20107,
CVE-2020-10735,
CVE-2021-28861,
CVE-2022-24834,
CVE-2022-45061,
CVE-2023-1786,
CVE-2023-1972,
CVE-2023-20867,
CVE-2023-2124,
CVE-2023-2426,
CVE-2023-24329,
CVE-2023-25515,
CVE-2023-25516,
CVE-2023-2609,
CVE-2023-2610,
CVE-2023-2650,
CVE-2023-27534,
CVE-2023-28319,
CVE-2023-28320,
CVE-2023-28321,
CVE-2023-28322,
CVE-2023-28484,
CVE-2023-28856,
CVE-2023-29402,
CVE-2023-29403,
CVE-2023-29404,
CVE-2023-29405,
CVE-2023-29491,
CVE-2023-3090,
CVE-2023-31248,
CVE-2023-32233,
CVE-2023-3268,
CVE-2023-3390,
CVE-2023-34256,
CVE-2023-35001,
CVE-2023-36824
20230508_00_00
Data di uscita |
Tipo di release |
2023-05-08 |
Manutenzione automatica |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 5.x |
Imposta la versione della patch OSS Redis su 5.0.14. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-105-17412-1-71. Miglioramenti generali dell'affidabilità. |
Patch di sicurezza
CVE-2004-0971,
CVE-2018-25032,
CVE-2020-17437,
CVE-2021-20270,
CVE-2021-27291,
CVE-2021-33574,
CVE-2021-3997,
CVE-2021-3999,
CVE-2021-4122,
CVE-2021-4160,
CVE-2021-43396,
CVE-2022-1154,
CVE-2022-1160,
CVE-2022-1304,
CVE-2022-1381,
CVE-2022-1420,
CVE-2022-1586,
CVE-2022-1587,
CVE-2022-1616,
CVE-2022-1619,
CVE-2022-1620,
CVE-2022-1621,
CVE-2022-1629,
CVE-2022-1664,
CVE-2022-1674,
CVE-2022-1720,
CVE-2022-1733,
CVE-2022-1735,
CVE-2022-1769,
CVE-2022-1771,
CVE-2022-1785,
CVE-2022-1796,
CVE-2022-1851,
CVE-2022-1886,
CVE-2022-1898,
CVE-2022-1927,
CVE-2022-1942,
CVE-2022-2124,
CVE-2022-2125,
CVE-2022-2126,
CVE-2022-2129,
CVE-2022-22943,
CVE-2022-23218,
CVE-2022-23219,
CVE-2022-26280,
CVE-2022-2928,
CVE-2022-2929,
CVE-2022-29824,
CVE-2022-34903,
CVE-2022-3715,
CVE-2022-37434,
CVE-2022-37454,
CVE-2022-40768,
CVE-2022-41723,
CVE-2022-41725,
CVE-2022-42898,
CVE-2022-43750,
CVE-2022-44638,
CVE-2023-0180,
CVE-2023-0183,
CVE-2023-0184,
CVE-2023-0185,
CVE-2023-0187,
CVE-2023-0188,
CVE-2023-0189
20230322_00_00
Data di uscita |
Tipo di release |
2023-03-29 |
Self-service |
Riepilogo
Istanze coperte |
Riepilogo |
Solo istanze Redis 6.x |
Imposta la versione della patch OSS Redis su 6.2.11. La patch include le correzioni CVE CVE-2023-25155 e CVE-2022-36021. |
Tutte le istanze Redis |
Imposta la versione del sistema operativo host Redis su cos-97-16919-235-36. |
Patch di sicurezza
CVE-2023-28466,
CVE-2023-26604,
CVE-2023-25155,
CVE-2023-23931,
CVE-2023-23586,
CVE-2023-23454,
CVE-2023-1355,
CVE-2023-1264,
CVE-2023-1175,
CVE-2023-1170,
CVE-2023-1127,
CVE-2023-0512,
CVE-2023-0461,
CVE-2023-0433,
CVE-2023-0288,
CVE-2023-0286,
CVE-2023-0215,
CVE-2023-0054,
CVE-2023-0051,
CVE-2023-0049,
CVE-2022-48303,
CVE-2022-47946,
CVE-2022-47929,
CVE-2022-4696,
CVE-2022-46663,
CVE-2022-4450,
CVE-2022-43945,
CVE-2022-4378,
CVE-2022-4304,
CVE-2022-4292,
CVE-2022-42915,
CVE-2022-4285,
CVE-2022-42329,
CVE-2022-42328,
CVE-2022-4141,
CVE-2022-41222,
CVE-2022-40897,
CVE-2022-40320,
CVE-2022-40304,
CVE-2022-40303,
CVE-2022-39188,
CVE-2022-3821,
CVE-2022-3705,
CVE-2022-36946,
CVE-2022-3625,
CVE-2022-36123,
CVE-2022-36021,
CVE-2022-35977,
CVE-2022-3586,
CVE-2022-35737,
CVE-2022-35260,
CVE-2022-35252,
CVE-2022-3524,
CVE-2022-33744,
CVE-2022-33743,
CVE-2022-3352,
CVE-2022-3324,
CVE-2022-3297,
CVE-2022-3296,
CVE-2022-3278,
CVE-2022-3256,
CVE-2022-3235,
CVE-2022-3234,
CVE-2022-32296,
CVE-2022-32221,
CVE-2022-32208,
CVE-2022-32207,
CVE-2022-32206,
CVE-2022-32205,
CVE-2022-32149,
CVE-2022-3176,
CVE-2022-3169,
CVE-2022-3153,
CVE-2022-3134,
CVE-2022-3107,
CVE-2022-3104,
CVE-2022-31030,
CVE-2022-3099,
CVE-2022-30594,
CVE-2022-3037,
CVE-2022-3028,
CVE-2022-3016,
CVE-2022-30115,
CVE-2022-29869,
CVE-2022-2982,
CVE-2022-2980,
CVE-2022-2977,
CVE-2022-2959,
CVE-2022-29582,
CVE-2022-29581,
CVE-2022-2946,
CVE-2022-29458,
CVE-2022-2938,
CVE-2022-2923,
CVE-2022-29217,
CVE-2022-29162,
CVE-2022-29154,
CVE-2022-2905,
CVE-2022-28893,
CVE-2022-2889,
CVE-2022-2874,
CVE-2022-2862,
CVE-2022-2849,
CVE-2022-2845,
CVE-2022-2819,
CVE-2022-2817,
CVE-2022-2816,
CVE-2022-27782,
CVE-2022-27781,
CVE-2022-27780,
CVE-2022-27779,
CVE-2022-27778,
CVE-2022-27776,
CVE-2022-27775,
CVE-2022-27774,
CVE-2022-27666,
CVE-2022-27239,
CVE-2022-2602,
CVE-2022-2598,
CVE-2022-2581,
CVE-2022-2580,
CVE-2022-2571,
CVE-2022-2526,
CVE-2022-2522,
CVE-2022-2509,
CVE-2022-2503,
CVE-2022-24769,
CVE-2022-24448,
CVE-2022-23960,
CVE-2022-23648,
CVE-2022-23471,
CVE-2022-2345,
CVE-2022-2344,
CVE-2022-2343,
CVE-2022-23308,
CVE-2022-2327,
CVE-2022-2304,
CVE-2022-2289,
CVE-2022-2288,
CVE-2022-2287,
CVE-2022-2286,
CVE-2022-2285,
CVE-2022-2284,
CVE-2022-2264,
CVE-2022-22576,
CVE-2022-2257,
CVE-2022-2231,
CVE-2022-2210,
CVE-2022-2208,
CVE-2022-2207,
CVE-2022-2206,
CVE-2022-2183,
CVE-2022-2182,
CVE-2022-2175,
CVE-2022-21505,
CVE-2022-2097,
CVE-2022-2068,
CVE-2022-20409,
CVE-2022-1998,
CVE-2022-1786,
CVE-2022-1729,
CVE-2022-1516,
CVE-2022-1508,
CVE-2022-1353,
CVE-2022-1292,
CVE-2022-1271,
CVE-2022-1116,
CVE-2022-1055,
CVE-2022-1012,
CVE-2022-1011,
CVE-2022-0995,
CVE-2022-0943,
CVE-2022-0886,
CVE-2022-0854,
CVE-2022-0850,
CVE-2022-0847,
CVE-2022-0778,
CVE-2022-0729,
CVE-2022-0714,
CVE-2022-0696,
CVE-2022-0696,
CVE-2022-0685,
CVE-2022-0629,
CVE-2022-0617,
CVE-2022-0572,
CVE-2022-0494,
CVE-2022-0492,
CVE-2022-0443,
CVE-2022-0413,
CVE-2022-0408,
CVE-2022-0407,
CVE-2022-0393,
CVE-2022-0392,
CVE-2022-0368,
CVE-2022-0361,
CVE-2022-0359,
CVE-2022-0319,
CVE-2022-0318,
CVE-2022-0264,
CVE-2022-0261,
CVE-2022-0185,
CVE-2022-0168,
CVE-2022-0158,
CVE-2022-0156,
CVE-2022-0128,
CVE-2022-0002,
CVE-2022-0001,
CVE-2021-46848,
CVE-2021-46828,
CVE-2021-45485,
CVE-2021-45402,
CVE-2021-45346,
CVE-2021-43816,
CVE-2021-43784,
CVE-2021-43618,
CVE-2021-43527,
CVE-2021-4209,
CVE-2021-4203,
CVE-2021-4193,
CVE-2021-4192,
CVE-2021-4187,
CVE-2021-4173,
CVE-2021-4166,
CVE-2021-41617,
CVE-2021-4159,
CVE-2021-4157,
CVE-2021-4155,
CVE-2021-4154,
CVE-2021-4148,
CVE-2021-4136,
CVE-2021-41190,
CVE-2021-41103,
CVE-2021-4083,
CVE-2021-4069,
CVE-2021-40528,
CVE-2021-4037,
CVE-2021-4019,
CVE-2021-4002,
CVE-2021-4001,
CVE-2021-3984,
CVE-2021-3974,
CVE-2021-3973,
CVE-2021-3968,
CVE-2021-3928,
CVE-2021-3927,
CVE-2021-3903,
CVE-2021-3875,
CVE-2021-3872,
CVE-2021-38561,
CVE-2021-38205,
CVE-2021-3753,
CVE-2021-3743,
CVE-2021-3732,
CVE-2021-3711,
CVE-2021-3669,
CVE-2021-3580,
CVE-2021-35477,
CVE-2021-34556,
CVE-2021-33656,
CVE-2021-31879,
CVE-2021-28715,
CVE-2021-28714,
CVE-2021-26341,
CVE-2021-22926,
CVE-2021-22924,
CVE-2021-22898,
CVE-2021-22897,
CVE-2021-22890,
CVE-2021-22876,
CVE-2021-22600,
CVE-2021-22570,
CVE-2021-22543,
CVE-2021-20322,
CVE-2021-20321,
CVE-2021-20208,
CVE-2020-36516,
CVE-2020-14387,
CVE-2020-13529,
CVE-2019-9924,
CVE-2019-18276,
CVE-2019-17595,
CVE-2019-17594