Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [“Critical Patch Updates, Security Alerts and Bulletins”](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories.
**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**
This Critical Patch Update contains 391 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ April 2021 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2765149.1>).
Affected Software
CPE Name
Name
Version
oracle global lifecycle management opatch
12.2.0.1.22
oracle nosql database
20.3
oracle rest data services
20.4.3.050.1904
oracle spatial studio
19.1.0
oracle spatial studio
20.1.1
oracle sql developer (apache httpclient)
20.4.1.407.0006
oracle commerce guided search
11.3.2
oracle commerce guided search
11.3.1
oracle commerce guided search
11.3.0
oracle commerce merchandising
0
oracle commerce merchandising
11.2.0
oracle commerce merchandising
11.3.0
oracle commerce merchandising
11.3.2
oracle commerce merchandising
11.3.1
oracle commerce merchandising
11.0.0
oracle commerce merchandising
11.1
oracle communications design studio
7.4.2
oracle communications messaging server
8.0.2
oracle communications messaging server
8.1.0
oracle communications messaging server
8.1
oracle communications unified inventory management
7.3.4
oracle communications unified inventory management
7.4.1
oracle communications unified inventory management
7.3.5
oracle communications unified inventory management
7.4.0
oracle communications calendar server
8.0
oracle communications contacts server
8.0
oracle communications metasolv solution
6.3.1
oracle communications metasolv solution
6.3.0
oracle communications application session controller
3.9m0p3
oracle communications interactive session recorder
6.4
oracle communications interactive session recorder
6.3
oracle communications performance intelligence center software
10.4.0.3
oracle communications performance intelligence center software
10.4.0.2
oracle communications session border controller
8.2
oracle communications session border controller
8.3
oracle communications session border controller
8.4
oracle sd-wan edge
8.2
oracle sd-wan edge
9.0
oracle communications session router
8.4
oracle communications session router
8.2
oracle communications session router
8.3
oracle communications subscriber-aware load balancer
8.4
oracle communications subscriber-aware load balancer
8.2
oracle communications subscriber-aware load balancer
8.3
oracle enterprise communications broker
3.1
oracle enterprise communications broker
3.3
oracle enterprise communications broker
3.2
oracle sd-wan aware
8.2
oracle communications services gatekeeper
7.0
oracle communications services gatekeeper
6.0
oracle communications services gatekeeper
6.1
oracle communications converged application server - service controller
6.2
oracle communications unified session manager
8.2.5
oracle enterprise session border controller
8.2
oracle enterprise session border controller
8.3
oracle enterprise session border controller
8.4
instantis enterprisetrack
17.1
instantis enterprisetrack
17.2
instantis enterprisetrack
17.3
primavera unifier
16.1
primavera unifier
18.8
primavera unifier
16.2
primavera unifier
20.12
primavera unifier
19.12
primavera unifier
17.7
primavera gateway
17.12.0
oracle applications framework
12.2.10
oracle marketing
12.2.7
oracle email center
12.1.1
oracle email center
12.2.3
oracle istore
12.1.1
oracle istore
12.2.3
oracle knowledge management
12.1.1
oracle knowledge management
12.2.3
oracle partner management
12.2.3
oracle partner management
12.1.3
oracle trade management
12.1.1
oracle trade management
12.2.3
oracle advanced collections
12.1.1
oracle advanced collections
12.2.3
oracle advanced pricing
12.1.3
oracle application object library
12.2.3
oracle application object library
12.1.3
oracle bill presentment architecture
12.1.1
oracle bill presentment architecture
12.2.3
oracle bills of material
12.1.1
oracle cash management
12.1.1
oracle compensation workbench
12.1.1
oracle concurrent processing
12.2.3
oracle concurrent processing
12.1.3
oracle crm technical foundation
12.2.3
oracle crm technical foundation
12.1.3
oracle customers online
12.2.3
oracle customers online
12.1.3
oracle depot repair
12.1.1
oracle document management and collaboration
12.1.1
oracle document management and collaboration
12.2.3
oracle document management and collaboration
12.1.3
oracle e-business intelligence
12.1.1
oracle e-business tax
12.1.1
oracle e-business tax
12.2.3
oracle engineering
12.1.1
oracle engineering
12.2.3
oracle enterprise asset management
12.1.1
oracle enterprise asset management
12.2.3
oracle financials common modules
12.1.1
oracle general ledger
12.1.1
oracle hrms (france)
12.1.1
oracle human resources
12.1.3
oracle incentive compensation
12.2.3
oracle incentive compensation
12.1.3
oracle installed base
12.1.3
oracle isetup
12.2.3
oracle isetup
12.1.3
oracle labor distribution
12.1.1
oracle landed cost management
12.1.1
oracle landed cost management
12.2.3
oracle lease and finance management
12.1.1
oracle lease and finance management
12.2.3
oracle legal entity configurator
12.1.1
oracle loans
12.1.1
oracle mes for process manufacturing
12.1.3
oracle payables
12.1.1
oracle payables
12.2.3
oracle product hub
12.1.1
oracle product hub
12.2.3
oracle project contracts
12.1.1
oracle projects
12.1.1
oracle projects
12.2.3
oracle purchasing
12.1.3
oracle quoting
12.1.1
oracle receivables
12.1.1
oracle service contracts
12.1.1
oracle site hub
12.1.1
oracle sourcing
12.1.1
oracle subledger accounting
12.1.1
oracle time and labor
12.1.1
oracle time and labor
12.2.3
oracle transportation execution
12.1.1
oracle universal work queue
12.1.1
oracle work in process
12.2.3
oracle work in process
12.1.3
application server
12.1.3
oracle sales offline
12.1.1
oracle sales offline
12.2.3
oracle applications manager
12.2.3
oracle applications manager
12.1.3
oracle e-business suite technology stack
12.2.3
oracle e-business suite technology stack
12.1.3
oracle internet expenses
12.2.3
oracle one-to-one fulfillment
12.1.1
oracle one-to-one fulfillment
12.2.3
enterprise manager base platform
13.4.0.0
oracle application testing suite
13.3.0.1
enterprise manager ops center
12.4.0.0
enterprise manager for fusion middleware
12.2.1.4
enterprise manager for fusion middleware
12.2.1.3
enterprise manager for fusion middleware
11.1.1.9
enterprise manager for virtualization
13.4.0.0
oracle flexcube private banking
12.0.0
oracle flexcube private banking
12.1.0
oracle banking platform
2.7.0
oracle banking platform
2.8.0
oracle banking platform
2.9.0
oracle banking platform
2.6.2
oracle banking platform
2.4.0
oracle banking platform
2.7.1
oracle banking platform
2.10.0
oracle financial services analytical applications infrastructure
8.0.6
oracle flexcube direct banking
12.0.2
oracle flexcube direct banking
12.0.3
oracle hospitality res 3700
5.7.0
oracle hospitality inventory management
9.1.0
oracle business intelligence enterprise edition
12.2.1.4.0
oracle business intelligence enterprise edition
12.2.1.3.0
oracle business intelligence enterprise edition
11.1.1.9.0
oracle business intelligence enterprise edition
5.5.0.0.0
oracle fusion middleware
12.2.1.4.0
oracle fusion middleware
12.2.1.3.0
oracle fusion middleware
11.1.1.9.0
oracle platform security for java
12.2.1.4.0
oracle platform security for java
12.2.1.3.0
oracle platform security for java
11.1.1.9.0
oracle webcenter portal
12.2.1.4.0
oracle webcenter portal
12.2.1.3.0
oracle weblogic server
12.2.1.3.0
oracle weblogic server
12.1.3.0.0
oracle weblogic server
10.3.6.0.0
oracle weblogic server
14.1.1.0.0
oracle weblogic server
12.2.1.4.0
fmw platform
12.2.1.4.0
fmw platform
12.2.1.3.0
oracle bam (business activity monitoring)
12.2.1.4.0
oracle bam (business activity monitoring)
12.2.1.3.0
oracle bam (business activity monitoring)
11.1.1.9.0
oracle endeca information discovery studio
3.2.0.0
oracle outside in technology
8.5.5
oracle identity manager connector
11.1.1.5.0
oracle api gateway
11.1.2.4.0
oracle coherence
12.2.1.3.0
oracle coherence
3.7.1.0
oracle coherence
12.1.3.0.0
oracle coherence
14.1.1.0.0
oracle coherence
12.2.1.4.0
oracle enterprise repository
11.1.1.7.0
oracle fusion middleware mapviewer
12.2.1.4.0
oracle http server
12.2.1.4.0
oracle http server
12.2.1.3.0
oracle http server
11.1.1.9.0
oracle security service
12.2.1.4.0
oracle security service
12.2.1.3.0
oracle security service
11.1.1.9.0
oracle weblogic server proxy plug-in
12.2.1.4.0
oracle weblogic server proxy plug-in
12.2.1.3.0
oracle weblogic server proxy plug-in
11.1.1.9.0
oracle service bus
12.2.1.4.0
oracle service bus
12.2.1.3.0
oracle service bus
11.1.1.9.0
oracle health sciences information manager
3.0.0
oracle health sciences empirica signal
9.0
oracle health sciences empirica signal
9.1
oracle healthcare foundation
7.2.2
oracle healthcare foundation
7.3.0
oracle healthcare foundation
7.1.5
oracle healthcare foundation
8.0.1
oracle healthcare foundation
7.3.1
oracle hospitality opera 5
5.6
oracle hospitality opera 5
5.5
oracle hospitality cruise shipboard property management system
20.1.0
hyperion analytic provider services
12.2.1.4
hyperion analytic provider services
11.1.2.4
hyperion financial management
11.1.2.4
oracle ilearning
6.2
oracle ilearning
6.3
oracle insurance data gateway
1.0.2.3
oracle graalvm enterprise edition
21.0.0.2
oracle graalvm enterprise edition
19.3.5
oracle graalvm enterprise edition
20.3.1.2
java se, java se embedded, oracle graalvm enterprise edition
21.0.0.2
java se, java se embedded, oracle graalvm enterprise edition
11.0.10
java se, java se embedded, oracle graalvm enterprise edition
16
java se, java se embedded, oracle graalvm enterprise edition
8u281
java se, java se embedded, oracle graalvm enterprise edition
7u291
java se, java se embedded, oracle graalvm enterprise edition
20.3.1.2
jd edwards enterpriseone tools
9.2.5.0
jd edwards enterpriseone tools
9.2.5.3
jd edwards enterpriseone tools
9.2.4.0
jd edwards enterpriseone tools
9.2.5.2
jd edwards world security
9.4
jd edwards enterpriseone orchestrator
9.2.5.3
mysql enterprise monitor
8.0.23
mysql cluster
8.0.23
mysql server
5.7.32
mysql server
8.0.19
mysql server
5.7.29
mysql server
8.0.17
mysql server
8.0.22
mysql server
5.7.33
mysql server
8.0.23
mysql server
5.7.30
mysql workbench
8.0.23
peoplesoft enterprise pt peopletools
8.58
peoplesoft enterprise pt peopletools
8.57
peoplesoft enterprise pt peopletools
8.56
peoplesoft enterprise peopletools
8.58
peoplesoft enterprise peopletools
8.57
peoplesoft enterprise peopletools
8.56
peoplesoft enterprise fin common application objects
9.2
peoplesoft enterprise fin expenses
9.2
peoplesoft enterprise scm eprocurement
9.2
peoplesoft enterprise scm purchasing
9.2
peoplesoft enterprise cs campus community
9.2
oracle retail xstore point of service
15.0.4
oracle retail xstore point of service
16.0.6
oracle retail xstore point of service
19.0.2
oracle retail xstore point of service
18.0.3
oracle retail xstore point of service
17.0.4
oracle retail predictive application server
16.0
oracle retail predictive application server
14.1
oracle retail predictive application server
15.0
oracle retail advanced inventory planning
14.1
oracle retail assortment planning
16.0.3
oracle retail back office
14.1
oracle retail category management planning & optimization
16.0.3
oracle retail central office
14.1
oracle retail eftlink
16.0.3
oracle retail eftlink
15.0.2
oracle retail eftlink
20.0.0
oracle retail eftlink
19.0.1
oracle retail eftlink
17.0.2
oracle retail eftlink
18.0.1
oracle retail item planning
16.0.3
oracle retail macro space optimization
16.0.3
oracle retail merchandise financial planning
16.0.3
oracle retail merchandising system
16.0.3
oracle retail point-of-service
14.1
oracle retail regular price optimization
16.0.3
oracle retail replenishment optimization
16.0.3
oracle retail returns management
14.1
oracle retail sales audit
14.0
oracle retail size profile optimization
16.0.3
oracle retail store inventory management
15.0.3.5
oracle retail store inventory management
16.0.3.5
oracle retail store inventory management
14.1.3.10
oracle retail insights cloud service suite
19.0
siebel ui framework
21.0
siebel ui framework
21.2
siebel engineering - installer & deployment
21.1
siebel apps - customer order management
21.0
oracle cloud infrastructure storage gateway
1.4
oracle storage cloud software appliance
16.3.1.4.2
oracle rapid planning
12.1.3
oracle advanced supply chain planning
12.1
oracle advanced supply chain planning
12.2
agile product lifecycle management integration pack for oracle e-business suite
3.6
agile product lifecycle management integration pack for oracle e-business suite
3.5
agile product lifecycle management integration pack for sap: design to release
3.6
agile product lifecycle management integration pack for sap: design to release
3.5
oracle agile plm
9.3.6
oracle agile plm
9.3.3
oracle agile plm
9.3.5
oss support tools
2.12.41
oracle zfs storage appliance kit
8.8
oracle solaris
10
oracle solaris
11
oracle utilities framework
4.4.0.3.0
oracle utilities framework
4.2.0.3.0
oracle utilities framework
4.3.0.5.0
oracle utilities framework
4.3.0.1.0
oracle utilities framework
4.3.0.6.0
oracle utilities framework
4.2.0.2.0
oracle utilities framework
4.4.0.0.0
oracle utilities framework
4.4.0.2.0
oracle secure global desktop
5.6
oracle vm virtualbox
6.1.20
Related
{"id": "ORACLE:CPUAPR2021", "vendorId": null, "type": "oracle", "bulletinFamily": "software", "title": "Oracle Critical Patch Update Advisory - April 2021", "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [\u201cCritical Patch Updates, Security Alerts and Bulletins\u201d](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories. \n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**\n\nThis Critical Patch Update contains 391 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ April 2021 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2765149.1>).\n", "published": "2021-04-20T00:00:00", "modified": "2021-09-04T00:00:00", "epss": [{"cve": "CVE-2016-2542", "epss": 0.00042, "percentile": 0.05664, "modified": "2023-06-03"}, {"cve": "CVE-2016-5725", "epss": 0.00995, "percentile": 0.81419, "modified": "2023-06-03"}, {"cve": "CVE-2016-7103", "epss": 0.00489, "percentile": 0.72734, "modified": "2023-06-25"}, {"cve": "CVE-2017-1000061", "epss": 0.00263, "percentile": 0.63381, "modified": "2023-09-20"}, {"cve": "CVE-2017-12626", "epss": 0.02354, "percentile": 0.88251, "modified": "2023-06-23"}, {"cve": "CVE-2017-14735", "epss": 0.00303, "percentile": 0.65327, "modified": "2023-06-23"}, {"cve": "CVE-2017-18640", "epss": 0.00871, "percentile": 0.80093, "modified": "2023-06-23"}, {"cve": "CVE-2017-5645", "epss": 0.81086, "percentile": 0.97851, "modified": "2023-06-23"}, {"cve": "CVE-2018-1000180", "epss": 0.00561, "percentile": 0.74526, "modified": "2023-06-19"}, {"cve": "CVE-2018-1000613", "epss": 0.00834, "percentile": 0.7965, "modified": "2023-06-19"}, {"cve": "CVE-2018-1000632", "epss": 0.00335, "percentile": 0.67132, "modified": "2023-06-19"}, {"cve": "CVE-2018-1285", "epss": 0.00397, "percentile": 0.69793, "modified": "2023-06-23"}, {"cve": "CVE-2018-14040", "epss": 0.00863, "percentile": 0.80002, "modified": "2023-06-23"}, {"cve": "CVE-2018-14041", "epss": 0.00451, "percentile": 0.71592, "modified": "2023-06-23"}, {"cve": "CVE-2018-14042", "epss": 0.00305, "percentile": 0.65468, "modified": "2023-06-23"}, {"cve": "CVE-2018-14550", "epss": 0.00498, "percentile": 0.72959, "modified": "2023-06-23"}, {"cve": "CVE-2018-14613", "epss": 0.00102, "percentile": 0.40606, "modified": "2023-06-23"}, {"cve": "CVE-2018-16884", "epss": 0.00046, "percentile": 0.14058, "modified": "2023-08-19"}, {"cve": "CVE-2018-20843", "epss": 0.91481, "percentile": 0.98418, "modified": "2023-06-23"}, {"cve": "CVE-2018-8032", "epss": 0.00212, "percentile": 0.57979, "modified": "2023-06-23"}, {"cve": "CVE-2019-0219", "epss": 0.00323, "percentile": 0.66446, "modified": "2023-06-14"}, {"cve": "CVE-2019-0221", "epss": 0.01651, "percentile": 0.85895, "modified": "2023-07-15"}, {"cve": "CVE-2019-0227", "epss": 0.96322, "percentile": 0.99289, "modified": "2023-06-13"}, {"cve": "CVE-2019-0228", "epss": 0.00235, "percentile": 0.60366, "modified": "2023-06-14"}, {"cve": "CVE-2019-0230", "epss": 0.89027, "percentile": 0.98216, "modified": "2023-06-13"}, {"cve": "CVE-2019-0232", "epss": 0.97529, "percentile": 0.9998, "modified": "2023-06-13"}, {"cve": "CVE-2019-0233", "epss": 0.13219, "percentile": 0.9474, "modified": "2023-06-13"}, {"cve": "CVE-2019-10072", "epss": 0.31745, "percentile": 0.96389, "modified": "2023-06-13"}, {"cve": "CVE-2019-10080", "epss": 0.00114, "percentile": 0.43784, "modified": "2023-06-13"}, {"cve": "CVE-2019-10086", "epss": 0.00311, "percentile": 0.65745, "modified": "2023-06-13"}, {"cve": "CVE-2019-10098", "epss": 0.01875, "percentile": 0.86707, "modified": "2023-06-13"}, {"cve": "CVE-2019-10173", "epss": 0.94887, "percentile": 0.98906, "modified": "2023-06-13"}, {"cve": "CVE-2019-10246", "epss": 0.00642, "percentile": 0.76326, "modified": "2023-06-13"}, {"cve": "CVE-2019-10247", "epss": 0.00249, "percentile": 0.61446, "modified": "2023-06-13"}, {"cve": "CVE-2019-10638", "epss": 0.00168, "percentile": 0.52359, "modified": "2023-06-13"}, {"cve": "CVE-2019-10639", "epss": 0.00269, "percentile": 0.63057, "modified": "2023-06-13"}, {"cve": "CVE-2019-11358", "epss": 0.02952, "percentile": 0.89598, "modified": "2023-09-07"}, {"cve": "CVE-2019-11487", "epss": 0.00112, "percentile": 0.43385, "modified": "2023-06-13"}, {"cve": "CVE-2019-11599", "epss": 0.00042, "percentile": 0.00481, "modified": "2023-06-13"}, {"cve": "CVE-2019-12086", "epss": 0.00604, "percentile": 0.75969, "modified": "2023-09-20"}, {"cve": "CVE-2019-12399", "epss": 0.001, "percentile": 0.40254, "modified": "2023-06-13"}, {"cve": "CVE-2019-12402", "epss": 0.00264, "percentile": 0.63305, "modified": "2023-08-26"}, {"cve": "CVE-2019-12406", "epss": 0.00245, "percentile": 0.61168, "modified": "2023-06-13"}, {"cve": "CVE-2019-1241", "epss": 0.01462, "percentile": 0.84806, "modified": "2023-06-13"}, {"cve": "CVE-2019-12415", "epss": 0.00069, "percentile": 0.28492, "modified": "2023-06-13"}, {"cve": "CVE-2019-12419", "epss": 0.00743, "percentile": 0.78258, "modified": "2023-06-13"}, {"cve": "CVE-2019-12423", "epss": 0.00289, "percentile": 0.64456, "modified": "2023-06-13"}, {"cve": "CVE-2019-14379", "epss": 0.00876, "percentile": 0.80481, "modified": "2023-09-20"}, {"cve": "CVE-2019-14898", "epss": 0.00042, "percentile": 0.05679, "modified": "2023-06-13"}, {"cve": "CVE-2019-15218", "epss": 0.00127, "percentile": 0.46171, "modified": "2023-06-13"}, {"cve": "CVE-2019-1551", "epss": 0.00261, "percentile": 0.62477, "modified": "2023-06-13"}, {"cve": "CVE-2019-16746", "epss": 0.00581, "percentile": 0.75003, "modified": "2023-06-13"}, {"cve": "CVE-2019-16942", "epss": 0.00292, "percentile": 0.6469, "modified": "2023-06-16"}, {"cve": "CVE-2019-17075", "epss": 0.00943, "percentile": 0.80885, "modified": "2023-06-13"}, {"cve": "CVE-2019-17133", "epss": 0.00576, "percentile": 0.74887, "modified": "2023-06-13"}, {"cve": "CVE-2019-17195", "epss": 0.00581, "percentile": 0.75011, "modified": "2023-06-13"}, {"cve": "CVE-2019-17495", "epss": 0.0098, "percentile": 0.81251, "modified": "2023-06-13"}, {"cve": "CVE-2019-17566", "epss": 0.00121, "percentile": 0.4518, "modified": "2023-06-13"}, {"cve": "CVE-2019-17571", "epss": 0.97467, "percentile": 0.99931, "modified": "2023-06-13"}, {"cve": "CVE-2019-17573", "epss": 0.00212, "percentile": 0.57957, "modified": "2023-06-13"}, {"cve": "CVE-2019-17632", "epss": 0.00099, "percentile": 0.39943, "modified": "2023-06-13"}, {"cve": "CVE-2019-17638", "epss": 0.0042, "percentile": 0.70565, "modified": "2023-06-13"}, {"cve": "CVE-2019-18885", "epss": 0.00098, "percentile": 0.39661, "modified": "2023-06-13"}, {"cve": "CVE-2019-19052", "epss": 0.0077, "percentile": 0.78739, "modified": "2023-06-13"}, {"cve": "CVE-2019-19063", "epss": 0.00118, "percentile": 0.44601, "modified": "2023-06-13"}, {"cve": "CVE-2019-19066", "epss": 0.00046, "percentile": 0.14036, "modified": "2023-06-13"}, {"cve": "CVE-2019-19073", "epss": 0.00158, "percentile": 0.51153, "modified": "2023-06-13"}, {"cve": "CVE-2019-19074", "epss": 0.02963, "percentile": 0.89441, "modified": "2023-06-13"}, {"cve": "CVE-2019-19078", "epss": 0.00696, "percentile": 0.7743, "modified": "2023-06-13"}, {"cve": "CVE-2019-19535", "epss": 0.00087, "percentile": 0.35367, "modified": "2023-06-13"}, {"cve": "CVE-2019-19922", "epss": 0.00078, "percentile": 0.31964, "modified": "2023-06-13"}, {"cve": "CVE-2019-20812", "epss": 0.00045, "percentile": 0.12132, "modified": "2023-06-13"}, {"cve": "CVE-2019-2904", "epss": 0.13095, "percentile": 0.94721, "modified": "2023-06-13"}, {"cve": "CVE-2019-3738", "epss": 0.0026, "percentile": 0.62404, "modified": "2023-06-13"}, {"cve": "CVE-2019-3739", "epss": 0.0027, "percentile": 0.63112, "modified": "2023-06-13"}, {"cve": "CVE-2019-3740", "epss": 0.0027, "percentile": 0.63112, "modified": "2023-06-13"}, {"cve": "CVE-2019-3773", "epss": 0.00636, "percentile": 0.7614, "modified": "2023-06-13"}, {"cve": "CVE-2019-3874", "epss": 0.00222, "percentile": 0.59261, "modified": "2023-06-13"}, {"cve": "CVE-2019-3900", "epss": 0.00184, "percentile": 0.54374, "modified": "2023-06-13"}, {"cve": "CVE-2019-5063", "epss": 0.14414, "percentile": 0.94928, "modified": "2023-06-13"}, {"cve": "CVE-2019-5064", "epss": 0.03184, "percentile": 0.89766, "modified": "2023-06-13"}, {"cve": "CVE-2019-5108", "epss": 0.00119, "percentile": 0.44939, "modified": "2023-06-13"}, {"cve": "CVE-2019-7317", "epss": 0.00545, "percentile": 0.74158, "modified": "2023-06-13"}, {"cve": "CVE-2019-8331", "epss": 0.00259, "percentile": 0.62339, "modified": "2023-06-13"}, {"cve": "CVE-2020-10188", "epss": 0.93609, "percentile": 0.98692, "modified": "2023-06-24"}, {"cve": "CVE-2020-10543", "epss": 0.00299, "percentile": 0.6503, "modified": "2023-06-06"}, {"cve": "CVE-2020-10683", "epss": 0.00261, "percentile": 0.62434, "modified": "2023-06-06"}, {"cve": "CVE-2020-10751", "epss": 0.0005, "percentile": 0.17022, "modified": "2023-06-06"}, {"cve": "CVE-2020-10769", "epss": 0.00042, "percentile": 0.05671, "modified": "2023-06-06"}, {"cve": "CVE-2020-10878", "epss": 0.00274, "percentile": 0.63366, "modified": "2023-06-06"}, {"cve": "CVE-2020-11022", "epss": 0.04523, "percentile": 0.91461, "modified": "2023-09-07"}, {"cve": "CVE-2020-11023", "epss": 0.00572, "percentile": 0.75158, "modified": "2023-09-07"}, {"cve": "CVE-2020-11612", "epss": 0.00623, "percentile": 0.75879, "modified": "2023-06-06"}, {"cve": "CVE-2020-11655", "epss": 0.01249, "percentile": 0.83588, "modified": "2023-06-06"}, {"cve": "CVE-2020-11656", "epss": 0.0079, "percentile": 0.79099, "modified": "2023-06-06"}, {"cve": "CVE-2020-11973", "epss": 0.01072, "percentile": 0.82145, "modified": "2023-06-06"}, {"cve": "CVE-2020-11979", "epss": 0.00189, "percentile": 0.55104, "modified": "2023-06-06"}, {"cve": "CVE-2020-11987", "epss": 0.00075, "percentile": 0.30587, "modified": "2023-06-06"}, {"cve": "CVE-2020-11994", "epss": 0.00079, "percentile": 0.32611, "modified": "2023-06-06"}, {"cve": "CVE-2020-11998", "epss": 0.00271, "percentile": 0.63135, "modified": "2023-06-06"}, {"cve": "CVE-2020-12114", "epss": 0.00044, "percentile": 0.0828, "modified": "2023-06-06"}, {"cve": "CVE-2020-12723", "epss": 0.00319, "percentile": 0.66188, "modified": "2023-06-06"}, {"cve": "CVE-2020-12771", "epss": 0.00054, "percentile": 0.19812, "modified": "2023-06-06"}, {"cve": "CVE-2020-13434", "epss": 0.00063, "percentile": 0.25071, "modified": "2023-06-06"}, {"cve": "CVE-2020-13435", "epss": 0.00106, "percentile": 0.41868, "modified": "2023-06-06"}, {"cve": "CVE-2020-13871", "epss": 0.01046, "percentile": 0.81876, "modified": "2023-06-06"}, {"cve": "CVE-2020-13934", "epss": 0.9514, "percentile": 0.98953, "modified": "2023-06-06"}, {"cve": "CVE-2020-13935", "epss": 0.39531, "percentile": 0.96705, "modified": "2023-06-06"}, {"cve": "CVE-2020-13943", "epss": 0.00102, "percentile": 0.40542, "modified": "2023-06-06"}, {"cve": "CVE-2020-13954", "epss": 0.95087, "percentile": 0.98943, "modified": "2023-06-06"}, {"cve": "CVE-2020-13956", "epss": 0.00124, "percentile": 0.45606, "modified": "2023-06-06"}, {"cve": "CVE-2020-14039", "epss": 0.00257, "percentile": 0.62125, "modified": "2023-06-06"}, {"cve": "CVE-2020-14060", "epss": 0.39335, "percentile": 0.96701, "modified": "2023-06-06"}, {"cve": "CVE-2020-14061", "epss": 0.02076, "percentile": 0.87446, "modified": "2023-06-06"}, {"cve": "CVE-2020-14062", "epss": 0.04035, "percentile": 0.90806, "modified": "2023-06-06"}, {"cve": "CVE-2020-14195", "epss": 0.02609, "percentile": 0.88788, "modified": "2023-06-06"}, {"cve": "CVE-2020-1472", "epss": 0.9732, "percentile": 0.9979, "modified": "2023-06-06"}, {"cve": "CVE-2020-15358", "epss": 0.00078, "percentile": 0.32289, "modified": "2023-06-06"}, {"cve": "CVE-2020-15586", "epss": 0.00496, "percentile": 0.72812, "modified": "2023-06-06"}, {"cve": "CVE-2020-16166", "epss": 0.00168, "percentile": 0.52206, "modified": "2023-06-06"}, {"cve": "CVE-2020-16845", "epss": 0.00496, "percentile": 0.72812, "modified": "2023-06-06"}, {"cve": "CVE-2020-17521", "epss": 0.00051, "percentile": 0.1765, "modified": "2023-06-06"}, {"cve": "CVE-2020-17527", "epss": 0.00219, "percentile": 0.58524, "modified": "2023-06-06"}, {"cve": "CVE-2020-17530", "epss": 0.97014, "percentile": 0.99594, "modified": "2023-06-06"}, {"cve": "CVE-2020-1927", "epss": 0.00138, "percentile": 0.48028, "modified": "2023-06-06"}, {"cve": "CVE-2020-1941", "epss": 0.00165, "percentile": 0.51922, "modified": "2023-06-06"}, {"cve": "CVE-2020-1945", "epss": 0.00062, "percentile": 0.24513, "modified": "2023-06-06"}, {"cve": "CVE-2020-1967", "epss": 0.33995, "percentile": 0.96458, "modified": "2023-06-06"}, {"cve": "CVE-2020-1968", "epss": 0.00422, "percentile": 0.70548, "modified": "2023-06-06"}, {"cve": "CVE-2020-1971", "epss": 0.00318, "percentile": 0.66102, "modified": "2023-06-06"}, {"cve": "CVE-2020-24394", "epss": 0.00049, "percentile": 0.16331, "modified": "2023-06-06"}, {"cve": "CVE-2020-24553", "epss": 0.00362, "percentile": 0.68259, "modified": "2023-06-06"}, {"cve": "CVE-2020-24616", "epss": 0.00457, "percentile": 0.72303, "modified": "2023-09-20"}, {"cve": "CVE-2020-24750", "epss": 0.00535, "percentile": 0.74365, "modified": "2023-09-20"}, {"cve": "CVE-2020-25649", "epss": 0.0014, "percentile": 0.48471, "modified": "2023-06-06"}, {"cve": "CVE-2020-26217", "epss": 0.97456, "percentile": 0.99916, "modified": "2023-06-06"}, {"cve": "CVE-2020-26418", "epss": 0.00269, "percentile": 0.63041, "modified": "2023-06-06"}, {"cve": "CVE-2020-26419", "epss": 0.00165, "percentile": 0.51953, "modified": "2023-06-06"}, {"cve": "CVE-2020-26420", "epss": 0.00165, "percentile": 0.51953, "modified": "2023-06-06"}, {"cve": "CVE-2020-26421", "epss": 0.00157, "percentile": 0.50928, "modified": "2023-06-06"}, {"cve": "CVE-2020-26422", "epss": 0.00148, "percentile": 0.49719, "modified": "2023-06-06"}, {"cve": "CVE-2020-27193", "epss": 0.00214, "percentile": 0.58146, "modified": "2023-06-06"}, {"cve": "CVE-2020-27216", "epss": 0.00052, "percentile": 0.18335, "modified": "2023-06-06"}, {"cve": "CVE-2020-27218", "epss": 0.00302, "percentile": 0.65138, "modified": "2023-06-06"}, {"cve": "CVE-2020-27223", "epss": 0.0095, "percentile": 0.8097, "modified": "2023-06-06"}, {"cve": "CVE-2020-27841", "epss": 0.00087, "percentile": 0.35453, "modified": "2023-06-06"}, {"cve": "CVE-2020-27842", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-27843", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-27844", "epss": 0.0009, "percentile": 0.37327, "modified": "2023-06-06"}, {"cve": "CVE-2020-27845", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-28052", "epss": 0.00224, "percentile": 0.59332, "modified": "2023-06-06"}, {"cve": "CVE-2020-28196", "epss": 0.00375, "percentile": 0.68812, "modified": "2023-06-06"}, {"cve": "CVE-2020-35490", "epss": 0.00184, "percentile": 0.54373, "modified": "2023-06-06"}, {"cve": "CVE-2020-35491", "epss": 0.00184, "percentile": 0.54373, "modified": "2023-06-06"}, {"cve": "CVE-2020-35728", "epss": 0.00367, "percentile": 0.68479, "modified": "2023-06-06"}, {"cve": "CVE-2020-36179", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36180", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36181", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36182", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36183", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36184", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36185", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36186", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36187", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36188", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36189", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-5359", "epss": 0.00124, "percentile": 0.45708, "modified": "2023-06-06"}, {"cve": "CVE-2020-5360", "epss": 0.0013, "percentile": 0.46656, "modified": "2023-06-06"}, {"cve": "CVE-2020-5398", "epss": 0.97084, "percentile": 0.99632, "modified": "2023-06-06"}, {"cve": "CVE-2020-5407", "epss": 0.00609, "percentile": 0.75595, "modified": "2023-06-06"}, {"cve": "CVE-2020-5408", "epss": 0.00191, "percentile": 0.55304, "modified": "2023-06-06"}, {"cve": "CVE-2020-5413", "epss": 0.0029, "percentile": 0.64513, "modified": "2023-06-06"}, {"cve": "CVE-2020-5421", "epss": 0.92524, "percentile": 0.98494, "modified": "2023-06-06"}, {"cve": "CVE-2020-7059", "epss": 0.00307, "percentile": 0.6552, "modified": "2023-06-06"}, {"cve": "CVE-2020-7060", "epss": 0.00324, "percentile": 0.66417, "modified": "2023-06-06"}, {"cve": "CVE-2020-7069", "epss": 0.00187, "percentile": 0.54843, "modified": "2023-06-06"}, {"cve": "CVE-2020-7760", "epss": 0.01368, "percentile": 0.84324, "modified": "2023-06-06"}, {"cve": "CVE-2020-7774", "epss": 0.45473, "percentile": 0.96866, "modified": "2023-06-06"}, {"cve": "CVE-2020-7919", "epss": 0.00824, "percentile": 0.79533, "modified": "2023-06-06"}, {"cve": "CVE-2020-8203", "epss": 0.01036, "percentile": 0.81779, "modified": "2023-06-06"}, {"cve": "CVE-2020-8277", "epss": 0.00537, "percentile": 0.73929, "modified": "2023-06-06"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49635, "modified": "2023-06-06"}, {"cve": "CVE-2020-8285", "epss": 0.0045, "percentile": 0.71446, "modified": "2023-06-06"}, {"cve": "CVE-2020-8286", "epss": 0.0026, "percentile": 0.62359, "modified": "2023-06-06"}, {"cve": "CVE-2020-8908", "epss": 0.0006, "percentile": 0.23333, "modified": "2023-08-06"}, {"cve": "CVE-2020-9281", "epss": 0.00145, "percentile": 0.49211, "modified": "2023-06-06"}, {"cve": "CVE-2020-9327", "epss": 0.00817, "percentile": 0.79439, "modified": "2023-06-06"}, {"cve": "CVE-2020-9480", "epss": 0.06434, "percentile": 0.9262, "modified": "2023-06-06"}, {"cve": "CVE-2020-9484", "epss": 0.97336, "percentile": 0.99807, "modified": "2023-06-06"}, {"cve": "CVE-2020-9488", "epss": 0.0026, "percentile": 0.62378, "modified": "2023-06-06"}, {"cve": "CVE-2020-9489", "epss": 0.00055, "percentile": 0.20866, "modified": "2023-06-06"}, {"cve": "CVE-2021-2008", "epss": 0.00071, "percentile": 0.2919, "modified": "2023-05-27"}, {"cve": "CVE-2021-20227", "epss": 0.00065, "percentile": 0.26894, "modified": "2023-05-27"}, {"cve": "CVE-2021-2053", "epss": 0.00092, "percentile": 0.38271, "modified": "2023-05-27"}, {"cve": "CVE-2021-21290", "epss": 0.00045, "percentile": 0.12546, "modified": "2023-05-27"}, {"cve": "CVE-2021-2134", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-21345", "epss": 0.50925, "percentile": 0.97, "modified": "2023-05-27"}, {"cve": "CVE-2021-2135", "epss": 0.056, "percentile": 0.92083, "modified": "2023-05-27"}, {"cve": "CVE-2021-2136", "epss": 0.056, "percentile": 0.92083, "modified": "2023-05-27"}, {"cve": "CVE-2021-2140", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2141", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2142", "epss": 0.00098, "percentile": 0.39728, "modified": "2023-05-27"}, {"cve": "CVE-2021-2144", "epss": 0.00103, "percentile": 0.40801, "modified": "2023-05-27"}, {"cve": "CVE-2021-2145", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2146", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2147", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2149", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2150", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2151", "epss": 0.00071, "percentile": 0.28874, "modified": "2023-05-27"}, {"cve": "CVE-2021-2152", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2153", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2154", "epss": 0.00124, "percentile": 0.4561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2155", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2156", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2157", "epss": 0.01577, "percentile": 0.85383, "modified": "2023-05-27"}, {"cve": "CVE-2021-2158", "epss": 0.00053, "percentile": 0.18982, "modified": "2023-05-27"}, {"cve": "CVE-2021-2159", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2160", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2161", "epss": 0.00085, "percentile": 0.34689, "modified": "2023-05-27"}, {"cve": "CVE-2021-2162", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2163", "epss": 0.00114, "percentile": 0.43667, "modified": "2023-05-27"}, {"cve": "CVE-2021-2164", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2166", "epss": 0.00231, "percentile": 0.59808, "modified": "2023-05-27"}, {"cve": "CVE-2021-2167", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2169", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2170", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2171", "epss": 0.00155, "percentile": 0.50623, "modified": "2023-05-27"}, {"cve": "CVE-2021-2172", "epss": 0.0029, "percentile": 0.64423, "modified": "2023-05-27"}, {"cve": "CVE-2021-2173", "epss": 0.0009, "percentile": 0.37192, "modified": "2023-05-27"}, {"cve": "CVE-2021-2174", "epss": 0.00155, "percentile": 0.50623, "modified": "2023-05-27"}, {"cve": "CVE-2021-2175", "epss": 0.00712, "percentile": 0.77662, "modified": "2023-05-27"}, {"cve": "CVE-2021-2177", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2178", "epss": 0.0029, "percentile": 0.64423, "modified": "2023-05-27"}, {"cve": "CVE-2021-2179", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2180", "epss": 0.00124, "percentile": 0.4561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2181", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2182", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2183", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2184", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2185", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2186", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2187", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2188", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2189", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2190", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2191", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2192", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2193", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2194", "epss": 0.0015, "percentile": 0.49979, "modified": "2023-05-27"}, {"cve": "CVE-2021-2195", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2196", "epss": 0.00168, "percentile": 0.52217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2197", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2198", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2199", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2200", "epss": 0.00167, "percentile": 0.52131, "modified": "2023-05-27"}, {"cve": "CVE-2021-2201", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2202", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2203", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2204", "epss": 0.0014, "percentile": 0.48384, "modified": "2023-05-27"}, {"cve": "CVE-2021-2205", "epss": 0.00167, "percentile": 0.52131, "modified": "2023-05-27"}, {"cve": "CVE-2021-2206", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2207", "epss": 0.00045, "percentile": 0.12384, "modified": "2023-09-10"}, {"cve": "CVE-2021-2208", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2209", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2210", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2211", "epss": 0.03637, "percentile": 0.90318, "modified": "2023-05-27"}, {"cve": "CVE-2021-22112", "epss": 0.00397, "percentile": 0.69665, "modified": "2023-05-27"}, {"cve": "CVE-2021-2212", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2213", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2214", "epss": 0.00192, "percentile": 0.55306, "modified": "2023-05-27"}, {"cve": "CVE-2021-2215", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2216", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2217", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-22173", "epss": 0.00197, "percentile": 0.56159, "modified": "2023-05-27"}, {"cve": "CVE-2021-22174", "epss": 0.00197, "percentile": 0.56159, "modified": "2023-05-27"}, {"cve": "CVE-2021-2218", "epss": 0.00071, "percentile": 0.2919, "modified": "2023-05-27"}, {"cve": "CVE-2021-2219", "epss": 0.00053, "percentile": 0.18982, "modified": "2023-05-27"}, {"cve": "CVE-2021-22191", "epss": 0.00461, "percentile": 0.71752, "modified": "2023-05-27"}, {"cve": "CVE-2021-2220", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2221", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2222", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2223", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2224", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2225", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2226", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2227", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2228", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2229", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2230", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2231", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2232", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2233", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2234", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2235", "epss": 0.00061, "percentile": 0.24063, "modified": "2023-05-27"}, {"cve": "CVE-2021-2236", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2237", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2238", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2239", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2240", "epss": 0.00071, "percentile": 0.2919, "modified": "2023-05-27"}, {"cve": "CVE-2021-2241", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2242", "epss": 0.00077, "percentile": 0.31432, "modified": "2023-05-27"}, {"cve": "CVE-2021-2244", "epss": 0.02117, "percentile": 0.87562, "modified": "2023-05-27"}, {"cve": "CVE-2021-2245", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2246", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2247", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2248", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2249", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2250", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2251", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2252", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2253", "epss": 0.00167, "percentile": 0.52131, "modified": "2023-05-27"}, {"cve": "CVE-2021-2254", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2255", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2256", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2257", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2258", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2259", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2260", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2261", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2262", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2263", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2264", "epss": 0.00052, "percentile": 0.18217, "modified": "2023-05-27"}, {"cve": "CVE-2021-2266", "epss": 0.00059, "percentile": 0.22772, "modified": "2023-05-27"}, {"cve": "CVE-2021-2267", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2268", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2269", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2270", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2271", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2272", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2273", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2274", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2275", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2276", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2277", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2278", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2279", "epss": 0.03154, "percentile": 0.89688, "modified": "2023-05-27"}, {"cve": "CVE-2021-2280", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2281", "epss": 0.00059, "percentile": 0.22935, "modified": "2023-05-27"}, {"cve": "CVE-2021-2282", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2283", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2284", "epss": 0.00059, "percentile": 0.22935, "modified": "2023-05-27"}, {"cve": "CVE-2021-2285", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2286", "epss": 0.00059, "percentile": 0.22935, "modified": "2023-05-27"}, {"cve": "CVE-2021-2287", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2288", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-22883", "epss": 0.00315, "percentile": 0.65881, "modified": "2023-05-27"}, {"cve": "CVE-2021-22884", "epss": 0.00222, "percentile": 0.59163, "modified": "2023-05-27"}, {"cve": "CVE-2021-2289", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2290", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2291", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2292", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2293", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2294", "epss": 0.00129, "percentile": 0.46521, "modified": "2023-05-27"}, {"cve": "CVE-2021-2295", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2296", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2297", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2298", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2299", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2300", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2301", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2302", "epss": 0.66973, "percentile": 0.97426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2303", "epss": 0.0362, "percentile": 0.90304, "modified": "2023-05-27"}, {"cve": "CVE-2021-2304", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2305", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2306", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2307", "epss": 0.00074, "percentile": 0.30426, "modified": "2023-05-27"}, {"cve": "CVE-2021-2308", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2309", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2310", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2311", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2312", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2314", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2315", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2316", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2317", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2318", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2319", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2320", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2321", "epss": 0.00058, "percentile": 0.22633, "modified": "2023-05-27"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.50451, "modified": "2023-09-20"}, {"cve": "CVE-2021-23839", "epss": 0.00174, "percentile": 0.53114, "modified": "2023-05-27"}, {"cve": "CVE-2021-23840", "epss": 0.00316, "percentile": 0.65984, "modified": "2023-05-27"}, {"cve": "CVE-2021-23841", "epss": 0.00299, "percentile": 0.64929, "modified": "2023-05-27"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64564, "modified": "2023-05-23"}, {"cve": "CVE-2021-3450", "epss": 0.00192, "percentile": 0.5586, "modified": "2023-08-06"}], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 6.0}, "href": "https://www.oracle.com/security-alerts/cpuapr2021.html", "reporter": "Oracle", "references": [], "cvelist": ["CVE-2016-2542", "CVE-2016-5725", "CVE-2016-7103", "CVE-2017-1000061", "CVE-2017-12626", "CVE-2017-14735", "CVE-2017-18640", "CVE-2017-5645", "CVE-2018-1000180", "CVE-2018-1000613", "CVE-2018-1000632", "CVE-2018-1285", "CVE-2018-14040", "CVE-2018-14041", "CVE-2018-14042", "CVE-2018-14550", "CVE-2018-14613", "CVE-2018-16884", "CVE-2018-20843", "CVE-2018-8032", "CVE-2019-0219", "CVE-2019-0221", "CVE-2019-0227", "CVE-2019-0228", "CVE-2019-0230", "CVE-2019-0232", "CVE-2019-0233", "CVE-2019-10072", "CVE-2019-10080", "CVE-2019-10086", "CVE-2019-10098", "CVE-2019-10173", "CVE-2019-10246", "CVE-2019-10247", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11358", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12086", "CVE-2019-12399", "CVE-2019-12402", "CVE-2019-12406", "CVE-2019-1241", "CVE-2019-12415", "CVE-2019-12419", "CVE-2019-12423", "CVE-2019-14379", "CVE-2019-14898", "CVE-2019-15218", "CVE-2019-1551", "CVE-2019-16746", "CVE-2019-16942", "CVE-2019-17075", "CVE-2019-17133", "CVE-2019-17195", "CVE-2019-17495", "CVE-2019-17566", "CVE-2019-17571", "CVE-2019-17573", "CVE-2019-17632", "CVE-2019-17638", "CVE-2019-18885", "CVE-2019-19052", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19078", "CVE-2019-19535", "CVE-2019-19922", "CVE-2019-20812", "CVE-2019-2904", "CVE-2019-3738", "CVE-2019-3739", "CVE-2019-3740", "CVE-2019-3773", "CVE-2019-3874", "CVE-2019-3900", "CVE-2019-5063", "CVE-2019-5064", "CVE-2019-5108", "CVE-2019-5428", "CVE-2019-7317", "CVE-2019-8331", "CVE-2020-10188", "CVE-2020-10543", "CVE-2020-10683", "CVE-2020-10751", "CVE-2020-10769", "CVE-2020-10878", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11612", "CVE-2020-11655", "CVE-2020-11656", "CVE-2020-11973", "CVE-2020-11979", "CVE-2020-11987", "CVE-2020-11994", "CVE-2020-11998", "CVE-2020-12114", "CVE-2020-12723", "CVE-2020-12771", "CVE-2020-13434", "CVE-2020-13435", "CVE-2020-13871", "CVE-2020-13934", "CVE-2020-13935", "CVE-2020-13943", "CVE-2020-13954", "CVE-2020-13956", "CVE-2020-14039", "CVE-2020-14060", "CVE-2020-14061", "CVE-2020-14062", "CVE-2020-14195", "CVE-2020-1472", "CVE-2020-15358", "CVE-2020-15586", "CVE-2020-16166", "CVE-2020-16845", "CVE-2020-17521", "CVE-2020-17527", "CVE-2020-17530", "CVE-2020-1927", "CVE-2020-1941", "CVE-2020-1945", "CVE-2020-1967", "CVE-2020-1968", "CVE-2020-1971", "CVE-2020-24394", "CVE-2020-24553", "CVE-2020-24616", "CVE-2020-24750", "CVE-2020-25649", "CVE-2020-26217", "CVE-2020-26418", "CVE-2020-26419", "CVE-2020-26420", "CVE-2020-26421", "CVE-2020-26422", "CVE-2020-27193", "CVE-2020-27216", "CVE-2020-27218", "CVE-2020-27223", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28052", "CVE-2020-28196", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5359", "CVE-2020-5360", "CVE-2020-5398", "CVE-2020-5407", "CVE-2020-5408", "CVE-2020-5413", "CVE-2020-5421", "CVE-2020-7059", "CVE-2020-7060", "CVE-2020-7069", "CVE-2020-7760", "CVE-2020-7774", "CVE-2020-7919", "CVE-2020-8203", "CVE-2020-8277", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8908", "CVE-2020-9281", "CVE-2020-9327", "CVE-2020-9480", "CVE-2020-9484", "CVE-2020-9488", "CVE-2020-9489", "CVE-2021-2008", "CVE-2021-20227", "CVE-2021-2053", "CVE-2021-21290", "CVE-2021-2134", "CVE-2021-21345", "CVE-2021-2135", "CVE-2021-2136", "CVE-2021-2140", "CVE-2021-2141", "CVE-2021-2142", "CVE-2021-2144", "CVE-2021-2145", "CVE-2021-2146", "CVE-2021-2147", "CVE-2021-2149", "CVE-2021-2150", "CVE-2021-2151", "CVE-2021-2152", "CVE-2021-2153", "CVE-2021-2154", "CVE-2021-2155", "CVE-2021-2156", "CVE-2021-2157", "CVE-2021-2158", "CVE-2021-2159", "CVE-2021-2160", "CVE-2021-2161", "CVE-2021-2162", "CVE-2021-2163", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2167", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2173", "CVE-2021-2174", "CVE-2021-2175", "CVE-2021-2177", "CVE-2021-2178", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2181", "CVE-2021-2182", "CVE-2021-2183", "CVE-2021-2184", "CVE-2021-2185", "CVE-2021-2186", "CVE-2021-2187", "CVE-2021-2188", "CVE-2021-2189", "CVE-2021-2190", "CVE-2021-2191", "CVE-2021-2192", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2195", "CVE-2021-2196", "CVE-2021-2197", "CVE-2021-2198", "CVE-2021-2199", "CVE-2021-2200", "CVE-2021-2201", "CVE-2021-2202", "CVE-2021-2203", "CVE-2021-2204", "CVE-2021-2205", "CVE-2021-2206", "CVE-2021-2207", "CVE-2021-2208", "CVE-2021-2209", "CVE-2021-2210", "CVE-2021-2211", "CVE-2021-22112", "CVE-2021-2212", "CVE-2021-2213", "CVE-2021-2214", "CVE-2021-2215", "CVE-2021-2216", "CVE-2021-2217", "CVE-2021-22173", "CVE-2021-22174", "CVE-2021-2218", "CVE-2021-2219", "CVE-2021-22191", "CVE-2021-2220", "CVE-2021-2221", "CVE-2021-2222", "CVE-2021-2223", "CVE-2021-2224", "CVE-2021-2225", "CVE-2021-2226", "CVE-2021-2227", "CVE-2021-2228", "CVE-2021-2229", "CVE-2021-2230", "CVE-2021-2231", "CVE-2021-2232", "CVE-2021-2233", "CVE-2021-2234", "CVE-2021-2235", "CVE-2021-2236", "CVE-2021-2237", "CVE-2021-2238", "CVE-2021-2239", "CVE-2021-2240", "CVE-2021-2241", "CVE-2021-2242", "CVE-2021-2244", "CVE-2021-2245", "CVE-2021-2246", "CVE-2021-2247", "CVE-2021-2248", "CVE-2021-2249", "CVE-2021-2250", "CVE-2021-2251", "CVE-2021-2252", "CVE-2021-2253", "CVE-2021-2254", "CVE-2021-2255", "CVE-2021-2256", "CVE-2021-2257", "CVE-2021-2258", "CVE-2021-2259", "CVE-2021-2260", "CVE-2021-2261", "CVE-2021-2262", "CVE-2021-2263", "CVE-2021-2264", "CVE-2021-2266", "CVE-2021-2267", "CVE-2021-2268", "CVE-2021-2269", "CVE-2021-2270", "CVE-2021-2271", "CVE-2021-2272", "CVE-2021-2273", "CVE-2021-2274", "CVE-2021-2275", "CVE-2021-2276", "CVE-2021-2277", "CVE-2021-2278", "CVE-2021-2279", "CVE-2021-2280", "CVE-2021-2281", "CVE-2021-2282", "CVE-2021-2283", "CVE-2021-2284", "CVE-2021-2285", "CVE-2021-2286", "CVE-2021-2287", "CVE-2021-2288", "CVE-2021-22883", "CVE-2021-22884", "CVE-2021-2289", "CVE-2021-2290", "CVE-2021-2291", "CVE-2021-2292", "CVE-2021-2293", "CVE-2021-2294", "CVE-2021-2295", "CVE-2021-2296", "CVE-2021-2297", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2302", "CVE-2021-2303", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2306", "CVE-2021-2307", "CVE-2021-2308", "CVE-2021-2309", "CVE-2021-2310", "CVE-2021-2311", "CVE-2021-2312", "CVE-2021-2314", "CVE-2021-2315", "CVE-2021-2316", "CVE-2021-2317", "CVE-2021-2318", "CVE-2021-2319", "CVE-2021-2320", "CVE-2021-2321", "CVE-2021-23336", "CVE-2021-23839", "CVE-2021-23840", "CVE-2021-23841", "CVE-2021-3449", "CVE-2021-3450"], "immutableFields": [], "lastseen": "2023-09-21T08:23:06", "viewCount": 556, "enchantments": {"dependencies": {"references": [{"type": "adobe", "idList": ["APSB19-38"]}, {"type": "aix", "idList": ["JAVA_DEC2022_ADVISORY.ASC", "JAVA_JULY2019_ADVISORY.ASC", "OPENSSL_ADVISORY32.ASC", "OPENSSL_ADVISORY33.ASC", "PERL_ADVISORY5.ASC"]}, {"type": "almalinux", "idList": ["ALSA-2020:1644", "ALSA-2020:3662", "ALSA-2020:4431", "ALSA-2020:4442", "ALSA-2020:4484", "ALSA-2020:4670", "ALSA-2020:4751", "ALSA-2020:4807", "ALSA-2020:4846", "ALSA-2020:4847", "ALSA-2020:5476", "ALSA-2020:5493", "ALSA-2020:5499", "ALSA-2021:0548", "ALSA-2021:0551", "ALSA-2021:0557", "ALSA-2021:0734", "ALSA-2021:0735", "ALSA-2021:0744", "ALSA-2021:1024", "ALSA-2021:1301", "ALSA-2021:1307", "ALSA-2021:1578", "ALSA-2021:1581", "ALSA-2021:1593", "ALSA-2021:1610", "ALSA-2021:1633", "ALSA-2021:1647", "ALSA-2021:1678", "ALSA-2021:1846", "ALSA-2021:1968", "ALSA-2021:3590", "ALSA-2021:4142", "ALSA-2021:4151", "ALSA-2021:4162", "ALSA-2021:4198", "ALSA-2021:4213", "ALSA-2021:4251", "ALSA-2021:4396", "ALSA-2021:4424", "ALSA-2022:1556", "ALSA-2022:1557", "ALSA-2022:1860", "ALSA-2022:1861"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2016-7103", "ALPINE:CVE-2018-14550", "ALPINE:CVE-2018-20843", "ALPINE:CVE-2019-10098", "ALPINE:CVE-2019-11358", "ALPINE:CVE-2019-1551", "ALPINE:CVE-2019-7317", "ALPINE:CVE-2020-10543", "ALPINE:CVE-2020-10878", "ALPINE:CVE-2020-11022", "ALPINE:CVE-2020-11023", "ALPINE:CVE-2020-11655", "ALPINE:CVE-2020-11656", "ALPINE:CVE-2020-11979", "ALPINE:CVE-2020-12723", "ALPINE:CVE-2020-13434", "ALPINE:CVE-2020-13435", "ALPINE:CVE-2020-1472", "ALPINE:CVE-2020-15358", "ALPINE:CVE-2020-15586", "ALPINE:CVE-2020-16845", "ALPINE:CVE-2020-1927", "ALPINE:CVE-2020-1945", "ALPINE:CVE-2020-1967", "ALPINE:CVE-2020-1971", "ALPINE:CVE-2020-24553", "ALPINE:CVE-2020-26418", "ALPINE:CVE-2020-26419", "ALPINE:CVE-2020-26420", "ALPINE:CVE-2020-26421", "ALPINE:CVE-2020-26422", "ALPINE:CVE-2020-27844", "ALPINE:CVE-2020-28196", "ALPINE:CVE-2020-7059", "ALPINE:CVE-2020-7060", "ALPINE:CVE-2020-7069", "ALPINE:CVE-2020-7774", "ALPINE:CVE-2020-7919", "ALPINE:CVE-2020-8277", "ALPINE:CVE-2020-8284", "ALPINE:CVE-2020-8285", "ALPINE:CVE-2020-8286", "ALPINE:CVE-2021-20227", "ALPINE:CVE-2021-2154", "ALPINE:CVE-2021-2161", "ALPINE:CVE-2021-2163", "ALPINE:CVE-2021-2166", "ALPINE:CVE-2021-22173", "ALPINE:CVE-2021-22174", "ALPINE:CVE-2021-22191", "ALPINE:CVE-2021-22883", "ALPINE:CVE-2021-22884", "ALPINE:CVE-2021-23336", "ALPINE:CVE-2021-23839", "ALPINE:CVE-2021-23840", "ALPINE:CVE-2021-23841", "ALPINE:CVE-2021-3449", "ALPINE:CVE-2021-3450"]}, {"type": "altlinux", "idList": ["00444F43642C910CC7CBC1EB5B8C06F7", "097046D930F8F95C9F2A481ABB5024BD", "19D9D4CF9E621238B64E7009C574A2B2", "1E1894CCC7195BF40E6FE3F3E3556D61", "21DE67DB284F699888F25ACE8396FF12", "22F8B1161360EAAC5A66FA7F9938B69E", "29D4C5F20DB0E4617B1920DAE92BDBB9", "2A135BAB5061812EB97FC257EF77751A", "2D2EA5319FAC96ACD8F8A32B0BE9BBF5", "31E3323E4933EB556D7C7784F116D272", "399DD76D4B44924FCBEE33240BDD953E", "487E91BC8036AC744BD522A0D1FEB5FB", "5038C7C6D0035CC240286AF6C8F5E73E", "516F69414A5664E48CE6F74BE40B4A98", "51F7325D48ECB8B79553E6BE38B000B4", "544851A681AF60F27FCB3D95133B59EE", "609E2F64A6553F3DAF121482357648AF", "6136B94EDC52560DDD6E26DEF1C1C233", "61DFA798756D99B65F1D96CC4A334918", "66FDECF6B8734FD9561C58C1CD83E3E9", "69FCC7D3741E27576F8891899E5C3887", "6BF8048CED3AF7FE5D439A91D781BCF8", "7304FA6A92BBC9DC45DFC1846E5141EC", "7386C69A4A551C491C79DF433DF0C82F", "7AD4DF30046D3CE85DA1DA87CB55B438", "7D0EAD47B6BEBFF0E2D06F9E2B17C8F8", "9010C82E1F47A1ADFFAA739AF4943069", "942B711BBC6F0D870CD159F0DCE33742", "9B8FBA6662B95E41A8BCCB5F346C028E", "B0DA0CE217A75449EFDF514507A4B5A7", "B3637B4143317F3EF89506F8A87A1616", "BF346AAE391F0CD1097D4DB67686DC33", "C259351860BCFBD26787D316DF3231D2", "D65FC29364E1C777293EC3010F155721", "DFB3531007B1DED7ABA1D6D9F40A6504", "DFBA4EF54C79890FFE224A6EF14372C8", "E7C1A0F273592010E8FD27973A4D47A8", "EBC7C1C3344FFA8417552500EF2EB33D", "ED500CC3CFDD8B8F102D05C7A7E5CBF7", "EF98134BF35516822BE2F1B57E3DC142", "F1B72EF26202C71B2ADF4ABFE01E93B3", "F60761B898DC69A381B52FE1247B1814", "FBC7F2CADB9237FF732BB459B020F421", "FD3981727F0622358F665D7D7E7A3DF5", "FD4483A7DF9B7189B007C0C774CA4588", "FF9405F8F2E42E5DBDA0FF78FB687D36", "FFCD9E207A1C842797CF9F17E8B46010"]}, {"type": "amazon", "idList": ["ALAS-2017-890", "ALAS-2017-891", "ALAS-2019-1149", "ALAS-2019-1208", "ALAS-2019-1232", "ALAS-2019-1234", "ALAS-2019-1235", "ALAS-2019-1311", "ALAS-2020-1346", "ALAS-2020-1347", "ALAS-2020-1370", "ALAS-2020-1377", "ALAS-2020-1387", "ALAS-2020-1389", "ALAS-2020-1390", "ALAS-2020-1401", "ALAS-2020-1409", "ALAS-2020-1417", "ALAS-2020-1436", "ALAS-2020-1440", "ALAS-2020-1445", "ALAS-2020-1456", "ALAS-2020-1460", "ALAS-2020-1465", "ALAS-2020-1473", "ALAS-2021-1459", "ALAS-2021-1469", "ALAS-2021-1473", "ALAS-2021-1482", "ALAS-2021-1491", "ALAS-2021-1493", "ALAS-2021-1498", "ALAS-2021-1500", "ALAS-2021-1504", "ALAS-2021-1515", "ALAS-2021-1612", "ALAS-2022-1562", "ALAS-2022-1572", "ALAS-2022-1593", "ALAS-2023-1686", "ALAS-2023-1695", "ALAS2-2019-1149", "ALAS2-2019-1229", "ALAS2-2019-1232", "ALAS2-2019-1246", "ALAS2-2019-1341", "ALAS2-2020-1395", "ALAS2-2020-1422", "ALAS2-2020-1427", "ALAS2-2020-1431", "ALAS2-2020-1449", "ALAS2-2020-1465", "ALAS2-2020-1479", "ALAS2-2020-1480", "ALAS2-2020-1494", "ALAS2-2020-1513", "ALAS2-2020-1519", "ALAS2-2020-1537", "ALAS2-2020-1554", "ALAS2-2020-1573", "ALAS2-2021-1585", "ALAS2-2021-1593", "ALAS2-2021-1608", "ALAS2-2021-1610", "ALAS2-2021-1612", "ALAS2-2021-1622", "ALAS2-2021-1626", "ALAS2-2021-1640", "ALAS2-2021-1645", "ALAS2-2021-1649", "ALAS2-2021-1687", "ALAS2-2021-1693", "ALAS2-2022-1741", "ALAS2-2022-1802", "ALAS2-2022-1845", "ALAS2-2023-1905", "ALAS2-2023-1946", "ALAS2-2023-1966", "ALAS2-2023-2047", "ALAS2-2023-2200"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-02-01", "ANDROID:2020-08-01", "ANDROID:2021-10-01", "ANDROID:2021-11-01"]}, {"type": "apple", "idList": ["APPLE:251C897D47AD6A2DB0B7E3792A81C425", "APPLE:2A32C0762786DF36357D645066CDC600", "APPLE:3D7765FAAA5588336144E1B60D0B775E", "APPLE:47A6F4E1660238E39625B31A34F6CDF1", "APPLE:4CDA87B47F793E07ABCA7B9C9345521B", "APPLE:7B414D7D6363796AB8F0EB89C5EEC383", "APPLE:8592A5882F33472850FF959BB2667129", "APPLE:914AF8F52D4AB5DC92631271089CEE87", "APPLE:9AAA600C4496E1F352EC9F07A8BDC39B", "APPLE:B08BBADEFC88806E12CB234F1EB6C4C6", "APPLE:B42E67860AD9D9F5B9307A29A1189DF0", "APPLE:BEC13883FC65A6FD008F312DB93C0A36", "APPLE:BF1622028DAB7FB7B0D91852357DB961", "APPLE:CABE34499864F4FA47751E5A9FCC58AC", "APPLE:E9C90A2600A9DE3614B923070AEC31B1", "APPLE:F7DADB3E958148A6B63512580383CEA2", "APPLE:HT211843", "APPLE:HT211844", "APPLE:HT211847", "APPLE:HT211850", "APPLE:HT211931", "APPLE:HT211935", "APPLE:HT211952", "APPLE:HT212147"]}, {"type": "archlinux", "idList": ["ASA-201904-10", "ASA-201905-8", "ASA-201905-9", "ASA-201906-2", "ASA-202004-14", "ASA-202004-18", "ASA-202004-19", "ASA-202005-15", "ASA-202006-11", "ASA-202006-5", "ASA-202006-6", "ASA-202006-7", "ASA-202009-17", "ASA-202009-3", "ASA-202011-18", "ASA-202012-21", "ASA-202012-24", "ASA-202012-3", "ASA-202012-4", "ASA-202012-5", "ASA-202102-28", "ASA-202102-3", "ASA-202102-37", "ASA-202102-42", "ASA-202103-10", "ASA-202103-14", "ASA-202103-19", "ASA-202103-2", "ASA-202103-27", "ASA-202104-9", "ASA-202105-14", "ASA-202106-20"]}, {"type": "arista", "idList": ["ARISTA:0048"]}, {"type": "atlassian", "idList": ["ATLASSIAN:BSERV-11753", "ATLASSIAN:BSERV-12196", "ATLASSIAN:CONFSERVER-60004", "ATLASSIAN:CONFSERVER-60189", "ATLASSIAN:CONFSERVER-60264", "ATLASSIAN:CRUC-8408", "ATLASSIAN:CRUC-8410", "ATLASSIAN:CWD-5683", "ATLASSIAN:CWD-5688", "ATLASSIAN:FE-7196", "ATLASSIAN:FE-7202", "ATLASSIAN:FE-7344", "ATLASSIAN:FE-7345", "ATLASSIAN:FE-7346", "ATLASSIAN:JRASERVER-69725", "ATLASSIAN:JRASERVER-70929", "ATLASSIAN:JRASERVER-71221", "ATLASSIAN:JRASERVER-71321", "ATLASSIAN:JRASERVER-72052", "ATLASSIAN:JRASERVER-72609", "ATLASSIAN:JRASERVER-72706", "BAM-21603", "BSERV-11753", "BSERV-12196", "BSERV-13449", "CONFSERVER-59549", "CONFSERVER-60004", "CONFSERVER-60264", "CRUC-8408", "CRUC-8410", "CWD-5683", "CWD-5688", "FE-7196", "FE-7202", "FE-7344", "FE-7345", "FE-7346", "JRASERVER-69725", "JRASERVER-70993", "JRASERVER-71221", "JRASERVER-71321", "JRASERVER-72052", "JRASERVER-72609", "JRASERVER-72706", "JRASERVER-73223", "JRASERVER-73739"]}, {"type": "attackerkb", "idList": ["AKB:1D624C3C-7F37-4D01-82C2-583BB1E19E4F", "AKB:22C3A43F-3CEE-464A-9C77-FEE26DBE757A", "AKB:289DC3CE-ED8A-4366-89F0-46E148584C36", "AKB:38F76C83-56D0-4112-A583-4513CC15B1B3", "AKB:5C46E63B-643E-4656-B654-4FBA061ECF66", "AKB:71F77351-1AE5-4161-8836-D26680828466", "AKB:7651D6FA-BDFA-4A6E-81F2-E5CF545CD088", "AKB:7C5703D3-9E18-4F5C-A4D2-25E1F09B43CB", "AKB:8878CC0F-8F42-41CD-B190-6AAC449597D7", "AKB:93D7F9FF-1F51-45C7-8172-B3E45415E966", "AKB:98773293-D092-495A-AD61-3E5439225950", "AKB:CB02764B-566F-4540-ACA2-C9DDEE8D1496", "AKB:CF76EF1F-CB59-4A29-ADB1-DA37C695142B", "AKB:FB2F65B2-D10B-4622-AEE6-41AAD3C1E6E7"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA", "AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987", "AVLEONOV:7E0DF6DEBB35FB55F6B4D33A7262A422", "AVLEONOV:93A5CCFA19B815AE15942F533FFD65C4", "AVLEONOV:C33EB29E3A78720B630607BECBB3CEF5", "AVLEONOV:F17F36C3CC642EBDC27E43900FE3905E"]}, {"type": "broadcom", "idList": ["BSA-2021-1013", "BSA-2022-1839"]}, {"type": "carbonblack", "idList": ["CARBONBLACK:19B4E04F8F1723A4F28FA7A8354698AF", "CARBONBLACK:91F55D2B8B2999589579EACB1542A3E9", "CARBONBLACK:A526657711947788A54505B0330C16A0"]}, {"type": "centos", "idList": ["CESA-2017:2423", "CESA-2017:2492", "CESA-2019:1265", "CESA-2019:1267", "CESA-2019:1309", "CESA-2019:1310", "CESA-2019:1873", "CESA-2019:2029", "CESA-2019:3836", "CESA-2020:0194", "CESA-2020:0374", "CESA-2020:0375", "CESA-2020:0790", "CESA-2020:0839", "CESA-2020:1016", "CESA-2020:1335", "CESA-2020:1349", "CESA-2020:2530", "CESA-2020:3936", "CESA-2020:3952", "CESA-2020:3958", "CESA-2020:4004", "CESA-2020:4026", "CESA-2020:4060", "CESA-2020:4182", "CESA-2020:5437", "CESA-2020:5439", "CESA-2020:5566", "CESA-2021:0162", "CESA-2021:0343", "CESA-2021:1297", "CESA-2021:1298", "CESA-2021:1354", "CESA-2021:3798"]}, {"type": "cert", "idList": ["VU:490028", "VU:567764", "VU:930724"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2016-1202", "CPAI-2017-1216", "CPAI-2017-1224", "CPAI-2019-0531", "CPAI-2019-0539", "CPAI-2019-0561", "CPAI-2019-1720", "CPAI-2019-1870", "CPAI-2019-2071", "CPAI-2019-2209", "CPAI-2020-0407", "CPAI-2020-0416", "CPAI-2020-0872", "CPAI-2020-1091", "CPAI-2020-1095", "CPAI-2020-1183", "CPAI-2020-1284", "CPAI-2020-1285", "CPAI-2020-1331", "CPAI-2020-1346", "CPAI-2020-1379", "CPAI-2020-3205", "CPAI-2020-3308", "CPAI-2020-3581", "CPAI-2021-0298", "CPAI-2021-0517", "CPAI-2021-1401", "CPAI-2021-1428"]}, {"type": "checkpoint_security", "idList": ["CPS:SK172983"]}, {"type": "chrome", "idList": ["GCSA-2509954079155194578", "GCSA-3803715665928870837"]}, {"type": "cisa", "idList": ["CISA:2B970469D89016F563E142BE209443D8", "CISA:3D9E69A26C68866B64ED6E4B31E270E6", "CISA:406AECF81233D47A32B44C16D7A13849", "CISA:433F588AAEF2DF2A0B46FE60687F19E0", "CISA:519C5EFD37846AD34AA43099C8D86620", "CISA:61F2653EF56231DB3AEC3A9E938133FE", "CISA:69BE91A89A9A3F3041ED791289DF9FDB", "CISA:727AB64FBBEAE210BE92EA5DFD66647C", "CISA:7E752ED3C4545FF8F72629B02D303E84", "CISA:7E93687DEED7F2EA7EFAEBA997B30A5D", "CISA:7FB0A467C0EB89B6198A58418B43D50C", "CISA:990FCFCEB1D9B60F5FAA47A1F537A3CB", "CISA:B47E8667695B59F24286931C39664E52", "CISA:C17258C519A149D638B0BCF35898ABEE", "CISA:E5A33B5356175BB63C2EFA605346F8C7"]}, {"type": "cisa_kev", "idList": ["CISA-KEV-CVE-2020-1472", "CISA-KEV-CVE-2020-17530"]}, {"type": "cisco", "idList": ["CISCO-SA-OPENSSL-2021-GHY28DJD", "CISCO-SA-TELNETD-EFJREZPX"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:02669B806A06D41B24DA398CE2D4EEFD", "CFOUNDRY:177BD11FEDF3F89426E99286BC7DC46B", "CFOUNDRY:2B547AA94018245E71F37CB94BA4EEBC", "CFOUNDRY:3B9568B5C673F722E180705DE02F0625", "CFOUNDRY:3CD9371F7B812821D289B3B89526722F", "CFOUNDRY:40058483A2E2195544934D494FF464F7", "CFOUNDRY:431A5FEB07A8E937BEDFD31D7F1BE817", "CFOUNDRY:5EA35272975027EBFB62DFE2535B7B4B", "CFOUNDRY:63AC599C6730C4293761CECD360AA195", "CFOUNDRY:79AEA0CB72178344BEE07C9B9FEA86F0", "CFOUNDRY:7D5F114602BB1B4781BFC57065F20675", "CFOUNDRY:7D6795462AFD47DE31FD5B40467B68C4", "CFOUNDRY:87EED6F38C9114A077795F94CEE1CCD3", "CFOUNDRY:A005A5D22D18F966EBF6C011F833E895", "CFOUNDRY:A6BB54E614972BC1F16419D7DB82331A", "CFOUNDRY:AA356DA8CD5E3C69DBEE45AEF6C8C74F", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190", "CFOUNDRY:BCFE0333C3F2E89FFDF11615D117C9AF", "CFOUNDRY:BD71AB043932448695E8B3D20302D582", "CFOUNDRY:BFC28EFEE9A9ABA8EC627AB7942BCFD7", "CFOUNDRY:C4D1C1686A388941AD439B6E19ADC7F2", "CFOUNDRY:CF99469AEE85FAA4A2723DEF330B8E4B", "CFOUNDRY:D09A12445CD6214C067F9255280BC24D", "CFOUNDRY:DBBC716FD85510861511BDE10DD24963", "CFOUNDRY:DC7BE5C08671B54CC5F39351987D8CA3", "CFOUNDRY:DC88CEA06ECA856893E7D089D36ADB07", "CFOUNDRY:E9CE0268DAFD76AE052E27B69A06ACBD", "CFOUNDRY:FAA30968EB5FC787D7DD15251E2F2C77"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1608724009", "CLSA-2020:1608724134", "CLSA-2021:1614885634", "CLSA-2021:1632261785", "CLSA-2021:1632328234", "CLSA-2021:1632328264", "CLSA-2022:1655843011", "CLSA-2022:1657561005", "CLSA-2022:1661176564", "CLSA-2022:1665428177"]}, {"type": "cnvd", "idList": ["CNVD-2021-54684", "CNVD-2022-71401", "CNVD-2023-07750"]}, {"type": "cve", "idList": ["CVE-2016-10735", "CVE-2016-2542", "CVE-2016-5725", "CVE-2016-7103", "CVE-2017-1000061", "CVE-2017-12626", "CVE-2017-14735", "CVE-2017-18640", "CVE-2017-5645", "CVE-2018-1000180", "CVE-2018-1000613", "CVE-2018-1000632", "CVE-2018-1285", "CVE-2018-14040", "CVE-2018-14041", "CVE-2018-14042", "CVE-2018-14550", "CVE-2018-14613", "CVE-2018-16884", "CVE-2018-20843", "CVE-2018-8032", "CVE-2019-0219", "CVE-2019-0221", "CVE-2019-0227", "CVE-2019-0228", "CVE-2019-0230", "CVE-2019-0232", "CVE-2019-0233", "CVE-2019-10072", "CVE-2019-10080", "CVE-2019-10086", "CVE-2019-10098", "CVE-2019-10173", "CVE-2019-10202", "CVE-2019-10246", "CVE-2019-10247", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11358", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12086", "CVE-2019-12399", "CVE-2019-1240", "CVE-2019-12402", "CVE-2019-12406", "CVE-2019-1241", "CVE-2019-12415", "CVE-2019-12419", "CVE-2019-1242", "CVE-2019-12423", "CVE-2019-1243", "CVE-2019-1246", "CVE-2019-1247", "CVE-2019-1248", "CVE-2019-1249", "CVE-2019-1250", "CVE-2019-14379", "CVE-2019-14898", "CVE-2019-15218", "CVE-2019-1551", "CVE-2019-16746", "CVE-2019-16942", "CVE-2019-17075", "CVE-2019-17133", "CVE-2019-17195", "CVE-2019-17495", "CVE-2019-17566", "CVE-2019-17571", "CVE-2019-17573", "CVE-2019-17632", "CVE-2019-17638", "CVE-2019-18885", "CVE-2019-19052", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19078", "CVE-2019-19535", "CVE-2019-19922", "CVE-2019-20812", "CVE-2019-2904", "CVE-2019-3738", "CVE-2019-3739", "CVE-2019-3740", "CVE-2019-3773", "CVE-2019-3874", "CVE-2019-3892", "CVE-2019-3900", "CVE-2019-5063", "CVE-2019-5064", "CVE-2019-5108", "CVE-2019-5428", "CVE-2019-7317", "CVE-2019-8331", "CVE-2020-0255", "CVE-2020-10188", "CVE-2020-10543", "CVE-2020-10683", "CVE-2020-10707", "CVE-2020-10751", "CVE-2020-10769", "CVE-2020-10878", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11612", "CVE-2020-11655", "CVE-2020-11656", "CVE-2020-11973", "CVE-2020-11979", "CVE-2020-11987", "CVE-2020-11994", "CVE-2020-11998", "CVE-2020-12114", "CVE-2020-12723", "CVE-2020-12771", "CVE-2020-13434", "CVE-2020-13435", "CVE-2020-13871", "CVE-2020-13934", "CVE-2020-13935", "CVE-2020-13943", "CVE-2020-13954", "CVE-2020-13956", "CVE-2020-14039", "CVE-2020-14060", "CVE-2020-14061", "CVE-2020-14062", "CVE-2020-14195", "CVE-2020-14384", "CVE-2020-1472", "CVE-2020-15358", "CVE-2020-15586", "CVE-2020-16166", "CVE-2020-16845", "CVE-2020-17521", "CVE-2020-17527", "CVE-2020-17530", "CVE-2020-1927", "CVE-2020-1941", "CVE-2020-1945", "CVE-2020-1967", "CVE-2020-1968", "CVE-2020-1971", "CVE-2020-24394", "CVE-2020-24553", "CVE-2020-24616", "CVE-2020-24750", "CVE-2020-25649", "CVE-2020-26217", "CVE-2020-26418", "CVE-2020-26419", "CVE-2020-26420", "CVE-2020-26421", "CVE-2020-26422", "CVE-2020-27193", "CVE-2020-27216", "CVE-2020-27218", "CVE-2020-27223", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28052", "CVE-2020-28196", "CVE-2020-28476", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5359", "CVE-2020-5360", "CVE-2020-5398", "CVE-2020-5407", "CVE-2020-5408", "CVE-2020-5413", "CVE-2020-5421", "CVE-2020-7059", "CVE-2020-7060", "CVE-2020-7069", "CVE-2020-7760", "CVE-2020-7774", "CVE-2020-7919", "CVE-2020-8203", "CVE-2020-8277", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8908", "CVE-2020-9281", "CVE-2020-9327", "CVE-2020-9480", "CVE-2020-9484", "CVE-2020-9488", "CVE-2020-9489", "CVE-2021-2008", "CVE-2021-20227", "CVE-2021-2053", "CVE-2021-21290", "CVE-2021-2134", "CVE-2021-21345", "CVE-2021-2135", "CVE-2021-2136", "CVE-2021-2140", "CVE-2021-2141", "CVE-2021-2142", "CVE-2021-2144", "CVE-2021-2145", "CVE-2021-2146", "CVE-2021-2147", "CVE-2021-2149", "CVE-2021-2150", "CVE-2021-2151", "CVE-2021-2152", "CVE-2021-2153", "CVE-2021-2154", "CVE-2021-2155", "CVE-2021-2156", "CVE-2021-2157", "CVE-2021-2158", "CVE-2021-2159", "CVE-2021-2160", "CVE-2021-2161", "CVE-2021-2162", "CVE-2021-2163", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2167", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2173", "CVE-2021-2174", "CVE-2021-2175", "CVE-2021-2177", "CVE-2021-2178", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2181", "CVE-2021-2182", "CVE-2021-2183", "CVE-2021-2184", "CVE-2021-2185", "CVE-2021-2186", "CVE-2021-2187", "CVE-2021-2188", "CVE-2021-2189", "CVE-2021-2190", "CVE-2021-2191", "CVE-2021-2192", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2195", "CVE-2021-2196", "CVE-2021-2197", "CVE-2021-2198", "CVE-2021-2199", "CVE-2021-2200", "CVE-2021-2201", "CVE-2021-2202", "CVE-2021-2203", "CVE-2021-2204", "CVE-2021-2205", "CVE-2021-2206", "CVE-2021-2207", "CVE-2021-2208", "CVE-2021-2209", "CVE-2021-2210", "CVE-2021-2211", "CVE-2021-22112", "CVE-2021-2212", "CVE-2021-2213", "CVE-2021-2214", "CVE-2021-2215", "CVE-2021-2216", "CVE-2021-2217", "CVE-2021-22173", "CVE-2021-22174", "CVE-2021-2218", "CVE-2021-2219", "CVE-2021-22191", "CVE-2021-2220", "CVE-2021-2221", "CVE-2021-2222", "CVE-2021-2223", "CVE-2021-2224", "CVE-2021-2225", "CVE-2021-2226", "CVE-2021-2227", "CVE-2021-2228", "CVE-2021-2229", "CVE-2021-2230", "CVE-2021-2231", "CVE-2021-2232", "CVE-2021-2233", "CVE-2021-2234", "CVE-2021-2235", "CVE-2021-2236", "CVE-2021-2237", "CVE-2021-2238", "CVE-2021-2239", "CVE-2021-2240", "CVE-2021-2241", "CVE-2021-2242", "CVE-2021-2244", "CVE-2021-2245", "CVE-2021-2246", "CVE-2021-2247", "CVE-2021-2248", "CVE-2021-2249", "CVE-2021-2250", "CVE-2021-2251", "CVE-2021-2252", "CVE-2021-2253", "CVE-2021-2254", "CVE-2021-2255", "CVE-2021-2256", "CVE-2021-2257", "CVE-2021-2258", "CVE-2021-2259", "CVE-2021-2260", "CVE-2021-2261", "CVE-2021-2262", "CVE-2021-2263", "CVE-2021-2264", "CVE-2021-2266", "CVE-2021-2267", "CVE-2021-2268", "CVE-2021-2269", "CVE-2021-2270", "CVE-2021-2271", "CVE-2021-2272", "CVE-2021-2273", "CVE-2021-2274", "CVE-2021-2275", "CVE-2021-2276", "CVE-2021-2277", "CVE-2021-2278", "CVE-2021-2279", "CVE-2021-2280", "CVE-2021-2281", "CVE-2021-2282", "CVE-2021-2283", "CVE-2021-2284", "CVE-2021-2285", "CVE-2021-2286", "CVE-2021-2287", "CVE-2021-2288", "CVE-2021-22883", "CVE-2021-22884", "CVE-2021-2289", "CVE-2021-2290", "CVE-2021-2291", "CVE-2021-2292", "CVE-2021-2293", "CVE-2021-2294", "CVE-2021-2295", "CVE-2021-2296", "CVE-2021-2297", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2302", "CVE-2021-2303", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2306", "CVE-2021-2307", "CVE-2021-2308", "CVE-2021-2309", "CVE-2021-2310", "CVE-2021-2311", "CVE-2021-2312", "CVE-2021-2314", "CVE-2021-2315", "CVE-2021-2316", "CVE-2021-2317", "CVE-2021-2318", "CVE-2021-2319", "CVE-2021-2320", "CVE-2021-2321", "CVE-2021-23336", "CVE-2021-23839", "CVE-2021-23840", "CVE-2021-23841", "CVE-2021-25329", "CVE-2021-28359", "CVE-2021-29482", "CVE-2021-31805", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-40491", "CVE-2021-44028", "CVE-2022-23181", "CVE-2022-24823", "CVE-2022-39950", "CVE-2023-32711"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1479-1:ABA01", "DEBIAN:DLA-1517-1:358D4", "DEBIAN:DLA-1517-1:7BA55", "DEBIAN:DLA-1715-1:4A3F9", "DEBIAN:DLA-1731-1:D19BD", "DEBIAN:DLA-1731-2:E6E1E", "DEBIAN:DLA-1771-1:3CE68", "DEBIAN:DLA-1777-1:55799", "DEBIAN:DLA-1797-1:1A7B8", "DEBIAN:DLA-1797-1:A2877", "DEBIAN:DLA-1798-1:61C44", "DEBIAN:DLA-1798-1:E389B", "DEBIAN:DLA-1799-1:F9D71", "DEBIAN:DLA-1799-2:074DF", "DEBIAN:DLA-1800-1:3D3DC", "DEBIAN:DLA-1800-1:756F1", "DEBIAN:DLA-1806-1:715A9", "DEBIAN:DLA-1806-1:86268", "DEBIAN:DLA-1810-1:6874E", "DEBIAN:DLA-1810-1:AF75C", "DEBIAN:DLA-1824-1:6789E", "DEBIAN:DLA-1839-1:13DB7", "DEBIAN:DLA-1839-1:728E0", "DEBIAN:DLA-1862-1:8E150", "DEBIAN:DLA-1879-1:41860", "DEBIAN:DLA-1883-1:3E939", "DEBIAN:DLA-1884-1:61F35", "DEBIAN:DLA-1885-1:84558", "DEBIAN:DLA-1896-1:572E2", "DEBIAN:DLA-1896-1:853E6", "DEBIAN:DLA-1900-1:23801", "DEBIAN:DLA-1900-1:EE6D1", "DEBIAN:DLA-1919-1:239EC", "DEBIAN:DLA-1919-2:858F8", "DEBIAN:DLA-1930-1:DFCDE", "DEBIAN:DLA-1943-1:5F5AB", "DEBIAN:DLA-1943-1:9AD98", "DEBIAN:DLA-2065-1:517F5", "DEBIAN:DLA-2065-1:5EEFC", "DEBIAN:DLA-2068-1:83234", "DEBIAN:DLA-2114-1:93D37", "DEBIAN:DLA-2118-1:5E0A4", "DEBIAN:DLA-2124-1:23BE6", "DEBIAN:DLA-2176-1:7D2CA", "DEBIAN:DLA-2184-1:7B407", "DEBIAN:DLA-2191-1:6C344", "DEBIAN:DLA-2191-1:AF8DE", "DEBIAN:DLA-2203-1:78BFA", "DEBIAN:DLA-2203-1:86D5F", "DEBIAN:DLA-2209-1:84C77", "DEBIAN:DLA-2209-1:D154F", "DEBIAN:DLA-2217-1:0ED90", "DEBIAN:DLA-2221-1:3C6AD", "DEBIAN:DLA-2221-1:DCC99", "DEBIAN:DLA-2241-1:DE3AB", "DEBIAN:DLA-2241-2:3E557", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DLA-2270-1:4546C", "DEBIAN:DLA-2270-1:A2D41", "DEBIAN:DLA-2279-1:771F3", "DEBIAN:DLA-2279-1:AB3FB", "DEBIAN:DLA-2286-1:A2783", "DEBIAN:DLA-2286-1:F04B8", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2340-1:34DF9", "DEBIAN:DLA-2341-1:5BD6D", "DEBIAN:DLA-2364-1:39666", "DEBIAN:DLA-2378-1:1D903", "DEBIAN:DLA-2385-1:FDE93", "DEBIAN:DLA-2405-1:2470B", "DEBIAN:DLA-2405-1:33C7A", "DEBIAN:DLA-2406-1:00733", "DEBIAN:DLA-2406-1:5CA04", "DEBIAN:DLA-2407-1:84753", "DEBIAN:DLA-2407-1:CBAA5", "DEBIAN:DLA-2420-1:692E7", "DEBIAN:DLA-2420-2:175D1", "DEBIAN:DLA-2437-1:334D0", "DEBIAN:DLA-2437-1:9852C", "DEBIAN:DLA-2459-1:C9586", "DEBIAN:DLA-2460-1:279E8", "DEBIAN:DLA-2463-1:1381E", "DEBIAN:DLA-2471-1:AFC93", "DEBIAN:DLA-2492-1:77952", "DEBIAN:DLA-2493-1:D2596", "DEBIAN:DLA-2495-1:A5479", "DEBIAN:DLA-2500-1:61422", "DEBIAN:DLA-2547-1:C57F2", "DEBIAN:DLA-2550-1:E200A", "DEBIAN:DLA-2555-1:64862", "DEBIAN:DLA-2555-1:DBD69", "DEBIAN:DLA-2563-1:7D5FC", "DEBIAN:DLA-2563-1:B363B", "DEBIAN:DLA-2565-1:2FCB7", "DEBIAN:DLA-2565-1:CC1A3", "DEBIAN:DLA-2569-1:11737", "DEBIAN:DLA-2569-1:E3354", "DEBIAN:DLA-2596-1:25D69", "DEBIAN:DLA-2608-1:50303", "DEBIAN:DLA-2616-1:FAA87", "DEBIAN:DLA-2619-1:8192B", "DEBIAN:DLA-2628-1:6F808", "DEBIAN:DLA-2634-1:2F707", "DEBIAN:DLA-2638-1:5B442", "DEBIAN:DLA-2638-1:AB692", "DEBIAN:DLA-2661-1:5DE5A", "DEBIAN:DLA-2706-1:666FB", "DEBIAN:DLA-2751-1:5F8DA", "DEBIAN:DLA-2821-1:A72F4", "DEBIAN:DLA-2852-1:37D89", "DEBIAN:DLA-2889-1:E0D6C", "DEBIAN:DLA-2952-1:7651B", "DEBIAN:DLA-2967-1:4C7AE", "DEBIAN:DLA-2975-1:76BFD", "DEBIAN:DLA-3160-1:77FDA", "DEBIAN:DLA-3164-1:A25EA", "DEBIAN:DLA-3205-1:40C3E", "DEBIAN:DLA-611-1:1B900", "DEBIAN:DSA-4233-1:7C3A1", "DEBIAN:DSA-4434-1:82FB6", "DEBIAN:DSA-4434-1:D2F07", "DEBIAN:DSA-4435-1:0A830", "DEBIAN:DSA-4435-1:1D8EB", "DEBIAN:DSA-4448-1:1AFE4", "DEBIAN:DSA-4451-1:B16F1", "DEBIAN:DSA-4452-1:F65D2", "DEBIAN:DSA-4460-1:50632", "DEBIAN:DSA-4465-1:304F1", "DEBIAN:DSA-4465-1:DDE47", "DEBIAN:DSA-4472-1:4A655", "DEBIAN:DSA-4472-1:97343", "DEBIAN:DSA-4495-1:1269E", "DEBIAN:DSA-4495-1:258DC", "DEBIAN:DSA-4497-1:7E46B", "DEBIAN:DSA-4497-1:F2AF4", "DEBIAN:DSA-4509-1:7B58D", "DEBIAN:DSA-4509-1:D6C70", "DEBIAN:DSA-4542-1:03F2D", "DEBIAN:DSA-4542-1:432E5", "DEBIAN:DSA-4594-1:28CBC", "DEBIAN:DSA-4596-1:D180A", "DEBIAN:DSA-4626-1:0219B", "DEBIAN:DSA-4627-1:1B266", "DEBIAN:DSA-4628-1:CE0DC", "DEBIAN:DSA-4661-1:70270", "DEBIAN:DSA-4680-1:FCF2B", "DEBIAN:DSA-4686-1:A3244", "DEBIAN:DSA-4686-1:EDCC0", "DEBIAN:DSA-4693-1:F5786", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4698-1:E1A7D", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4699-1:D5D43", "DEBIAN:DSA-4757-1:5C812", "DEBIAN:DSA-4757-1:83F60", "DEBIAN:DSA-4772-1:DCCA8", "DEBIAN:DSA-4789-1:72A9C", "DEBIAN:DSA-4789-1:817CC", "DEBIAN:DSA-4795-1:5CD54", "DEBIAN:DSA-4807-1:1C1CB", "DEBIAN:DSA-4807-1:B0537", "DEBIAN:DSA-4811-1:BEA23", "DEBIAN:DSA-4835-1:22674", "DEBIAN:DSA-4848-1:D81AC", "DEBIAN:DSA-4855-1:4A0C0", "DEBIAN:DSA-4855-1:B091B", "DEBIAN:DSA-4856-1:BF4D3", "DEBIAN:DSA-4863-1:331E6", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4875-1:AE1B0", "DEBIAN:DSA-4881-1:5FAC1", "DEBIAN:DSA-4882-1:5EC6A", "DEBIAN:DSA-4885-1:31BC0", "DEBIAN:DSA-4899-1:2F354", "DEBIAN:DSA-4949-1:1212B", "DEBIAN:DSA-5004-1:7D2F1", "DEBIAN:DSA-5004-1:912EF", "DEBIAN:DSA-5004-1:999C3", "DEBIAN:DSA-5020-1:32A64", "DEBIAN:DSA-5265-1:55805"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2016-10735", "DEBIANCVE:CVE-2016-5725", "DEBIANCVE:CVE-2016-7103", "DEBIANCVE:CVE-2017-1000061", "DEBIANCVE:CVE-2017-12626", "DEBIANCVE:CVE-2017-14735", "DEBIANCVE:CVE-2017-18640", "DEBIANCVE:CVE-2017-5645", "DEBIANCVE:CVE-2018-1000180", "DEBIANCVE:CVE-2018-1000613", "DEBIANCVE:CVE-2018-1000632", "DEBIANCVE:CVE-2018-1285", "DEBIANCVE:CVE-2018-14040", "DEBIANCVE:CVE-2018-14041", "DEBIANCVE:CVE-2018-14042", "DEBIANCVE:CVE-2018-14550", "DEBIANCVE:CVE-2018-14613", "DEBIANCVE:CVE-2018-16884", "DEBIANCVE:CVE-2018-20843", "DEBIANCVE:CVE-2018-8032", "DEBIANCVE:CVE-2019-0221", "DEBIANCVE:CVE-2019-0227", "DEBIANCVE:CVE-2019-0228", "DEBIANCVE:CVE-2019-0232", "DEBIANCVE:CVE-2019-10072", "DEBIANCVE:CVE-2019-10086", "DEBIANCVE:CVE-2019-10098", "DEBIANCVE:CVE-2019-10173", "DEBIANCVE:CVE-2019-10246", "DEBIANCVE:CVE-2019-10247", "DEBIANCVE:CVE-2019-10638", "DEBIANCVE:CVE-2019-10639", "DEBIANCVE:CVE-2019-11358", "DEBIANCVE:CVE-2019-11487", "DEBIANCVE:CVE-2019-11599", "DEBIANCVE:CVE-2019-12086", "DEBIANCVE:CVE-2019-12402", "DEBIANCVE:CVE-2019-12415", "DEBIANCVE:CVE-2019-14379", "DEBIANCVE:CVE-2019-14898", "DEBIANCVE:CVE-2019-15218", "DEBIANCVE:CVE-2019-1551", "DEBIANCVE:CVE-2019-16746", "DEBIANCVE:CVE-2019-16942", "DEBIANCVE:CVE-2019-17075", "DEBIANCVE:CVE-2019-17133", "DEBIANCVE:CVE-2019-17566", "DEBIANCVE:CVE-2019-17571", "DEBIANCVE:CVE-2019-17632", "DEBIANCVE:CVE-2019-17638", "DEBIANCVE:CVE-2019-18885", "DEBIANCVE:CVE-2019-19052", "DEBIANCVE:CVE-2019-19063", "DEBIANCVE:CVE-2019-19066", "DEBIANCVE:CVE-2019-19073", "DEBIANCVE:CVE-2019-19074", "DEBIANCVE:CVE-2019-19078", "DEBIANCVE:CVE-2019-19535", "DEBIANCVE:CVE-2019-19922", "DEBIANCVE:CVE-2019-20812", "DEBIANCVE:CVE-2019-3874", "DEBIANCVE:CVE-2019-3900", "DEBIANCVE:CVE-2019-5063", "DEBIANCVE:CVE-2019-5064", "DEBIANCVE:CVE-2019-5108", "DEBIANCVE:CVE-2019-7317", "DEBIANCVE:CVE-2019-8331", "DEBIANCVE:CVE-2020-10188", "DEBIANCVE:CVE-2020-10543", "DEBIANCVE:CVE-2020-10683", "DEBIANCVE:CVE-2020-10751", "DEBIANCVE:CVE-2020-10769", "DEBIANCVE:CVE-2020-10878", "DEBIANCVE:CVE-2020-11022", "DEBIANCVE:CVE-2020-11023", "DEBIANCVE:CVE-2020-11612", "DEBIANCVE:CVE-2020-11655", "DEBIANCVE:CVE-2020-11656", "DEBIANCVE:CVE-2020-11979", "DEBIANCVE:CVE-2020-11987", "DEBIANCVE:CVE-2020-11998", "DEBIANCVE:CVE-2020-12114", "DEBIANCVE:CVE-2020-12723", "DEBIANCVE:CVE-2020-12771", "DEBIANCVE:CVE-2020-13434", "DEBIANCVE:CVE-2020-13435", "DEBIANCVE:CVE-2020-13871", "DEBIANCVE:CVE-2020-13934", "DEBIANCVE:CVE-2020-13935", "DEBIANCVE:CVE-2020-13943", "DEBIANCVE:CVE-2020-13956", "DEBIANCVE:CVE-2020-14039", "DEBIANCVE:CVE-2020-14060", "DEBIANCVE:CVE-2020-14061", "DEBIANCVE:CVE-2020-14062", "DEBIANCVE:CVE-2020-14195", "DEBIANCVE:CVE-2020-1472", "DEBIANCVE:CVE-2020-15358", "DEBIANCVE:CVE-2020-15586", "DEBIANCVE:CVE-2020-16166", "DEBIANCVE:CVE-2020-16845", "DEBIANCVE:CVE-2020-17521", "DEBIANCVE:CVE-2020-17527", "DEBIANCVE:CVE-2020-1927", "DEBIANCVE:CVE-2020-1941", "DEBIANCVE:CVE-2020-1945", "DEBIANCVE:CVE-2020-1967", "DEBIANCVE:CVE-2020-1968", "DEBIANCVE:CVE-2020-1971", "DEBIANCVE:CVE-2020-24394", "DEBIANCVE:CVE-2020-24553", "DEBIANCVE:CVE-2020-24616", "DEBIANCVE:CVE-2020-24750", "DEBIANCVE:CVE-2020-25649", "DEBIANCVE:CVE-2020-26217", "DEBIANCVE:CVE-2020-26418", "DEBIANCVE:CVE-2020-26419", "DEBIANCVE:CVE-2020-26420", "DEBIANCVE:CVE-2020-26421", "DEBIANCVE:CVE-2020-26422", "DEBIANCVE:CVE-2020-27216", "DEBIANCVE:CVE-2020-27218", "DEBIANCVE:CVE-2020-27223", "DEBIANCVE:CVE-2020-27841", "DEBIANCVE:CVE-2020-27842", "DEBIANCVE:CVE-2020-27843", "DEBIANCVE:CVE-2020-27844", "DEBIANCVE:CVE-2020-27845", "DEBIANCVE:CVE-2020-28052", "DEBIANCVE:CVE-2020-28196", "DEBIANCVE:CVE-2020-35490", "DEBIANCVE:CVE-2020-35491", "DEBIANCVE:CVE-2020-35728", "DEBIANCVE:CVE-2020-36179", "DEBIANCVE:CVE-2020-36180", "DEBIANCVE:CVE-2020-36181", "DEBIANCVE:CVE-2020-36182", "DEBIANCVE:CVE-2020-36183", "DEBIANCVE:CVE-2020-36184", "DEBIANCVE:CVE-2020-36185", "DEBIANCVE:CVE-2020-36186", "DEBIANCVE:CVE-2020-36187", "DEBIANCVE:CVE-2020-36188", "DEBIANCVE:CVE-2020-36189", "DEBIANCVE:CVE-2020-5398", "DEBIANCVE:CVE-2020-5421", "DEBIANCVE:CVE-2020-7059", "DEBIANCVE:CVE-2020-7060", "DEBIANCVE:CVE-2020-7069", "DEBIANCVE:CVE-2020-7760", "DEBIANCVE:CVE-2020-7774", "DEBIANCVE:CVE-2020-7919", "DEBIANCVE:CVE-2020-8203", "DEBIANCVE:CVE-2020-8277", "DEBIANCVE:CVE-2020-8284", "DEBIANCVE:CVE-2020-8285", "DEBIANCVE:CVE-2020-8286", "DEBIANCVE:CVE-2020-8908", "DEBIANCVE:CVE-2020-9327", "DEBIANCVE:CVE-2020-9484", "DEBIANCVE:CVE-2020-9488", "DEBIANCVE:CVE-2020-9489", "DEBIANCVE:CVE-2021-20227", "DEBIANCVE:CVE-2021-21290", "DEBIANCVE:CVE-2021-21345", "DEBIANCVE:CVE-2021-2144", "DEBIANCVE:CVE-2021-2145", "DEBIANCVE:CVE-2021-2146", "DEBIANCVE:CVE-2021-2154", "DEBIANCVE:CVE-2021-2160", "DEBIANCVE:CVE-2021-2161", "DEBIANCVE:CVE-2021-2162", "DEBIANCVE:CVE-2021-2163", "DEBIANCVE:CVE-2021-2164", "DEBIANCVE:CVE-2021-2166", "DEBIANCVE:CVE-2021-2169", "DEBIANCVE:CVE-2021-2170", "DEBIANCVE:CVE-2021-2171", "DEBIANCVE:CVE-2021-2172", "DEBIANCVE:CVE-2021-2174", "DEBIANCVE:CVE-2021-2178", "DEBIANCVE:CVE-2021-2179", "DEBIANCVE:CVE-2021-2180", "DEBIANCVE:CVE-2021-2193", "DEBIANCVE:CVE-2021-2194", "DEBIANCVE:CVE-2021-2196", "DEBIANCVE:CVE-2021-2201", "DEBIANCVE:CVE-2021-2202", "DEBIANCVE:CVE-2021-2203", "DEBIANCVE:CVE-2021-2208", "DEBIANCVE:CVE-2021-2212", "DEBIANCVE:CVE-2021-2213", "DEBIANCVE:CVE-2021-2215", "DEBIANCVE:CVE-2021-2217", "DEBIANCVE:CVE-2021-22173", "DEBIANCVE:CVE-2021-22174", "DEBIANCVE:CVE-2021-22191", "DEBIANCVE:CVE-2021-2226", "DEBIANCVE:CVE-2021-2230", "DEBIANCVE:CVE-2021-2232", "DEBIANCVE:CVE-2021-2250", "DEBIANCVE:CVE-2021-2264", "DEBIANCVE:CVE-2021-2266", "DEBIANCVE:CVE-2021-2278", "DEBIANCVE:CVE-2021-2279", "DEBIANCVE:CVE-2021-2280", "DEBIANCVE:CVE-2021-2281", "DEBIANCVE:CVE-2021-2282", "DEBIANCVE:CVE-2021-2283", "DEBIANCVE:CVE-2021-2284", "DEBIANCVE:CVE-2021-2285", "DEBIANCVE:CVE-2021-2286", "DEBIANCVE:CVE-2021-2287", "DEBIANCVE:CVE-2021-22883", "DEBIANCVE:CVE-2021-22884", "DEBIANCVE:CVE-2021-2291", "DEBIANCVE:CVE-2021-2293", "DEBIANCVE:CVE-2021-2296", "DEBIANCVE:CVE-2021-2297", "DEBIANCVE:CVE-2021-2298", "DEBIANCVE:CVE-2021-2299", "DEBIANCVE:CVE-2021-2300", "DEBIANCVE:CVE-2021-2301", "DEBIANCVE:CVE-2021-2304", "DEBIANCVE:CVE-2021-2305", "DEBIANCVE:CVE-2021-2306", "DEBIANCVE:CVE-2021-2307", "DEBIANCVE:CVE-2021-2308", "DEBIANCVE:CVE-2021-2309", "DEBIANCVE:CVE-2021-2310", "DEBIANCVE:CVE-2021-2312", "DEBIANCVE:CVE-2021-2321", "DEBIANCVE:CVE-2021-23336", "DEBIANCVE:CVE-2021-23839", "DEBIANCVE:CVE-2021-23840", "DEBIANCVE:CVE-2021-23841", "DEBIANCVE:CVE-2021-25329", "DEBIANCVE:CVE-2021-29482", "DEBIANCVE:CVE-2021-3449", "DEBIANCVE:CVE-2021-3450", "DEBIANCVE:CVE-2021-40491", "DEBIANCVE:CVE-2022-23181", "DEBIANCVE:CVE-2022-24823"]}, {"type": "drupal", "idList": ["DRUPAL-SA-CORE-2019-006", "DRUPAL-SA-CORE-2020-002", "DRUPAL-SA-CORE-2022-002"]}, {"type": "exploitdb", "idList": ["EDB-ID:40411", "EDB-ID:46682", "EDB-ID:47073", "EDB-ID:49068", "EDB-ID:49071", "EDB-ID:49766", "EDB-ID:49767", "EDB-ID:50119"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:5F816FAE3FBDB1D267530F19C0426785", "EXPLOITPACK:A8C8424AAD98145F43A2AF9734E0BCF4"]}, {"type": "f5", "idList": ["F5:K01251345", "F5:K02349370", "F5:K02453220", "F5:K03121171", "F5:K04107324", "F5:K04553557", "F5:K05380109", "F5:K07944249", "F5:K12492858", "F5:K13184144", "F5:K14255532", "F5:K15111130", "F5:K15402727", "F5:K17321505", "F5:K18484125", "F5:K19785240", "F5:K20455158", "F5:K21418431", "F5:K21430012", "F5:K22130301", "F5:K23153696", "F5:K23173103", "F5:K23630542", "F5:K24249971", "F5:K24383845", "F5:K24608264", "F5:K24624116", "F5:K25126370", "F5:K25401610", "F5:K28409053", "F5:K31573032", "F5:K32804955", "F5:K33535454", "F5:K38573130", "F5:K40508224", "F5:K41412302", "F5:K42910051", "F5:K43378049", "F5:K43798238", "F5:K44415301", "F5:K45026834", "F5:K45991967", "F5:K47227224", "F5:K48127735", "F5:K48382137", "F5:K50315101", "F5:K51011533", "F5:K51674118", "F5:K52171694", "F5:K61186963", "F5:K61529042", "F5:K61903372", "F5:K62532228", "F5:K63525058", "F5:K66544153", "F5:K71522481", "F5:K73648110", "F5:K82131333", "F5:K92451315", "F5:K92969318", "F5:K93951507", "F5:K95208524", "F5:K99862460"]}, {"type": "fedora", "idList": ["FEDORA:000423094DC3", "FEDORA:0051430CF91F", "FEDORA:0105430CE303", "FEDORA:017273129EBB", "FEDORA:02FC6309C829", "FEDORA:041196190421", "FEDORA:04868606351B", "FEDORA:0491B668B8F5", "FEDORA:05AFB3091421", "FEDORA:0730C6051059", "FEDORA:07B5A6CB4421", "FEDORA:07D2762C825F", "FEDORA:0A47230D7963", "FEDORA:0AC1C60C76B5", "FEDORA:0D1FF66FAB6D", "FEDORA:0D4A66058533", "FEDORA:0D7F230979AB", "FEDORA:0E6FD60E1861", "FEDORA:0FDC630A5C68", "FEDORA:10ED96049C48", "FEDORA:11C9F606DF50", "FEDORA:11D1460CADC2", "FEDORA:12C83309E79F", "FEDORA:1364530979AB", "FEDORA:146FE30DD5E7", "FEDORA:16B2E6344278", "FEDORA:16BDD6092702", "FEDORA:180E930E766E", "FEDORA:18A7960877B3", "FEDORA:18B6A601B8F9", "FEDORA:1BD5B6389B47", "FEDORA:1CAC0608E6F2", "FEDORA:21C3E309DE29", "FEDORA:224AE608F491", "FEDORA:267796076024", "FEDORA:26A3B606353E", "FEDORA:277F560476FA", "FEDORA:27A3A30520EC", "FEDORA:2836F613193B", "FEDORA:2A5B86076F48", "FEDORA:2B920607600F", "FEDORA:2BAD930CF289", "FEDORA:2BD533098BA0", "FEDORA:2C8BA30B7889", "FEDORA:2D51F60C28B2", "FEDORA:2ED3A6058506", "FEDORA:2F93B6076D15", "FEDORA:30E656126A67", "FEDORA:320386075B54", "FEDORA:3230260BA78B", "FEDORA:3245830C47E2", "FEDORA:328696076D30", "FEDORA:3336630BAE2E", "FEDORA:341EA6057129", "FEDORA:344346042F3E", "FEDORA:36BF9305D418", "FEDORA:3706260609AC", "FEDORA:371D8608F499", "FEDORA:371E06040B12", "FEDORA:376506075014", "FEDORA:3787360525AF", "FEDORA:38BDC3095ADB", "FEDORA:38D8230C58CD", "FEDORA:398FD60CEC5A", "FEDORA:3A3766C5B5A2", "FEDORA:3A69E60B3E88", "FEDORA:3AEB830B2656", "FEDORA:3B84A305A8AE", "FEDORA:3C394606D98F", "FEDORA:3CA1930493B5", "FEDORA:3CD8830CF284", "FEDORA:3F234602D69C", "FEDORA:3F6FC603B27A", "FEDORA:4002B609954A", "FEDORA:4036A60ACFA8", "FEDORA:438D16045644", "FEDORA:44652606F1D1", "FEDORA:44F56325DDAB", "FEDORA:455E83148598", "FEDORA:4788E309FF20", "FEDORA:481D1608F47B", "FEDORA:48CC5309B6F7", "FEDORA:48D7A3098BA2", "FEDORA:49205309799A", "FEDORA:49A0E6048FEB", "FEDORA:4A1276046F94", "FEDORA:4A64830CFCDC", "FEDORA:4B24430DFF14", "FEDORA:4C04C605CB70", "FEDORA:4CEF5610D7CA", "FEDORA:4D359608778C", "FEDORA:4F21B6125E50", "FEDORA:4FB5560427DA", "FEDORA:511986124F82", "FEDORA:511A7608E6E1", "FEDORA:51B856067EB8", "FEDORA:52396606732B", "FEDORA:53C3261278CC", "FEDORA:54575302587A", "FEDORA:589CF30BDEBA", "FEDORA:59A883072F03", "FEDORA:59E3F606D998", "FEDORA:5A27030A7064", "FEDORA:5A4D662AE22C", "FEDORA:5A7AC6087A51", "FEDORA:5BC786077CC2", "FEDORA:5D29C6345DD2", "FEDORA:5E5506051725", "FEDORA:5F36E6079A0D", "FEDORA:61A713098ED5", "FEDORA:61ED7309CECD", "FEDORA:628EB603ECD0", "FEDORA:65AD730DB56D", "FEDORA:67C5B30EB70C", "FEDORA:6869030D3139", "FEDORA:690DE6022BA8", "FEDORA:6976D62A089B", "FEDORA:69B8A30B8B4D", "FEDORA:6B19A304E89C", "FEDORA:6B66A6047312", "FEDORA:6C06860BAFF2", "FEDORA:6E66C608B5D9", "FEDORA:6E67663233DB", "FEDORA:6ED3730946F6", "FEDORA:6EEE330609B8", "FEDORA:707E930AB4A5", "FEDORA:71D65309D32B", "FEDORA:748BC6048FFE", "FEDORA:754F860A98ED", "FEDORA:758FA61278EA", "FEDORA:764EE30C99A3", "FEDORA:76CFD605E21F", "FEDORA:772A7605712B", "FEDORA:77A873096A19", "FEDORA:79EAC605FC25", "FEDORA:7A1EA3098BA2", "FEDORA:7B34D3127D43", "FEDORA:7CFF660874FE", "FEDORA:7D962606E7C6", "FEDORA:7F23B6061573", "FEDORA:803AE30C6416", "FEDORA:80F403093F67", "FEDORA:822D960BF257", "FEDORA:84FBF6179A05", "FEDORA:8514B6312F21", "FEDORA:85B0430979AB", "FEDORA:8657A309BA6B", "FEDORA:86D5D3097097", "FEDORA:87CE1617FCD1", "FEDORA:87DD160648EE", "FEDORA:882916051CFA", "FEDORA:8836630BDEAC", "FEDORA:88EAA30905CF", "FEDORA:89C9C6051B3A", "FEDORA:8B34C608D224", "FEDORA:8B7ED61120D5", "FEDORA:8C11E6076D27", "FEDORA:8C9CB30BDABD", "FEDORA:8E08F605F09F", "FEDORA:8FE7330D68B0", "FEDORA:8FEA960A4096", "FEDORA:91BCA30520E0", "FEDORA:91F3430B4C91", "FEDORA:929076060E6D", "FEDORA:93A083094AEF", "FEDORA:9408B30E7B01", "FEDORA:941CE60BDCAF", "FEDORA:94A8C309799A", "FEDORA:94BC060A4ECF", "FEDORA:973BC60CDD88", "FEDORA:978EE3068B61", "FEDORA:9801060D30FA", "FEDORA:98E8F6079A11", "FEDORA:993EF606D491", "FEDORA:9970030A594F", "FEDORA:9BFED31347B3", "FEDORA:9F2FE3098B94", "FEDORA:A071E60419A6", "FEDORA:A09EE6087595", "FEDORA:A387A3072636", "FEDORA:A5EF730B303B", "FEDORA:A8ABE60560A2", "FEDORA:A8BE83094DF0", "FEDORA:A94C730ECAFD", "FEDORA:A99066078F69", "FEDORA:AA46430A6A34", "FEDORA:AAF643072F13", "FEDORA:AC1C6304E3A3", "FEDORA:AC9AB30BBFBA", "FEDORA:AD122309BA5B", "FEDORA:AE3D830AB4B2", "FEDORA:AE8886060E81", "FEDORA:AF19730979AB", "FEDORA:B0BBE6085FBF", "FEDORA:B0F9260499C1", "FEDORA:B42DC304E39B", "FEDORA:B87A730E900E", "FEDORA:BA292604B38E", "FEDORA:BACE03098BA0", "FEDORA:BB774312EFDE", "FEDORA:BDC9D3090DB1", "FEDORA:BF5EC607125E", "FEDORA:BF8D031075B1", "FEDORA:BFF95608779F", "FEDORA:C0A2E30B00AE", "FEDORA:C1819309C5A0", "FEDORA:C1EA6603ECEC", "FEDORA:C3ED760C452F", "FEDORA:C4D496071279", "FEDORA:C63656040AE1", "FEDORA:C6ACE30A5262", "FEDORA:C6AD93098B94", "FEDORA:C6AF860C4240", "FEDORA:C7391611860D", "FEDORA:C7AFE309727E", "FEDORA:C91E46060E8C", "FEDORA:C92EE30BAE72", "FEDORA:CB0956087865", "FEDORA:CD864304939A", "FEDORA:CF92F602C6D5", "FEDORA:CFC09309E7A4", "FEDORA:D091860478FA", "FEDORA:D1CD060F60C5", "FEDORA:D3523607924A", "FEDORA:D3C883052BBC", "FEDORA:D47CC30C448C", "FEDORA:D4B143098BA2", "FEDORA:D4D0A3067095", "FEDORA:D4F2130BAB3C", "FEDORA:D7C6D30E4D22", "FEDORA:D8A0E3053060", "FEDORA:D948D608771F", "FEDORA:DA60861278C0", "FEDORA:DBC4662F3455", "FEDORA:DBF7C3092516", "FEDORA:DC7DF3111B2E", "FEDORA:E0E2C3098BA0", "FEDORA:E37FD60924F1", "FEDORA:E700F3072E21", "FEDORA:E8332604D4B4", "FEDORA:E9B1430CC2C0", "FEDORA:E9B236090C2D", "FEDORA:EA4F2309E0EF", "FEDORA:EA85730AFE74", "FEDORA:EC29C30BAE78", "FEDORA:EC9F26076D31", "FEDORA:ECB8530BC708", "FEDORA:EDF1E309799A", "FEDORA:EE46664638EB", "FEDORA:EEC036047C93", "FEDORA:EF5B36120D8F", "FEDORA:EFDAB6050C3B", "FEDORA:F015D61278C8", "FEDORA:F02C560914F4", "FEDORA:F12FB31404B0", "FEDORA:F149334E497A", "FEDORA:F41A860321C6"]}, {"type": "fireeye", "idList": ["FIREEYE:D64714BFF80E34308579150D4C839557"]}, {"type": "fortinet", "idList": ["FG-IR-21-228", "FG-IR-22-008"]}, {"type": "freebsd", "idList": ["012809CE-83F3-11EA-92AB-00163E433440", "08B553ED-537A-11EB-BE6E-0022489AD614", "09EA1B08-1D3E-4BF2-91A1-D6573F4DA3D8", "10E3ED8A-DB7F-11EA-8BDF-643150D3111D", "1D56CFC5-3970-11EB-929D-D4C9EF517024", "1FB13175-ED52-11EA-8B93-001B217B3468", "20006B5F-A0BC-11EB-8AE6-FC4DD43E2B6A", "24ACE516-FAD7-11EA-8D8C-005056A311D1", "2F3CD69E-7DEE-11EB-B92E-0022489AD614", "38A4A043-E937-11EB-9B84-D4C9EF517024", "3C5A4FE0-9EBB-11E9-9169-FCAA147E860E", "3C77F139-3A09-11EB-929D-D4C9EF517024", "44B6DFBF-4EF7-4D52-AD52-2B1B05D81272", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "5A668AB3-8D86-11EB-B8D6-D4C9EF517024", "676CA486-9C1E-11EA-8B5E-B42E99A1B9C3", "67B050AE-EC82-11EA-9071-10C37B4AC2EA", "6A72EFF7-CCD6-11EA-9172-4C72B94353B5", "6D5F1B0B-B865-48D5-935B-3FB6EBB425FC", "70E71A24-0151-11EC-BF0C-080027EEDC6A", "81FCC2F9-E15A-11E9-ABBF-800DD28B22BD", "96A21236-707B-11EB-96D8-D4C9EF517024", "A45D945A-CC2C-4CD7-A941-FB58FDB1B01E", "AD792169-2AA4-11EB-AB71-0022489AD614", "B360B120-74B1-11EA-A84A-4C72B94353B5", "B9210706-FEB0-11EC-81FA-1C697A616631", "BC7AFF8C-D806-11EA-A5AA-0800272260E5", "BD159669-0808-11EB-A3A4-0019DBB15B3F", "C0C1834C-9761-11EB-ACFD-0022489AD614", "C4AC9C79-AB37-11EA-8B5E-B42E99A1B9C3", "CAF545F2-C0D9-11E9-9051-4C72B94353B5", "CD2DC126-CFE4-11EA-9172-4C72B94353B5", "D778DDB0-2338-11EA-A1C7-B499BAEBFEAF", "E8483115-8B8E-11EA-BDCF-001B217B3468", "F00B65D8-7CCB-11EB-B3BE-E09467587C17", "FE93803C-883F-11E8-9F0C-001B216D295B", "FFC73E87-87F0-11E9-AD56-FCAA147E860E"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-20:11.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-20:22.SQLITE", "FREEBSD_ADVISORY:FREEBSD-SA-20:33.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-21:07.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-21:17.OPENSSL"]}, {"type": "gentoo", "idList": ["GLSA-201908-02", "GLSA-201909-04", "GLSA-201911-08", "GLSA-202003-16", "GLSA-202003-43", "GLSA-202003-57", "GLSA-202004-10", "GLSA-202006-03", "GLSA-202006-21", "GLSA-202007-03", "GLSA-202007-26", "GLSA-202007-34", "GLSA-202011-17", "GLSA-202011-18", "GLSA-202012-11", "GLSA-202012-13", "GLSA-202012-14", "GLSA-202012-16", "GLSA-202012-23", "GLSA-202012-24", "GLSA-202101-07", "GLSA-202101-12", "GLSA-202101-29", "GLSA-202103-03", "GLSA-202103-04", "GLSA-202104-04", "GLSA-202105-27", "GLSA-202105-28", "GLSA-202107-21", "GLSA-202208-36", "GLSA-202209-05", "GLSA-202210-02", "GLSA-202210-40", "GLSA-202305-28"]}, {"type": "github", "idList": ["GHSA-25XM-HR59-7C27", "GHSA-269G-PWP5-87PP", "GHSA-269Q-HMXG-M83Q", "GHSA-288C-CQ4H-88GQ", "GHSA-2CWJ-8CHV-9PP9", "GHSA-2H63-QP69-FWVW", "GHSA-2PPP-9496-P23Q", "GHSA-2QRG-X229-3V8Q", "GHSA-344F-F5VG-2JFJ", "GHSA-3WQF-4X89-9G79", "GHSA-3XXV-P78R-4FC6", "GHSA-42F2-F9VC-6365", "GHSA-4446-656P-F54G", "GHSA-48RW-J489-928M", "GHSA-4GW3-8F77-F72C", "GHSA-4M44-5J2G-XF64", "GHSA-4P24-VMCR-4GQJ", "GHSA-4P6W-M9WC-C9C9", "GHSA-4PV3-63JW-4JW2", "GHSA-523C-XH4G-MH5M", "GHSA-53X6-4X5P-RRVV", "GHSA-562R-VG33-8X8H", "GHSA-58P8-9G59-Q2HR", "GHSA-5H9J-Q6J2-253F", "GHSA-5MCR-GQ6C-3HQ2", "GHSA-5MG8-W23W-74H3", "GHSA-5R5R-6HPJ-8GG9", "GHSA-5WW9-J83M-Q7QX", "GHSA-64X2-GQ24-75PV", "GHSA-6C3J-C64M-QHGQ", "GHSA-6FPP-RGJ9-8RWC", "GHSA-6JMF-MXWF-R3JC", "GHSA-6PCC-3RFX-4GPM", "GHSA-6PHF-73Q6-GH87", "GHSA-73XV-W5GP-FRXH", "GHSA-744R-VV2G-2X6G", "GHSA-7MVR-5X2G-WFC8", "GHSA-7R82-7XV7-XCPJ", "GHSA-8222-6FC8-MHVF", "GHSA-83MX-573X-5RW9", "GHSA-84RM-QF37-FGC2", "GHSA-86QR-9VQC-PGC6", "GHSA-86WM-RRJM-8WH8", "GHSA-89QR-369F-5M5X", "GHSA-8C4J-34R4-XR8G", "GHSA-8HFJ-XRJ2-PM22", "GHSA-8HXH-R6F7-JF45", "GHSA-8VMX-QMCH-MPQG", "GHSA-8W26-6F25-CM9X", "GHSA-8WX2-9Q48-VM9R", "GHSA-96JQ-75WH-2658", "GHSA-9F3J-PM6F-9FM5", "GHSA-9GPH-22XH-8X98", "GHSA-9JWC-Q6J3-8G9G", "GHSA-9M6F-7XCQ-8VF8", "GHSA-9V3M-8FP8-MJ99", "GHSA-9VFJ-5G7H-4P24", "GHSA-C265-37VJ-CWCC", "GHSA-C27H-MCMW-48HV", "GHSA-C2Q3-4QRH-FM48", "GHSA-C427-HJC3-WRFW", "GHSA-C43Q-5HPJ-4CRV", "GHSA-C4W7-XM78-47VH", "GHSA-C6PW-Q7F2-97HV", "GHSA-C9JJ-3WVG-Q65H", "GHSA-CC94-3V9C-7RM8", "GHSA-CCP5-GG58-PXFM", "GHSA-CJJC-XP8V-855W", "GHSA-CMX4-P4V5-HMR5", "GHSA-CQCC-MM6X-VMVW", "GHSA-CVM9-FJM9-3572", "GHSA-CW6W-Q88J-6MQF", "GHSA-F268-65QC-98VG", "GHSA-F62V-XPXF-3V68", "GHSA-F6VF-PQ8C-69M4", "GHSA-F93P-F762-VR53", "GHSA-F9XH-2QGP-CQ57", "GHSA-FXPH-Q3J8-MV87", "GHSA-FXWM-579Q-49QQ", "GHSA-G3WG-6MCF-8JJ6", "GHSA-GQ28-H5VG-8PRX", "GHSA-GXR4-XJJ5-5PX2", "GHSA-H3CW-G4MQ-C5X2", "GHSA-H79P-32MX-FJJ9", "GHSA-H9GJ-RQRW-X4FQ", "GHSA-HF23-9PF7-388P", "GHSA-HPCF-8VF9-Q4GJ", "GHSA-HWJ3-M3P6-HJ38", "GHSA-HWPC-8XQV-JVJ4", "GHSA-HWVM-VFW8-93MW", "GHSA-J823-4QCH-3RGM", "GHSA-JC35-Q369-45PV", "GHSA-JGWR-3QM3-26F3", "GHSA-JJPQ-GP5Q-8Q6W", "GHSA-JPCQ-CGW6-V4J6", "GHSA-JQ65-29V4-4X35", "GHSA-M394-8RWW-3JR7", "GHSA-M6VM-8G8V-XFJH", "GHSA-M6X4-97WX-4Q27", "GHSA-M7JV-HQ7H-MQ7C", "GHSA-MC6H-4QGP-37QH", "GHSA-MM9X-G8PC-W292", "GHSA-MW36-7C6C-Q4Q2", "GHSA-MX7P-6679-8G3Q", "GHSA-P6MC-M468-83GW", "GHSA-PJ7M-G53M-7638", "GHSA-Q446-82VQ-W674", "GHSA-Q44V-XC3G-V7JQ", "GHSA-Q4HG-RMQ2-52Q9", "GHSA-Q6GQ-997W-F55G", "GHSA-Q799-Q27X-VP7W", "GHSA-QGM6-9472-PWQ7", "GHSA-QJW2-HR98-QGFH", "GHSA-QWWR-QC2P-6283", "GHSA-R28M-G6J9-R2H5", "GHSA-R3GR-CXRF-HG25", "GHSA-R695-7VR9-JGC2", "GHSA-RCJJ-H6GH-JF3R", "GHSA-RV39-3QH7-9V7W", "GHSA-RVWF-54QP-4R6V", "GHSA-V585-23HC-C647", "GHSA-V73W-R9XG-7CR9", "GHSA-V8J6-6C2R-R27C", "GHSA-VCJF-MGCG-JXJQ", "GHSA-VF77-8H7G-GGHP", "GHSA-VFQX-33QM-G869", "GHSA-VVW4-RFWF-P6HX", "GHSA-VWQQ-5VRC-XW9H", "GHSA-WGX7-JWWM-CGJV", "GHSA-WH77-3X4M-4Q9G", "GHSA-WH8G-3J2C-RQJ5", "GHSA-WP4H-PVGW-5727", "GHSA-WQFH-9M4G-7X6X", "GHSA-WV67-Q8RR-GRJP", "GHSA-X3RH-M7VP-35F2", "GHSA-XC67-HJX6-CGG6", "GHSA-XQJ7-J8J5-F2XR", "GITHUB:0519EA92487B44F364A1B35C85049455"]}, {"type": "githubexploit", "idList": ["042AB58A-C86A-5A8B-AED3-2FF3624E97E3", "04BCA9BC-E3AD-5234-A5F0-7A1ED826F600", "050B5540-E4D4-523F-A821-852F4E2CCDD8", "06BAC40D-74DF-5994-909F-3A87FC3B76C8", "07DF268C-467E-54A3-B713-057BA19C72F7", "07E56BF6-A72B-5ACD-A2FF-818C48E4E132", "0CFAB531-412C-57A0-BD9E-EF072620C078", "12E44744-1AF0-523A-ACA2-593B4D33E014", "14BD2DBD-3A91-55FC-9836-14EF9ABF56CF", "14CD7401-C309-52B2-B4EE-AD54900F0455", "18F5237C-DCAC-5831-AED6-F0880A11DFF2", "194C161A-A17E-51A4-97CC-179E45EC7253", "20466D13-6C5B-5326-9C8B-160E9BE37195", "2255B39F-1B91-56F4-A323-8704808620D3", "24B7AC9D-6C5E-545B-97E4-F20711FFCF8F", "25B0D3BA-0039-5AAB-97E1-07A88FE23CC1", "2691C74B-4ECB-5E22-8BDF-7784E321BE55", "28D42B84-AB24-5FC6-ADE1-610374D67F21", "2B8C7714-D2D7-50C4-BEB8-B616BD51A554", "2D16FB2A-7A61-5E45-AAF8-1E090E0ADCC0", "2E71FF50-1B48-5A8E-9212-C4CF9399715C", "32FB08A0-ACB0-5E2F-8691-570E7B806086", "3640EAF9-330F-508E-A488-D3A51649AD96", "37DBE88A-3249-51AF-8021-8619CFD56A4B", "3A26C086-A741-585B-8FA9-F90780E2CA16", "3DFE8091-03AE-565B-A198-BD509784502C", "3F400483-1F7E-5BE5-8612-4D55D450D553", "400AD2B4-EBCE-5934-92E0-C32C59BFA420", "4278B435-D22E-57E8-ABC4-639BAAFA6FC9", "453574C2-C801-529D-A0A6-5C5E1471F1AC", "458891C6-0BE7-5AC1-8119-7DD6B0884A9A", "4754A596-7C59-5BF6-9A77-A9D8982CB695", "49EC151F-12F0-59CF-960C-25BD54F46680", "4CB63A18-5D6F-57E3-8CD8-9110CF63E120", "4D38002E-58DF-5264-9A2E-9E446EDF6721", "4E339DB6-4704-5991-B690-DF8D7307532E", "4E834790-A0F9-5830-88FE-F520B8FE3CBB", "504D019A-423C-50A0-9677-93192F0ECDFC", "50FA6373-CBCD-5EF5-B37D-0ECD621C6134", "5602A60A-886A-598C-99B3-EE2E820506AD", "58CD2EEE-5826-5136-84D4-BCAC28741415", "58E81731-017D-5CF4-8117-A7FAC5D6C97F", "5B025A0D-055E-552C-B1FB-287C6F191F8E", "5BCFB44C-A4FD-5890-AE9A-A60CC135A2F1", "5E7409E5-7716-5F40-999C-E6622B806F5E", "5E80DB20-575C-537A-9B83-CCFCCB55E448", "6083DCC3-CA9C-58A4-9FBC-983DF1E52584", "63C36F7A-5F99-5A79-B99F-260360AC237F", "6FB0B63E-DE9A-5065-B577-ECA3ED5E9F4B", "7078ED42-959E-5242-BE9D-17F2F99C76A8", "7247E67F-6DD7-5526-8312-91D0D99FED26", "72ACBBC1-E9FB-5A12-8614-06BEF5F96394", "743F51FB-8BF4-5425-AEFA-10B2A14C8F3B", "79FADEDE-9F29-583A-908E-676A91E2F562", "7C6A25CE-E02A-57D4-B020-A998CFA24D76", "819C8E77-6773-5D34-9315-B4C7B7C88BDE", "879CF3A7-ECBC-552A-A044-5E2724F63279", "87B06BBD-7ED2-5BD2-95E1-21EE66501505", "92652D10-0053-5EC5-BEE7-CDD2141C7525", "92CE6110-40F8-5FE5-909B-BE6B59186578", "939F3BE7-AF69-5351-BD56-12412FA184C5", "95E9031F-A021-5296-ADC3-71E43A95A049", "968DBE0A-CC05-5F47-B348-E8E33AA33F6C", "9C9BD402-511C-597D-9864-647131FE6647", "9D1AE9EC-AAED-5991-9F41-9458ABC7EFC3", "9E63B0B5-5583-5FC0-85B1-048296D9FC6A", "A24AC1AC-55EF-51D8-B696-32F369DCAB96", "A435389F-9C9F-5CEA-8255-C23422F533AB", "A46721A6-23E8-5E16-B9CA-0C887A66551D", "A906B17D-A78F-5755-8763-7D1AA7E65750", "AD0AD709-77EA-5215-BC4E-82EF1BE97938", "AEF449B8-DC3E-544A-A748-5A1C6F7EBA59", "B0BA17F5-F171-5C97-9F6C-D5F38B5B64F5", "B0E0C8DF-3D79-58BC-881A-52FFBFBDE3F8", "B1E738E0-BF1B-50E1-88E2-1D265CF9AEB8", "B2E1F725-D74D-5E81-88CC-6530BC9BAB30", "B38C8387-765B-587E-BBED-9336E586B3E2", "B4CCD6DC-671B-58FE-9826-B4F9C361A650", "B663ED8E-3FC8-597C-94C8-F7D1BA5DAF2B", "B7C1C535-3653-5D12-8922-4C6A5CCBD5F3", "B9EB8E0F-C53A-5795-92FA-1994F120A1CF", "BA280EB1-2FF9-52DA-8BA4-A276A1158DD8", "BA9D322B-4694-5B07-BD2F-83E700A62DE8", "BBE1926E-1EC7-5657-8766-3CA8418F815C", "BC46DAAE-9274-500B-A6A2-DB7DA8EAF068", "BD05B538-25EA-5C42-AE8D-229D78B57CB1", "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "C2D99D6A-1A8C-5D55-BBB7-34A978AAC642", "C3C9928F-AC84-5B3E-980E-F594CABE8EA3", "C4EDB405-454C-5160-9A99-21A930740C3F", "C5B49BD0-D347-5AEB-A774-EE7BB35688E9", "C7CE5D12-A4E5-5FF2-9F07-CD5E84B4C02F", "C7E2EC97-A49D-5063-BC43-995A0E058FCF", "C7F6FB3B-581D-53E1-A2BF-C935FE7B03C8", "C841D92F-11E1-5077-AE70-CA2FEF0BC96E", "C878132C-FB46-5C51-9D3B-B87DB3578112", "C9BC03B4-078B-5F3C-815A-98E0F8AAA33B", "CF07CF32-0B8E-58E5-A410-8FA68D411ED0", "D178DAA4-01D0-50D0-A741-1C3C76A7D023", "D3C401E0-D013-59E2-8FFB-6BEF41DA3D1B", "D5CBA0E2-A4B0-52CE-B93B-F433CE8662DA", "D7AB3F4A-8E41-5E5B-B987-99AFB571FE9C", "DB8D8364-06FB-55E8-934E-C013B00821B5", "DC2FB701-98C0-58E1-9CBB-F9E17BA3A8A0", "DEC5B8BB-1933-54FF-890E-9C2720E9966E", "E56192E7-FC31-58F7-A982-BEA41F95D172", "E83D6606-6F89-5700-B703-B87CF90D6565", "E95D9A0E-E9DE-5D95-9879-E07C0257318C", "E9F25671-2BEF-5E8B-A60A-55C6DD9DE820", "EA74F876-4376-5A5F-B6EE-1AA5B4690A29", "EF08F582-5E5C-506D-B223-26A7028B4A16", "EF22B1BD-85C3-525C-B7D6-94014939E96B", "F085F702-F1C3-5ACB-99BE-086DA182D98B", "F0ED6FE9-BC03-5953-BF24-995A28292C17", "F13B1CEC-8713-5A1E-8117-F6BED15AEA04", "F2076B48-44ED-5B15-9B08-53183DC5B9EF", "F3523D8D-36CF-530B-85DD-013275F7D552", "F472C105-E3B1-524A-BBF5-1C436185F6EE", "F5E8481E-66F6-56CB-9978-EB66D506B26F", "F60737C1-A24B-51C1-AE8D-73A65C778FFF", "FC661572-B96B-5B2C-B12F-E8D279E189BF"]}, {"type": "gitlab", "idList": ["GITLAB-3ABBDB911ADD0E0B84EE2B79B6A00304", "GITLAB-8D7BA3B78283EE462A6A4B0CFD175A97", "GITLAB-9FA54FEA1F8F04808234808F9BD0065B", "GITLAB-BC05E1FE8806F74AAAA8D9C45FC1170F", "GITLAB-BDDC02CF1F134A78C5E70B135CEA58D1", "GITLAB-CB6C4BF381303026D1C61EF0734B2431", "GITLAB-D03178D3A0CBB9D554B02F99A6139A65", "GITLAB-F3664DEA7C9C3BD1A6B7E11EF6D6F9D2"]}, {"type": "hackerone", "idList": ["H1:1033107", "H1:1040166", "H1:1043360", "H1:1045844", "H1:1048457", "H1:1069487", "H1:1113025", "H1:1145454", "H1:1188643", "H1:1218173", "H1:1812768", "H1:454365", "H1:712065", "H1:778834", "H1:874427", "H1:888986"]}, {"type": "hivepro", "idList": ["HIVEPRO:8DA601C83DB9C139357327C06B06CB36", "HIVEPRO:A9AF072A11E6D314ED458ACFFE3BDFD3", "HIVEPRO:B3F9F66CBDECF3B8E7AADF5951D97F6A"]}, {"type": "hp", "idList": ["HP:C06911998", "HPSBHF3803"]}, {"type": "httpd", "idList": ["HTTPD:5FF2D6B51D8115FFCB653949D8D36345", "HTTPD:8DF9389A321028B4475CE2E9B5BFC7A6"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20200715-01-OPENSSL", "HUAWEI-SA-20200902-01-STRUTS2", "HUAWEI-SA-20201105-01-NETLOGON"]}, {"type": "huntr", "idList": ["1-NPM-Y18N", "3CE480DC-1B1C-4230-9287-0DC3B31C2F87"]}, {"type": "ibm", "idList": ["0014B28ACA7F9997C72146507BEEC1742A1789CC46F9FF03799C7B89A0B39408", "0029ABBB141B6B352048BA2F9DF7D2CCCF9E41BEDC2A8E7CA69432B1B68A991E", "003E808C317FB1CEF04F5EDBEB16A13E730C2707CF8E2423D4945D325E93E40E", "00433CAF266E39F063C2B039391891725D25992A193F3BAAA61C1BA35BEFE3BF", "0066C9EC375123E63AE360D74EC62586671E78442045839C341498FBEEC24A1E", "007DFAD86F416C9AC87345D02AE4005684AA152122F2EE95FE38D624D8AB56EA", "007E1AC1E4228B8135E45C63FCEF82799BD02C157157F082CD8D3E0F0D61C361", "00D824B67021FD76536F27CE6257463F93E0A25CF71D85ADCB3E4BE94949E2DA", "00DD5060E6124BE4F25A4AF7DA83D15A52360F89A1F6A84F1ED9C6E28CD62833", "010EC971C8137CA217EFCF666EC9014A85C2FF0721F787178F2DAC34FF7F5576", "016248796F0D60834A9AE6D8C8659223A06C7DCF5A1BFEB093E2C71A7B706F76", "017704F263DE498C81E38DCD35C1B649CAC8F2B6DA67887C1DC1F132F6BB1B85", "02208B95DC0377482AA2F9D9C05755BE90534C1B3F7475FC805AC14769FE9106", "023AF7CE811F35CB9EA5BD22171F66AA17D83D1B9FF44FF925D320814BAE40E2", "0251DBCB96D0ED10DA628D06B0978F8DE5AB5BDFE82E017184802BFCC0709826", "026861C8F37CB442AEB06F08CB67784AB6226E1C2C5830E2D4227D71E9453C5B", "02740F7656140577EDC311D3FA53C782BE9C2AFA138D94E3B0583A50F28424DA", "02AC3D75FB5E9A395164B03D2835B59279C245C81FF95300ED74B35ADE723D5F", "02FD10030B8366010758D75673B2286A0CD064A8561853F6F314CF7B7BC8B298", "0303FE3DB6883C126F5416C10E374A324E85ADEDF43FC6D681B3D909D291CD2F", "0307FB788EC450B953F9418B6F98AA9C07CA589604E81399E29EEA192C59ACAA", "0319E4F01D8C2BB1E1D9CA642942762AB6D0486EE87445E505B6585BF79E6E34", "0336508687FC75709AB1D96C0DF14CA61FD81A95284DDA31533A99A1CBFC2A81", "03691F1EE0B131D78EA0BD89002CC0B602DB37A603D015DF70107A778260C592", "037DC92C3964B9BE83FE00549FB0CE6C44ACB2D76406400ED57CA4D310EF3538", "03A75A8ADEE2A3CF05A2ED491DBA9138617AEFF976CB3B9F8B7A69B2AE72BF8A", "03BD9C6A634D56977256D0EB02550574DC21A677D8E08EEB57FD8C5F206D469F", "045B3221FB3BBC39DD70A158CACD0ACC0885A17A6B16F3CCA24E243D79A3DFB4", "0485351996005CEF78DD27685D03F13E44B57DA06BF37109C6A70DA7DD6629FC", "058E392DEA73A24CA6C67618B232264C90DBFDFCD4ED83BE148E4CEAE854E70D", "059A77E3EFE81C2EA2227B88299B87D315EDC11B87459F13C3B094AEEFE691F9", "05C711ADE626E71EEF208B57EB92611FB65BACFAC2E002E5DCF15BB16E425278", "05EBC3EA4B66B19728BB66D5DC71F429C8B7233EC5AC3CB0DA401B57D74514F3", "05F3B2BCBA66E63FF50CAB9D4E4610B2EAE6CD3DA38047220611B10B02307DE3", "066CC30FF07EA70663C1053750F35662E071CE8F2ADB63927D6FD5956CB157A7", "06D03D8DB6D81BBB2F401326BFFBACB319A58DAC3E5E25DB3786F9C50548BBAF", "06E45448DD54AD77E13A3A6CDF85E9A5C15F5881E8F05C1E5D3E72BA73F31BE8", "06E7679A0A430591547BE3B839983A91F1BB92D74E31EB6A05B85DD469AC6C05", "06FE50BE40FEE3497F0E530101C2633637A1990675C077F16FF2FB5E0F90CCF4", "077CACE3330807DB9A0479410A548456194DEE66D2F89956CE566945832802D8", "07988475CE9095B9471700FFB4FFB199A58AB32837E3178BE094D53E97B8461A", "0804EB7E524FDDE4C3294460DB5A4485239188569A96D6E3035C9AF003C2B459", "08139CE06A8A5B4E6DECA1C19593AB1C2B019BD2AB5CC530089313FD991614D7", "087CD3B8800A1EB017C933808D8D5E610496ED972CA8243894CB2435705F3CAF", "089B564037CD6CBF124F570A0074A8E6C37E90240BCF8C5297D2EBD444E34F18", "08B8F7A5BD2A4C807B593B79793086AE818A4C18A2CA1A3A38E171A0EA5BD485", "08BE0A8BB84E3BC2898AB7755B7D1A3495C89B7E47A13AF2D70C5EEDFEB7423A", "08D66F29C64E6C39E4785214007F9468046E2322A395BD20F63969686E7E940B", "092A5FFF63DF2D24AE105A3D4A7EFA1386A4FF9DBF7D2F354A30991E0CB4C671", "09859535BBD73886942005381F7140B37F4079C86A8279AC944AB83F5FC012DB", "098A0B0BBDA18721083717F103FE7FB2B2BBE2394E33149D968FE7B59A7B2AD4", "09991BD27DF134FB901D580D8AB22958816A72F1DA9169086D91AB2CCAA0D19E", "099DD49202775CBB1F4948F66DB50FAE41385719EDE85DEF5171C85DA36B727F", "09B2AB76F2BDB96C1D80882C003F4EB4F06924E6DBF0BF3818CF83A2F0AF4B47", "0A2CC076E697047BEB801920E37078BA16894DE0A4DAB7A64E209E04A52ED4A7", "0A5B13C8983BE4491518367535A0427B2CBE5B0B75C8384C4657D2E9D8B12509", "0AF4568867479D47E4352B7E039C8B495FFD7D263FC7B6E5D521CCBE61FFC605", "0B000A0891A3DD2B6FEEDDE868C5765ECFB2CF839563136900F2FFB29F7ED71C", "0B32FE452355B1C3468364CEE7BB901540B1401AA499444B7D5418E694FA963A", "0B841A25DD5089B54804EEE177963CE7CA3A23E107F528BF4D4DE12B41D18A16", "0BC017C730A770E349E300089D6DB71D200CA299BDBFA58821787583FA3F9DB1", "0BDDBA484F3367829DBE683BE155B8F63CE6E7CF5747401F154DB308D91D8FD4", "0BF1424660629822F80DB4B18F2F5A52F9E3B3B4A3C6EE2309A4CDE620DC6FFB", "0C0FCEFF08B70A8890556A0B1964A693C539DCB661117BFD547DB5BBE82E7794", "0CDA7C10442B705C677D939E4525A0FD2BF6C2E3CCD7C1AC57DA125C095DD3F3", "0CF13F8FB4FD77C6593C265FA8F397D0C4324FC1F07F86C436B4937E98B25DBF", "0D15D47821CE302EE87F64871F16E8FAED0DF6B97568D7FF28129A9D318E1F27", "0D1CD2F0F6466904E8614A55941F9674CA10DEEEC78000ED7F7FCCDB2BDCF1F8", "0D3AC1653A7CFC61981BECC263BCD833E5441240DF62D2E529CB279D31CBD069", "0DB781AA08EB5BF3514B03091A0400B8238C108F721C116A9739CB261ED78D7F", "0E8555641D8CDA8EC9035ED3EB5F648F408D4DF211176B6798C8D8C65318F3F5", "0E90BE57477FF48A1B6656796E64B27DD2F0FD10BE811D20B98E904E94B3762E", "0E93ED5DE66ECEEBDC351B52A02102977F0EC054248E1231FACE079530976EB4", "0ECBCAAF17194C060682E1B26E2EF9F8F8DA5EA1DAFDB2E39C320FF040DEBF75", "0EF2B3BEA4403B998499114AE5D3693C840E985B7ECCF95FA6F6834A4F819197", "0F297F5F87FAC22F33127BF32110D0C0B158B6859BCE9E0ED4EB35484AD06F6A", "0F73246124CA58D05064BB5D07082DCA6F2A1D48630CAAC82BCFFB4A71F45CA7", "0FC7CED4B78FA51F433FBF3BAC439FB6F67980E97861DB61D5E227DA0D8C5CFF", "101D9839DC4D3A67F5CA5070D8255AEF01378A1F2F94126A2F00868A71C2B71A", "1022F1A8652F556CC61338952DE52ECA055F8D74B75EE7AF0120EF547C2DEB6E", "102B9B7DB920309348807B9EDBB8011D39F944480E9B123DF1061A6D4163603A", "10301FF6336C952B90C3BF7CBE84C410CA8A9F2722C29F538BA2BF6C7FFD1A3C", "1040E61D553E5D96DC4708670394F1131FA180E0AD28D8BB14E0A6D5F43E9C82", "10BC2C3E71D7BE838D7AFB65577146159915718411EBAA6FC48E3F7023189237", "10FBEBB14A30BC73B75E0DF3E1AC14E07BC218A2AAE122217F23444AA2EEB55D", "11CF4631DBE6B658A508429E589E135C8DF8945F214E1A5F66CB372FF4056326", "11D50567E527C1FAA2CC7E5BFC7E0A144943437DED5DC6E20F8744DBB47E7648", "120453FD49EF11638E39BF5B4DA62877D1466CC197735D22DF4F46D76D9E3EFE", "1216BEFCC877765223CE187EEB457AD44E77DE77B9A00DFE2C29DBD67EE87D6C", "12333AFEDFBFAD6D25D8677FBCED3D9B79A60115DD4D276200CFEDB506FF254D", "124495DD455D7F5D1C3DB0D3404B8054E94AC8A5A5D620E6E377E96048271229", "126E1024546918D07264839DD88F2FF75D58789A0F611D0689966886112B533B", "12EFB707E056F27AA11980D2F9CC90B6739FAC22EC63709581DBBBA13033E1C9", "1326F316F94A2B8EF7EF8FF595BB760A1583E388BE90F314F3455F0F5A4DDE24", "1360BEF97E01B87A4E58CA581A1F32ECD385845F24783D4980B6E64F68F389FB", "13A7CD5F3B6EA41927871DFED2B88C78727B03B56B4E65C6A651F0E363444695", "13CEF3E699B892EB8EDD7E52729E7EE991B647FA5B215D74BD789F18036E95A9", "1409CD05A45669BF88F7CEAB610D65B1F84FD0522659550C3AD802B5214CCF7A", "146E5B6C7DEF48D9B9132CEF69C4B99A3655374C8A833C5CDB62A212794B3988", "147EB4D07985CB7587528D1FBFB02A47595F2094BB3705844F8CDEA4FBC9E359", "149236693C3EFB0834C33EFC100BF77DF7747461162DFC42AFAEDC312B6B7A36", "14A3992D6AEAB49B53E2E2EC2A0DB3A1D7491212EF4BFF3A48607684815FD89F", "14A887E26BDEB476941873D8603CE7056CDC1B2DDE8715BEE33CDC5E12E4CB69", "14C97104BCF75D000EB0338B3459ECEA0D1ADC44700E4D1225D84D331BF1A88C", "152DBBBD89777F049F222CCBB92B4558AF83750C87593C90CA6D85B18A25D750", "1537402AEBCA58A04823B2BD9283E713BDBDA32FC5EB538F962BEC65B5EA0627", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "15EDD207F35C78C838BF7C8772771732C1FF8B232E352EBA84C90F297CEE11D5", "16097D10C16187FEE6C6D0C073373A94CA846504BF17F40FC2F3A9424684F9EF", "161E93A17C210873A930616B7AA642E8DECB548C126F51ACBF476947F04F5F46", "167951D4CB6682B161C7C63B81A840E45EF18CAE83E9A3ED32C423308A35D68F", "1684DEC3DF3BB9E78C84E76D9D7057965A40ADC07F69C113F4E928D34BF0D671", "16BD53FF8D4AF4008A6B9480C8D62C5AECEF46E4F486EC150D2D9BBC2C7349FC", "17179127276D2C8BCC739D66B23A070D5DCF232A120A9E4EF31DA0C49E8077B9", "172A294B4E2CF6C12D3CB6DE7719E22FDCF3394F3511D668B2CFA99B26749D80", "175009EB341D97448B52AD259BC76696D2A9138DEEB2C7A2778DE2B09D846193", "17D807157AE85FF3E12475E26C42C266072688E69F2D7B363DFB2920E4737A6A", "17E2A2234B8EB1A1FD88875B4639DD7977B1A0F62BC6D5F9D6C40BAFB9288E47", "180AC5D7287F51495B95E36020BFF2325D0F58CB7C4B6EA71A4C3D8EEB389808", "1816205804EFBBBBB94018144A008A33799E226A9B559AA545872E5FBE25A885", "18620B761A4F7E6873488EDD7E1CDC967A96C7C3E1D9E6AF924585B3EBCCCC9A", "1884864549E9954D0DBBE2AC224F348D2E593A0CB7BB89635A0316AA5AAFB22E", "18E3835EB48610335189B66CA3B787759BF28CEA62D84163A3574C70FFE6874A", "18F70AA47E2E43F4DA8767A4A95C24F6E49AC9CA2DA52A0DD0B10595AB37B715", "190680E40A17D3CD839AD41A35BAAEA69C358A05CD874B5D0B4DBA1097C68C1E", "1914476FD091A15E96610F7BF31547167EE2615FDE4E5D3885C1359FD96241AA", "19C4C882864E6146FC051FFD0D6639DA7D33478F602126A11F952529D4692F5D", "19C76C5B3FDC0D71CECCC0547185F376A4CB3B63C7810C50C2FC2E6DB2DAAB2F", "1A030187296C45282C7919058ADD8AA1992811C3B3D7481CF22AA0E13A7F5096", "1A13E6CC79FCC83DDA9CC9D0EEC387490EEA3CB0B10BA19B2339B66E13D368F8", "1A226F41CCEE49F182D2CE6E2913B939C921267EC05F27A8773B9DAF87654A6F", "1A35248CBBA17AE981ED0B52B133E7CA1678042C1A9C93C2EC8BED2EF8994420", "1A4FA3B5469D18137712BF7AC1D07484A80FF90FF9C73C0DAEB585280189A01B", "1A7668E81452E83AB00678328095567DA17543F8BDE6DB1EE678E96C5B064FD6", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1AA4611E8CEF92D7DAB3035A8D24E6E9D88F1CF99EEC6736B41463D5EEF4773E", "1AD1D443A812E31635C257C107A94874F8B4C76399451E955FF84E25916790A9", "1B0ED4A3526A4957AFA5966EC1D954AC93826AA8F95F1EF2E8A3A6657E73F691", "1B99BE15EF0865EC7D6CAAD98E1510DF110D3FC32411F14658640A57804FCBB5", "1BC1BBD2406B2A6EF54915D3A9F7303447F1E9A74BFAA21C16496E625A76B261", "1C1678518312F18585D48228E2C4D89CBF458CAF1277708839EA38E32D0F11E3", "1C2B1F5888896B1434C4030A2ECAD60A72F097817520C11E7B2E61D7CD497A9F", "1C517BA9FC0472715C27405CC1F49641936D0DD7D2A6B75FCEAB32BAE2D1BF64", "1C55CAC6F2BA9EA2F9C79FC550F3069099AEBD5976424CD8A7D727271F1DF182", "1CA02D1630693BDEC96DE2519DBFDE95238FA85B0FAF06C3B850DA65DFF05E19", "1CA5EFFF48503220FA8729D288342161A3477C54DF435407E3869B260531E400", "1CBE337FF050BDB3D7428C429B0D632D927462CA2D4256921D9DF353A64A68D2", "1CD24D9BB6CC6131994412DB4971F1CBCAE6B1BCF0242694237661B1E8308C5A", "1D33780165CE03D17A585E899523DDBE511D21519995012271E87BD93BBC146C", "1D58139EE8E4B7EBF966E04A3481F7E3158581B7050B64797149C45F8E953D84", "1D6097D0A6BF254EF69F7263F555AC03F9D2CD91725BDEC46126F199CDCCD2A9", "1DAFFF28AC34C8DA1A937E9644BE4D8E8B813CF125F13D52F12ED92015236660", "1DC9078E2D1CA7D5784B1FC9BDA067B8531DD5665DE952284FBF28A882CBE820", "1DDE283631D7E628B7D2F4A7678B3D12963C552E56F866B3FA77E479E7E818D7", "1DF12FB692783635DE10020C233543F032F1D4FF83BE360C8CD94064DBF6CB64", "1E236D9F26350B681A529BCA89C1DD7A00E417E70E5D0AE5428703E999445FCD", "1E239D8C4813C8FA705CBB86F01F323B29B73D1086FDF65021C9CB4B0146A272", "1E31E5192E10CAAECCFE249B0EEB57518F8681EB105FB477D1D108CDEEAD4DD9", "1E526EF1AF9493D4DFD68A54DE20164B19C56298C4825803A217A2A0D1ABCCD7", "1EB9F8573A9E928E14652E6C4EA6633663E35B33C744263304C0A5C14EC87569", "1EBC77DA43FD0C2AC1B3FBFCD06096623AB926F98B7AC6367589E5222F2115BC", "1F1DE6AEC253757076B31DD34F214015B5B41FF17747603D8B3DD39A6F27D12D", "1F716F8DE6344CD6DB2CEEACCC3ED5CDCB2FBEE87D93FC53CA7EE8D23A9BCB30", "1F74C18809B4642477D9BFB857B02CDCE5F1FD17731A7F1BB3FE3345BB84EBC5", "1FEA014B0C2FDFA9CD279E4CFD9E200E38418FF00A5DAAACDABABCEF7837D1FC", "1FF8E68E83BF3DB2672591959122E4AFEF74C0664CD23BFF44CDC08E383E49EC", "20209226CF708BF44C7840FD584A6E597BB42A22FD1DED4CB30C9CB82F0400F6", "20372756D0D4D41E4530AE121905256C2AF155E987D21A7B2CC7D85274A6AE1D", "204ADCCC258487D6D5F8C848C95DAB38413055F4AFD05DFCF56FD7435CBF7C69", "205D8E291F00D69928AE2777BC3A52CC5094D59B30AB5BF479F77703C17C0EBE", "20763F2B27C66C722124CBB23FF4ECBE76431735E0AC6E1F94E8999CB3A2CB25", "20CF2AD2EFF7DE6AD8F93586D48E59262F447700FFF48E5E610099B41CEE05B7", "20DAAA2A40C4A633F7230B8255F0CADBA6E88A77DD305EC21132BECBFF011089", "210BE5BCF995033D93AD152A3413E946C87FA9E242CD051D6228488AC0FD790C", "2111955F2AA016CDE9E98C0F42BF600D3DD2BEA5694E99735DD169E4E8ADD920", "21142DF71EAD09193DDED15561CD1A43227AFDD0E8979F78556DC466663B350D", "2131D99BFAEFE3343A14AD9ABC5F0D304F0DF1B269E5BC2555D19BE72A1ADCF0", "217BB6C17A6FD504F278CE0259F71540873D9ACBEC02EC2F580CED3F0A79FB4A", "21D21B6B900E74036C37AA6199307658F5132BE9091971C8994946E3A890EE51", "21FAA8B3214081B02B5CB45D8150D70F352C2BC0EC67E463FBA7D35DF6B2614C", "226FFFCDF94FA8471AA279C7EA3B887FAA510E3463B5ABDBC303B7D6583EE6BE", "22794D277867D05D60A4A8B81178E1E278C8910B8FD88EA36F11DE159D85F815", "22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "22FE69B31A10A2D1A4C8753B638EBDDDA55E81977EC4563B990767DDEB64861F", "23258712AF0C6FF3D199FB0C84691351D550E3A4E86DEF3F1A107BF53AC16647", "2325D4266908D6E2E1036A3CB699E90414BA7A130ECC4A96E48EFAA7D1ABBDB2", "23D411D68BFED5CF1D51704608C604C493F6C2422CED07555BF04D2CE25673E8", "23E1A8234CB28A1958E6B0921DBFF41F837627FC7FE0AB52E91697295E3B8DA0", "2404E42A6AEF9D8505CDF5F29071088D46DB039426A35293F5767A7820D62316", "24998913BBA24560DF90F23DACB1EE1AF91DAA3212C9A03EEBBD3A5EFE2155E0", "2537F49BC389A32095FFD04DD90ABD8C245F9F959B3040D4B3B584792F460CCA", "25397404A49A13F607BAB2C3AB213E098E878D383B3AD1E6FA8C841C89EA04A7", "25465AE304B2A76CEF5AAA7B2ED23C6230565ED22DF8525A608DE70FB394D75E", "257282661EC40294AA6CD7D16D142C7D834B7703E989C3E4C143A5B9AF27C918", "25866EAC5116B5C36C790B49E143D8CC4258D3DCE1C90FBCAE80E34B6D66A383", "25ACBC37BF847C07DB268F19D48DBF40D18FA806E20FFFCA0C1E2BFEA5CC5FA1", "25D2E41063060A04C79B1BEA256E06B67D13B6B9C57B7E667497957B4D4944CA", "264C961BAB10A4BA0E7567F453354D59B642C48BC97915D2754E4EB195A5BC6C", "26ADEC61B8C1B41EF5FD239E107632C6411B87865AB620585E02973AFFB623B9", "26C2D2D50BF66B18D568B39D5C0159D92777EF3637170739E97769DB93D44C46", "26C5478AF443551899CE3143C82F992134193151BEE1EB85465FB332E6A47256", "26D8B9BA25346A1142EC41EC455309415D14076E05E1C0FE94BCF3C77CFC130B", "26EF104246EE173B8FE798F20C9B0F499B3C95857BDCBB8E535C30A87C5C61AB", "270059310308ADDF90FB6FA65F9F800BC7784217CB7B74FA653E7420EBD96506", "2728A54A733C1334AD5FF98B90433841FD176869AA41A20F157E87B17EAD4D49", "276311EA26EA41FBAE81DFB3042788416A0F2799192780CD6BCD5F7081C47F5C", "278B33580333ED28E55DD7063E392BB225BBFB1BB954C108D12E110FCDE077BE", "27B11849CE393237ADE7F7AFB1B4BECD78159FDF9951E5E30FB407F9DFA93273", "27BC70E2EA08EE1D00F1DC696806FF0E8D5E261D13D8DFE4629529B49DBE187D", "27D394FDCFC7CCD676B6A0CB669CCC21028A62B88FA5A040852A1E2BFAB5D49B", "2845AD6FAC4EA95B559A4E380E9C11A324976019B59ABF05F3BD5C0D71A9860E", "28E0CB5C99EA2D9D29E76348BDEA32969117AF8D0FAE1B64E67CFEE258A643A3", "28E1A34D8B7AACAE238760E03EC7DC2D0E6A35DCA936AE45B1D6CE580679D06C", "2955FD677307C59BC4E381D8CA0275D629803259C2176CE4E845D6B42BA2E178", "29FEB4BC243AF3979A9988871B7F5C155C9D2A35DC7B74A7FF221E6D9E7BEA57", "2A1E47DBD233FE789FE30CE03EB01C4E46A020DBEF4F312E3EE04541FD0B1866", "2A203D8BF52DCAFF8B5E95996A1B55C43D9BF20BC5F58B0B4D388698819D6CF7", "2A3BE29C61AB5C206E51A18D7963A9C32350407C526C2B7F696349BA022B924F", "2A46921EEC2CADB61365DF806BD35FD7B978A8C2F7E52A8A76CFA6C311901F49", "2A5453A8FC9EB27F6ADB0D211CACAD0F8DF506F7D5DD5C0B520193CF9BED6583", "2ACAF7EF965645E3B6441E6A8A68E6FE8B309E3EF7A1558180C489C22189FA2F", "2AFC5A8E16BC71AFE3703E0DDD6A01C2DEC758FA5CF41D9AFF831AA67E5A2468", "2B4BFF0D4D521D5012752D32EC9AED8D7B42C9CCDA58A0989CACAC0FE91E3799", "2B8ED03AFB64688F7C236312BC8155AB0C092B0BB10F225899EEE28BFC95B925", "2B9868CAD288C14AFDF0F5971D15B862C2D321ABB30241C9D87CD9C59FF9BD03", "2BB3C8004E1BE7B6685F06647AE6C9D2DDB7E23C1ADF387683986B3217D061F7", "2BD4C17835FEE75B5DD82D43E16DF6D6AFA1DE77CB24213DFD8CE6D73C92BEDD", "2BE1B762E9F077419A696E0C1B88E2D3F236BE3549BFC2182468480E071BF032", "2C070ACA838DF756EF2C6663B3A4CC8D6546936B4E9067A8CC8F4E89004415FB", "2C1B7E62B248FF39626000CF15C85771AA08F4D695FE4DA8F2B707B4FB16460B", "2C7412E482349885BC031D8092C58A0522256DA1A334A7F460ABFBD30F40BDE0", "2CEF62C50CDD94A991768F05F02F6E909CA28C3D65E1DDC9FE44EB80961223F7", "2D1C0AA1418FBF47302662148F950E7C026FF064EF3B9F6614CBF0F8FA30BD0A", "2DD33EDACA0BB82F4B5458A08C6886655FE63C68C3DB81837B804B712F21638E", "2DD5C6727E4EED0ED960C2D5700AB7EDDF488FF993374321E14841F44202416A", "2E01377B53F391E376F1759320631A1C142B4E58121781793F84A5847C6E21D0", "2E0D3D0CF86F6C48B680F76C93BAE1886AC182B679AAB019C0AA49D79D2D84BA", "2E3576FC9DB523E4FB2CBA935633AE28BB3DCBE18A90FB77A0F3E1112A899144", "2E4AE144A0CE46F0B21DDCD0E57D2F32B9242E6EA360EE8F749F9D2219693213", "2E58B569B4DB4763709C8CD7E2753A53378BB27D938664EE87B306305B546DAA", "2E99FBB731310229E5D67CCF834D84A3C63F588068BE4D2601929B95EFC9AA89", "2ECE3B786054F61CA595AAF0F84D1E826CED90F49FBAEFF05CE55C1F8F413D29", "2F2115F5724B651AC6B9F0B28265F93BC7C9AB2AC6ADC0181AFF86004B79A417", "2FBA4A0FB6AAAC5B96D5638614DE0F0DD6C37754E93BCB6DD5A92FF9E1771D92", "2FBDB647A432042A10EC78183C73C0F6FB59930DA021F42ACDA90C79715CDA31", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "301104FD8A64B7CFFEF0D7B773C4EB91D8D4FF589C9D5CCC6FB24E276422E1A4", "30A5CA62F6580AAFA852738DF5325C812D685A3292E94F7A9E759C1125E79A0A", "30C160035BB3D7D8CCEFC976E9A66E721135E92A5F2BC6D96A0922DAD970B145", "30DC450AABD11109A70A2AFC8BA5DC8E8DEFDC385B32C17C4EE2BE3BF55721AB", "30F31D61B76815116E40D478A4FF3D7F4375DE5C3DE9AF0D9789BB84723A1B12", "30FFFEA2FE2E4E9AF5ECA6DC17AE2B44C7349035512A5564E90395AD4D0D14BA", "3155E4C578E235596C383461692E605196F27EF7EBE1510C68AECA994099E83C", "3182625767F77414E4F551A3C35D21062B444542453E79F9D8C2AE1D16DA1DD8", "3198DEC4E9D947362AF3768731656BD9FBF79E754C34F560CE23FD3D14F37BC8", "31B1064DCFEBEFEAF97006340D2D1FE860DC4B79040635ADA444CFFBCDBEA67B", "31B52B6899B60AEEF3E2FDB88C6911775AAECF09577B42C5714529B9E50C6861", "31C0D6F0198B5B32668729F457051BC27E8C565F391B61E6339D7B6015170602", "31D774CF733E3311087AF9DBF776C5768E99CD088E058FFAFD8CB6ADDEE91194", "31D7DCC8D683A82E44671DA5A38CDC1A58877727926C937FE8D9FD9EE9FD2370", "31F68B7BB58984A435894E3513751A284D142799EBE999CBA3ECA2FAA67E6C16", "3269D53D796DE6142CE9BD0E1B94D97873271D1E5CAAA9941F4536CB81D160D3", "3282DBAF074AFA6C97A473357736E8D5E80D6E12F0EAC7051F513FBF50E6124E", "32899B6047FBFF28B427CE61C2D6723F075F80767724F31E8E7087630D7F7EDA", "32A1E3EDC609BB78C42FCFF916A38DE2C67C968AC7A60B68DA1760208CD96EE7", "32A552C9D601D5556D9E77A4710C33359E9E59554828DF5DF32E88FA7D8B12FD", "3323AF07D4905315C3357FA1A76F4697C9268EAD4578F869AC69CDC347B3010E", "333592CBE804FCDFDF74B8FA13079F97D5B02F69AD7FA9A4515AE89BF6194975", "3338DC95220D2E7488A5EECF8C3CB0E737C1D3739387EC9FA725E0249DD8FB24", "333C119D3A0437BF92826DA551039CEEC4C96ACBE2B033BC949AB1809D25154B", "335243CD3E153CE71F83C1E35358A1A6961917FF347D3F9AE3F81167F8B8996A", "33F2BE5B3163CCE6F404E0E0DC6BB6A2C755D0AF8F3D67F6910CECAD65EA3623", "3410A57294243E5BBAFB4C69F17AC837FB02B049396A85D095AF16279272DED9", "3443CFC39DFCA9DB7D36765185173FAE8A5DE1BFF01B1EC7DB085184AA97ABAE", "3477DD0939B4B8CC59240F8DCC09305A2F7C13CA45285602F1755CDF6F593B52", "349AB443AFC0F9A0DCBBC79503DAD80FA9D227155C9781FACDB7620738CF7EA8", "34BD53EB31AD88FE6BCD0318A3283205983F8374B4E36C18A2AB87E881443510", "353C8048EB40D7C11CD60ABB9D7F5DFD666EDB60B698E9932FC1A04919041609", "3573B8231D7FD55CF0A4EFE36C172C85E85EB9016219840B42EB0C20410093E9", "3576FEB4DAFB79E3EF7C0C201D47295310F8BB7F0CC0C20D7FD3E8EE3350C5A0", "35774A12657731256610BEB1ACB2AE99C105060354AA560F82DED28AE65A8B24", "358DC0980F7932DD14B85959C6700782E8655CCB3063C8C48A71493831458384", "359D81A32B636B6B41B26FA1EB195DCDD898364CBE4C284C377BC53F3B665B24", "35DB525D4E07A09A6F2976ED4B93F380507E2F51F096B5749BE6E096C57DD8BD", "36006A3CBC2B6ED4FC8763C3659F749848C9FDC3A7A23F5C510E43FC3EADFED4", "3617E5DB629BF3E4966913C6CBFB7FB0D83FD9726DE73DD22305E09D36598E97", "3622D26BF2A8D7905A43AF4FD3847F31535F225DEA877486A8A1D6D670A79A1E", "36565348F4E1B0CCDE0AADC411DA06910C9187D494E861656F2898FFF80CA633", "3669E45D7FE2AA83192FF44FAA60FB349B5D39469F2B30F7D69463B2868B4908", "366CE799D9AEE4234CE4D38A22D774A769300127F0319D9238DAEC27C48436E1", "3685B92248F5EF5F87E22332608BA77B6E0CBEC5E65184E9ED006251D92D1762", "36F5A24A0FE05876D471A20F32BE0669E453AF841B04CDD94792F8F80EF7F4D4", "3751D59918B26EEDBAC0FEE1886D1A118A9D2105E993222B09C299A55F5D8424", "376BF79A42FDC2B79EA0ACE3299D7D2BC084C5F6732575256A96FE46F43D836F", "37B1C13D57560AD2D5EFC78D9765E406257D9DEC561AC751A89056CBB0B78CDF", "37E104987DDBCB98288C981D0121D7E0E9C8345C5AF2BCE774DAAE155427E747", "37FEDFA5DF3F0060E544688E9EF0F5DB94DF9FBB54A45BA5388CFB35F53DA927", "3806864362596B8F499C9B331631D79EC751CD68B24068ED9B36CFB553A6D005", "38230E519D378DE2DC75E630BBE3083E23728897D6DA217E2FF09CC4976D9E4A", "384C2E2A2A7CE0D7C1ED343860F7A8372BBF28CD038D1B9802B3A13C761159CF", "3851D26A1B7DF88EA8BA11EEB80A7341FC47BF9EE9F99E03682D841ED55868A9", "38673841651CC84F9C5F463EBAA4FCB1CD8DB260C4DB4DE5C5EB13515B8DE043", "386787210638336CC8A4D4477798C39C1093AF9F1749D0FFC4352CD55B67EECC", "38FAB199DF9F4E39A65615F1E108853EF74C41252303325B3AE91FF543CD105A", "390281289B3F4343A1E1F6452AD13173E9D0CC35AEA58C89794C77A0CF60DD5B", "39C354245E58DEA5508935346917841B7B505E810D13B316B0E6615AD25C04D2", "39EC965A32E4731457CEEA02EAEC841BAFA28785B721AFA4F5396AF6EFF86877", "3A0EC58D68A9FF044EFDD59A19016C7F96E811E1FC47D2E23F42FDF074B43F35", "3A3862BB2F5CF16B0EC3A6E37BC6259A114093A112447E385C778F568E3A19E7", "3A934AE5E3EF3AFC43B24AF0991F5D43670265E33F7583480D6AD5CFEC251C77", "3AB9E06E0036C8F4205D0B9C799D43CE7751D6227E9C183F98AF145F9DCCCE6B", "3B8955E90A75DA2251988CD12D1FDBE7CE404EE0628540DC232E613A0739B512", "3BA65632D2C38CB6B2155205BEF7E978F1A0061EDF59190756A9E0B8A31E73D6", "3BF2E5B5DC96CFF6560CACA72BDEFBC18C7F886DCC73DD4BC3A493BD7B4647F1", "3C732FE7415FBA3DE391A641FEEFD9EF355B5481A82CB22A125F154F83F4488A", "3C757E6C207C325B90893148C70649850957A2F8AB27DE4E6D68D3EA4F71D013", "3C77EEA4EA6840E26E70F8C3772A9613DD661BCD8208A914A074E756E3761909", "3D1FD9B5927004B8B7B1CB77FE467A67DED4E5A078A791448C81D1500BA2A09E", "3D307C26AD38224FBB6887FA744256D8B485F2828F3491E37740B523C7D53134", "3D3BF59CC576F554C3F716540167D85670B56CE61C0AA690764AE05CC62E23C5", "3D3C4FB3DC4BEAFAD73308AFB9445F4931AF1CAA76C3F7953545A147535F56AC", "3D8ED3F19F14A2F659EBD2B5D86396CA6A5E21211208D2596BB5AD2E5190ED52", "3E261B96ABC6FB8DAA7E70DB43FA7ABE715188074A159795BC665B68C81B1FCE", "3E3AF8AC7BA63076BEE8FFB670B3A3F27E0903C83526E54496E50EB2DF74B875", "3E676CEE741F035B426AAE7DF3EC83BF7941667EB382805D029B2A95E65A0352", "3E6B657C015C16954B98859793FD033350A73E948A9B34DC9CE852E2232B7B0D", "3E7141042BE5B9E1A55ADA05F6035C03E394EF7DC2BDEDF57AEB4C33DF04D003", "3E8AD8E5AA3CC6B39E8DB40BBEBEB8A2737CE40275360EB8D2C188A14A72D4E3", "3E90D8B117724A689CF205EB148C972A5AC679705260655DC0A260183EE9C99E", "3F1E93CED935A8B73DF4F559D8444A47F42A24D3C4458A3E6BDE3B7C2F9CF9D0", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "3F62FF7BCA470B2753A8C7ACE1E94B0359E450C5B2C2C9EFB3CE8BC574F7E77C", "3F8BFA161D8ACAADC208317BA26AAC30EE1793F948D454DB7BC13F5155B44393", "3FA2879FBADE8540F6B4D5091DA5772A30EB11207B58722F47A672ABFF7C289C", "3FE63A3F5C5015BF12CBC5431C7DB0BF49847105404A82C433D9F62224F6903F", "3FF772AA30D91592B94F6E275C504EBDE9E11D165317B50E5C7F2CA30B74F1E7", "4029D42CC914504E09EE100B22AC6776680410A3D499885D657894142CD104C8", "4060FEAE2D8470B62DDC84A48595D6C7603D47471C44652E3605D6624835C6E5", "4084935986C852F33CAE5E0C10EC1E67A016C9E964B3DE71ECA876D7AEB0B93E", "40AB54AD406F2338CEDC99E69986ECDC190917A9D711E806EACC78563FDDE00D", "40F7CBCFB58A3B19B3D79CA6DAD7B6DC2BDC641FF8B170D51B354FDEBE613E4B", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "41063A36A2C63F34663F2A3C79F5A2394B4CC7D0583C0E1C239BAF86A931C49D", "4115A90D37196D5FAF4484121B16F2FFB94D03025F3E45B245A4E195BF680A73", "418A4C8D1E8F2E8A923DFE2C36570B4A5EF7B515E050C0F19513AF3DAE7D2628", "41BB6A57FAD3A6133AC798B9A434DFE0BA0E9AC64CD3258AAECCEAD5451AF287", "41CB9666A88AE67D4A0558674B8CFDA62F160B6DDCBA3C10576515447887CF12", "41DF23CE2735413DAB9CB5FEC88B4F08F99AD02C93EA5246E5E57959ACBB4A3D", "41E5114A4BDDC5721ED193477AF4D7766B975DA049CA337ACB35DD35514BD892", "4285320DB515A7DDFB31B8A5AD1416F144BB7493D6D7B26DAAA6134A677B2AD5", "42CC68EBCA8D48483A0807702A9211570D9B3609F86140DACB3FBC0EF6CA2BDA", "43889098AF27B56E1AAC2C0ADC87D15751A2B0CCE3BF25260E32BBE3CCA7CE93", "43A059A4F1BC57350A1E035C01C61052FD9A2C0AA72377768D010CBA020E335D", "43ABDDEF8A51FB28FC8C4825BAD26A0A25F5F21805BFC87561A0AEABFD065F37", "441A6459C1CBE843EDD7F5C4D862AA7C6F90584EA901F82EF1B6D31B418078EB", "443D72A50EC70BB907313144DE326CBB62CC442B470D6915D9AFF2C8F6E0D2A6", "4462F68776C0B9CE996B1CDD6E1466E18E772BB0C1491F3161CE6D6FC1362DD3", "44AB81145F56D1DFCE25BD0377256BF4F249F090106634935902C6B2AB63091D", "44AFDEAFD41860F69D32A81AF82FFCC07CB70BCD09283311989298641C60901F", "44B0022B14893C294BEA44555B80055369138F079E5C801EC2449F2BB64AF930", "44BBDADD105197938F540FD4CE3785F014A665D16F7814593D2D617671C1231B", "44D4BE9C6B3A5CA2D7E393A0C6B1DE6752C9B6BDF8F6BC23CA690D4063D3152B", "456A44C73802C0210EF9039DDC2F2011CE64D16EE318CB2485594AB6312D17CA", "456B2EB80A04726EA1ABA567940D381A0E2976991206F33CA962674055ED3FD9", "461BBFF276D2BD07EE935B18691B56E01933360B1B42DAE8AAFFC1167BCA5486", "46408A14D896F2590474D3B129B44EA3EC035B71D283468445233579BDC6BEE8", "46CE56C60CF59C2CE96E832E3949D9036A709BD9A0B3F2E5A02B11F84C34294E", "46F19B07C11D71E357D28FD4B0BFDE347B5C2272A359685427860584D313AC3E", "46FAA835435B75C9ACF0355A61E51FB1D066AB3F9C5269FB30BFFF04C2C7D336", "470748236CF687BBC17C70DFCCF5107CED7FA6CB57B3A02A0A94855B02E20BF9", "4726D58587EE8412D67A331D82BD496807214AF416DF9A71BAB9B7D943A8F674", "47274321AA3430917FC9FF88F99229CD7614CD6268ABCD535250486839A8D636", "476B017015C7BC4F8F39C2B41A3D687C1FD9E58B44A524C0A4CF05B7ED875145", "4777AA656AFE2A7E99CB0D93F8BE73D4229AC1A8C767E59363E711B828FD7059", "478179A4FF7D7F88209674CCCA14AA5E28599D1CB2F8DECF2A69F98F78B27118", "47A9526430C9C366FECCD6852CFBC71095166B7357B960378A8A4EBF55B1FBCC", "4831008AAD7ECEB15BCC2AF6CA0B235A90580284A36262D069AC3AB661CBEA80", "48478BA5BF51629D45FAE9220538ED95DEA4B48A5153EF85A2E4E8D4DEB4F9BF", "484E80FAE1A14CB4A5381B80BC5D666F692E35EDFE6C47B8F37C038AA85F3417", "48743691B199137A582CC22605BCF99658033695C6D69E50041B31A074707355", "491394DDEE034747D7811D1973C25BFF278CF244B77553F19F191E2CAC5CF3CB", "4952085F3BD03E7CC52280C0BE2E118F3008773DB8D56BED9FC98936BED85E5C", "495FDB911AC82E9C2789BC230DA3363EDD3AF8344FD88833AC53A4000FCAC1F6", "496D1442E6BA8A6137102D042D945E6932A39AD824C40F1EC57D3D14D4666E29", "4979AE00A6ED0C539B1400C19C9582B63BBE318402F26C5329EFDF836AF802D1", "49E9B57EAAE5DF04272F156A9A5D46D3528D39E3F7210693B629967CD349833A", "49ED43DAA523C79B0D499D6AAAF1DB03BC188989246D9E4075BF6071BC1F62AD", "4A1FF6EA16CC8948CB147D51B2E197C352EF38F584D7EAAC6167E50D4D9212D8", "4A4F5BB53C8DDCEE3D34BD988ABA91CF0C55BD9DCF4C64F8201B449C24A79560", "4A91EBA290B30504A8EF2EE87060FA1D3D5EF2F7A2869B4D9ACCE1C477DA4795", "4ABA347899E62D111444546AB60C999D1DFAF09E640D551C905BED4CAEE1CAD9", "4BB2759DF5CBB6BF54A7D60BF1046942C755D661255DAAC4EF3C0614D1A3AF9A", "4BB2B67EDD762366F1A281807D23AE5F489EF087E0171311F44835ED92304195", "4BEC8E9463E4B27C09D4E3ECF5C98A9E0D6D193C06E6EFC3DEDB9F41368D7DC0", "4BF7A5E750431865636D92E71393396C252B3F778FB89C0C3E599627DCB87306", "4C098F2F4DD25A03B6FD67587B106604BA4957943FBB7B66868AD8F6F9AEAA0C", "4C149E6F2A02DE48EF008D908A63161BF93C07DD6B16401AC765C3B64D274497", "4C62280F93124FD0C7C5C20CA30CD4D137F1D0A9E1E35780DCDE98EDBCFD8B1B", "4CE1B2F6454C1BD94457E47D668B97B231076132166B23B18741F946099CC719", "4D266A154A3DA31DCA059F3C44F85045C1027D42EEAD68DA8098C2A3E0994AF2", "4D42AAA4F789C7D1BA65614CE73F72CA7B880E7B175E5E14A5BA53020528C9D9", "4D821944016FDC395E14D8C2DC172C6934E950F5A979E201F20692FA151224E5", "4DFE5A6ED234327248E8451B57200F8C7A68429EC3CCCB0DFECC6728217B38C9", "4E18B67E118A4426922199D71DDEBDA96F590289F2B10DF757857DB660516218", "4E20FF6980EF77F8F7C53E254EBEB9AF129EF6EDA938A5BDE9CFA46C95393000", "4E2A0891FC6A9216C5F9B6391FCCE631A5FCFCA9CD4485D154F09E66D094E86B", "4E39FDB5C241C26D4DD2BD5D0D87CEBA03C22671C2E86D53C726034AAB37EFD2", "4E6353F1062DDEE2F859DA9376A59A0A02E58324E8A0BB460968024ADB369792", "4E7FE0F1E30AF3FEDE3E69121DBC9B8ED2C0931A5F59643DDC7CCF633D093C6D", "4EC41687F6C702A06FF4722B6E37F3C645729920B78D22B770E171A0DB12CB76", "4EC468925EC1B01AC3E2235FC9136746880477512CE0A8130EE536AD1AADBEA0", "4EEA40866A50FD47B88CDEDFE5D4501E3C595A076C9874F03873B7D7BEC2B0F8", "4F2F1CEC21593E14CFA5185766BAB1A3ACE3CE7606D9506EA35A0E0677085BC7", "4F3266EA945DE8D8D2A40355E5B0F806639DB3718EB5A22B6BC31D1E5CD00CE7", "4F441F1EC2D2D7EA1D9033E689E8C62FE264F17CF627C618EF574955EF8C49D0", "4F83742D4D9E3F03A6481F27A21969D4333962D309ACFDC2D174BF09D63F0F8A", "4F83B26494F5C02A937F66487471A788F350B0FE1D9EABC80254DB502CA97A51", "4F8D39F3F464E5E9FD3000C317BC69CF4FEEE9F0605C69E62D810607C6BB87CD", "4F9B97366DEEBEF2DEE9D041B3982BB1DF67BB173569B8AD40A84B319E78729B", "4FB18D178F1A54F4568F82B87500157E5ADEF17F447B84B79FA2BB7073A2FB2A", "4FCC1DD5163EE346E1A9F93B8E75FAA23D12DFF359A57876FBDDCD952ADB13ED", "4FD6558CB9A80538F78AE6DD5C078F6C7A28CACA8FA5FE27C5744C1328FD1254", "5041F3D5141A619380512BA58DDE4E2250632BFCFF26D7B947F0A03A7FFC021B", "508080EC2619947743811C2CDFEC88743E56A6A7B5472534F08845B6126E5BEA", "508FADBDC0756F9E8252176202EBE8324AE6CA7FB12D58C5E50572177293656C", "50AFB1284FA10D4E83AEFE409E8E05B67E7E2BCCAE0E467F68601455F164F5E3", "5100AC8D5E4B9B2820C8E97CB99708D3E6DA55A8125242DB99536FD592D317C2", "5102E26F5F9D162F10D7A53504320571C340046D1DC087AD20DBEB386B11F545", "511182968CEDB172B8730661A03A2F4C78BA383091EEAD7D8936E457AE6A6443", "516C78282E257BAD924E6FC3088367963BA15FCD8305B1B9C4978CA225F03D64", "51B18D37F54E0E13CB87112E0323518D15B4E3A206BB32632FE2181BBF89BDC8", "521FBC3140A9184ACD54DB259B5C982B7555628E6C09A54B0ED31625D877719A", "52A39A31A2B851E5476110E47BF03862724661EC3EA218D629808602352A073B", "532D176661BCBEC8BE03A731D55474DD320250BB0C4A431156B2B65DA6D50581", "534BE42CCFEBF334619AFF9C2FB1955CE0C058A0559E49A3D0C26AB6F743C73E", "5350BFE3F0C933995CDC18BFAA64637FC165B9B3DA8DE751D393D697721E78BF", "53B532B87CEA78B57E2ED69FBCEA8B269DE8F2659CD1185FAB9174B1B7BD0971", "53F007B960459765058C623CD55EC0CB2787CD6CC41E114A4FE33B4399B679FB", "53F32964A2275244A5F7A1D6BE61A50BA12236B3F5CF9F259D3080CEA722858F", "544A62D038D1DABC7657DC39AB50509001B28B3A7122B934FCE553D787E38968", "54676D873049DCAF16EAA1A2D3C84F2FEA5E59524A8378996F862C1749977BED", "54C108178FEFCC2E097FAAE5C25ED91CFC0811D8F54A2518390833D0DCC7402A", "54E686FBB2E60A0BDEAB59EFECEB36D61C77A784661FD44124BD8864158EE317", "54F9221C1089CF8B9A0ACDD45A9C931B5899A615CA1B2F2D1A71EC547D382E21", "5504B497EFCB1ADA00D2DCB964F88F57F9AA5DE185DBCDADE66329A2AB66948D", "55156FCD842A2CC421648C286DB79335E98E88FF88D30BADC857588FB7995139", "552FD8E250C33622C92D4D81FCFD993060B032D714D05723F83EB943297F3CBD", "55B26E0461C3762CE34B9A024103EA4D7F7AB0CCFFF0990F7B7E24F913809384", "5627FF7B843DD3506C71D634BF3D9A84A7A4505185E28F6288298EC59DAA7BC5", "5661271458AF486CAF91C4347299A68A4928C9708FB2076BC7CD30C98EC4DC20", "567625FF8DF333D5C563E40EDFFF9516FF13EA40EAFE9A2E68635850284A1A44", "56906754275E685B1DC1D6D105C9D9CB42A11896378207F65958D5E80BC24EB5", "56AA25058B49601CC436FB99CDCA8B0EFA02E1CE410A9EC2373C5FE7CBDAE326", "56F736C514D801D48076A768942C738445DEA5EC6AD9001D0E68FF2BEA3431CB", "570AF6CDC4F7E864E6852EBD03923041C13A884B424AC254820AD0EEB73694DF", "572C92FBCB85F9CBBE5041D9C1135E179AC600F3E58C858B12F278A8EE69392F", "573F294E16A1C9B7682B48604209232E9D20CDAD4F9D09F633AA855F804E24CD", "574FC031AF9B64FDFC8B0BF65E22355456EDFA4CF1ECE74E592CA6972407F30F", "5785772A628413BE750308910FFEAA8AACC7C2703F2240DE96947A5EC9FB2289", "57AE760DFB50538BE1F8A0AE6498718A547B70C0FEC4480282AF8A01140729ED", "57F776FF55271032943DDA94EDAE416CC0AC456F5B793EAFAE5C9E1DC182575D", "5817362CFEBEC3D97C56F71F58F7BAD39B11D1FC1BE175D82D99141AA79FD8BD", "5834E81AF46691B1D89090AAA05DF8D5F3F6ABF00015A6CCFC60814EADDADCF6", "585CCC2B164ED70872FA701909D0AF43DF766881E7B777E942C77DB55AC69FF5", "5918E9614B79CB7AD729F929FE35D24A4B9D1F15450478C744B675BA273158AA", "5935A15F92A37157E966D8E884F61FEFBEB9E3563CFBA27A696DE8622449DA07", "59546F63C7A60C8B206D8D53B79FBBDC51B4BC21915D19B927A95CC508208016", "599FD7C04A9861E581A0889B84F743CE6345EDB3A38453CDF55B29FBE0F03491", "59DED814D95C4B5C7A44D5086807798A905A8FC4A79786C753E840AC1630DF3E", "5A2425933E89E2C50FE1F3B1903983FFF1089EEE55483682712FA0DB9D6A700B", "5A6FA2CC424A9B8D486401FE327721B1780501E50590F4DFC511823FB8D4F3BE", "5A96631841EA46983EB77A89CAFB8E8379D5322478DADC3770B1B7DA4AA986A9", "5B2548C6541B1859D763161398A2C0411503B1B1DF68AA7E25EE242BF792098C", "5B47275B66495017EC8BCD458FF8949B7FBE30E96158522A3DA6B3FED9F36A9E", "5B55DE775FD627D53A5307BC1C2CCF710D57AAAAE0C4F339A2BFE244B91BF012", "5B63337BED8D1831437D9E9CDA230341D96CD4E72BF44B64671DD96E2E83D164", "5B8144ECBE66D3F42C6265F0D0218BCE7B8C4F532A8F158F78E777D2EAABB546", "5B9FE3466C6709549936B7AF9F0C0D4DCFCB7C692D0EEFEE7E0A64D8C6798193", "5C7F4FA69211291876224CC5E5EF38063BA255404681592C01B44130CDCF968B", "5CAD5D32258B6EBB72263ED99B6DE586C3A3347FA7743140740A1F7CC94CC9A8", "5CFA2CCBFE05295C7186239383AF12E6EC68C33A3ED0A1976150849CCB589A37", "5D39BE1A6B2CE65845B9D4CA9622C926C13462AA53BA63F8F3B325A7C7D87B00", "5DC8FB040A584733A88E3C4FB30004B815F71BE1D0193C00019FE31037DC709D", "5E02F35DE80ECC15B70D12ED4DF7A3FF92E8DF3ADBAF829B84A2668AB541ED5E", "5E1D2B7B081D4A60EBBC9020AFF0CBAA85C044CF8F85282AF49BC9C8678ED4F2", "5E23E05BECFB965DB7E4C7AE5FFCFE7DC73ED0C7C8707051982D891255EAE803", "5E5C3542432C244148D8B1FE3AB5BF8C0F5F43AB9B9058BF91D5D4BFEA40DA5C", "5E6AC096D5F35D524923422195E5F8BE5ABD6E307943C5F7A48830343C060E96", "5ED570DDC2DC18EDBE3A6F896450F75892C392B6E12D967BD6C8F6E5EB0809E5", "5F0469017E936297F6853A39B26FB54C2D62A7A59EC15BFC45787D2EB0637C32", "5F12C1AE477898835792369095749C194B6192FCC8D6F145CFFE8A4822387E8C", "5F1A8E5DEF8C5B0BD8A337785BC9EC92521E4E1FC191BC80CFB2E92B4BEB7686", "5F5D3CEFEA884B6709DBD49D40D3E975A798FDFD2E04275C70BC4CA8663DFC57", "5F792F8D340FF2EE83DE40316936CA0AA1272904A4423A4CAF9FA698D9FD6BE0", "6008235F2B5AB889012327334B8370A8EE655F77D3C7C13C1112DD6F096D05B1", "60534107EEBE1FC28BA7B5968A9A0C51CA6E5FDA395D6771A575BA502A8E6DD8", "60B024799A8BCB67F8D6647F008C565B9B661B63D8F52FC6E04A3528CF8B6B3D", "60BC7D4DCC3D358CA3A091D2D1C15EE5A67539C2664E72739BD35D6406A88E4A", "60DB7F5346C5B9A16FA72AD40E93F7504EC85787EA9E05A8A2B66219C25CEE88", "61149F4D97B791E1883A77C4470485C913931119045329BCC44F6A65E2B0A9A4", "61FF6F10F0D76277F85A8A525D2C9989283AB04F3D830BEC0894CE78DF0624A3", "620DEEE8E25F410CD7D5D914617F8424D18C6FBA60049459E6DDEF27E51FE74C", "6227E56DAD73769F0362D834B90EB9B1D9A60C3227B1A4516F314052662E33C8", "6263612F623854B1816D51762475FAFCD97ADE651BE7280B16CBA8CD17414AF3", "626A00E3899D66317EFDAF9786CA08DA775CCF50D0DAF458B4B3052E047CA3DF", "628CB36753883231031D529A86E264092FF7A5CF21319F4F245464EF4C4FB0BA", "62E23437974E48A449C2EB8CE3148CD724E7039E419C0CE0AE579DF2B11560EA", "63491DD97F4B72DF4482AA5603DAEAA0D11ECBD12741689992C14929BBC91CB7", "635E714DA56A0FFA8A22BFDD7DFA750905703B4E553FE2435190846F7AB29ABA", "638BC9B9F1B860264859BBA0AE04F262C584B383B8D229DBFD85404C0046EBA0", "63C0560C61FE9A9777F6402C4988E794A31F66C8118AFA944D2596065F5D0454", "63E97EE79A6570DBA544550FC5DF8BE2C8A41E24FA160EBF78E0A0A573148655", "643278CE1BB636D8764FFFB99832A74E1EB43BC79E059A2AF6DA2A9DF4BB4FCB", "643E846D7944EB8AF4DC6AA049F3D7CEA565A47905FF0E8DC5627CB212EA131D", "6440B3CEEF4AA572EDBCEC6666974E017AFAAA0983E4E7486BF1811FD9CBC173", "644A8D20EA5C122A543FD2875F814F29458A670A8F81310C4182A6D4DD814E43", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "654EC4741C192A4D4B8ACB967C8C2D31BEFC1442C9B7DCC262604FE1AE69DF3B", "656937FA945DE5E58B9B5C0431A830AA521D479596EA01ACED0A20A166C4E3B3", "6592D9252E79D347E3A4FFDDFF016AB701763D108B8568C8DAE4D38C3A52C76A", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "65EC64A753CE4A7F6C9FBB3047D29A2833F1E56F4AB452D779D8436BA19B01F0", "660208B752BB57B009A4138672B205F26C849049E39D34C5826F6CEC8771C567", "660F79D7F9C6524A14DF2940CF8DA166E39FBB028D628CAF3FD232455DB9F4DC", "661EF6C7BBF8AD251228707DD8EDA4B08D9235BFBAA6C9BCAC49A5F4CECDE3DD", "662D2612392C122C804D26AEC201E3811C98DB9211142384D96CC125BAB4048F", "6633AEA14C5B5430B41209886E7739DD57F4002A86E88200DD915838C1355A84", "663B167589F3DD84D622432BC518FFD94B44586796A4D03C6BBE87EF173E7023", "6654AE2FA078AED87235FAD6FFB227BC1BC97B7BDDF23B5127538003C585142D", "66886B86D22AD162D05F9B987C32085ED4A1AA2754E87D356E718DE087B7313A", "66C65608C48FA9A8FCD8C712F142BF802B318517AE0F2C5E42A7CB9567BB7B0E", "679BB8CE3220011CA4B10A26DAE28F57C4AE0FFE11D6960AF99282DDBDCCCC87", "68016A8DB4106D592EEF0B68F99DCC1753587E6A6CD5F38B754B1EC7912C735D", "6834E3905AADC819DB5BF4042B617F874AC24BCB0AC2F484A2275161173B7A89", "68659D93A7B4C79150F4B62DF02E4CA34859145C18B4D4E7381CBF880486F5BA", "68762F9B97244228D4FDC0C6A3CB0C7CA39273D7387B7DC7A403747ED465EA59", "687EF3D9E4C66E2EC0DD556D7C5488A09AD8CF69EA1010A9456E63DF45C0B64F", "68F0C3AC29EEC11A1B3683CC670DBB84880DD11F8968A7B69BF67C664E520FCE", "695AD761535791BFD5B19D6F2FA27E78E40E7E49025C57143449ED9010F98D1E", "69C147CB642B39AA3250947FC1868ED542CC9C2C3BED4BA821CAD9BA0F178E84", "69C79DB7169CF870F6B1FDFFBCCD8DCEFED293B79862611C9A5D39778668A20A", "6A0CE211061F295D9D98B616DAAADA0A43895F1108ACB08AF6BC99BC646F2753", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6A8FB2890AF2EBFB497D7D6CCC198FF3FF0E22BD184AAB460E05F9B5E0B6A4DF", "6AB7EE25CEFEC99E5658BEFE4D594FAAA375C1558F00A1900E6FF8619C6CA80A", "6B1C6EAA2CD3518A682D3056E09D4E1EA74C23C47C9F526F46AB4741F8D3E72F", "6B6F13479A05023E8BD2B97E73C4B7C00B578E9CADB70B9A72B008E52DFDECB7", "6B7AC9FC6F20E098C237B2663F69D9460C7412F71E37DFA2FF31F061BE7C7C0F", "6B9D154BCE10DADDC28B259A53CDE7ADF906DBCB05E8EF0696407EACF7A37CB7", "6BA70D78F086D07D5D04D35657C565B766597C9DE86C3B8D586D271713B4D89A", "6BA96613CB9284A12C5C7BA5B1AF346C52C407C3784639F8A63CA5F6E90563C2", "6BC9040B51F3B0282E132873A0D807E58D8450D20237A38329B62B37AB7F1BD6", "6BFF2F7D47BEB5AAD519E86E0FF790AFC72EDB0265341A03D475E407CEF9931B", "6C10F7DF7999077DCC8D27116701F4736A872F28FB52C6D8B857063D077487A5", "6C58E509ADBB933450E4C7DC4DA6C1EAFE229D3A387C478FBB26D7279A0E12C9", "6C8567DF72CA8A25F4328377A9D305D3ACCAE181160B03E595CB767274D3C083", "6CB4EF3A076E2190B30084083521AA008A1E2F799850D429F0737446D33988B3", "6CFD1F4E92DE674FABBF5CB0AB382F8E451BC50559AF2503871032E5B3345584", "6D14A4B63C553D8F0F27D90830AAE51E6B540ABC64ADB3C84D42F5E358D5DEBB", "6D4BC30FC7D54719CC8531DD40CAEF904411E8A769D791119C3658B78C353F56", "6D72F5E2F90CAC5A4D151DD3483103FAB60A4A6FCD9FF4EB47E5E45ACF7A4129", "6DE1111C95036BF7FA194ADF6F373E2AACCB3428B281A57809F95D1DB9843066", "6DFE02E47206439339CF69003DED7C6A339BE8A9FDA6611EA300ACF64BDB9DD1", "6E26A0758438B20E786E7278B449CE995EB702FD88F24C2EEA45FAEAF3CAD7A1", "6E3F293E02D3B6D0238E0282D8FD8862A73192FD2C71B007C3D3B943147AF8A5", "6E5B13327E4590127ACE7F6743E6E09F603D78BA006DDA5BA8663FBE6F712923", "6EBCD95DCAC978C1A7A0BBE48B2233B86A8B806867AC1A76A54DF3F53C002B09", "6F1207317470AA234882D78F1F399A5A16C9D25ADD86B6DBB1C594BB387484C4", "6F3F6DADD552091B6F3667F9BAEA0214E2DEEEB84B68778DC8F4F03FD4DEF664", "6F5C14D8F69121D142075F54FA8D7EBC0AA14DDDA57C28B17CEBB02A4F651B30", "6F5E7455D08E55E4F9F3DFA8B8B618487EC9BFDDC4FCB87851672633689609AB", "6F607AF63C8C989A61CF1A0B9CF9799D18AB1642D794D93AB154FE52AB789CE5", "6F9B3E5D97FDBB41059AA8C4DDC3F8C6E337642756FF537C16A61C7599D523B9", "6FC3A70E69693A6A15050339D9B2368FE0F69A247562F6FDA33037FBACD59417", "6FEE67038ED295324647308F3C611846F29F9073DA5F2D94C9C0754CE87A2A60", "705D1AA8DC1EFC5A25852EAE8F70114AEDB618E07145B676E2B502DEDBEBA92D", "70A244D2ACF5F54C8A00B80F18E4E6BBB5679FDC6B106AC69D24FEF5900799DB", "70A9E006601471831C111535E5AEE0524C324100C2852ADCCA9ECFE67BDDCA0D", "70E7C4F10838DCD91579EAE4380936B1A2975B973F9A7D6A565AB5DF177F1B0B", "7173CE0529466881C359FCCADEF6CE29FA3E19A2809503D3AF51ED4BD00B45A8", "71992C293C68F803D971C4A6799C4C00887FE01C90A51BBA1EF2ECC47DF8D10F", "720832AC3637E07F4C1BFCA75FC6629997A5BE41E1E70274D0A86D7D48EF7EAC", "72323A87B15F078C393C08C2C6CBC69CF69DA2EEF2BE247F76E5827524377951", "725E32A9B6092E4AD63AD8E97B36AECDCE864C1BA681C18BE98CB3D51167C891", "726D3EA736C4A8B48405EED7970A20AD57696B09376152E80E033C733E679B49", "72BB3BC198E5CF30445046A5030AABD63EFFF869220C6D292F71B3308B547D14", "72E563FF799565BA0BAC30781F2F7618D43BA295DE1DABC0839C7F0ECB363255", "72F1807DE4890F3BB43A992E28DF563B4DE911006515812F38C4124C9545D838", "73C56B324A2080FA9C0CB45D26C0A4523AA2C160E0E404D5B47EF65512D83AFF", "73DEE30800CCC9325D5F1586487B2795A5B59E4F564CA3DF38C3A192975E9546", "7463232BD9391B70113F6779133DEEDF82C2F9FB5E2F9C9C4D0363B332E72184", "74767FAF408C31EF10FD36E87F8FF06644380251DEDF0B8DF0EAD56F9291B3E7", "74A64D86F481DEE0890B283DD0C93883DCD1F9CD9011875F5CCF194BC49A6A89", "74A7E2C07D54A37D5F24750F06A13F0442C9D38D0B176EBFFB72B71C5332F1F2", "74D0E5AD4F657233552369F17E052268A86658331A40E0F3BB6D4070311F727D", "74ECBB84CE8413AF6DA93062925AAA87DD5232E1319904ACEC3D5A509E59A9F3", "74F2A94336E51B0E3062906A1A2B7FB8CDE35DFD901789C840E3CE1DA62E9EF6", "7515461187DFB015988713DF2DBDEA4817C1389377BFCF2A0E37795D61EB76DF", "75172376975CFC491DFBE3507EBF17A98678B53D9C0BA45EC17BE0841880DF1D", "751CB6A9BF687409CFB218778DB37C20DA4DA2EC6316F9E59110746F3B88B073", "757696CF6B25D861147516A0233F27AA8ED63CE44EC3D079E6265FF809DBCB35", "7577BCAD9072181E579BF3A80532F420C8424F287BE8B450E9A58DF0F61C21A9", "759B56FD4AA17873CFEF240471D53E2CE3CC4A7775D72A8FF17D44E868820C96", "75A547F3BA75C8FD5BF5185CE11155B9F37CBC820B9102C0531E0C7785BA8B78", "75B84CEC510E3A7D95E9F35F371450BB7120399A0D986BEBD2A14B5FCE7E3924", "7646169157CFCA2EE9B0ECDADC0C273667191C1F53D4AC6C5880ED444A68F873", "766578EB2C7BE8A81F504B4989C22C31CF802D03B94649D36D4712AB13F788F0", "7673ECA7C26C82F326589C66582D68F7F87357B4FB250AD73DE7E7F5EC924344", "76B18AC05B7E0957D5D44EE4D8737CA8E0D897D28AB3EF35B96AF96E1045759B", "7712F0249FC574F5E6BB742100BF0E53D089C499325D28D0E2739DFD47B4CADA", "778EA31981EC95B7D8915FD854BC6A0D98BB9A839E808A14D3C548C3A88F9D2D", "77A5CD46FD3C6940EFC34DE8C8AA831927106A12E0E3EAC862A5D46723F4092E", "77D1D444B20370DE0EDFF23D9E385D851AC796623E4D85D114F6A8AA31FAB59A", "77E3C17864071E6772CDF6C8E252ACF8E77FD5D30AB4631D569A5A980B8C27A1", "788251FD7397EDDA8B4E4DF8AACBE1D142303877A23213E980EDE042998B46CF", "78D9C4BA0AC6C939F05FFA65988885F5B6562735B96655E51EE309206C6220A9", "790AEE8158E5072311EE0B1D8C1CACC2CAE27CA8C7B75F39AD990B40790CFB8C", "792B85A8DB94781D66D2F4C4B62AF0AB0D8345DE0EDC163D9DF3146450CB58F8", "7976285C796BB636B28F14C5DA550AD74D4373A4D28EA23185C050910A0811C7", "79A57DCA9547EB7144EF1FD539121D0ABCED0FDC7C53893D2995C5C2A1DAAA8A", "79EAE7C5A7DA7DBE00A17ADBD6792438E4B1B128DF0096E2DF804D9C313CF08D", "7A150D300EAF951027B5658B77CFFFE80D0F69EFCB3AA3F0D27F874804ADB297", "7A176FEC5482DF626A658547378F02268F41CB91F7D83D022F9EFD7F0A8D1167", "7A1D4AFC62D444E93951F6A46CA35876DD42680BFCB9DD562AE0F80A2C338D67", "7A29ED8F7D6418C37C96D4510A80023AFED108D01C67AF41A5CA6ECDFE3590EA", "7A34C5EA3878227646136480AF345DCC5DF882B26F65D3380EC0064BCCA45485", "7A6627FB30537F67774301CE66136CB8471DD887C6FDF4BC9824732D94F56B3F", "7AABFFD7EDE8A56FF3E63014903A8533BF0F07389F0D81F452A4D9AFF5CEB90B", "7AF5E457957D525BF4860A192FFBA4A63C528432C2CE1B5DDAC50B96EBBF9A8E", "7B614296DA3E2724AE6DAB84E18EEDD256F0912D1BCD8AD522657BCB05C688CF", "7BE11F93427DE2496C264310F6C3E92E19016A048F64608DB74BA4A182CBE343", "7BE38BC9D9063F34BE9B8AEC73F5518E1D7B0EC8F35109DB2E64EBA48061A6DB", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "7C01AFE6E64B43031575F0102FF010954F3B02AB92048869BDE2D0610503F56C", "7C5451969551322B10C02D39A8205047791F77289C2CE11B04A515BC58230E66", "7C6822723C8DED69D9FBC4D1DC69A54DC5A848CD239869AB0C90FC327D194CAA", "7C6868DF7570F67513CD79FFFE949C20A91FB069E0BF035BB536049992C5168D", "7C687A5C4DA5F147CCB651C24229AA31D311EBB13BB2DF3508D7A6085EF3DD7D", "7CC35644F6B021F831E7F0CE6202E800E4D6128DCDC6A585E8A27C3D0C5B672E", "7CFD15481B10EF25CA2897D79DF5E964CCBF6F259DAF4C8B56677086A6FA579A", "7D158CE8DF0EAA9F8D32E562C6E3311BC04075EC6BE07466A648F40065F0CEAD", "7D67D80D4B93C266A649B84CAFDD0C7C0525E4EF25DE3D86F84615A02E71F9A3", "7DAA1079EC80CD5A34A54CC4F091B8B38553BE4A9A89DC95810848A4E4B45568", "7E027EA6AFA5AC3F077B2C95C7795D55794EDBB517183D1A4A0AE2117BEDD668", "7E0744D5936EDC5F018B0850D801B665D388060D6A81B986BC7AD81C9A78C0EE", "7E120392C6B27EF023444674C7B2E2BB0AF1032844B5941C3D340385D2344B0E", "7E18B438D1C420D8FB4F0763D89974D25E4342FB6DD3A5ED861C0784B3F46C2C", "7E1CB2FDA212C7A8FC0CCD8803720285F00C1F62F3E2628C7217A85BFA5FFBC8", "7E466DB7C3E6D0FD95B6290D6AABCA2CA5965052B0CC5CB552473151BFA7576F", "7E48E83AB3B599D048D884D2F2A9C830676F7F8EE7EFC2B799BFE4618D5E9A2F", "7E908C54FE9150C3B09D4779711C48C66901453652E1833B9998EC652FE7B869", "7EDC7E4A607AC78AB259E545462224179BA0B894DBBE1C19D52406785B960D30", "7F074E985E9433293F83AAA7F6DAA1B51640BE0E9CE150599D1BBD7718BDB08F", "7F1C012CC641EF0CCDD9BC749B665F263D22200F5DA78D27932DB5F6F0D9433E", "7FD9F7FFE1C0EF8F68DFE234A094535CE5CD56211AA4CA79732A71BF6B3C0262", "8039FB04A2531EB7A8A10709ABE8AF69FCBD24923ADB1607D3008C4B1F055832", "80737D4B4CE626670083B16CA387FEFAC8045ECB16DACD55AD56FFAC544F21A4", "8074E36BA6CCBB82DDD34401CDDE6095CC85FDC1D6E55869D25037592E0F14DF", "807F02BF5D04D1D709B1D383A56D073A3E2ABB5E058B819FF145C9C80E083AF4", "81025F903EAAFB3FD0BB42B351CD25803D50132F91E66C45941659CF9467FC5C", "814A42F376BD84EA7C321ADD0697620A9CCFB64AA5053D864D6575D7386F0CD1", "816BF55A9A089E73F8DAC34421450C5C33888FAEC59EDC25458BF1584212DF35", "817AF808ECFB2DB89B8957CB7948F2576360D0AD07783BA6C641C17BF4EC867B", "818B433278D5E2420F4213C71C6036E7BA5EA3C87CB6A3BC405627E0A3B9E898", "8190BE7075BCD3ECD99D09840619467A00B84599B985C4B2AB342389339984B1", "81D5F6F41E5617EDA7FF694BBE43496FC48B7577BB4C9C238127ECCCB1D40118", "8204B6AAEB9CA480B2BABF218A0BA53A2F6756B72A886187C55CC06DAD85DF7A", "8275C3B123771E721297381D0F66E5CCB99C5D5EA14F12413C6DF109D950665B", "82D897D235CFB70936ACD9CA3E6034885E56EBCC4A41A67CD33F1077B9C80885", "83FB543E615A9C8662A98035262ECF1D1F4689ADFAF69DF4FB232747683951CC", "8405678496B3F9D576311647EA784131ED1CC62B9B29E00D7E50D121BEBDAC6E", "841ABF9ADD122315E9FF98182FCCE868E8819519D3577D87A3CBDF6FFE75C0B5", "8487A6900043EFE75D80134C90DE25F907DFAAC25AF8918AC8AAE271C44C4F5D", "84D1908D442438EA45EBF0E200B34DCAC5621B3C6B4BD938450BD9000A08427B", "85B7C56E128E085728B9A6C1907216332D70311005E46352CCC818BD2B282D3E", "8677F08636676A812666D9173BE281822A35EA2589B586A211824F7B588BD018", "869D3B2E67F71714B7C5159A34A85E522DF442E8B9F951EDA2D9D91583A1A49B", "86BC382413D13FEC49BBCF5FC0129F8B83C058E0C0CDD0CFC599911E284C4FA7", "86C605E3543D3B83BA0A25B4F9686B938438FDAB955B33BD0721D21AA9B6A946", "86C7951371BC0A7800D1FEBC038565FA28DED7D904E47462C3F5395FDE8AB9C9", "873E4E7D31B3D0678D775F72B794EC936D165E1CF0679FF3C31754D430863C36", "8789F1A6D596C8A6BC66585DCB6E13DB24951FC43243FD3D7B803A8FF2BEFC44", "879386F682CC1455246FD7C829CF91A2F25AB2793DBAA6F53BDE7DB2B8771BF9", "879F74712AF34BE6EC4D8C4FE133D1AEA5F4C9D65B94BBFFE57B8ECEAAAA6350", "87B4000A01C23B6231C463A8E1B3BEC371361C202F46354684899DC113F12BC8", "87DCB77CF764C7235B6473B289E603F21A1588D5812BC1D3022468CF1C8EF03A", "87F784817DF6050E97DE8698F7CB349CD170961AC5E808DCAD56A3653680C140", "88030D4F1517AC9EC8202290C87E6CA9AE0FE862783A643A8EA37C2CBB13C39A", "883B66BBC428EF9C3DF145A5C127B4BFC99B6BA1FB3CFD362ECC8BFC48D63DED", "883FEFB91BF4346AE32F85914D99935FA7A52B740E4ED70D7858EEE31F76AC70", "88982C3BC765C275837ADC018CDBF4C480BAB80750C3DC007054B3AED0A5724E", "891E5F0424A107621BE648D5F1576C607F7834B3BC114E0F945E5010BA70A9F3", "89780D4585A20488FEED7686A5CA76A1831A95DB741EA06511648ED27850EC1B", "89BE9EE6717FD5FE5CAC882E73D515D8E83F7EB08EF93BE1CF98227C2B6807B1", "89EDB053A13178ECCE22E53127E4E3457976D1CD3AF94B502528C97684F15BB8", "89FA8C3D609DA37A07A9176E3D62CD317A632452E0252F1F53DB21BDB9518B31", "8A0DA0F94FA34FE9334A6F58F277F51D60D68F3B0D01D043559306679C8F8EC0", "8A25414E8FED9B3A34B56F03DDCF0BE180EB8F7764BA550EFFBCC83D0E7E8154", "8A3B4149E7EAB3A7478E92C55ED495F70AD25B6A33537799F9CFBD490835D8BD", "8A65F637B267CC03477D8AD35E745DB910F4F59345E9C265E6A8241596E3AA90", "8A9DA62ACD0528EEF6577A7929613A497D58F78FF0E64379975CCC381DD42953", "8AAACE4B8576E759E07E007A6C62A6C7EADF6433E09CA81BDF0E3614C86C7DF0", "8AEB61826548DDA949641863F93129FEE91E02DC3B949C9D6D3A111A2DF9A0BE", "8B0A6A21BA2668C6FF8B23BDBA894A0A5CF4333B21213D8B0B25FCFC976379D7", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "8B2AA49114B0E5F7D2BB4B82734BAD2524EA50B29A1FE570A4CBAEC23A3CFD3A", "8B65AD0B262281BCB3C1B71984593938FD704EF9F6CCED6BFB6939C6D2117DAB", "8BC573C8FBFDC3FE1293A99FB38EFC468AABA4FF41FB2D0FBF491836C839D5DA", "8BF9E951D2952E5BFD9190BD6EED01A626E5267E6C5A41ABE0F6BDA10ED75439", "8C2C4E2C0A521DE5440EB6823B48F550EFFAC9F2827DC45DF361442B5CC5D8BF", "8C5BD629FA7D39B5BD451BABDDCAC49CF0450777D25DB8D47EA1E7BB29AEC988", "8C5F81E1994499DBB0DE67BE5FE7D15F748FAEF0DB15BBA4651F5D23252455DB", "8C722873CB01E09D72565830790CEA1A6C7CCFC546391C310640314E98FB432C", "8C84F9F6803F7B599727F54AFEA8E6241BA3FD1510B15AE2524E912A02E9BC46", "8C93F64EB942B89C85FD3B80A9DC2CFE179B0438AABE15445B3E18014CA9F419", "8CA61ED519AF8D2C40AF34E194E5D7262B3105E9EF9837DC95F346629FF6328D", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8CD12EF78572A4084B09F1DEB451D5D52F854099E5B1A1A30714B96E6F38483F", "8CF6A6FE2F39323B5977B7A87F227610F8DCFED21A1A2E55F1C1160FF28EB52E", "8D1B1AA82D0BDDFEE37EA9AE5360AD4C6DD4C6EA3811B8ED14557DAE25A0EA03", "8D2C237BEE4441339BA2BEA5A096B3B4B0E410AD212D590FAF348DD3549DC2F1", "8D64F104C14AF2A33552E861AE403F451EDADB214820F820DA429C523DB6D464", "8DAEC6BCDE7A61BCB818037C4AAA2835BC75563C598312914F7766E39155FAB3", "8DD827D74AF85708EA2C9099D87AA731E017BAE733F136194953C1481A380280", "8DF333F79E75C38BAF5D10978D2A5980C7BCD16722EBEF4A77847AA9601A851D", "8EFB8A654D3536DD4481500A7680D75E0B2A04D2F63C829CAE130B12A35D7ED3", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "8FB323EC50EB5CCD3380176BF2571DDA8C7739DBF4BC558C9B57458B912FEEF7", "9018EBBB2B02EE47F1D399A0C2BDB34D3337938CEAB3DDDABC830CFAB6427187", "90246D34A2A9EC4005A1B788C09D0DF4366E66BC9D5DC5A39EEF5286DE79E161", "9060A206CBABF03C6B8B1253289AB03007F487F5D9A586841F214C048AFED1A5", "906B64791AA71F432F14BB58CCAEE6A9622AD741C3E459C5C2594F4C546B7BA9", "90CF485116A952ADEC5B5A85E722DF33D1556D18AE9C7D1F5699712F4EB9F66A", "90CFB9B81B5299E4356A5F0999F149321228FAC5F22748DCEBF354DC2C0813B5", "90D59D207E240BE5AC750765C539B8ED7F5604D85518190296B85710EF6190ED", "90E3248C0EB13CBFBEB131158F80607B38E28F5677D6CE735DD80BD8F809A0E3", "91276D3C2731F3DA4DD452E951C9FDEE291112FDC8F824C89A17FB705CD2BB08", "9127FA4EDE27E92FDCE7B70DC41C9305AE9E5B6D403BE08DFEBD68099F4F802D", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "914B3D8A3C96750F83A07447B8B437FD19FA6D91185D7E4959ABEC5B8EC2CC0B", "915C40C3847839BAFC1ADC3A4E386F48D7716C2F3DA53EC6BE7228D7003DDC0D", "918FB350C4A2F364438A8B06FF35E252681953DAD2994DB37F9DAC5309B3D9D7", "91ACCACCF51183B22B704C13615BFD4650511CBD23CDA3DFFC59F6EA4243161F", "91D7C6C9A5739FEE5F42D389A6790AF75591DE3F4B00792DEC9B2F9736C9AA92", "920143F649D1BDAC9BF8F36D736EE6949CA36478BABD92FF3F0373ECDB2C1D0C", "9235ED396A90BB944C2B22072DE6B91B22155C3982DDD732067344CA700C0ADE", "92627E627D103D4038024BCFD810986107E14AF89DB4426C430D1DE63EBADE27", "926CD83AAB7DA7EA60F3ED2C60C4D2004D06E2189562B75111B63EE52FE070C2", "92C7FE6CF964CFF7663A2F30257F2374522889DA6BB31D37E2BBB96D799F67DE", "92F2A9B7C4EEEC292BB19AAFE8AFF26AD8870C022D98AD670334DBE43D053D61", "9308099D073B8B4A5B875ABF63A2A8BA4F4ABCB691E71E14B89B4833B4ED12AD", "934D721C1AB58ACE3BF9BE7C5F5C525259057A25F2AFD40C49A35BEF2DF6445A", "93A2C56B0AB96E65E4360EC6548816D3C33DE282AFCF4BF7B723C6CAF3370854", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "93FB43619692E9A4D81819FDEE2EC14BE9B5E62B4E287FD49E3F7D0FE31D653A", "940BE4870816428E160144CDB6AC238F35669EA66C9749E3D3F7C7A0BC8EC5A0", "9413B45266B0A1BF4C0F9EFBF289FB6AC5322C48A1E69D09833E6DA257C8CC77", "941A5FB04B6C4DF5F07E2FBC7A84EADD1A839385EC770AAC6BDFEF5BC82847D9", "94283DE0584ABF5D790E0534ED68F70746D7978ACD04057D9A9DAD20D45397A9", "942E8FACD0350ED3215EB9DD3629B360E18E87D3ABD165831163EDE9AAB16C21", "9443E4370B56256F34D235A66E9C842FD2984D8BF8C9AE3113E33A2322DF6D50", "948BCC9F22A9E406D5CD799F6EF0E00FD425491AC80A0EEC98CF827FE115B33E", "94A5EAD2AABE10D8AAA1B85ABE8D9AB1090736FBD08E6B72EE5BAB165F23B881", "954B901FB199DE0B672BB799941A63760A9851C6EF21D1CDD9356E28D85DFB83", "954F19165902A68FCC586E55B2FBAD28E4C66C71F4AECE8D5047BBAA35ABBC06", "9568E59FBC9F48E0CA633A74AB406265AC01F813ACFBBF2AC3F70CCAF62213C1", "956982A3E052293F0151836446E11BFC653A802D63CD0248D1D89A3EE15C0636", "95DB73F5A2D4EB11B85C362DCF03F9F8FC46C7CB97B1703FBB0155459B8D3286", "95EA56D6055115B49AA8D0630FEC4CFD34FF4271A5FA42CFC289248EA2AEBEDC", "95F72A00E1A8D6C6435D5EA582DBD8F295F4C86F1D6773A4DD617BAD40C3247F", "96080ECFBE42CEF2D63B1341838131BE1CCC2B5F08130E2F678CCDCE13FAE376", "962B6C450D99D068B5A3F11E1A8E7104C2F8019A689A55CD698B82A47543B8BB", "9639F84E85C1FD3D4C5A89655B415BE95E955B63B48D2B85EF64F81DAC429A11", "9675BEE399F1FBF15763A36AB15E1D3A821814173B17B47DBA439FF730F077A3", "96B34DECBD5111CA099BBF02896DC500AFE9357A8C64E783BBC560AB34F745F2", "96D305EAE4A7FD6D6FD4E199CDA3EF2579F2E48F6FBF657006C48D2421E7DFFE", "96EA3FAB46A9992B85A37D32FF04225F7EBAA1E4A838AFAAC04B90A060C0948A", "97439FF2C3A046215A9F6FBE47B7950CF91954D61775F25E45BCDD8A70389449", "9770323F532BB10EA2CF6AA35FD83A103279F223480B36A5D157CEB2FDA4B9D8", "97918B8E0A34BC0868CE65A92D25972D5C1B07A90FC608DFB9C6C0F944FA0ADF", "979C1C302656B100A9230D67DC5FDA9D31E695FEDE62BEA27566840475B31B1B", "97CF7C515357F1AFFF5BDC937895F029179A2F0A599F6865A2F4BA81F8C07371", "97D5F772EC68BDCD260FBB9DFB7A322AAAC657E9360305DF11F9C6A6A40D1B85", "97DAF9DC379788A0256F1282C0BACE119D9E6A9486647915DB7396CD37EB5480", "97DBA1E30952A387E9FFBBCBC4073EB22E406C0722006EEFFCFE53B1712D7E07", "981346B4F2948F216BED89C4CD8BE79AD6F63DE1FBA4E88FB16B5600DC4A27C5", "9898A3EC8BF1E9FC2EAA662543E6514CFB2C354F067BA2E9DD0CFAE333F8B99F", "98B323422CA792F32B2EA7482D9D79B9F9D15C3830E9ED03453DF7CC38205557", "99084FFA789D95BADF692928B0618A889A000D098F055B05388851B9A57D3682", "9987E875C9C70BDC98BBCFA96D1053320128B489B65C198738DCE478B17F732F", "9A04620999F6A5C33EA2D706818867EC5FDA6193AE9CFACF3632E54A7A590B2D", "9A20509E1E544EB20A59DA9FC7AF82F400FE5F811F4BF6223A61E0E7FD269C22", "9A4B42181E5D8A9CEA3178AD3E0CFEA6672BA250DEBDA4E822FCC8B9D4F87CF1", "9A974C19C88E6055D4246D3077BD4EB1DCC0F339D4F608BD01A98B7ABC9630EB", "9AB1E803E873C7A84CE99F66DE88AF1E8B46E7101BF649CF589989C1581AAA3B", "9AE75CB1A1D3DD100D9064B9CD05456A761753026F2FA396034E23E18AE154DF", "9B2AEF92C0DDCDFD94BCC038631EDBEBE2A32A5B521CA121192D36BB62077E74", "9B7484C34C9F34F0426B6E8110F51B91DBBF139DD14849DC744E1B348D2F480F", "9B836FD2A429413FD1FEFBFE2067B9346E4F981BD19FEBF0603FE9C0533BE5F0", "9BBB794BF1DCF8660F8460268754D1A7E827EF26EEF07D631316C9EF5FC3CBDD", "9C24209812A5B441A11CEACACB03DEA118F9FC897BF0F2A1976EECBA06E78B91", "9C281E51011593E8EEB75C9B2ABA710432CC18DBD8E16DE56F7985BD8E4C1BBB", "9C2F629D74A0CEB50295825F06E9E3F031D43FAA69C3940ECFB41EE6607361C2", "9C4C70AC1220B4AB5A285A185307DA7DF44E947301A291D48C2912AEE62114C9", "9CC47C37A5CC093943921CDECE4CF9F41C86981FD1C6230EAA9DD109B2974C86", "9CCBD4EB0143B71631C1E82E0870EE2D6F309B261DD6B3D203F2B5E3D1FFE257", "9D10729AB8873D23F2244363D8A1DDDC6F4683B3420052FC513112D30B8E6FC8", "9D37182D92DF6AA8FA1CBC82F99316BF0499E63FFA722F6D8E8797E6C70FE0E5", "9D474CFA28D8B0313A49C799D05622C172F9872EA0EAE8F12773DAC4E1DEF768", "9D70765425B02FB4212DD4D5C134270A48CF65000E4A833405DF290005C5A2AB", "9D9A01E02514803E9E0E5DD88830752E1595E1F1CC50F35B26CA6DC44AE2E184", "9DB895C4F270F43F8C3560CBAF624FA9E5871EFCEAC3EDCFEBBD1FDDC90D847E", "9E0BDEBE89F5BFD4E20C1FC5208F8F3EC7C8056537B187222997616BD93BC68C", "9E122C3147369696EEB22BB3077D52C1A9B149F5FD98D9E64ECA4092528218A8", "9E63E9416444AA2DF1664209083F4A7A31363BE16B637E0BA27E1FF0733D991A", "9E6FA1F3A9A1191971251B93D23C36DEAAB0788ADEF80DBC0987592BC5E6D5C3", "9EAED1F5FB3762874ED935AF686A504F1630ADB20AA5EBFAE97EAEEEA4C0DAF8", "9ED959A552F1F1135D021720BFEF601A33E4FF298A735DCF0648EF0558E731A9", "9F95AEBD8EC232C9A5958CB17E5C9C4116B02F62221BC66A39487A0F95F36A9F", "9FD2E9C66619362A32DE4524AA1584928DB440CB9828F6FFBD3C98115D160446", "A07C9B7C7D5952E2BBD4C0874BEC859D77892E662D993098C91BDFD5CD4FF6ED", "A0C17B7FA23DBF1DC4FACFA7A00FFB9DEE0554664F67073C8C966AAD62F6C865", "A0E9873CE477AFCDF49EA44C688C2E955608B19AF61940009894ABF7BB1A3C38", "A0EF1B53F76A87117F5A8C9A4208296020E4E538E12E58B3F85BF4F0ADDB481A", "A104F357C85C98F8863EC17E0968EE2F520A9E4DA3A10DBF1287F2CDE17AFD04", "A12EA0FCE4EFCAD90DBB12ADA21F4183773C1E167C13B4C91D05F80DF25E0060", "A150C2E017839DE1F5CBC686332D12515358F881E715C75E1B2D5509C5D5362A", "A1EDB9F080D136915C41FC93DD601226B7CED464E5D5D90AA293CF2531D2E05F", "A1EF9298714E6ED876FC447E879AE4AEF24B3BAE418A5BF1CCD587D6F1B0DF70", "A1F6DDF011DAD0291EC494B8A8870EB4294541EF775B653EAFE335D3158A3D92", "A21450CA46A13FB7D14123F07EF140C38F3E8D99CAA98E59F1BF8D289483212C", "A23F81D3778388FEA85C4F68EAB5B06484A84CEE1267505C6AC6D40B99F50BBE", "A24025E5E8DFBECD8F40E7C292D9FCC4C212B6C1F927A299C2FB44D85D74F70A", "A2457C3A7B20059C90A8B0A06C0058C69C62F582C42EE25EB0BD86681744A856", "A253C518E6F506AA657A30BCF5C28CD2BD5AAE549B0C7517660542C70E8B897B", "A286BD77B3C7FBE86C2323B3D9F433CB3B367EDDC062CD70A992ABBC521C41B7", "A2924B4DE05BD5A9DE02BD29915404543555C0C4AAE9016A5C570D5EE0CB6EA6", "A2986B3F1E7D262A7D84A42B3E6305CB140E7761D5A0E56DB1A501FFE61D4E56", "A2B7B3BF6FCA39AA75ECAA4E73CA474375D79E4943FB0AA53D4AF9C31A37E9B5", "A2C8E2CF672AC451E5F568D88ED15C956CC420B68B1A498D23EF4F2087430CE6", "A2D06FB3017FCE651EA8255C84E9C676D1204865B3375BA8E8B8F438AA9B7256", "A2E923A551C0F36BAC84848E053A3A93F2AC1141EB9D1739FE1D48A6684F5352", "A34F8A2BB950E16F5F7EFA39DFEB254445E1AC4DF791FD7A07BF129351DAE57A", "A380C4CD3FFEF0D1AD28C9019320AF0085267A1FC55FD33D40E61A6A71DFDFF1", "A39A2E00B5BABE0243F9671D1FBE1DA3F18A76F8A4B8F40C5F0A37733F567181", "A3AA1EABC04F772D5CDA8853B864F229765DC4A3D9C4B8F0FBF97542821DB5E9", "A435141E9D6894F7CA102FDB03C29288BC56B476D91906B1B0E7FA8301E0D89A", "A4789370408F9C24E02B7205DCFC6E8366E926811626A119FB3EA4676EE27F0E", "A49FC03081B73A65E6CCF013015154811700EB0AF3A788F88F0A2DD80E7DDB14", "A4C7F1899089B546ED394AE8F6988B8EE42E053E0111886BE9FBF60DD7E72474", "A4D9B7A7CD9FAC0F57CCD7375312F6EEFD14A4BBC52B3F6047942E98CFF6339E", "A4F4ED08429B5D47DD29B88E1F05943B726DF1810969F88CDB4A5626D3881137", "A545DB1C220C2CED88336E81FF848EF91603811394EF649FEC94F4D2653CBD45", "A575794F0C356D695CBCDBD7EF6EDCE45426BD5B6E3A33BD084AB41B7337280E", "A5A892259BF44584524D97B2CB83E9150F24F7E5C20081122730CDDBEA729805", "A5BDBA48582E84D9D511148A7D6686E035238126382034F25D0DE3123B69FAB0", "A5CBEEFD626C571355DF8388498D9808FFEC358F873B2F3FB321770F6D19ACC9", "A5DABD1C1B1C58D900A9518CCA7EC1C03488CC2DF1750F65600D7F0C8E0E4763", "A5F102AA90B5BFDB2EE4442DF51659EE282A3C06887BA2EE4F4B5E779799F22B", "A5F646FF4C83A4B1D2C8B47FCAC3D208DF17454D859B9AB5DD63F0E74300162C", "A63221A3E2B1CE90B33EEE6D5C17C71D6DAFD1A90BCC39B6E03A5066A8597FE2", "A658826ACEFD8281700AA4C5F1D1D4C5E783F73C590631B873055789D4BF0CFD", "A6D9D4111807AA4EB0126419E70851CE3116CAE1D7000C36A1B26DAEBCF4424F", "A701AFC8C238BDFFC275CACF75BFA2343212CCA8077B0C43D13D17FB1392C9ED", "A72BBE49D062044178A486D7560B956A83842D3845B8E0C9C8F52229F1387CCC", "A7668EFA2A4710B7E3D5B8C8191045528B7DD06F6710E08837566548F9500347", "A770E87B78A1CE76903B4B233716D0607AFD01AE39801385CB61B30131C7ACC5", "A77752C32B282EE01C2B264981C7DFDC7554CD9C1469D9E83E02A1B6F7E98B7C", "A79DD559871726E692FB55D7ACC6F9BC215D7114846386F8E2919B66C7EFEFE5", "A815FD0F021F6B36A999CA38395A5624B6819141FD5DB5CE993819C2A28DEDE9", "A87D3B01BEB3628C5A4865D02456C6AE700642AF49B89B34D8697869591CCEC7", "AA368E89835F74857CCB97D3A4A3C3640BC3193AFAF5AEBDB69ACC0179835395", "AA4FDE0C6B204D3B97E506557D8877E2EEC378624BA08168CE105CA385AA1400", "AA6F08F01A079565B77B09647282DFF85E99CF9A1905EAF67DAE8F9CCF81DB85", "AA8C1A9401902E4D43951DACB6CCA9BDB3B93DE3457DB04CA67EAA908C7AB333", "AA9924D97A331BFEF405C5965F86807ACBF07005A06B3D61D1E7556C355A7841", "AAD1C61D86824F7D5F888BBB8715B562EC57F24BF75C9015000650BCDA26084E", "AAE68AA2EFC385FF3EBD4382FB866664D480CC7F1DD4B169227644E77ADC4B20", "AAF4BDDA7ECF566534F1FC9D951BC20C97D4E89F8F43C5F79B8F6AA13170E4D9", "AAFF9E87667B35D62A52D77B8E5C3A000AE2419974F7C14545C23704BDDC171B", "AB1AC7E7CE95316265077790DC2D6CE23068401552650F2CE08BCFDA4CE41AA9", "AB595BAD745ACCEB2CA1F5A7FC0DC9717FFDD74D2EEC460390003F7C91DD4FFD", "AB7E82CD356AAA55900FFB785ECCA647E2DE687F0BE610FBC448CF5A139EB4CF", "ABE6D7E1715EC89D7D9B85B3E6F7AD550EF1882B24B2D50542407488158748B5", "AC5DE01326AFA37CBA7F799502684F57AF3D9271EC49734648DB7797522AF2E8", "ACA78519DAED0CD6A996922734C96430375BA723D975A22C0DD0A7716D545ABE", "ACAA55025C09DA144288A5D0A5158AF597D978C292D71EF5E2D01DFB8E56A818", "ACB678E6521C7EA397226E2F4ED553189E6069F60E848A366E9D7DC9D7CB1BC0", "ACBA42A9F266755DB30CE35DBA1907FB61B1687AAD3415499AF5573BC67595AA", "ACDFCA5E93908C1CC35E54B4EF854ED57BCD6CD2641A3590CD2418E8BCA917EA", "AD93426B49228B04BDAB79161DCBCCF882ED48D9F34985BDEF0F8736255A81ED", "AD9D0F1B219EF1414A1CFE4F9B1CA78EEF4B4C701B90380ABE4C1CDC35D33584", "ADF0635C8C226573B68B90CCCD3BBEE5D58D01FA40BFFCEB1F024C6F94610012", "ADFE973D8DE75277E9EFC45721D8E95AA276E7A47E8AD912E51F9030BD45EBD5", "AE04C563BFD8D158A34D941FC591BA2027AA9CDF2814A2468DA20F6AF67AFEDE", "AE08D425BCFE92B07EA73E9098FF0CA5AE4F08C3C2A4E5A61A0379715335421E", "AE2D99F51F54FB9B9702B49C29BE274AEE8BC814AAE746C495B94D448A0B731E", "AE3208EEE597DADD8531B516A96ADB9FF4C1017F9E86C776CEC09336A409AEEF", "AE33D31A0FB7255EF28BE79BC12503CDC31DB9273944374F35C9752D138DD964", "AE395445C7C7240CD17B06CE58A20D98731AA33DE1AAF047F3A02C424CBD3F87", "AE43F70F3F5D62A658918CCC29799CE9BC8043632FD1B49352EA1394C508AEFE", "AE9AE27A2F9D74588E4BD4733FD267C7A7AFFE6114F53DACEBDC4FEAEEAC13DA", "AED0F240DF3C88F319E3FB42ACD61D16097A82B46ED80B7D90B6C196F011838C", "AF51E1CC97DA90D00CDACD35B02B7E7108FB894DA97EFC4B711F84EEBE554D1F", "AF6ABB14A6D607E15C5B5E8D5407EEF7D810349AC6111648229782BB7B5A95B8", "AF755D0AFFE03556C8B9305D8915C03A01FE89F8467352FDCE443EF53F8AF11B", "AF7602FA31D6499CCEA0B90364F0341F1379DF87CD2AD96A05C2831AEA8BB671", "AFA0CC2FC2C055F26F871E9C21EE0AA3306230ACECF1CBD6D9CD834A07E53935", "B0528F9B036E05AC9A10262631DAF76C50D058E8380B936E9BB1177907389047", "B0BB2EA7A319BAF5A56BA29C1BB3AB5E703F5A5F8559CC217AF2FBEB02F8A32D", "B0DF32322CE6A2B6D1EC5D029C9322141A4F0B90F6393DD9417AE692DA63CE98", "B0FB4CCA6C2AAF4AE7DFA7516AE94640B71BE0BE346F669F7A4393C673251F3D", "B0FF85DCDE8644B3484BD6CF258480DD40154E7BDFEEDF7A128BF747F3AC618F", "B1784201FD00E2C0822FC10C298CDFE41BD6AB499FD017C9C1EA87BBC11A7547", "B17F6EA32217517527CEC9840D03393C5EFC22D03E15D5F135A129A339DB07A0", "B1E750F05DC2133E8D51F675D3CBD67E8448BB183D36DC9052B6E9550A7CC5B5", "B236D3400A0C6106EC62C77931DC3654EEBAB6EEA563B3344ECFF477FD634E81", "B2565B6FD403933075A5010B41D6BBBFC8A77FB43477AAB65D5831F66FC7C366", "B256C15E99202EA347E2A029A2996E0D747C26A51F8F4A110F2D6D74B8EA1B6A", "B26820DB27A2FAA1ACA38AC50789692CF5EFEEBC3CBAF202DB49324399109A51", "B28FD4A25B43EFD2C7450FB640D5515FCCE6BF18AB77452E913D7313263F803B", "B296DE2C978240783DE76901DE1418342BE45C62777C42A3956DA1B0B1716126", "B2CF752DFF3B011601B92047B2385142C0B5BC43D63F524444B6D4A034DA8902", "B2EA2FBA4D280351FEA7F9EC1921C448D44F4D9EC613590A87A15467F7D34153", "B2EAB78FADD2A38E2416DBE38509D0A0612D4D7D3AF68924D1886EE5C5C022AF", "B301E3BA36CF8897185EB51E86542B39D3D05EDE0AA3B1DAADFE9F809DDA0C1F", "B3078CC20AA0193DE0BA1F24BF600DB307BF3971A7F9CDE1170DAADE21278824", "B32575F43F0C7C8A19D29087C1F5ED02C42CB3C9C07BA541EAE33916454EC4A7", "B36D4D104A4F6AABE76B2FD840B292FAFEABCFA232BB38EEB768F68D12E9D548", "B37FB96EE4FA4B06328DA641D49120233F6F6FC031E87E5A21A71F34BB882B42", "B3A541644FEA43E48D36CA5E9D16B0C96C2D2EDDC66F78E397A1A660286F7C94", "B3C929CB89C965C95D82EBE5A7AF7A009A0B697351CDCD4715611526B43B321E", "B43C19A7C3830FE0BD2A0DC67EEA1A869FB4BCDC9E39048C7D25BAD77DC3AA41", "B4509EF08EDCA4252A8513FCFE1BDE0609885709DCB2BBD14D88DF46A60410C4", "B461564439D4658BADF79A98487AAE120C0F7D7F784CD83A6C875E93D4CBEE04", "B52F45C24E03B4330A5EDBC164ECE7905A3A5E97DD605715B03A667374818330", "B54C23AB6C2F4099543B14F5900252BB82DD7A923744D25CBFCED8DB2A18B38B", "B5810DD31544DECD338CCD71F5C05C78B267068FE3FD01928B5545B05BEE5FA0", "B599429672D35F0898136CCC25113D8FA5E242634C8CEB73C87851525F0DA4BB", "B5AA883A7ECBB98CC082171970FB0FD2158AEB520B2B654518056D674E2939C5", "B5B313A73D0B335F18892EC4196F2ABB099764E6FF53E09B6A30800B58EACAB5", "B5B6C4769983441433B811EF3AAED6CFC993849D42BC924ECF1CCA5E34838148", "B5F498C2528C0E625760D72F802C203FB63AC6B3CBD1D27268D5F386CC4385CE", "B609D685D630C87BB458CB89A66B87A64831A7617912F7856869B7F1B264C40C", "B61430FF02D2BBFFC51F443C00CA0AEE8270C012141BA15B5D5AABD29C436091", "B620821FF2207F0F29E8296161D30377DB0940076051E33A9B5F739DFE2D2363", "B673694C2888EE95A6BAB04A5C155DEAA18A41E4DF0C4AE45D1C5C2E3FD7151D", "B68653AE8B3B701FAB183C54D344C9C2EE03602A2C7365EC7CF172320BA1AA2E", "B7074E3767BE7204533488BE44152DE584C4DB3226649CD8A632D11D49BCBF7A", "B7B1A8DAB1A897FBFE8F37F46B5A9BAA67F914F715D69E265E2F4E7D8FBB16AF", "B7BA5F69F24A628309DDEB4E2D3F14EFFC76E85846D015C3C74B090A1ADCD851", "B7D409E9A403BA9F7B31027D06EA38DD15E5D87F56D21161B5BA8A2053445315", "B7F356915A28B9170C4F7E7052ACCF6150441808722D8591A7AE82035D391CBA", "B8C124EE4E419DE7F41A9CB0246E9FF21300C4C9A2734EF999830B9906B65133", "B8E199CFC7A9C8DCF033928312B9AE0E344AB91916C93723350723B89FCB619A", "B931906157019C8376AB5AF866AAFB8EB9C1B87D65CD05FB164C4FBA0ECCF4F6", "B947805A29EE83AAAED8ABADDD8CFF00AA389BFC4D7DDC49FC3A89A557DD856C", "B94DE57728774DA14635F965E20FAE142AA85C68C5E5D7C8BA2D710B564FCD37", "B95C859528E2821892603F360127BB3563DF6115B490F316E124F29208FB3511", "B9609A42BFED86C36189258C748597C29F9D824D3DD52ECECFEEA902FDA884B1", "B97713A9D1C3353360B57D1AD1EC137AB7A100FBE009625EB3FD31558B3B3304", "BA385C300E1AB69708D8E5042F5220F275493E2AE45A5E3A1DD992DE1DAB492E", "BAC58F310A73AC5E5FAD84D6ECE65ABCF89CB378E0F1092F4F7D09F826B5874A", "BADBDDC1B57091B8599CC7962BF6E7379B13BB622E4729B571298EDA81699BA2", "BB600B119BB0BCBE0C1A441D96B93496AC1319A4F50379AB81C6EC6E8A6222AF", "BC0916015C108037BE6EEE58D101EE5DE12F752A3F9BF433C3D352C6406B3C0E", "BC4AD41BBC5C4EC5A5CA4863C7BA4A6119A58DC36BA86476A2CB677AFA4570F8", "BCCAA86BCC3B16C9C58E1F4717449CC03D19E983B5D795C29B0F4F2B70C2296D", "BCFE59AECDDB67845A4B618BFD6E41A20C550D57DD097AC67063BDCE4F60B5F5", "BD254A15BAD5E287C6B2C82F2D724824C0DAE3774F51EFD21CA2855E0233A70B", "BDB7B08B4805AAD724E532E7DAD3D505850268202F5B6A7CD5D7EAE6DD6BA2FF", "BDF8F6272DDC9AFF34CC149E66EE100802632EF6ECBB6A1F85ED4C5AAC63B956", "BDFA432EA62E6EFDD1DA5F84B4EE926C27FCF1125443F9D0EC5005B0FEE74C89", "BDFFEC82B2EDD09B2B9BBF108A0FF2E0545F478096EDDC6BB9309619F66D585B", "BE28B80282A36EB5AE12EA4346DFDEB6572CBBFD3F23A4A31E09F4406B8F71BD", "BE38ED822E7AF0C00178B9F33546DB67627005E6481750CB7374811E7F5674AE", "BE82F07FED1BEFB3F4DF7EBB0BCE97E5DC59077685EFFE1755143A8613828BA4", "BEBF8A07906A8F35FF3BC068026B3463B248B5C923B7DB769559C4DC6A31E015", "BF68FAD3CDDC1EF89A6E1816F361C2991126DB73F6E989C09DC7FB8DE5DCF82F", "BFF89C15B535EBBB3357938F3490EF4BD8E51EFAAA3AD2539FF46CE98385B88B", "C0349AAABFD1576263D75DDFC8EBEDBDBF9CBE04C997B8F00EF826B9D7C1793B", "C034F4A93C7986F86B5276634B82B774DA1796B9A2CC2371DA4859670D82233E", "C06037486063080DAF0903578E651F281F08105507F07A61B0292AD4FC96B7DB", "C08849A00434A559EE1C5504DAE1CDDB28E9D46EDC400E95B2136AC317DFE7A3", "C09C5C1FD3C60B48E6AFE6C609BF568B8A996E541FEDA06CAD3678833B7435CF", "C09FB711C174C12F52503E2759D5CC8B4D40F4D1E018E27BB42EE31BB32CCD6C", "C0BDB67449527274F6BF935813A76F827DBFB1EAD61444E49DD24177F6B0ABE0", "C1043F35FF1F630A47D32A8195A08331316B4A0E682E22CCC64ED3A8793D1A86", "C10B851D2EABB86A3DA0968EAEAC1B5EA951FF1F25CF8B2C4C827231197FA641", "C1ABD83F59F7956B106D85FAB93A6B43A5430EF38D53B5D809C3AC7F05FEEE8A", "C1E9DD1D5F56BE590CE67E5ACE9A370747957987F59BF2DE6CD477A299E8C37E", "C22253825FA485019FC06565D7E7D6C4103E0C10B6510212859354833FAEB242", "C22DE952FD6E1544B14AE2735F81ACAE3EF08509FC895F0AAF0AC7485A98F798", "C240DF09D934E998A5A6E9F16EE5D00606D3852B389FD502ED34EB411645C177", "C247CDADCEBD86F6926A5A03AD862F20EC878D5E1054BCF2C6B70778E3741BB7", "C26C11BE05ACD8A2C83F0DB7B1892810A051510E92DBA86C9AF94113E6A66789", "C2FBE434FDED9DC756BE855E33C9AD8C0A5B759539A8AEC3235DE5AFDA3E29EF", "C3037503770A1CACC9F579498514AB027E6EF7B6DADEF690AC4B8100F16B3509", "C38AFDD82BC77228F8D7DDBD5DE927E97F8C97D1E6B1F76B6C890149323EE9E7", "C43D2CB156B7BD39FC113EAD22568306F95463D3E29CC3A697EB085F142533BB", "C44205BD925B3B63D65D5FA991188252016274A35741248C9CE3855AD19580EC", "C4CFE7F52773212E28404A230CF4140269A0828FBCB8D5BA45FA335D89CD6733", "C51EF092095509DC47C909859351A8ADA43A7C16BBC9EEABB3105B07B38B2E02", "C53D3C47BD4A155045F99C1E4CBF677182A1008DEB57811C876885F82676C572", "C584062FF02196D3513361FBB98104F5FA7514B1ABD5ECCA55D19C8B859E090E", "C596338966F1610A28DC01FBB21502CC71651B70DBC8B96D9603EBE432E4D5E6", "C5C3A875E50DB700220E26BE110391D11F736F71096D75C525AE9DDA14ABD8F7", "C60127BFAAE1D4A880639F74CBD9F532CC003FF936369962BC8C4ADE4D744ED6", "C6324A3EF45791634807F1A3E649F45DC0E3697C2CBC966F21AF4D4D9E99531F", "C633E3F919C9BCD1EAFB625FB054DC01CA44ECB316E9D13E7A22A44BF1FFF391", "C63F9049147CBF2ED4A200A30AAC47716B2DCF79A16C7EDB82A67B451E5E892D", "C653CBC867105CF4C768835C9EDDEDF60AF058B89DAF4ECE572AC72BEA4EB1D8", "C65722F809C01B5483BEFD48484EDC46960C65030D132C9D08F70EDB8A00D231", "C672C39FBBDF2FB7F29F14B836418C34934E05354948A44F41CFDABC3D4150F5", "C6AE70E5471CDF678253E267AB7C45FA772A777F24502EE50E243BD88E300D13", "C7D5275CE22EF1E77C2DE0FC048F002DC6C6C43730D8E85E12B6D4635562E537", "C7E6E453C17F0E572D59405DDE66A6D6FA0C82A2CA378C448ADA47660CFACEB5", "C826F1176449BFF5FE343AA4934EC17535CEB1F851490DC6C1AF590BE9A199A5", "C868750A64F1F0DE2A582ECF9C49046F23D8C1A898586CEBEE0D5DF55CF4FBA1", "C8805CB7A9877952E3B667A528AE49619053A2D7DB5F1F65CA2C84C382A15EAE", "C8E3076BF00DD8380618AD02C4DDA7DF7604CC6B6A724449CCB6A06853CAED2A", "C91C4E43132696FEC4880710887B3C0280455B0F29B0B1FDDFC3F98D4048B4E8", "C926343F69A65947C34E3260FD60159DDF712736C6D160F1C7207E499775DBA8", "C936C0289F6D1ECF2F7B1179FC0DBCBE1DBDAE4E68A5D3CDEF9291869F5779CC", "C95C9771121CCE6842ACFEDC26BFC21B9739D3FC215633C459D55FD458440B00", "C9755EA07FA4C3DAAF1AF3B34FF0FC1694AE744BC0D6BAFA63E93BC7B50B63EF", "C982CF6338657F6143B56DF2B152C22F655B666B3943AA320ECBB445A15418E2", "C9A62458FFCDA7D13068BA51A14F3364875030AD9E3379B54C1EB8EAA4DD8D49", "CA1E3EFC07D22B2DA86595362931D640F30F757529856481F669DB4619DAD922", "CA22EB6E856EBA35EEBB4E26E9399464F4765FC62AB8D4A61DDCD6F4EFCCCD56", "CA6E62CB32AA91296638D9DAB5072711CB69A35615F7FC69D8B55BD25BE71F67", "CA7DBBCCBD71AD1A623C4962467CD43E2CA4803FF5C0BA37E1261ACAA93ED3EC", "CA8663505F60F5243982B35614A0AA7CCDE991BD5E9C175202F625C2979040E4", "CA9DCF531A11B03DA139506DC9F6319E49C554DF0F64E8DEC99E49C30FB2656F", "CAAED4B9D717A8660FB48F1966B7523F78E0ED961F92395D260A9CE3B3CBFFC1", "CAD0AF0EEE65AC3FA6B204F1FFF00B9921F356F552AFDDA967C7307BEF52E7FF", "CB01E6853C64C288BE80DDE27064824F3B99801B8CD6E6B5203368FB629091EC", "CB6124223B6F8216BA9E92EAD6DAFC187E51AC4BEC28594EAEF38B28FCD5792F", "CB765B8720A2E211CEA709C71E6C4409A9A1FE0813B5C8FA4AE6417BE059E68A", "CBCC379563323EBE1812461205257622C05A3C7EB51AEE2176BCFB46533D2159", "CBD8847E98393D15AF7D2691A1958B4AAF9058B018D5E477DFB037CCB9D75D3F", "CBDB352135F35E50D1EDF94C431A5A57B2DE17935CB3F0D6B7B9FF3C9FE7A3B7", "CC00D2892FCF1EA1D20EE0AEFDCDC781C96C580705A7539FF786CF12BE0620D0", "CC1A4751363BAF070355299EF4837A7E17D105E504AC93B43A4CACBE41426035", "CC3CA2E6A057BD0C432A1C280BCDA473EAA13F9A6EA2532C58C5E8FD129BF2B1", "CC5089F9744A6B5AF776C8A1234A9BCA32E0798D396B5C631C8D215B02EA08AB", "CC6DB3505939453FB542901C62C95B2A03B3815D8482DF559005310A267A606D", "CC955D63C5A677B05E118A898E1FA6F660887714CEC0064650D28CE42265F548", "CCA2C68EF569C58F2CD1B5927035CEFEACBB9429A63AB8C973E5D68208E4AD02", "CCD94A417BFDDF66E8A9D1DC74E59009E94970350A4609BDF6C3050556108F68", "CCFBBF17D9A696428033DD621D20DBA44A61CCB92DE126AC9B8A8CA1DDE1D0EB", "CCFD0AA6FE0B04D655CB682E840C88D56CFE6066B6B9B349560AFB2C6DFBCB00", "CD07568ED0ED0755A81F0FAAB2708FA8AAC3BA618A3434B98C44AA7ECD3EE952", "CD2B7B17CE7F61CA3A2FDCC35C19FE418DC9AB2EA0126463B7C9285931D572AD", "CD495CA44BEBD14CB077B530B911409D233F1F70D2D255F57108D910C1F3D853", "CD8ECA477B472E220ABA29FB5C44E5E90FEA01ECE1DF9C4117266D72CB75EE6E", "CDF8726CAC4FB89641972BE5C7E766A6A5B672703DBCD02B09164ED4A59A37D1", "CE4FC19BA02C8564FB475BA90DED991D7B09805BAB4820B95887F32969AFE989", "CE9B7DAE68B959C5E4A5F965424DF5CB00879B1AB1296B115DB9CB1B8ACD054F", "CED843D7D4246954CE05AFA7281A1AAFE1CB3941999D193D72B79F3086C39822", "CEE16EDAFB404DDF033F95C90CAC7DC93AC2A4F7F086C619B9F25A120A2D62C1", "CEFB2CDD169330DA5EC688A529952C2E9694D94C3E8E4A50C9011E9A9F7FD71F", "CF1C387E16CABF8D81AAB4B6A53874DE0D663EE059046460B3A0D1EEB8D2E762", "CFCC0798CDF713DF824D5A326207194D6B958FDE4555B27C773AACA218FEDFBF", "CFD032C6816AA09BC4BFE927259D2C7496159BC447A779769DEB0DECC4952A56", "D02871CB7E6D12ECC82CE98E5D1C92E08BB9FE8D99C34DD0487685D4579DFF16", "D02A0AE2121D8B9AB906A297465551FCFDE7C31DBB34EBD52FA33528398DBCBC", "D03B0EB9D33E29DBE71CE300C3891E52F52A955A1F5348A6E91F09C3927647E1", "D054D1FB915BA204B059103047AE248EE28845425BAC252BCE0F9CFD4D129929", "D069D767BFDDACAF36F8AD8149748B1FB801641BF7495317DD2896BA6B1D2E26", "D0934964E9B56702CBED525517F4EA576FF2F33A8BA6C800C34ECA9B7FE90236", "D0B36475A4B658E0814531AA499810EB812EB1431F68943B8310DF7002931DBE", "D0C8E5E0BEE4FABB79DB325BB83CABDE3FDAB4C4F1FED02D03D24818C3955365", "D10B18EC28A032EFEE6049343ECB3633CC65AE8BDF915EC68181989AB9170F54", "D119D49C63D565CF5FF1DB2A9639F03B8A262F13941341F6EE7F4F012125086C", "D11A0C2CC15BB8D7B04868F2862A15D1963924B4812649E2D326C9951AF9DCE2", "D11AB976F85F6CB2A151F18E4C7DCD45359DDB99578FE739D459AA7C71585CEB", "D1521F697384AE68624F938E7199B69FD04C3C927F4E48E039FD236DC2F71A72", "D16BB3B63F820806338161CA1080F3C27550FA2CD017A11E0C7250AB6C05CD77", "D1C70BE32DEEA561F5BD20121B6CE6B04522C3B0A34D7DF273B2AA52F0E58277", "D1EE65B724C053B8C531DB8F905A57DF1D402D875E50E3E22DD86A5856E65A9D", "D1F42AA8CB20DBF23F25294AF1D5952B14F11D54D59A127F5802F150505DD446", "D21E913C6ADECF8EF09DE3D9AEE7C0E5E9B0753FDE5C8D754FBFEF41B5821AD7", "D265D6420534A0D3FF516C7DD25F86A97421F2782B1E44C0F82532643E80A306", "D288D5ADF67DE9C3743BE8316D7F496F7CA64A396C1E8E9019178232D17AF15D", "D2F50568EE4DA937EE17845E1DD5EBF05D635A0EA8DF1A71A541344922C646AE", "D39F97275EC2B41842D64D43A382D291565500E4943347BBD6046D3D96E0BD41", "D3DCE49F85FE68AF51C5D2B463504D5A7870D422F5ACFC1E2C0DCB64F7543F5E", "D4552FDC70931CD8B4AD1900AAFD91F4395F28D6E61914A873226147AFDAF729", "D4710F6A6EB0137969736C9167FDBE7A89392EB02E9E63C18FB1343780A146C3", "D4F9AE28EA501CF2A176391E0E920E7B7FC3A2D7D8CE5319FAE6CA44DF5B1E04", "D5A337BBF40F1EC278A257AD0E66694203DC8C28AD33E3EE2CAB9931D25C3842", "D5FC186AFDC475BF1011609D51599D9F4054E10263C52218648C49E2D757DF13", "D5FC516E557685CDE38A1C2C470F73080C33F28187E749A00C04F0812AFB9842", "D63678498B94CE4636F5CEB8FAB7C8F6F571F578E6D0EF1B23F011C3A5778E9E", "D64BC5FE778E62F52FAF1A558C46AB9C63D2D06A74FDE22CC1A16BB67C6A0E8C", "D677F4DB1390FE714B817B24CE7D654078B51BA146F6C4537E43D85D3A2B0CC2", "D68C800775F3FF091EBBA6CDD9876B557C32AE8057306E8C377C8D67C60953EB", "D6A278AD53F24F8C2A141B0CE86714271C028E265EA5E488D59254EE85EA8F0B", "D7003E42BBB90675047D51795AAEDACC95B4FFAA8765FB64E2392FFB56156EC7", "D737A8C94C930B47803CAEB6FC01A6B08302D409FE64A0E40960433AFCACF7A4", "D73D3EC11078FBD322287FA1CD4D278DC6757E7F27EB2AF32CBA897EE086EB0D", "D7631ACBA1AF1A9B52812A58BF3AA35ADF9FF7484F93C8ABDF833A2E3543B207", "D76879E8E9C0967E4A6B7FF8216C0847B633BB1DAC32CEE31E4544A60A45BA68", "D783A7F4DFFB9905E79E357ACA80CE9623FFC55147AEC4BAF71DFFC0CC45C9F3", "D78944C84B5DC781DE9FF60E3429142DE64F0F3040B571360FB07D29CCB7FF6D", "D794EA27CA7E3FF8825CDCEFF3439F08F1C4C2B94C2E54C22629BF94087D371F", "D7F5135F5917DEC79A3EC5F40696F566955841FB3632FC8C822946EC528790B3", "D7F9F6844C0B2A7AD577E157F60824D8F5E539422CB268955C43FA58749778CA", "D8A776D3B0AC34F7E1A0CD9930DE0D129047F912F17BAA37C912C1C104FBA268", "D90882A3E95B0A521011936122CA086C48D9FEF441869C5BF302F67319C3A703", "D9172969D61CF2C2B1320CAD15CAF5A2806FCA9580D5A6E5A2E2C98FF12E2386", "D92ADA90B46EC7B09898EB31D2D008827097E27BEC48AE4B2D1B9121A6F37C05", "D97BB9BB53B939FF7B35193579188B04D16C39569BA1894B0DE24BF411876AEC", "D9933DC2F45243B1EECAAC88FFE4749460DD4954EC12DA4342D5EE3BE7459FB0", "D99368A75ACAE1BA071AB4642187D64BD6775A4C21AC3701A9903B0394B40C87", "DA2EED2B0475D138CCA1BAE01157F3CFA6C1C284092799EA42A78A5B89EC994D", "DA5693B45D837E9F7AE2D7774F00B89CB743CC916CC5F6FE9C57B7B0840EC498", "DA6CCDF86949C91E3CDB7DD6338939531CDDAC3BE2000984206A1C2A539B8AD4", "DA815A7C4A42ED491F84873B4248BBC6BF0CD175F8AA4219C89E764FB61FECD4", "DAFB6976639A3A0CD92E6E7C328A7D79DE7ABB5427325AE9867BF17CA6FD2D68", "DB0FA9F3BEEDABDE80F9E34B7FD19E3F236E4D322D5E55572DDDEC14A0312943", "DB21F6160E03B6122C498B14479D8591179C3DBE218BCD893BF4F64F3154AC0A", "DB2C130ED664EF84FEA3890AA61C559D746402DC22D50E0603B7AF440CD83DD7", "DB7E13AA3FC7A85023493B236DF17D2598630CB39A19C53964F1CB0981572C36", "DB866DC8DC23646847AE5E9E25C02B2DF2A195A414B2734DCAA102E637957BAF", "DB8E4E659E64514548095D982131905FB3A6F5608C5916769B8820AA6A05133D", "DBDF7B62F6BB6B8ABE8E864AB6CBAB13BAF35D120B81DFFD0E0880EED7F9F4F9", "DC05F94C20E54530B22A0F7C5D47B16BEB79F796391043B6D8D2F3934DA6C247", "DC103410561C74F2BE482D1DC9D39673C4CA0201FA7430A6DA0052ED558DCC5F", "DC1E3E2C447E8C34410E5BFCF98F1BF0BA115FC736AA77AB7956DD329EB71F5D", "DC6227B5FADC6BCD577F4D87652F816B3EBA9EC54A04943E6907CA0B82BECA66", "DC8B783B9EAA31C03B1E404FC721223E232D2BB78FAD1F0FF5BCC2915BC8629E", "DCA68441373BEF1042981BB5F93A15689B7F444A5DB03C85C73E77740349FF8B", "DCA6C0610E9C45CFF20182F3A5A4D478C784CA78328DEAB4C09C1F518C77F206", "DD34B9BC3B107A1DC572E91FE164C11C4D3B050CFD5A53884C66DA680566DEB4", "DD3DD96D8064D65093AA9C7A9CFD186B2731F20C9C4F12C15232298160BDD6CD", "DD464CE379B2EA45DB8FD5C1271CBEF5EA4164AAAFA4FB13859BABF4DFF16C6B", "DDB6BECDB2F6AD03325FC289A06D647AF83BD3A8B6A5886DB4466FD926B7E25D", "DDC286A102F903AF2B73B62C4B9B6B164AD805B5A1C38820F523736F979F5A1A", "DDE11A6EB73BE3F98B37D85D58288FC1BB387A976FF07E231F2FC766E2B956AB", "DE610DDFE9494156D25DDA58CDDC5C5009E3BBAAB1D9C6FC73CE6056DFE0DCFA", "DED899C681C4F01F658F5349E77058BDF8C51E88FADBC17AC63AAD856B4CADE5", "DF49B4B02F69D1E1BA635FAFD13EBE3F5F12A4D7C1504672A80DBC7EB5565608", "DF63783429087B5486C3BD74B359536E1A11AE36CCFF2E12974830FE3C214C0A", "DFB2B8A17991C21AA572BC3D0FE7E4D2908FC84F553760CE8368AAFCE6C462AE", "DFB4A89370117A0C76AEBA610891449C199F7498B60521F9612F1A48A7736A6B", "DFB4A9585ACCD058A33E7C0B787D6C7AD3CF5F7FAE137EEC5A2BC75C501CD55E", "DFEB027D63B2C15191EC1FDE8836EE3B8F24CFA4B42FE77E7E1820B6BBD77AC9", "DFF1640DBEB48B8BDF07B3856E1B96CFEE191A513A8879122CB35B6ECF091230", "E04F9DE1174EFB4A26CD756DF59E4C46606A4BD4063992B465E76804515C6833", "E07C0C4D82739BCF3EC12790499FE045BA8E517D49D7B04601CDBB95AF91DA23", "E13F75F869D571A85240331EB120F83974D98D63498ADF9BE18416B8ADD741BD", "E1A1D552E78033169678134FE5961F6004062983C1F460B7BF4BC91470F5CDBC", "E1C98720DDEC034DBD81A6FCCC9C362ADA6F62195BBF704CE0EE2543201B50D5", "E21F340DABF184020C5A840EB8711C476D889C801FCE844EC58DC7085FC2D37F", "E23E5E368C5384B3BD0EA1D29DE09B49CF49A5F44632E304B0A1EEC8896477FE", "E243C29CA896F4377033D44D58C81FB66922C5BD9E66D42908A6616C20911343", "E24DA558C6C58E4DA05950B06D7C9C1BFB980CB0462AF1D70A81036D55BCE675", "E266F803E71C486543CF623D66DDFA40AA2C4AEB0C15F49A79A5600D3D37709B", "E298AFAE6C10545EEFE2EDCB1E58ACEB81769C82FC173BB89206A046496B5501", "E2B86254D720126A86E0D868B69F73304F67BBA828605033D214DA145B7078F4", "E2CA1E7AD2646F35FD854E930E6AF030E58817DBF599A59E49719694B3B46D1F", "E310185BE54E51CFF10493C7633774F32119E4171818C194880F59739AAA4089", "E3347BCB529A35601F044748C20F62BDDA272E18F4F99AF1DC1EC2079BD36858", "E3B35F3E04652FAE6E9FBEE0D92DCFA4823E1547648C47F0F20643E610649EA7", "E3E29938D5D0031514AFE0A7E80C2513F25C4DCE6D5E26A93BE99C9CA93B0FEA", "E46E249A2A7ED001BEF59F483830A2690EC2B94A16D5E8A1028E94B1AA23DA4C", "E4A28F8F68186CEA27D3FEB20460BE3334CBCA58BC4385BFB2DAC3333FEF6C4B", "E4B907FE5279D8C6CE8330CC79305C67649550BA06CF29D70ABB593E6074803D", "E4BF18E141DF994DA14A3731342314B60F8A9B7863C10CD9B3821AFA750D3B31", "E4CE7479089E915C4B370974E3FF482D5EE842E39F0AB529ACA744F7ED4A4FCC", "E4F82B1EF36905183E848EAEFF844914F58061E9D484E205B7784B8B5BE99E13", "E4FC892E8AC3743F52323C3E71CB36B20C92F7CB7EA5B793E1F9A6FC92FE4DA6", "E5138E231899A09B05DC534B4777976B17A0246B1FA15B8342DBF280F6CFD669", "E51AD2501331015E7E19A3AC49A96E1AC1A7C291EEE9E468031B3BA17AE28285", "E51DDF73E3F5CD96B12560329D18889F698C09D96494E43FCCF428FEC32A1F2E", "E5BBCEF719E615994F1B258C759E10E101CC12EE74BBCBA1AFE726D5AFF29509", "E5C9021CFF3428F4B3B0F66CCD3134EB51552CD8CB2E83DF36DD8403ADFA8179", "E5E882E54AFBD27E45C030839DACD6485753D5EE22D50022E3F5DC9AB418F901", "E60642C240D9037B533752978E174EB572F0BE59C7AAFB7A1B4B4EF362ABE4E3", "E619F0B12EAE67CCCEC5CE0326BC6EB363C3E94F87723AB21878B776DD8B0317", "E64AB3ADC23B600EA6ED20359A0A41DC683503D7E0E0C1B0EA08877FC18ADCD0", "E652AD074D4537242E4F6F6865F5497FE3BCB4D68389AAE0D3EB706D9D1DD1ED", "E661C6421191DB8D60DC25995576ECD28F8538D31F59D40BAB7FA8CD127BB2C8", "E677723D81339CA25FE5CB670D8786FB1ABB44D538C8C5D7C05E9A9FAE453FF7", "E6EE20198BD4C32711820E67FB3A052C1C4BCF0D11A5A4BBA683215A3FA5825E", "E74C53C459F7FE1C89AE67FEC29B42B1B0BF95AA1A5FE3D3CA36BD71ABE75230", "E75CBB7CFBC1B3A83749883DA9B07688107AC477333503C7735A34D91DB19608", "E775C68CA18D51E91E688F1880BD5AF1955B5F4DF7397FA28CC721E37DAFB99A", "E7B26F1EAEFB4260D24EE36CC6F4BF7A433546C3ED0AB3E0C2C3FEF44B61DA61", "E7B4E1607446FED2E1EA3DED4F35354BBD746B762279FBE37A746CB69873BBAB", "E7CD7DB0F968EEE7B8FE20C80C08018385BAE3E1AD7510C813DD097869B900D5", "E7E3551B3BD388636A37375B3F6439FA5E8D471B186B7E9F88305EC0A265E5D7", "E7FB5735ADA60C1184A568F1F506520CF55F0E3A61B381ABCF4FF3C5090C8998", "E817E7CC83FE8715306D28C653DB646FDADE31AB5B2E6D0633EF4C1838CEC408", "E8369E4F0706AD67E1935A667DD2E6F656DC66DBF75209AA618BDB625E1D75DA", "E865BAEC142E55284C8F942A6FED3A4F1258913AF74DA6D04A4F969F1FDEE827", "E885A13E4B96E1D152C9AE2E650F10ADDF3F376F994F2B7919FFDCACA79C4E08", "E888E5EBE83D27A538FE4C5957DF731881D9808C40870DA1BFEB861547852D38", "E8B622A20154C0D070D4BFC473B062648A8B30F2DC4928FABC794E27583489A8", "E8E3D041384B3A1C50DFC8E8DD6B7415911290515C88A2C292DAF367F018B0E7", "E8FB04B96E4922EE98A4E39A82665391B5E33FFBD84BF83FC189E8E9D5922FC8", "E985F7DD50D9D8A298856E2C1DDC013C56A405C6DA86C2ECE58AB850F0AC19BE", "E9CDD69A151880279AA5C5E27039A10306BBC1E05EF41BEE24FB52ADDD64851C", "E9F3A90DA9806F4EB921B9D3B1386D06CBF6A6FC448F63739B13ABCC86AF0725", "EA52924E34BCC16950981552A3FA767720FFB0ABD2C4348121C16E9BA6BD4C80", "EA8F6026280EC5C6AA9C8A07C54623F78F9DEE9C998B454ABD6F0A27FDCF35E6", "EAE3626D697DD9AA184F2FB8430E9808A349261E042A2F475F1558DE0474E3B5", "EB600CE5395CD89BA24F74E48B91CAA92CF18E64A90B1514E5930A42BF80F58A", "EB9C97E1767E99DB5972AA6DB53446FFC1D2256CC95E283AD514F18189053A41", "EBBA69401956060B98C4FDDE1CDAAA10D09B28A527F8C5C2F8D2998B16B675C4", "EBCAE79C78E25C53F68D6476B1A365416013A82CC75BAFBA0C65816EA47B537E", "EBCC12197854D7C444B518B80A223576FCB219A088A0CC929C19FF2993DC431A", "EBD6110D65EB41702B40A5795DBF9BE4F150B84442976771BAD2D5EE26847349", "EBF1AB9B1789962995A00F3A98AA22490BA3274A2E69C3AB4CFE371E9416F6AB", "EBF7FAC69068575846327A4CBDC56FA371BCD390746BA7B0C955566A104AD9B3", "EC44FB8E43A4ACE3E70572A9C176DA90A44A471EC4871646DA9BC2ADBCD35F57", "EC4B00EBCD41BEC5ED4E0FAD95E591C72B412CD4A25710944DF52D9B3D888B31", "EC583EC959A2A069B275113A4307EA1C258F0306C4E67508A1300BE5A8431AC2", "ECD5F4107F4577D44F48EA90E5DA9B65FCE96715BB21DE2FB949370278F108C8", "ED796DA12F35B849EC739966324C81FE11BDCC6E2DCB25F912D4D4A08B754359", "EDBB640D9C964C319A40ED15C23232FA8D49C6B495D6EF19F248B4A314B7651D", "EDD093484D30137351819CC679BCE37DF189A386F2BF2055FD557CA44A4384A5", "EDFA9D5968081EDE399774767050C178F730BD070533CFA73DE5F24F7E8E7A52", "EE3F69DB0756C44AE3B430C37F675C3996793B7254B2E503759E7B1FA35A0053", "EE46E4F493F456699A7CA10804D8498E26AB27FC70EDD6DB31949516494BA3D2", "EFC1B556A22098087C19B5342F262C1D63356C91A618DD58A453DF339E10D8AD", "EFD4687D2DC8ADFBEC960932263D6DA222DDFA92899BC72A9B9D62B4331178A6", "F000446708B91A19B1F61CA99B1AF67BFEB9C3B680087EEAA89007C8D02D6447", "F009B229BA58179FC3CB8F633C40E30BDC72B91C95C8FC1634F3C8FD8DBB7689", "F094735617DF6D91E1005B48EFE756F8123F399A8FB01EFDC087D8C653FDA1EE", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "F0C6BC6B6E0BCD2F79CA2CF94A9D9909AF0E9117B13EA219F0B9C650CC1C6C47", "F0CF06A35CFB9F883DE74CA58FDA5FB8E4CD4EED75B2FA4B80389117E7AAC99D", "F10F8D3E795F8FC960C9DE67D3C8A350C036905B85F3908BFE6956BF772DB36B", "F1A3DFA7EB79FE51E9EE40DE7EE818B3181F7D6FFEBD16C7E5DC5676556369E6", "F1F4B6471FE5DE046CD2C2806192CD966190888F90B300C9E1616BE3CC7833F1", "F231A1135B58328EB93FE9F162165688AF51DA93D4A867DE99250877EF9D4E04", "F26EE38CBA6B93A0B0967DD4DF0B628E7EDCBF41134B0358C7BD18C0EBEC7F60", "F2C60EF9E96AA9B7F20810A32ABE6C58279506718A61C2BD9D6A6DF787CD9EA7", "F3A0AF7D427E6AED8E40B3D19585D93D61954607EC55F8F1D3E4A633C68E5576", "F3E9AF17DCD2EBC47BC32D0E05B6ACDCBFDDAF3EB47FFAC93CFD0FEBBBC04F7E", "F479B1D4D6CE6F94562BE83AEBC7D30E6633A6727AB24138B99039D7EB3AB70F", "F47F7D0A6FF231FAB4DFD908C791F72AC22C869B27ACB9F25AA9C61F0E6F2A9D", "F485D1B302C6CCF9DD5E2160CF80EB387E0ECFB5F05E8CF17ED9E037DF9F6555", "F4A4DE4779BD0C5EB9721FAA09D23035B36D4C6ECC92A86784334BD52BD8BEB3", "F4CA880341B94608CA96ABB2752E8B1E313AAF497D8551E7FBFF02076E793142", "F52078C3CD6350F062D64B5C88176DBF009214F5DCC83CE7CB6761C3791B8AA3", "F532B959E4CDB66D565B5EFE3D3EE3723E54DF33B61EC2B410D139F563418B5E", "F55E9BE9F784F2E15972A25E2B2F5A6D630C611D72C692443C49F26D84E95F99", "F5AE5E21C0A9E6B0B1649A6E7B87CB8EE2192944FCF61E38E2C0AD35BE61EB2A", "F65A53960215D7A6B10E3EDBAF16DDE9E3AA563F5E9427FA05CEFCC6F8CF7B6F", "F65CCCFAB16BAD847BA677C36DE613EC73CA7786F8DF7AD1ACFB80028B238ADD", "F65F1D96E364841337F0770420AA39E180E57CF181628F15C7259D9D9A9E8BDD", "F6697F7B335B13964F9055910F3DE232E816E18DF95389E89281CB35606768FB", "F6A277D5EB211A9A3F13B9D708BC789AB41D5A7C41AA503DD52BE96CAC542086", "F75806AF51F262CD91F3E2017F6775AF7816B8E15289C5596B33856B18979E5B", "F7D8CC190EB2EEC81DB597D9AE0B7B2D297C1C2915915DECD42344B16CE3E429", "F7E51655AE0C3E3A5C7AFAE4499771D71B4A3255C1EDE468013BB3892E874345", "F7F257A8838D7035B1E7CA49E5F21557E74037DBD6A812B56E778A4C0E53CE55", "F86E22B7D4364B00DDE20B4FC7BF8FBECA6DFB9BBB025F902E24119D4762DB2F", "F888D5954ED0A16F231E324379B3058253B264123956F7A5799DE57898BCD74E", "F8C05127E36E824556F51F75FC0BD7B8C9BAFBF8B9EDFDFD5570D29673E4DEA1", "F9336FFC545BDCFCB6E2911A06416BD29601F97D9670FD8B6FE980BAB262EA22", "F94E2FD93352C1316CE6430308206EAFBBC673CE41B3E1052A98C80E2798D9B0", "F968064DF1D870E093FB1CBB6C9BC42A2AAB61D61095B3E288687BFC31A52BFD", "F976E6D48149579C30755509014967F1B6A7163FEAAB9453EBE9572696C3DDDD", "F9E6E871AD09EFD68493B0509332E4B5C31659A85D7103231DE33305CC3016B9", "F9ED99C3F4B2D868A3826BA34135EFCC7EF1978329C535488F23E6CF98DA913D", "F9F3B4261A18C4DCE8B16610FB2521F9D859E86F8EE3010A1231A24FF23D52DB", "FA0EB7A3587533C5F011BB310568B892891B2BB789186F309C8FB944D26E61B1", "FA28CB50714C2E033435E17981D021316797914289ED09AB906E1A7CBA22C8A3", "FA4B683BEB9B49C87C8F293AD46CC6FEDB68A76B71FDD62413EE14D604E1FE34", "FA8947935D7353A8494BB4E9213036F88B784759F33BB661330A2FD4F6E4F874", "FA90A7911C85ADEB12B865581B20CE95E3F9ECDBBEA139C43CB0A41CA0544B89", "FA92E5E95E82235799A737D3E6B40E874586F24ED8ECB218C8E8C5936994C79F", "FABB94D4F22FE933341A4AC48321DD3E7433EB12024376434818EBEED312A6EB", "FB0FED96F844946FA916BA96FE69D8FC255DE30F14533A361ECDC4784137B093", "FB37F0F7CF6522CCB3B684C95B5F64BEC8DDF83F29BF1BF109AD27B6810731D6", "FB73DD29E703B2E5FE969689D0C1C72E123F823CDE33C9FB0AA1F550080057EC", "FBDE9BE1DCD3C192C9247062192D5C2056370389FC70704F2A228C20959BB676", "FBFE1E5ECDECD0966708DE2FC2FD96E9AFAB202138280274E5E4440591E756DF", "FC367D3847B3B18A075985BFC8A2A8898C7B9AFE3FE16A6F84968131CD5047B4", "FC61ACAE0AB22E97FD911A75A9094C7517F5B67482635EEE91A119E450FC843D", "FCBFB0CF72C1D0C2DF6362EB9276C011BB3576BCD5D43679BE083A875D64CF2D", "FCD1F2B6A6EBCC0ED4071B26367C683978C01FF7E8287DA4D600E165CED45E15", "FCE07050809EDF0FDD5519879C9E4BCB128AC13A84C2716F0B87AC89A1907CD6", "FD0E85A6790A7A5E9E4ED07F7E069BEFCDF351251124844206CB202EC5DE5168", "FD2209B7CB15638992B681C2106BFB54C56CAD087AEDD9B4249C0F8E7ADCB3D2", "FD3B6DACCDF2917EDE59BC97EFBE6A2BE91294E55463A289E02F5106FB9C2596", "FD3F7FDFA4DAAB71D175F1E137285D1F69A465922921368206BF33D36AB43D22", "FD49F69A2433C54698143251927A4D0BFEC67AB881AEDC9C3EAC9D5E7CE41075", "FD78E00A34CDC9D7D8091CAA57CDC14B83E54362C87FEC9329E3CF442952770F", "FD89F92B8829CE7392B47C0ED84C6AFC3595DB7DDA24639A8AB325F2C83DE0D3", "FDA97DD243269D8176D4598B89F04D28DF3C51AA39B222AF75B2387650313DA7", "FDBFA660F5F9536D14D1AEA47B8AD52194A56B7E998A98510729B3B69EB70975", "FDE1BF635D60EE0CA8051E326BCA1EFB7C7E659B969B5B079432E17D2860391E", "FE682ECFC10CBB3EA19CC98A95397F776F34168220DD72550FAE4CF5E216A9CC", "FE6A60EA653FEE6F655EBB8429BCB70E7D54726EC0055ECB440856BF66B419CA", "FE6D95CEEFE9596CD6D6134F8326AB13E3C97D550B3E62F57DECDBDBC51C329A", "FE89F8E2C667D09C2C5C2208AC1E6F9525947B9E4A96A92CFD5C9D80113D73FB", "FEC8232906D5E0EDBA8A4F328F694BF10D9BB2DBA200DA4D22E92231EBDBB517", "FED8F524B9C595CB0D81C78AF8662D74D0C7960F6749FC6424484CB55637033C", "FEE45A44E8C46E13896C20C8C9B2A275C16E5652E4DF723FE4A044838B932DB1", "FEEDE21D672A39EFCED3DB5A5B53E379443D429F39751E681671299243448D14", "FEF059B015A81B33DB20267AB1E57A6B66A7880C75417A5CE5E485C06805E565", "FF45E3ABF690F8389ABC4179D09EC26AE04AAE4360E4A0DC8ED625EC0F918D5D", "FF4840FA7F2317CBB6130A281376F7290C3227EB77D653FDB8C95433F1FE2137", "FF60AB2CCC42CBF13C1B6FA8A219EC72D17B3DCC11F28A2485862DCCD8A4C2EC", "FFD20BDA9DC0CD5DDBF6748696EACE0D0B49FB850C5DF5A2ED65A12A1B79DB4F", "FFEEC184B6E70C6210AE293D53A3A1B1504EA119812486B8160ACE05A643D9DD", "FFF61835C72330962E1EE49EB4E204840FE39F4532D4920DF766E57BAE1B8221"]}, {"type": "ics", "idList": ["AA20-275A", "AA20-283A", "AA20-296A", "AA21-209A", "AA22-011A", "AA22-055A", "AA22-117A", "AA22-335A", "AA23-136A", "AA23-165A", "AA23-215A", "ICSA-20-133-02", "ICSA-20-287-03", "ICSA-21-159-10", "ICSA-21-306-01", "ICSA-21-336-06", "ICSA-21-336-08", "ICSA-22-055-02", "ICSA-22-069-09", "ICSA-22-090-02", "ICSA-22-097-01", "ICSA-22-104-05", "ICSA-22-111-03", "ICSA-22-116-01", "ICSA-22-130-06", "ICSA-22-242-01", "ICSA-22-242-02", "ICSA-22-242-03", "ICSA-22-258-05", "ICSA-22-326-01", "ICSA-22-342-02", "ICSMA-23-194-01"]}, {"type": "impervablog", "idList": ["IMPERVABLOG:4F187FDBA230373382F26BA12E00F8E7"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00668"]}, {"type": "intothesymmetry", "idList": ["INTOTHESYMMETRY:03170E09A2C6F4BE8A3B9D5EF113B293"]}, {"type": "joomla", "idList": ["JOOMLA-779", "JOOMLA-816"]}, {"type": "jvn", "idList": ["JVN:06527859", "JVN:42883072", "JVN:43969166", "JVN:50890770", "JVN:96561229"]}, {"type": "kaspersky", "idList": ["KLA11472", "KLA11486", "KLA11487", "KLA11488", "KLA11520", "KLA11552", "KLA11555", "KLA11571", "KLA11641", "KLA11784", "KLA11785", "KLA11929", "KLA11931", "KLA12006", "KLA12007", "KLA12017", "KLA12081", "KLA12082", "KLA12083", "KLA12084", "KLA12085", "KLA12087", "KLA12107", "KLA12114", "KLA12159", "KLA12160", "KLA12311", "KLA12366", "KLA12367", "KLA12437"]}, {"type": "kitploit", "idList": ["KITPLOIT:5420210148456420402", "KITPLOIT:648469287269586263", "KITPLOIT:7323577050718865961"]}, {"type": "krebs", "idList": ["KREBS:1BEFD58F5124A2E4CA40BD9C1B49B9B7", "KREBS:952ACEBFD55EBD076910C6B233491883", "KREBS:A8F0DD3F6E965A3A66B2CCBB003ACF62"]}, {"type": "laminas", "idList": ["LP-2020-01"]}, {"type": "lenovo", "idList": ["LENOVO:PS500321-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2016-0311", "MGASA-2017-0305", "MGASA-2018-0376", "MGASA-2018-0431", "MGASA-2019-0077", "MGASA-2019-0097", "MGASA-2019-0098", "MGASA-2019-0126", "MGASA-2019-0170", "MGASA-2019-0171", "MGASA-2019-0172", "MGASA-2019-0190", "MGASA-2019-0191", "MGASA-2019-0221", "MGASA-2019-0260", "MGASA-2019-0274", "MGASA-2019-0279", "MGASA-2019-0399", "MGASA-2019-0407", "MGASA-2020-0001", "MGASA-2020-0023", "MGASA-2020-0066", "MGASA-2020-0104", "MGASA-2020-0166", "MGASA-2020-0169", "MGASA-2020-0173", "MGASA-2020-0211", "MGASA-2020-0233", "MGASA-2020-0237", "MGASA-2020-0255", "MGASA-2020-0277", "MGASA-2020-0325", "MGASA-2020-0331", "MGASA-2020-0380", "MGASA-2020-0397", "MGASA-2020-0424", "MGASA-2020-0465", "MGASA-2020-0467", "MGASA-2020-0478", "MGASA-2020-0482", "MGASA-2021-0020", "MGASA-2021-0021", "MGASA-2021-0022", "MGASA-2021-0034", "MGASA-2021-0092", "MGASA-2021-0093", "MGASA-2021-0108", "MGASA-2021-0135", "MGASA-2021-0136", "MGASA-2021-0139", "MGASA-2021-0142", "MGASA-2021-0153", "MGASA-2021-0165", "MGASA-2021-0168", "MGASA-2021-0173", "MGASA-2021-0176", "MGASA-2021-0185", "MGASA-2021-0197", "MGASA-2021-0211", "MGASA-2021-0298", "MGASA-2021-0303", "MGASA-2021-0314", "MGASA-2021-0357", "MGASA-2021-0370", "MGASA-2021-0372", "MGASA-2023-0138", "MGASA-2023-0141"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:78E91E28F51B0A15B6CA53FF8A9B480B"]}, {"type": "mariadbunix", "idList": ["MARIA:CVE-2021-2144", "MARIA:CVE-2021-2154", "MARIA:CVE-2021-2166", "MARIA:CVE-2021-2174", "MARIA:CVE-2021-2180", "MARIA:CVE-2021-2194"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY-ADMIN-DCERPC-CVE_2020_1472_ZEROLOGON-", "MSF:EXPLOIT-MULTI-HTTP-STRUTS2_MULTI_EVAL_OGNL-", "MSF:EXPLOIT-WINDOWS-HTTP-TOMCAT_CGI_CMDLINEARGS-"]}, {"type": "mmpc", "idList": ["MMPC:1AFF4881941FA1030862F773DC84A4A8", "MMPC:D6D537E875C3CBD84822A868D24B31BA"]}, {"type": "mozilla", "idList": ["MFSA2019-13", "MFSA2019-14", "MFSA2019-15"]}, {"type": "mscve", "idList": ["MS:ADV200007", "MS:CVE-2019-1241", "MS:CVE-2020-1472", "MS:CVE-2020-1971", "MS:CVE-2020-27844", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "mskb", "idList": ["KB4601315", "KB4601318", "KB4601319", "KB4601345", "KB4601347", "KB4601348", "KB4601349", "KB4601357", "KB4601363", "KB4601384"]}, {"type": "msrc", "idList": ["MSRC:35A18F0B9DCC4126DC5EC19296034C33", "MSRC:5B84BD451283462DC81D4090EFE66280", "MSRC:617BB0BF7CDA5777BFA2E81C8277D73C", "MSRC:6EA997A78BB548DC0178952394874CE2", "MSRC:93A361B73FFA3EEFB6825C56F25103BB", "MSRC:96F2FB0D77EED0ABDED8EBD64AEBEA09", "MSRC:D7503EE6392B6B3DC42482FC0340DB67"]}, {"type": "mssecure", "idList": ["MSSECURE:1AFF4881941FA1030862F773DC84A4A8", "MSSECURE:D6D537E875C3CBD84822A868D24B31BA"]}, {"type": "myhack58", "idList": ["MYHACK58:62201785372", "MYHACK58:62201785395", "MYHACK58:62201995222"]}, {"type": "nessus", "idList": ["700697.PASL", "700727.PRM", "700733.PRM", "700742.PRM", "ACTIVEMQ_5_15_12.NASL", "AIX_IJ26985.NASL", "AIX_IJ26986.NASL", "AL2022_ALAS2022-2022-044.NASL", "AL2022_ALAS2022-2022-233.NASL", "AL2023_ALAS2023-2023-059.NASL", "AL2_ALAS-2019-1149.NASL", "AL2_ALAS-2019-1229.NASL", "AL2_ALAS-2019-1232.NASL", "AL2_ALAS-2019-1246.NASL", "AL2_ALAS-2019-1341.NASL", "AL2_ALAS-2020-1395.NASL", "AL2_ALAS-2020-1422.NASL", "AL2_ALAS-2020-1427.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1449.NASL", "AL2_ALAS-2020-1465.NASL", "AL2_ALAS-2020-1479.NASL", "AL2_ALAS-2020-1480.NASL", "AL2_ALAS-2020-1494.NASL", "AL2_ALAS-2020-1513.NASL", "AL2_ALAS-2020-1519.NASL", "AL2_ALAS-2020-1554.NASL", "AL2_ALAS-2020-1573.NASL", "AL2_ALAS-2021-1585.NASL", "AL2_ALAS-2021-1593.NASL", "AL2_ALAS-2021-1608.NASL", "AL2_ALAS-2021-1610.NASL", "AL2_ALAS-2021-1612.NASL", "AL2_ALAS-2021-1622.NASL", "AL2_ALAS-2021-1626.NASL", "AL2_ALAS-2021-1640.NASL", "AL2_ALAS-2021-1645.NASL", "AL2_ALAS-2021-1649.NASL", "AL2_ALAS-2021-1687.NASL", "AL2_ALAS-2021-1693.NASL", "AL2_ALAS-2022-1739.NASL", "AL2_ALAS-2022-1802.NASL", "AL2_ALAS-2022-1845.NASL", "AL2_ALAS-2023-1905.NASL", "AL2_ALAS-2023-1946.NASL", "AL2_ALAS-2023-1966.NASL", "AL2_ALAS-2023-2047.NASL", "AL2_ALAS-2023-2200.NASL", "AL2_ALASKERNEL-5_4-2022-012.NASL", "AL2_ALASKERNEL-5_4-2022-013.NASL", "AL2_ALASKERNEL-5_4-2022-014.NASL", "ALA_ALAS-2017-890.NASL", "ALA_ALAS-2017-891.NASL", "ALA_ALAS-2019-1149.NASL", "ALA_ALAS-2019-1208.NASL", "ALA_ALAS-2019-1232.NASL", "ALA_ALAS-2019-1234.NASL", "ALA_ALAS-2019-1235.NASL", "ALA_ALAS-2019-1311.NASL", "ALA_ALAS-2020-1346.NASL", "ALA_ALAS-2020-1347.NASL", "ALA_ALAS-2020-1370.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1387.NASL", "ALA_ALAS-2020-1389.NASL", "ALA_ALAS-2020-1390.NASL", "ALA_ALAS-2020-1401.NASL", "ALA_ALAS-2020-1409.NASL", "ALA_ALAS-2020-1417.NASL", "ALA_ALAS-2020-1436.NASL", "ALA_ALAS-2020-1440.NASL", "ALA_ALAS-2020-1445.NASL", "ALA_ALAS-2020-1456.NASL", "ALA_ALAS-2020-1460.NASL", "ALA_ALAS-2020-1473.NASL", "ALA_ALAS-2021-1459.NASL", "ALA_ALAS-2021-1469.NASL", "ALA_ALAS-2021-1473.NASL", "ALA_ALAS-2021-1482.NASL", "ALA_ALAS-2021-1491.NASL", "ALA_ALAS-2021-1493.NASL", "ALA_ALAS-2021-1498.NASL", "ALA_ALAS-2021-1500.NASL", "ALA_ALAS-2021-1504.NASL", "ALA_ALAS-2021-1515.NASL", "ALA_ALAS-2022-1562.NASL", "ALA_ALAS-2022-1572.NASL", "ALA_ALAS-2022-1593.NASL", "ALA_ALAS-2023-1686.NASL", "ALA_ALAS-2023-1695.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "ALMA_LINUX_ALSA-2020-4442.NASL", "ALMA_LINUX_ALSA-2020-4484.NASL", "ALMA_LINUX_ALSA-2020-4807.NASL", "ALMA_LINUX_ALSA-2020-4846.NASL", "ALMA_LINUX_ALSA-2020-5476.NASL", "ALMA_LINUX_ALSA-2021-0557.NASL", "ALMA_LINUX_ALSA-2021-1024.NASL", "ALMA_LINUX_ALSA-2021-1578.NASL", "ALMA_LINUX_ALSA-2021-1581.NASL", "ALMA_LINUX_ALSA-2021-1593.NASL", "ALMA_LINUX_ALSA-2021-1610.NASL", "ALMA_LINUX_ALSA-2021-1633.NASL", "ALMA_LINUX_ALSA-2021-1647.NASL", "ALMA_LINUX_ALSA-2021-1678.NASL", "ALMA_LINUX_ALSA-2021-1968.NASL", "ALMA_LINUX_ALSA-2021-4142.NASL", "ALMA_LINUX_ALSA-2021-4198.NASL", "ALMA_LINUX_ALSA-2021-4251.NASL", "ALMA_LINUX_ALSA-2021-4396.NASL", "ALMA_LINUX_ALSA-2021-4424.NASL", "ALMA_LINUX_ALSA-2022-1860.NASL", "ALMA_LINUX_ALSA-2022-1861.NASL", "AMAZON_CORRETTO_11_0_11_9_1.NASL", "AMAZON_CORRETTO_11_0_4_11_1.NASL", "AMAZON_CORRETTO_16_0_1_9_1.NASL", "AMAZON_CORRETTO_8_222_10_1.NASL", "AMAZON_CORRETTO_8_292_10_1.NASL", "APACHE_2_4_41.NASL", "APACHE_2_4_42.NASL", "APACHE_LOG4J_1_X_MULTIPLE_VULNERABILITIES.NASL", "APACHE_LOG4J_2_13_2.NASL", "APACHE_POI_3_17.NASL", "APACHE_SPARK_CVE-2020-9480.NASL", "AZUL_ZULU_16_30_20.NASL", "CENTOS8_RHSA-2019-1269.NASL", "CENTOS8_RHSA-2019-1308.NASL", "CENTOS8_RHSA-2019-2703.NASL", "CENTOS8_RHSA-2019-3517.NASL", "CENTOS8_RHSA-2020-0339.NASL", "CENTOS8_RHSA-2020-1318.NASL", "CENTOS8_RHSA-2020-1644.NASL", "CENTOS8_RHSA-2020-1769.NASL", "CENTOS8_RHSA-2020-3662.NASL", "CENTOS8_RHSA-2020-3665.NASL", "CENTOS8_RHSA-2020-3732.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS8_RHSA-2020-4442.NASL", "CENTOS8_RHSA-2020-4484.NASL", "CENTOS8_RHSA-2020-4514.NASL", "CENTOS8_RHSA-2020-4670.NASL", "CENTOS8_RHSA-2020-4751.NASL", "CENTOS8_RHSA-2020-4807.NASL", "CENTOS8_RHSA-2020-4846.NASL", "CENTOS8_RHSA-2020-4847.NASL", "CENTOS8_RHSA-2020-5476.NASL", "CENTOS8_RHSA-2020-5493.NASL", "CENTOS8_RHSA-2020-5499.NASL", "CENTOS8_RHSA-2020-5500.NASL", "CENTOS8_RHSA-2021-0548.NASL", "CENTOS8_RHSA-2021-0551.NASL", "CENTOS8_RHSA-2021-0734.NASL", "CENTOS8_RHSA-2021-0735.NASL", "CENTOS8_RHSA-2021-0744.NASL", "CENTOS8_RHSA-2021-1024.NASL", "CENTOS8_RHSA-2021-1301.NASL", "CENTOS8_RHSA-2021-1307.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS8_RHSA-2021-1581.NASL", "CENTOS8_RHSA-2021-1593.NASL", "CENTOS8_RHSA-2021-1610.NASL", "CENTOS8_RHSA-2021-1633.NASL", "CENTOS8_RHSA-2021-1647.NASL", "CENTOS8_RHSA-2021-1678.NASL", "CENTOS8_RHSA-2021-1846.NASL", "CENTOS8_RHSA-2021-1968.NASL", "CENTOS8_RHSA-2021-3590.NASL", "CENTOS8_RHSA-2021-4142.NASL", "CENTOS8_RHSA-2021-4151.NASL", "CENTOS8_RHSA-2021-4162.NASL", "CENTOS8_RHSA-2021-4198.NASL", "CENTOS8_RHSA-2021-4213.NASL", "CENTOS8_RHSA-2021-4251.NASL", "CENTOS8_RHSA-2021-4396.NASL", "CENTOS8_RHSA-2021-4424.NASL", "CENTOS8_RHSA-2022-1557.NASL", "CENTOS8_RHSA-2022-1860.NASL", "CENTOS8_RHSA-2022-1861.NASL", "CENTOS_RHSA-2017-2423.NASL", "CENTOS_RHSA-2017-2492.NASL", "CENTOS_RHSA-2019-1265.NASL", "CENTOS_RHSA-2019-1267.NASL", "CENTOS_RHSA-2019-1309.NASL", "CENTOS_RHSA-2019-1310.NASL", "CENTOS_RHSA-2019-1873.NASL", "CENTOS_RHSA-2019-2029.NASL", "CENTOS_RHSA-2019-3836.NASL", "CENTOS_RHSA-2020-0194.NASL", "CENTOS_RHSA-2020-0374.NASL", "CENTOS_RHSA-2020-0375.NASL", "CENTOS_RHSA-2020-0790.NASL", "CENTOS_RHSA-2020-0839.NASL", "CENTOS_RHSA-2020-1016.NASL", "CENTOS_RHSA-2020-1335.NASL", "CENTOS_RHSA-2020-1349.NASL", "CENTOS_RHSA-2020-2530.NASL", "CENTOS_RHSA-2020-3936.NASL", "CENTOS_RHSA-2020-3952.NASL", "CENTOS_RHSA-2020-3958.NASL", "CENTOS_RHSA-2020-4004.NASL", "CENTOS_RHSA-2020-4060.NASL", "CENTOS_RHSA-2020-4182.NASL", "CENTOS_RHSA-2020-5437.NASL", "CENTOS_RHSA-2020-5439.NASL", "CENTOS_RHSA-2020-5566.NASL", "CENTOS_RHSA-2021-0162.NASL", "CENTOS_RHSA-2021-0343.NASL", "CENTOS_RHSA-2021-1297.NASL", "CENTOS_RHSA-2021-1298.NASL", "CENTOS_RHSA-2021-1354.NASL", "CENTOS_RHSA-2021-3798.NASL", "CISCO-SA-TELNETD-EFJREZPX-IOSXE.NASL", "DEBIAN_DLA-1479.NASL", "DEBIAN_DLA-1517.NASL", "DEBIAN_DLA-1715.NASL", "DEBIAN_DLA-1731.NASL", "DEBIAN_DLA-1771.NASL", "DEBIAN_DLA-1797.NASL", "DEBIAN_DLA-1798.NASL", "DEBIAN_DLA-1799.NASL", "DEBIAN_DLA-1800.NASL", "DEBIAN_DLA-1806.NASL", "DEBIAN_DLA-1810.NASL", "DEBIAN_DLA-1824.NASL", "DEBIAN_DLA-1839.NASL", "DEBIAN_DLA-1862.NASL", "DEBIAN_DLA-1879.NASL", "DEBIAN_DLA-1883.NASL", "DEBIAN_DLA-1884.NASL", "DEBIAN_DLA-1885.NASL", "DEBIAN_DLA-1896.NASL", "DEBIAN_DLA-1919.NASL", "DEBIAN_DLA-1930.NASL", "DEBIAN_DLA-1943.NASL", "DEBIAN_DLA-2065.NASL", "DEBIAN_DLA-2068.NASL", "DEBIAN_DLA-2114.NASL", "DEBIAN_DLA-2118.NASL", "DEBIAN_DLA-2124.NASL", "DEBIAN_DLA-2176.NASL", "DEBIAN_DLA-2184.NASL", "DEBIAN_DLA-2191.NASL", "DEBIAN_DLA-2203.NASL", "DEBIAN_DLA-2209.NASL", "DEBIAN_DLA-2217.NASL", "DEBIAN_DLA-2221.NASL", "DEBIAN_DLA-2241.NASL", "DEBIAN_DLA-2242.NASL", "DEBIAN_DLA-2270.NASL", "DEBIAN_DLA-2279.NASL", "DEBIAN_DLA-2286.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2341.NASL", "DEBIAN_DLA-2364.NASL", "DEBIAN_DLA-2378.NASL", "DEBIAN_DLA-2385.NASL", "DEBIAN_DLA-2405.NASL", "DEBIAN_DLA-2406.NASL", "DEBIAN_DLA-2407.NASL", "DEBIAN_DLA-2420.NASL", "DEBIAN_DLA-2437.NASL", "DEBIAN_DLA-2459.NASL", "DEBIAN_DLA-2460.NASL", "DEBIAN_DLA-2463.NASL", "DEBIAN_DLA-2471.NASL", "DEBIAN_DLA-2492.NASL", "DEBIAN_DLA-2493.NASL", "DEBIAN_DLA-2495.NASL", "DEBIAN_DLA-2500.NASL", "DEBIAN_DLA-2547.NASL", "DEBIAN_DLA-2550.NASL", "DEBIAN_DLA-2555.NASL", "DEBIAN_DLA-2563.NASL", "DEBIAN_DLA-2565.NASL", "DEBIAN_DLA-2569.NASL", "DEBIAN_DLA-2608.NASL", "DEBIAN_DLA-2616.NASL", "DEBIAN_DLA-2619.NASL", "DEBIAN_DLA-2628.NASL", "DEBIAN_DLA-2634.NASL", "DEBIAN_DLA-2638.NASL", "DEBIAN_DLA-2661.NASL", "DEBIAN_DLA-2706.NASL", "DEBIAN_DLA-2751.NASL", "DEBIAN_DLA-2821.NASL", "DEBIAN_DLA-2852.NASL", "DEBIAN_DLA-2952.NASL", "DEBIAN_DLA-2967.NASL", "DEBIAN_DLA-2975.NASL", "DEBIAN_DLA-3160.NASL", "DEBIAN_DLA-3164.NASL", "DEBIAN_DLA-3205.NASL", "DEBIAN_DLA-3551.NASL", "DEBIAN_DLA-611.NASL", "DEBIAN_DSA-4233.NASL", "DEBIAN_DSA-4434.NASL", "DEBIAN_DSA-4435.NASL", "DEBIAN_DSA-4448.NASL", "DEBIAN_DSA-4451.NASL", "DEBIAN_DSA-4452.NASL", "DEBIAN_DSA-4460.NASL", "DEBIAN_DSA-4465.NASL", "DEBIAN_DSA-4472.NASL", "DEBIAN_DSA-4495.NASL", "DEBIAN_DSA-4497.NASL", "DEBIAN_DSA-4509.NASL", "DEBIAN_DSA-4542.NASL", "DEBIAN_DSA-4594.NASL", "DEBIAN_DSA-4596.NASL", "DEBIAN_DSA-4626.NASL", "DEBIAN_DSA-4628.NASL", "DEBIAN_DSA-4661.NASL", "DEBIAN_DSA-4680.NASL", "DEBIAN_DSA-4686.NASL", "DEBIAN_DSA-4693.NASL", "DEBIAN_DSA-4698.NASL", "DEBIAN_DSA-4699.NASL", "DEBIAN_DSA-4727.NASL", "DEBIAN_DSA-4757.NASL", "DEBIAN_DSA-4772.NASL", "DEBIAN_DSA-4789.NASL", "DEBIAN_DSA-4795.NASL", "DEBIAN_DSA-4807.NASL", "DEBIAN_DSA-4811.NASL", "DEBIAN_DSA-4835.NASL", "DEBIAN_DSA-4848.NASL", "DEBIAN_DSA-4855.NASL", "DEBIAN_DSA-4856.NASL", "DEBIAN_DSA-4863.NASL", "DEBIAN_DSA-4875.NASL", "DEBIAN_DSA-4881.NASL", "DEBIAN_DSA-4882.NASL", "DEBIAN_DSA-4885.NASL", "DEBIAN_DSA-4899.NASL", "DEBIAN_DSA-4949.NASL", "DEBIAN_DSA-5004.NASL", "DEBIAN_DSA-5020.NASL", "DEBIAN_DSA-5265.NASL", "DRUPAL_8_8_6.NASL", "DRUPAL_9_3_3.NASL", "EULEROS_SA-2017-1193.NASL", "EULEROS_SA-2017-1194.NASL", "EULEROS_SA-2017-1213.NASL", "EULEROS_SA-2017-1214.NASL", "EULEROS_SA-2019-1304.NASL", "EULEROS_SA-2019-1506.NASL", "EULEROS_SA-2019-1586.NASL", "EULEROS_SA-2019-1587.NASL", "EULEROS_SA-2019-1588.NASL", "EULEROS_SA-2019-1612.NASL", "EULEROS_SA-2019-1635.NASL", "EULEROS_SA-2019-1636.NASL", "EULEROS_SA-2019-1639.NASL", "EULEROS_SA-2019-1671.NASL", "EULEROS_SA-2019-1672.NASL", "EULEROS_SA-2019-1758.NASL", "EULEROS_SA-2019-1783.NASL", "EULEROS_SA-2019-1787.NASL", "EULEROS_SA-2019-1793.NASL", "EULEROS_SA-2019-1813.NASL", "EULEROS_SA-2019-1819.NASL", "EULEROS_SA-2019-1841.NASL", "EULEROS_SA-2019-1847.NASL", "EULEROS_SA-2019-1885.NASL", "EULEROS_SA-2019-1926.NASL", "EULEROS_SA-2019-1935.NASL", "EULEROS_SA-2019-1960.NASL", "EULEROS_SA-2019-2047.NASL", "EULEROS_SA-2019-2063.NASL", "EULEROS_SA-2019-2068.NASL", "EULEROS_SA-2019-2094.NASL", "EULEROS_SA-2019-2201.NASL", "EULEROS_SA-2019-2274.NASL", "EULEROS_SA-2019-2283.NASL", "EULEROS_SA-2019-2331.NASL", "EULEROS_SA-2019-2353.NASL", "EULEROS_SA-2019-2361.NASL", "EULEROS_SA-2019-2405.NASL", "EULEROS_SA-2019-2531.NASL", "EULEROS_SA-2019-2569.NASL", "EULEROS_SA-2019-2599.NASL", "EULEROS_SA-2019-2691.NASL", "EULEROS_SA-2019-2693.NASL", "EULEROS_SA-2019-2699.NASL", "EULEROS_SA-2020-1012.NASL", "EULEROS_SA-2020-1015.NASL", "EULEROS_SA-2020-1021.NASL", "EULEROS_SA-2020-1042.NASL", "EULEROS_SA-2020-1063.NASL", "EULEROS_SA-2020-1078.NASL", "EULEROS_SA-2020-1112.NASL", "EULEROS_SA-2020-1158.NASL", "EULEROS_SA-2020-1186.NASL", "EULEROS_SA-2020-1197.NASL", "EULEROS_SA-2020-1269.NASL", "EULEROS_SA-2020-1289.NASL", "EULEROS_SA-2020-1300.NASL", "EULEROS_SA-2020-1333.NASL", "EULEROS_SA-2020-1342.NASL", "EULEROS_SA-2020-1364.NASL", "EULEROS_SA-2020-1370.NASL", "EULEROS_SA-2020-1396.NASL", "EULEROS_SA-2020-1444.NASL", "EULEROS_SA-2020-1452.NASL", "EULEROS_SA-2020-1455.NASL", "EULEROS_SA-2020-1505.NASL", "EULEROS_SA-2020-1512.NASL", "EULEROS_SA-2020-1536.NASL", "EULEROS_SA-2020-1538.NASL", "EULEROS_SA-2020-1541.NASL", "EULEROS_SA-2020-1552.NASL", "EULEROS_SA-2020-1577.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1596.NASL", "EULEROS_SA-2020-1601.NASL", "EULEROS_SA-2020-1606.NASL", "EULEROS_SA-2020-1613.NASL", "EULEROS_SA-2020-1617.NASL", "EULEROS_SA-2020-1625.NASL", "EULEROS_SA-2020-1629.NASL", "EULEROS_SA-2020-1645.NASL", "EULEROS_SA-2020-1650.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2020-1677.NASL", "EULEROS_SA-2020-1692.NASL", "EULEROS_SA-2020-1693.NASL", "EULEROS_SA-2020-1698.NASL", "EULEROS_SA-2020-1710.NASL", "EULEROS_SA-2020-1749.NASL", "EULEROS_SA-2020-1765.NASL", "EULEROS_SA-2020-1794.NASL", "EULEROS_SA-2020-1799.NASL", "EULEROS_SA-2020-1804.NASL", "EULEROS_SA-2020-1807.NASL", "EULEROS_SA-2020-1820.NASL", "EULEROS_SA-2020-1821.NASL", "EULEROS_SA-2020-1827.NASL", "EULEROS_SA-2020-1829.NASL", "EULEROS_SA-2020-1852.NASL", "EULEROS_SA-2020-1859.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1894.NASL", "EULEROS_SA-2020-1895.NASL", "EULEROS_SA-2020-1908.NASL", "EULEROS_SA-2020-1915.NASL", "EULEROS_SA-2020-1920.NASL", "EULEROS_SA-2020-1930.NASL", "EULEROS_SA-2020-1932.NASL", "EULEROS_SA-2020-1938.NASL", "EULEROS_SA-2020-1943.NASL", "EULEROS_SA-2020-1958.NASL", "EULEROS_SA-2020-1967.NASL", "EULEROS_SA-2020-1987.NASL", "EULEROS_SA-2020-2011.NASL", "EULEROS_SA-2020-2059.NASL", "EULEROS_SA-2020-2065.NASL", "EULEROS_SA-2020-2067.NASL", "EULEROS_SA-2020-2078.NASL", "EULEROS_SA-2020-2085.NASL", "EULEROS_SA-2020-2093.NASL", "EULEROS_SA-2020-2102.NASL", "EULEROS_SA-2020-2103.NASL", "EULEROS_SA-2020-2132.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2151.NASL", "EULEROS_SA-2020-2171.NASL", "EULEROS_SA-2020-2181.NASL", "EULEROS_SA-2020-2222.NASL", "EULEROS_SA-2020-2224.NASL", "EULEROS_SA-2020-2247.NASL", "EULEROS_SA-2020-2250.NASL", "EULEROS_SA-2020-2274.NASL", "EULEROS_SA-2020-2299.NASL", "EULEROS_SA-2020-2303.NASL", "EULEROS_SA-2020-2316.NASL", "EULEROS_SA-2020-2324.NASL", "EULEROS_SA-2020-2327.NASL", "EULEROS_SA-2020-2353.NASL", "EULEROS_SA-2020-2380.NASL", "EULEROS_SA-2020-2384.NASL", "EULEROS_SA-2020-2396.NASL", "EULEROS_SA-2020-2398.NASL", "EULEROS_SA-2020-2400.NASL", "EULEROS_SA-2020-2401.NASL", "EULEROS_SA-2020-2443.NASL", "EULEROS_SA-2020-2453.NASL", "EULEROS_SA-2020-2459.NASL", "EULEROS_SA-2020-2512.NASL", "EULEROS_SA-2020-2548.NASL", "EULEROS_SA-2020-2560.NASL", "EULEROS_SA-2021-1003.NASL", "EULEROS_SA-2021-1010.NASL", "EULEROS_SA-2021-1014.NASL", "EULEROS_SA-2021-1022.NASL", "EULEROS_SA-2021-1029.NASL", "EULEROS_SA-2021-1033.NASL", "EULEROS_SA-2021-1039.NASL", "EULEROS_SA-2021-1050.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1063.NASL", "EULEROS_SA-2021-1073.NASL", "EULEROS_SA-2021-1079.NASL", "EULEROS_SA-2021-1080.NASL", "EULEROS_SA-2021-1104.NASL", "EULEROS_SA-2021-1118.NASL", "EULEROS_SA-2021-1133.NASL", "EULEROS_SA-2021-1137.NASL", "EULEROS_SA-2021-1149.NASL", "EULEROS_SA-2021-1156.NASL", "EULEROS_SA-2021-1160.NASL", "EULEROS_SA-2021-1175.NASL", "EULEROS_SA-2021-1287.NASL", "EULEROS_SA-2021-1311.NASL", "EULEROS_SA-2021-1312.NASL", "EULEROS_SA-2021-1338.NASL", "EULEROS_SA-2021-1339.NASL", "EULEROS_SA-2021-1346.NASL", "EULEROS_SA-2021-1376.NASL", "EULEROS_SA-2021-1399.NASL", "EULEROS_SA-2021-1403.NASL", "EULEROS_SA-2021-1410.NASL", "EULEROS_SA-2021-1414.NASL", "EULEROS_SA-2021-1418.NASL", "EULEROS_SA-2021-1466.NASL", "EULEROS_SA-2021-1487.NASL", "EULEROS_SA-2021-1505.NASL", "EULEROS_SA-2021-1517.NASL", "EULEROS_SA-2021-1533.NASL", "EULEROS_SA-2021-1544.NASL", "EULEROS_SA-2021-1548.NASL", "EULEROS_SA-2021-1549.NASL", "EULEROS_SA-2021-1554.NASL", "EULEROS_SA-2021-1566.NASL", "EULEROS_SA-2021-1596.NASL", "EULEROS_SA-2021-1604.NASL", "EULEROS_SA-2021-1605.NASL", "EULEROS_SA-2021-1615.NASL", "EULEROS_SA-2021-1619.NASL", "EULEROS_SA-2021-1621.NASL", "EULEROS_SA-2021-1625.NASL", "EULEROS_SA-2021-1626.NASL", "EULEROS_SA-2021-1635.NASL", "EULEROS_SA-2021-1637.NASL", "EULEROS_SA-2021-1641.NASL", "EULEROS_SA-2021-1645.NASL", "EULEROS_SA-2021-1672.NASL", "EULEROS_SA-2021-1684.NASL", "EULEROS_SA-2021-1685.NASL", "EULEROS_SA-2021-1695.NASL", "EULEROS_SA-2021-1696.NASL", "EULEROS_SA-2021-1710.NASL", "EULEROS_SA-2021-1711.NASL", "EULEROS_SA-2021-1721.NASL", "EULEROS_SA-2021-1722.NASL", "EULEROS_SA-2021-1737.NASL", "EULEROS_SA-2021-1740.NASL", "EULEROS_SA-2021-1747.NASL", "EULEROS_SA-2021-1756.NASL", "EULEROS_SA-2021-1825.NASL", "EULEROS_SA-2021-1826.NASL", "EULEROS_SA-2021-1831.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1856.NASL", "EULEROS_SA-2021-1868.NASL", "EULEROS_SA-2021-1882.NASL", "EULEROS_SA-2021-1886.NASL", "EULEROS_SA-2021-1891.NASL", "EULEROS_SA-2021-1907.NASL", "EULEROS_SA-2021-1908.NASL", "EULEROS_SA-2021-1909.NASL", "EULEROS_SA-2021-1911.NASL", "EULEROS_SA-2021-1915.NASL", "EULEROS_SA-2021-1920.NASL", "EULEROS_SA-2021-1921.NASL", "EULEROS_SA-2021-1935.NASL", "EULEROS_SA-2021-1936.NASL", "EULEROS_SA-2021-1941.NASL", "EULEROS_SA-2021-1942.NASL", "EULEROS_SA-2021-1956.NASL", "EULEROS_SA-2021-1957.NASL", "EULEROS_SA-2021-1960.NASL", "EULEROS_SA-2021-1965.NASL", "EULEROS_SA-2021-1970.NASL", "EULEROS_SA-2021-1973.NASL", "EULEROS_SA-2021-1985.NASL", "EULEROS_SA-2021-1997.NASL", "EULEROS_SA-2021-2005.NASL", "EULEROS_SA-2021-2007.NASL", "EULEROS_SA-2021-2020.NASL", "EULEROS_SA-2021-2022.NASL", "EULEROS_SA-2021-2028.NASL", "EULEROS_SA-2021-2032.NASL", "EULEROS_SA-2021-2040.NASL", "EULEROS_SA-2021-2044.NASL", "EULEROS_SA-2021-2052.NASL", "EULEROS_SA-2021-2056.NASL", "EULEROS_SA-2021-2063.NASL", "EULEROS_SA-2021-2067.NASL", "EULEROS_SA-2021-2091.NASL", "EULEROS_SA-2021-2096.NASL", "EULEROS_SA-2021-2132.NASL", "EULEROS_SA-2021-2140.NASL", "EULEROS_SA-2021-2141.NASL", "EULEROS_SA-2021-2154.NASL", "EULEROS_SA-2021-2157.NASL", "EULEROS_SA-2021-2159.NASL", "EULEROS_SA-2021-2168.NASL", "EULEROS_SA-2021-2169.NASL", "EULEROS_SA-2021-2174.NASL", "EULEROS_SA-2021-2198.NASL", "EULEROS_SA-2021-2225.NASL", "EULEROS_SA-2021-2250.NASL", "EULEROS_SA-2021-2276.NASL", "EULEROS_SA-2021-2300.NASL", "EULEROS_SA-2021-2309.NASL", "EULEROS_SA-2021-2335.NASL", "EULEROS_SA-2021-2389.NASL", "EULEROS_SA-2021-2416.NASL", "EULEROS_SA-2021-2417.NASL", "EULEROS_SA-2021-2418.NASL", "EULEROS_SA-2021-2427.NASL", "EULEROS_SA-2021-2435.NASL", "EULEROS_SA-2021-2456.NASL", "EULEROS_SA-2021-2542.NASL", "EULEROS_SA-2021-2566.NASL", "EULEROS_SA-2021-2587.NASL", "EULEROS_SA-2021-2758.NASL", "EULEROS_SA-2021-2785.NASL", "EULEROS_SA-2021-2808.NASL", "EULEROS_SA-2021-2872.NASL", "EULEROS_SA-2021-2874.NASL", "EULEROS_SA-2021-2875.NASL", "EULEROS_SA-2022-1048.NASL", "EULEROS_SA-2022-1059.NASL", "EULEROS_SA-2022-1086.NASL", "EULEROS_SA-2022-1265.NASL", "EULEROS_SA-2022-1433.NASL", "EULEROS_SA-2022-1454.NASL", "EULEROS_SA-2022-1492.NASL", "EULEROS_SA-2022-1511.NASL", "EULEROS_SA-2022-1611.NASL", "EULEROS_SA-2022-1634.NASL", "EULEROS_SA-2022-1688.NASL", "EULEROS_SA-2022-1711.NASL", "EULEROS_SA-2022-1751.NASL", "EULEROS_SA-2022-1907.NASL", "EULEROS_SA-2022-2031.NASL", "EULEROS_SA-2022-2059.NASL", "EULEROS_SA-2022-2288.NASL", "EULEROS_SA-2022-2317.NASL", "EULEROS_SA-2022-2491.NASL", "EULEROS_SA-2023-1055.NASL", "EULEROS_SA-2023-1748.NASL", "EULEROS_SA-2023-2183.NASL", "EULEROS_SA-2023-2444.NASL", "F5_BIGIP_SOL000133673.NASL", "F5_BIGIP_SOL05380109.NASL", "F5_BIGIP_SOL07944249.NASL", "F5_BIGIP_SOL15402727.NASL", "F5_BIGIP_SOL18484125.NASL", "F5_BIGIP_SOL19785240.NASL", "F5_BIGIP_SOL23153696.NASL", "F5_BIGIP_SOL24383845.NASL", "F5_BIGIP_SOL24624116.NASL", "F5_BIGIP_SOL25126370.NASL", "F5_BIGIP_SOL32804955.NASL", "F5_BIGIP_SOL40508224.NASL", "F5_BIGIP_SOL42910051.NASL", "F5_BIGIP_SOL48382137.NASL", "F5_BIGIP_SOL51674118.NASL", "F5_BIGIP_SOL61186963.NASL", "F5_BIGIP_SOL62532228.NASL", "F5_BIGIP_SOL63525058.NASL", "F5_BIGIP_SOL71522481.NASL", "F5_BIGIP_SOL92451315.NASL", "FEDORA_2017-11EDC0D6C3.NASL", "FEDORA_2017-2CCFBD650A.NASL", "FEDORA_2017-511EBFA8A3.NASL", "FEDORA_2017-7E0FF7F73A.NASL", "FEDORA_2017-8348115ACD.NASL", "FEDORA_2017-B8358CDA24.NASL", "FEDORA_2018-4F2C2615B3.NASL", "FEDORA_2018-8A85ED2F10.NASL", "FEDORA_2018-CECED55C5E.NASL", "FEDORA_2018-DA9FE79871.NASL", "FEDORA_2018-E6894349C9.NASL", "FEDORA_2019-021C968423.NASL", "FEDORA_2019-038D78EAA5.NASL", "FEDORA_2019-057D691FD4.NASL", "FEDORA_2019-099575A123.NASL", "FEDORA_2019-139FCDA84D.NASL", "FEDORA_2019-18868E1715.NASL", "FEDORA_2019-1A3EDD7E8A.NASL", "FEDORA_2019-1A3F878D27.NASL", "FEDORA_2019-20A89CA9AF.NASL", "FEDORA_2019-2A0CE0C58C.NASL", "FEDORA_2019-335C3AD86A.NASL", "FEDORA_2019-34A75D7E61.NASL", "FEDORA_2019-6FA01D12B4.NASL", "FEDORA_2019-79B5790566.NASL", "FEDORA_2019-7EAF0BBE7C.NASL", "FEDORA_2019-8219EFA9F6.NASL", "FEDORA_2019-87D807D7CB.NASL", "FEDORA_2019-8846A1A5A2.NASL", "FEDORA_2019-88F53A7433.NASL", "FEDORA_2019-91F6E7BB71.NASL", "FEDORA_2019-99FF6AA32C.NASL", "FEDORA_2019-9E91AFA2BE.NASL", "FEDORA_2019-A06DFFAB1C.NASL", "FEDORA_2019-A6CD583A8D.NASL", "FEDORA_2019-AE6A703B8F.NASL", "FEDORA_2019-B171554877.NASL", "FEDORA_2019-BCAD44B5D6.NASL", "FEDORA_2019-C96A8D12B0.NASL", "FEDORA_2019-D66FEBB5DF.NASL", "FEDORA_2019-DA0EAC1EB6.NASL", "FEDORA_2019-EBA8E44EE6.NASL", "FEDORA_2019-F563E66380.NASL", "FEDORA_2019-FB23ECCC03.NASL", "FEDORA_2020-0477F8840E.NASL", "FEDORA_2020-0B32A59B54.NASL", "FEDORA_2020-0BE2776ED3.NASL", "FEDORA_2020-0D3D3F5072.NASL", "FEDORA_2020-0DF38B2843.NASL", "FEDORA_2020-11BE4B36D4.NASL", "FEDORA_2020-12BC5B5597.NASL", "FEDORA_2020-189A1E6C3E.NASL", "FEDORA_2020-23012FAFBC.NASL", "FEDORA_2020-261449D821.NASL", "FEDORA_2020-2640AA4E19.NASL", "FEDORA_2020-27B577AB23.NASL", "FEDORA_2020-2CD6393548.NASL", "FEDORA_2020-307E873389.NASL", "FEDORA_2020-32193CBBE6.NASL", "FEDORA_2020-36D2DB5F51.NASL", "FEDORA_2020-3CE0F55BC5.NASL", "FEDORA_2020-3E00413763.NASL", "FEDORA_2020-4021BF2AE8.NASL", "FEDORA_2020-4573F0E03A.NASL", "FEDORA_2020-4913D43D77.NASL", "FEDORA_2020-4FE6B116E5.NASL", "FEDORA_2020-52741B0A49.NASL", "FEDORA_2020-6B07FF2526.NASL", "FEDORA_2020-7473744DE1.NASL", "FEDORA_2020-77C15664B0.NASL", "FEDORA_2020-7AB62C73BC.NASL", "FEDORA_2020-7F07DA3FEF.NASL", "FEDORA_2020-847775BF79.NASL", "FEDORA_2020-8D634E31C0.NASL", "FEDORA_2020-92B1D001B3.NASL", "FEDORA_2020-94763CB98B.NASL", "FEDORA_2020-9573355FF4.NASL", "FEDORA_2020-9CD1204BA0.NASL", "FEDORA_2020-A1D139381A.NASL", "FEDORA_2020-A31B01E945.NASL", "FEDORA_2020-A55F130272.NASL", "FEDORA_2020-A832C215BF.NASL", "FEDORA_2020-B190375A37.NASL", "FEDORA_2020-CE396E7D5C.NASL", "FEDORA_2020-CEAF490686.NASL", "FEDORA_2020-CF8EF2F333.NASL", "FEDORA_2020-CFC319E067.NASL", "FEDORA_2020-D0F892B069.NASL", "FEDORA_2020-D32853A28D.NASL", "FEDORA_2020-D75360E2B0.NASL", "FEDORA_2020-D7B29838F6.NASL", "FEDORA_2020-DA2D1EF2D7.NASL", "FEDORA_2020-DCA9810FD2.NASL", "FEDORA_2020-DEFF052E7A.NASL", "FEDORA_2020-E384830A0D.NASL", "FEDORA_2020-E7B942A47A.NASL", "FEDORA_2020-EF1870065A.NASL", "FEDORA_2020-F9D2203F3B.NASL", "FEDORA_2020-FBB94073A1.NASL", "FEDORA_2020-FD73C08076.NASL", "FEDORA_2021-138674557C.NASL", "FEDORA_2021-1BB399A5AF.NASL", "FEDORA_2021-1D8254899C.NASL", "FEDORA_2021-2897F5366C.NASL", "FEDORA_2021-309BC2E727.NASL", "FEDORA_2021-3352C1C802.NASL", "FEDORA_2021-33A1B73E48.NASL", "FEDORA_2021-5522A34AA0.NASL", "FEDORA_2021-7547AD987F.NASL", "FEDORA_2021-7C1BB32D13.NASL", "FEDORA_2021-7D3A9004E2.NASL", "FEDORA_2021-907F3BACAE.NASL", "FEDORA_2021-A760169C3C.NASL", "FEDORA_2021-AFED2B904E.NASL", "FEDORA_2021-B1843407CA.NASL", "FEDORA_2021-B326FCB83F.NASL", "FEDORA_2021-B76EDE8F4D.NASL", "FEDORA_2021-EE913722DB.NASL", "FEDORA_2021-EF83E8525A.NASL", "FEDORA_2021-F22CE64B3B.NASL", "FEDORA_2021-F3011DA665.NASL", "FEDORA_2021-F4FD9372C7.NASL", "FEDORA_2021-F6BD75E9D4.NASL", "FEDORA_2022-9D655503EA.NASL", "FEDORA_2022-BF18450366.NASL", "FLEXERA_INSTALLSHIELD_CVE-2016-2542.NASL", "FOXIT_PDF_EDITOR_11_2_1.NASL", "FOXIT_PHANTOM_10_1_7.NASL", "FOXIT_READER_11_2_1.NASL", "FREEBSD_PKG_012809CE83F311EA92AB00163E433440.NASL", "FREEBSD_PKG_08B553ED537A11EBBE6E0022489AD614.NASL", "FREEBSD_PKG_09EA1B081D3E4BF291A1D6573F4DA3D8.NASL", "FREEBSD_PKG_10E3ED8ADB7F11EA8BDF643150D3111D.NASL", "FREEBSD_PKG_1D56CFC5397011EB929DD4C9EF517024.NASL", "FREEBSD_PKG_1FB13175ED5211EA8B93001B217B3468.NASL", "FREEBSD_PKG_20006B5FA0BC11EB8AE6FC4DD43E2B6A.NASL", "FREEBSD_PKG_24ACE516FAD711EA8D8C005056A311D1.NASL", "FREEBSD_PKG_2F3CD69E7DEE11EBB92E0022489AD614.NASL", "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "FREEBSD_PKG_3C5A4FE09EBB11E99169FCAA147E860E.NASL", "FREEBSD_PKG_3C77F1393A0911EB929DD4C9EF517024.NASL", "FREEBSD_PKG_44B6DFBF4EF74D52AD522B1B05D81272.NASL", "FREEBSD_PKG_53CAF29B918011EDACBEB42E991FC52E.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_5A668AB38D8611EBB8D6D4C9EF517024.NASL", "FREEBSD_PKG_676CA4869C1E11EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_67B050AEEC8211EA907110C37B4AC2EA.NASL", "FREEBSD_PKG_6A72EFF7CCD611EA91724C72B94353B5.NASL", "FREEBSD_PKG_6D5F1B0BB86548D5935B3FB6EBB425FC.NASL", "FREEBSD_PKG_70E71A24015111ECBF0C080027EEDC6A.NASL", "FREEBSD_PKG_81FCC2F9E15A11E9ABBF800DD28B22BD.NASL", "FREEBSD_PKG_96A21236707B11EB96D8D4C9EF517024.NASL", "FREEBSD_PKG_A45D945ACC2C4CD7A941FB58FDB1B01E.NASL", "FREEBSD_PKG_AD7921692AA411EBAB710022489AD614.NASL", "FREEBSD_PKG_B360B12074B111EAA84A4C72B94353B5.NASL", "FREEBSD_PKG_BC7AFF8CD80611EAA5AA0800272260E5.NASL", "FREEBSD_PKG_BD159669080811EBA3A40019DBB15B3F.NASL", "FREEBSD_PKG_C0C1834C976111EBACFD0022489AD614.NASL", "FREEBSD_PKG_C4AC9C79AB3711EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_CAF545F2C0D911E990514C72B94353B5.NASL", "FREEBSD_PKG_CD2DC126CFE411EA91724C72B94353B5.NASL", "FREEBSD_PKG_D778DDB0233811EAA1C7B499BAEBFEAF.NASL", "FREEBSD_PKG_E84831158B8E11EABDCF001B217B3468.NASL", "FREEBSD_PKG_F00B65D87CCB11EBB3BEE09467587C17.NASL", "FREEBSD_PKG_FE93803C883F11E89F0C001B216D295B.NASL", "FREEBSD_PKG_FFC73E8787F011E9AD56FCAA147E860E.NASL", "GENTOO_GLSA-201908-02.NASL", "GENTOO_GLSA-201909-04.NASL", "GENTOO_GLSA-201911-08.NASL", "GENTOO_GLSA-202003-16.NASL", "GENTOO_GLSA-202003-43.NASL", "GENTOO_GLSA-202003-57.NASL", "GENTOO_GLSA-202004-10.NASL", "GENTOO_GLSA-202006-03.NASL", "GENTOO_GLSA-202006-21.NASL", "GENTOO_GLSA-202007-03.NASL", "GENTOO_GLSA-202007-26.NASL", "GENTOO_GLSA-202007-34.NASL", "GENTOO_GLSA-202011-17.NASL", "GENTOO_GLSA-202011-18.NASL", "GENTOO_GLSA-202012-11.NASL", "GENTOO_GLSA-202012-13.NASL", "GENTOO_GLSA-202012-14.NASL", "GENTOO_GLSA-202012-16.NASL", "GENTOO_GLSA-202012-23.NASL", "GENTOO_GLSA-202012-24.NASL", "GENTOO_GLSA-202101-07.NASL", "GENTOO_GLSA-202101-12.NASL", "GENTOO_GLSA-202101-29.NASL", "GENTOO_GLSA-202103-03.NASL", "GENTOO_GLSA-202103-04.NASL", "GENTOO_GLSA-202104-04.NASL", "GENTOO_GLSA-202105-27.NASL", "GENTOO_GLSA-202105-28.NASL", "GENTOO_GLSA-202107-21.NASL", "GENTOO_GLSA-202208-34.NASL", "GENTOO_GLSA-202208-36.NASL", "GENTOO_GLSA-202209-05.NASL", "GENTOO_GLSA-202210-02.NASL", "GENTOO_GLSA-202210-40.NASL", "GENTOO_GLSA-202305-28.NASL", "GOOGLE_CHROME_89_0_4389_72.NASL", "IBM_HTTP_SERVER_6191631.NASL", "IBM_HTTP_SERVER_964768.NASL", "IBM_JAVA_2019_07_16.NASL", "IBM_JAVA_2021_04_20.NASL", "JBOSS_EAP_RHSA-2019-1162.NASL", "JENKINS_2_243.NASL", "JENKINS_2_280.NASL", "JFROG_ARTIFACTORY_6_23_0.NASL", "JFROG_ARTIFACTORY_7_10_1.NASL", "JFROG_ARTIFACTORY_7_11_1.NASL", "JFROG_ARTIFACTORY_7_7_0.NASL", "JIRA_8_15_0_JRASERVER-72052.NASL", "JOOMLA_3919.NASL", "JQUERY_3_4_0.NASL", "JQUERY_CVE-2020-11022.NASL", "JUNIPER_JSA11025.NASL", "JUNIPER_JSA11207.NASL", "JUNIPER_JSA69705.NASL", "JUNIPER_JSA69715.NASL", "JUNIPER_SPACE_JSA_10838.NASL", "LCE_6_0_9.NASL", "MACOSX_GOOGLE_CHROME_89_0_4389_72.NASL", "MACOSX_WIRESHARK_3_2_12.NASL", "MACOSX_WIRESHARK_3_2_9.NASL", "MACOSX_WIRESHARK_3_4_1.NASL", "MACOSX_WIRESHARK_3_4_2.NASL", "MACOSX_WIRESHARK_3_4_3.NASL", "MACOSX_WIRESHARK_3_4_4.NASL", "MACOS_FIREFOX_60_7_ESR.NASL", "MACOS_FIREFOX_67_0.NASL", "MACOS_HT211931.NASL", "MACOS_HT212147.NASL", "MACOS_HT212325.NASL", "MACOS_HT212326.NASL", "MACOS_HT212327.NASL", "MACOS_HT212529.NASL", "MACOS_THUNDERBIRD_60_7.NASL", "MARIADB_10_1_42.NASL", "MARIADB_10_2_18.NASL", "MARIADB_10_2_28.NASL", "MARIADB_10_2_35.NASL", "MARIADB_10_2_38.NASL", "MARIADB_10_3_19.NASL", "MARIADB_10_3_29.NASL", "MARIADB_10_4_16.NASL", "MARIADB_10_4_19.NASL", "MARIADB_10_4_9.NASL", "MARIADB_10_5_10.NASL", "MARIADB_10_5_7.NASL", "MARIADB_5_5_66.NASL", "MCAFEE_EPO_SB10332.NASL", "MICROSOFT_EDGE_CHROMIUM_89_0_774_45.NASL", "MOZILLA_FIREFOX_60_7_ESR.NASL", "MOZILLA_FIREFOX_67_0.NASL", "MOZILLA_THUNDERBIRD_60_7.NASL", "MYSQL_5_6_49.NASL", "MYSQL_5_7_30.NASL", "MYSQL_5_7_31.NASL", "MYSQL_5_7_33.NASL", "MYSQL_5_7_34.NASL", "MYSQL_8_0_18.NASL", "MYSQL_8_0_20.NASL", "MYSQL_8_0_21.NASL", "MYSQL_8_0_23.NASL", "MYSQL_8_0_24.NASL", "MYSQL_8_0_26.NASL", "MYSQL_ENTERPRISE_MONITOR_3_4_8.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_18.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_21_1240.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_21_1243.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_22_1262.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_23.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_27.NASL", "NESSUS_TNS-2023-09.NASL", "NESSUS_TNS_2021_04.NASL", "NESSUS_TNS_2021_11.NASL", "NETLOGON_ZEROLOGON_CVE-2020-1472.NBIN", "NEWSTART_CGSL_NS-SA-2019-0087_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0088_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0158_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0159_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0167_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0169_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0175_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0178_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0180_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0183_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0247_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0253_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0264_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0266_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0010_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0011_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0014_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0021_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0045_TELNET.NASL", "NEWSTART_CGSL_NS-SA-2020-0049_KRB5-APPL.NASL", "NEWSTART_CGSL_NS-SA-2020-0050_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0055_TELNET.NASL", "NEWSTART_CGSL_NS-SA-2020-0055_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2020-0085_TELNET.NASL", "NEWSTART_CGSL_NS-SA-2020-0100_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0117_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2021-0020_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0024_SAMBA.NASL", "NEWSTART_CGSL_NS-SA-2021-0026_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0028_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0036_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2021-0045_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0064_SQLITE.NASL", "NEWSTART_CGSL_NS-SA-2021-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0083_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0086_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0095_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0098_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0099_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0104_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0108_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0115_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0127_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0134_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0135_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0144_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0158_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0159_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2021-0162_MARIADB.NASL", "NEWSTART_CGSL_NS-SA-2021-0167_SAMBA.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0171_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0175_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0179_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0183_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0184_PERL.NASL", "NEWSTART_CGSL_NS-SA-2022-0002_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0017_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0026_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0033_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2022-0037_IPA.NASL", "NEWSTART_CGSL_NS-SA-2022-0049_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2022-0052_SQLITE.NASL", "NEWSTART_CGSL_NS-SA-2022-0057_KRB5.NASL", "NEWSTART_CGSL_NS-SA-2022-0058_SAMBA.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0083_CURL.NASL", "NEWSTART_CGSL_NS-SA-2022-0089_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0096_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2023-0025_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2023-1001_HTTPD.NASL", "NNM_5_13_0.NASL", "NNM_5_13_1.NASL", "NNM_6_2_2.NASL", "NODEJS_2020_NOV.NASL", "NODEJS_2021_FEB.NASL", "NODEJS_2021_JAN.NASL", "NODEJS_2022_JUL.NASL", "NUTANIX_NXSA-AHV-20201105_1021.NASL", "NUTANIX_NXSA-AHV-20201105_1045.NASL", "NUTANIX_NXSA-AHV-20201105_1082.NASL", "NUTANIX_NXSA-AOS-5_10_10.NASL", "NUTANIX_NXSA-AOS-5_11_2_1.NASL", "NUTANIX_NXSA-AOS-5_11_3.NASL", "NUTANIX_NXSA-AOS-5_15_1.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_5_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_15_7.NASL", "NUTANIX_NXSA-AOS-5_16_0_1.NASL", "NUTANIX_NXSA-AOS-5_16_1.NASL", "NUTANIX_NXSA-AOS-5_16_1_1.NASL", "NUTANIX_NXSA-AOS-5_16_1_3.NASL", "NUTANIX_NXSA-AOS-5_17.NASL", "NUTANIX_NXSA-AOS-5_17_0_3.NASL", "NUTANIX_NXSA-AOS-5_17_1.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_19_1_5.NASL", "NUTANIX_NXSA-AOS-5_19_2.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-5_20_1.NASL", "NUTANIX_NXSA-AOS-5_20_3.NASL", "NUTANIX_NXSA-AOS-5_20_3_5.NASL", "NUTANIX_NXSA-AOS-5_20_4.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_0_1.NASL", "NUTANIX_NXSA-AOS-6_0_2_5.NASL", "NUTANIX_NXSA-AOS-6_0_2_6.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "NUTANIX_NXSA-AOS-6_1_1.NASL", "OPENJDK_2019-07-16.NASL", "OPENJDK_20_04_2021.NASL", "OPENSSL_1_0_2U.NASL", "OPENSSL_1_0_2W.NASL", "OPENSSL_1_0_2X.NASL", "OPENSSL_1_0_2Y.NASL", "OPENSSL_1_1_1E_DEV.NASL", "OPENSSL_1_1_1G.NASL", "OPENSSL_1_1_1I.NASL", "OPENSSL_1_1_1J.NASL", "OPENSSL_1_1_1K.NASL", "OPENSUSE-2018-1043.NASL", "OPENSUSE-2018-1077.NASL", "OPENSUSE-2018-1140.NASL", "OPENSUSE-2018-1184.NASL", "OPENSUSE-2018-1188.NASL", "OPENSUSE-2018-1486.NASL", "OPENSUSE-2018-776.NASL", "OPENSUSE-2018-794.NASL", "OPENSUSE-2019-140.NASL", "OPENSUSE-2019-1484.NASL", "OPENSUSE-2019-1530.NASL", "OPENSUSE-2019-1534.NASL", "OPENSUSE-2019-1570.NASL", "OPENSUSE-2019-1571.NASL", "OPENSUSE-2019-1579.NASL", "OPENSUSE-2019-1673.NASL", "OPENSUSE-2019-1716.NASL", "OPENSUSE-2019-1757.NASL", "OPENSUSE-2019-1777.NASL", "OPENSUSE-2019-1808.NASL", "OPENSUSE-2019-1839.NASL", "OPENSUSE-2019-1912.NASL", "OPENSUSE-2019-1916.NASL", "OPENSUSE-2019-2051.NASL", "OPENSUSE-2019-2058.NASL", "OPENSUSE-2019-2173.NASL", "OPENSUSE-2019-2181.NASL", "OPENSUSE-2019-2392.NASL", "OPENSUSE-2019-2444.NASL", "OPENSUSE-2019-2675.NASL", "OPENSUSE-2019-546.NASL", "OPENSUSE-2019-65.NASL", "OPENSUSE-2019-769.NASL", "OPENSUSE-2019-792.NASL", "OPENSUSE-2019-958.NASL", "OPENSUSE-2020-1022.NASL", "OPENSUSE-2020-1060.NASL", "OPENSUSE-2020-1062.NASL", "OPENSUSE-2020-1087.NASL", "OPENSUSE-2020-1095.NASL", "OPENSUSE-2020-1102.NASL", "OPENSUSE-2020-1111.NASL", "OPENSUSE-2020-1153.NASL", "OPENSUSE-2020-1178.NASL", "OPENSUSE-2020-1194.NASL", "OPENSUSE-2020-1236.NASL", "OPENSUSE-2020-1325.NASL", "OPENSUSE-2020-1405.NASL", "OPENSUSE-2020-1407.NASL", "OPENSUSE-2020-1513.NASL", "OPENSUSE-2020-1526.NASL", "OPENSUSE-2020-1584.NASL", "OPENSUSE-2020-1587.NASL", "OPENSUSE-2020-1703.NASL", "OPENSUSE-2020-1767.NASL", "OPENSUSE-2020-1799.NASL", "OPENSUSE-2020-1842.NASL", "OPENSUSE-2020-1888.NASL", "OPENSUSE-2020-2037.NASL", "OPENSUSE-2020-2045.NASL", "OPENSUSE-2020-2062.NASL", "OPENSUSE-2020-2092.NASL", "OPENSUSE-2020-2223.NASL", "OPENSUSE-2020-2236.NASL", "OPENSUSE-2020-2238.NASL", "OPENSUSE-2020-2245.NASL", "OPENSUSE-2020-2249.NASL", "OPENSUSE-2020-2269.NASL", "OPENSUSE-2020-2367.NASL", "OPENSUSE-2020-336.NASL", "OPENSUSE-2020-341.NASL", "OPENSUSE-2020-38.NASL", "OPENSUSE-2020-51.NASL", "OPENSUSE-2020-597.NASL", "OPENSUSE-2020-607.NASL", "OPENSUSE-2020-61.NASL", "OPENSUSE-2020-62.NASL", "OPENSUSE-2020-711.NASL", "OPENSUSE-2020-719.NASL", "OPENSUSE-2020-801.NASL", "OPENSUSE-2020-850.NASL", "OPENSUSE-2020-851.NASL", "OPENSUSE-2020-933.NASL", "OPENSUSE-2020-935.NASL", "OPENSUSE-2020-945.NASL", "OPENSUSE-2021-1058.NASL", "OPENSUSE-2021-1059.NASL", "OPENSUSE-2021-1060.NASL", "OPENSUSE-2021-1061.NASL", "OPENSUSE-2021-1113.NASL", "OPENSUSE-2021-1130.NASL", "OPENSUSE-2021-1176.NASL", "OPENSUSE-2021-12.NASL", "OPENSUSE-2021-140.NASL", "OPENSUSE-2021-1455.NASL", "OPENSUSE-2021-1666.NASL", "OPENSUSE-2021-1840.NASL", "OPENSUSE-2021-1876.NASL", "OPENSUSE-2021-1989.NASL", "OPENSUSE-2021-2125.NASL", "OPENSUSE-2021-221.NASL", "OPENSUSE-2021-2320.NASL", "OPENSUSE-2021-2327.NASL", "OPENSUSE-2021-2353.NASL", "OPENSUSE-2021-2354.NASL", "OPENSUSE-2021-242.NASL", "OPENSUSE-2021-2575.NASL", "OPENSUSE-2021-2605.NASL", "OPENSUSE-2021-2616.NASL", "OPENSUSE-2021-2617.NASL", "OPENSUSE-2021-2618.NASL", "OPENSUSE-2021-2637.NASL", "OPENSUSE-2021-2795.NASL", "OPENSUSE-2021-2798.NASL", "OPENSUSE-2021-356.NASL", "OPENSUSE-2021-357.NASL", "OPENSUSE-2021-3615.NASL", "OPENSUSE-2021-372.NASL", "OPENSUSE-2021-3876.NASL", "OPENSUSE-2021-389.NASL", "OPENSUSE-2021-392.NASL", "OPENSUSE-2021-427.NASL", "OPENSUSE-2021-43.NASL", "OPENSUSE-2021-430.NASL", "OPENSUSE-2021-435.NASL", "OPENSUSE-2021-476.NASL", "OPENSUSE-2021-496.NASL", "OPENSUSE-2021-630.NASL", "OPENSUSE-2021-64.NASL", "OPENSUSE-2021-65.NASL", "OPENSUSE-2021-66.NASL", "OPENSUSE-2021-719.NASL", "OPENSUSE-2021-723.NASL", "OPENSUSE-2021-776.NASL", "OPENSUSE-2021-81.NASL", "OPENSUSE-2021-82.NASL", "OPENSUSE-2021-832.NASL", "OPENSUSE-2021-855.NASL", "OPENSUSE-2021-909.NASL", "OPENSUSE-2021-933.NASL", "OPENSUSE-2021-977.NASL", "OPENSUSE-2022-0108-1.NASL", "OPENSUSE-2022-0818-1.NASL", "ORACLELINUX_ELSA-2017-2423.NASL", "ORACLELINUX_ELSA-2017-2492.NASL", "ORACLELINUX_ELSA-2019-1265.NASL", "ORACLELINUX_ELSA-2019-1267.NASL", "ORACLELINUX_ELSA-2019-1269.NASL", "ORACLELINUX_ELSA-2019-1308.NASL", "ORACLELINUX_ELSA-2019-1309.NASL", "ORACLELINUX_ELSA-2019-1310.NASL", "ORACLELINUX_ELSA-2019-1873.NASL", "ORACLELINUX_ELSA-2019-2029.NASL", "ORACLELINUX_ELSA-2019-2703.NASL", "ORACLELINUX_ELSA-2019-3517.NASL", "ORACLELINUX_ELSA-2019-3836.NASL", "ORACLELINUX_ELSA-2020-0194.NASL", "ORACLELINUX_ELSA-2020-0339.NASL", "ORACLELINUX_ELSA-2020-0374.NASL", "ORACLELINUX_ELSA-2020-0790.NASL", "ORACLELINUX_ELSA-2020-0834.NASL", "ORACLELINUX_ELSA-2020-1016.NASL", "ORACLELINUX_ELSA-2020-1318.NASL", "ORACLELINUX_ELSA-2020-1334.NASL", "ORACLELINUX_ELSA-2020-1335.NASL", "ORACLELINUX_ELSA-2020-1349.NASL", "ORACLELINUX_ELSA-2020-1644.NASL", "ORACLELINUX_ELSA-2020-1769.NASL", "ORACLELINUX_ELSA-2020-2529.NASL", "ORACLELINUX_ELSA-2020-2530.NASL", "ORACLELINUX_ELSA-2020-3662.NASL", "ORACLELINUX_ELSA-2020-3665.NASL", "ORACLELINUX_ELSA-2020-3936.NASL", "ORACLELINUX_ELSA-2020-3952.NASL", "ORACLELINUX_ELSA-2020-3958.NASL", "ORACLELINUX_ELSA-2020-4004.NASL", "ORACLELINUX_ELSA-2020-4060.NASL", "ORACLELINUX_ELSA-2020-4182.NASL", "ORACLELINUX_ELSA-2020-4431.NASL", "ORACLELINUX_ELSA-2020-4442.NASL", "ORACLELINUX_ELSA-2020-4484.NASL", "ORACLELINUX_ELSA-2020-4514.NASL", "ORACLELINUX_ELSA-2020-4670.NASL", "ORACLELINUX_ELSA-2020-4751.NASL", "ORACLELINUX_ELSA-2020-4807.NASL", "ORACLELINUX_ELSA-2020-4847.NASL", "ORACLELINUX_ELSA-2020-5437.NASL", "ORACLELINUX_ELSA-2020-5439.NASL", "ORACLELINUX_ELSA-2020-5473.NASL", "ORACLELINUX_ELSA-2020-5476.NASL", "ORACLELINUX_ELSA-2020-5493.NASL", "ORACLELINUX_ELSA-2020-5499.NASL", "ORACLELINUX_ELSA-2020-55661.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5823.NASL", "ORACLELINUX_ELSA-2020-5825.NASL", "ORACLELINUX_ELSA-2020-5827.NASL", "ORACLELINUX_ELSA-2020-5828.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5841.NASL", "ORACLELINUX_ELSA-2020-5844.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5848.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLELINUX_ELSA-2020-5879.NASL", "ORACLELINUX_ELSA-2020-5881.NASL", "ORACLELINUX_ELSA-2020-5885.NASL", "ORACLELINUX_ELSA-2020-5962.NASL", "ORACLELINUX_ELSA-2020-5968.NASL", "ORACLELINUX_ELSA-2020-5983.NASL", "ORACLELINUX_ELSA-2021-0162.NASL", "ORACLELINUX_ELSA-2021-0343.NASL", "ORACLELINUX_ELSA-2021-0548.NASL", "ORACLELINUX_ELSA-2021-0551.NASL", "ORACLELINUX_ELSA-2021-0557.NASL", "ORACLELINUX_ELSA-2021-0734.NASL", "ORACLELINUX_ELSA-2021-0735.NASL", "ORACLELINUX_ELSA-2021-0744.NASL", "ORACLELINUX_ELSA-2021-0860.NASL", "ORACLELINUX_ELSA-2021-1024.NASL", "ORACLELINUX_ELSA-2021-1297.NASL", "ORACLELINUX_ELSA-2021-1298.NASL", "ORACLELINUX_ELSA-2021-1301.NASL", "ORACLELINUX_ELSA-2021-1307.NASL", "ORACLELINUX_ELSA-2021-1354.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-1581.NASL", "ORACLELINUX_ELSA-2021-1593.NASL", "ORACLELINUX_ELSA-2021-1610.NASL", "ORACLELINUX_ELSA-2021-1633.NASL", "ORACLELINUX_ELSA-2021-1647.NASL", "ORACLELINUX_ELSA-2021-1678.NASL", "ORACLELINUX_ELSA-2021-1846.NASL", "ORACLELINUX_ELSA-2021-3590.NASL", "ORACLELINUX_ELSA-2021-3798.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-4213.NASL", "ORACLELINUX_ELSA-2021-4251.NASL", "ORACLELINUX_ELSA-2021-4396.NASL", "ORACLELINUX_ELSA-2021-4424.NASL", "ORACLELINUX_ELSA-2021-9121.NASL", "ORACLELINUX_ELSA-2021-9137.NASL", "ORACLELINUX_ELSA-2021-9150.NASL", "ORACLELINUX_ELSA-2021-9151.NASL", "ORACLELINUX_ELSA-2021-9238.NASL", "ORACLELINUX_ELSA-2021-9294.NASL", "ORACLELINUX_ELSA-2021-9400.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLELINUX_ELSA-2021-9473.NASL", "ORACLELINUX_ELSA-2021-9478.NASL", "ORACLELINUX_ELSA-2021-9528.NASL", "ORACLELINUX_ELSA-2021-9552.NASL", "ORACLELINUX_ELSA-2021-9561.NASL", "ORACLELINUX_ELSA-2022-1556.NASL", "ORACLELINUX_ELSA-2022-1557.NASL", "ORACLELINUX_ELSA-2022-1860.NASL", "ORACLELINUX_ELSA-2022-1861.NASL", "ORACLELINUX_ELSA-2022-7343.NASL", "ORACLELINUX_ELSA-2022-9177.NASL", "ORACLELINUX_ELSA-2022-9419.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "ORACLEVM_OVMSA-2020-0054.NASL", "ORACLEVM_OVMSA-2021-0011.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "ORACLE_BI_PUBLISHER_APR_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_JUL_2022_CPU.NASL", "ORACLE_BI_PUBLISHER_OAS_CPU_JUL_2022.NASL", "ORACLE_BI_PUBLISHER_OCT_2018_CPU.NASL", "ORACLE_BI_PUBLISHER_OCT_2019_CPU.NASL", "ORACLE_BI_PUBLISHER_OCT_2020_CPU.NASL", "ORACLE_BPM_CPU_APR_2022.NASL", "ORACLE_BPM_CPU_JAN_2021.NASL", "ORACLE_BPM_CPU_OCT_2020.NASL", "ORACLE_COHERENCE_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_JAN_2022.NASL", "ORACLE_E-BUSINESS_CPU_OCT_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JAN_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JUL_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_OCT_2020.NASL", "ORACLE_ENTERPRISE_MANAGER_JUL_2018_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_JUL_2020_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_APR_2021_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_OCT_2021_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JUL_2020_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JUL_2020_CPU_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2019_CPU_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2020_CPU.NASL", "ORACLE_GOLDENGATE_CPU_OCT_2021.NASL", "ORACLE_GOLDENGATE_FOR_BIG_DATA_CPU_JAN_2019.NASL", "ORACLE_HTTP_SERVER_CPU_APR_2021.NASL", "ORACLE_HTTP_SERVER_CPU_JAN_2018.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2020.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2021.NASL", "ORACLE_IDENTITY_MANAGEMENT_CPU_JUL_2021.NASL", "ORACLE_IDENTITY_MANAGEMENT_CPU_OCT_2018.NASL", "ORACLE_JAVA_CPU_APR_2021.NASL", "ORACLE_JAVA_CPU_APR_2021_UNIX.NASL", "ORACLE_JAVA_CPU_JUL_2019.NASL", "ORACLE_JAVA_CPU_JUL_2019_UNIX.NASL", "ORACLE_JDEVELOPER_CPU_JUL_2021.NASL", "ORACLE_JDEVELOPER_CPU_OCT_2020.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2020.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2021.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_23.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_27.NASL", "ORACLE_NOSQL_CPU_APR_2021.NASL", "ORACLE_NOSQL_CPU_OCT_2021.NASL", "ORACLE_OATS_CPU_APR_2020.NASL", "ORACLE_OATS_CPU_APR_2021.NASL", "ORACLE_OATS_CPU_APR_2022.NASL", "ORACLE_OATS_CPU_JAN_2020.NASL", "ORACLE_OATS_CPU_JAN_2021.NASL", "ORACLE_OATS_CPU_JUL_2018.NASL", "ORACLE_OATS_CPU_JUL_2020.NASL", "ORACLE_OATS_CPU_JUL_2021.NASL", "ORACLE_OBIEE_CPU_APR_2023.NASL", "ORACLE_OBIEE_CPU_APR_2023_OAS.NASL", "ORACLE_OBIEE_CPU_JUL_2023.NASL", "ORACLE_OBIEE_CPU_JUL_2023_OAS.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2020.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2018.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2020.NASL", "ORACLE_RDBMS_CPU_APR_2020.NASL", "ORACLE_RDBMS_CPU_APR_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2020.NASL", "ORACLE_RDBMS_CPU_JAN_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2023.NASL", "ORACLE_RDBMS_CPU_JAN_2023_WIN.NASL", "ORACLE_RDBMS_CPU_JUL_2020.NASL", "ORACLE_RDBMS_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_OCT_2020.NASL", "ORACLE_RDBMS_CPU_OCT_2022.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JAN_2018_CPU.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JAN_2020_CPU.NASL", "ORACLE_TUXEDO_CPU_JAN_2020.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JAN_2019.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_JAN_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2020.NBIN", "ORACLE_WEBCENTER_SITES_APR_2020_CPU.NASL", "ORACLE_WEBCENTER_SITES_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_SITES_CPU_APR_2023.NASL", "ORACLE_WEBCENTER_SITES_JAN_2021_CPU.NASL", "ORACLE_WEBCENTER_SITES_OCT_2021_CPU.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2018.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2023.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022_V14.NASL", "PALO_ALTO_CVE-2020-10188.NASL", "PALO_ALTO_CVE-2020-1968.NASL", "PHOTONOS_PHSA-2019-1_0-0235_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0244_APACHE.NASL", "PHOTONOS_PHSA-2019-1_0-0247_EXPAT.NASL", "PHOTONOS_PHSA-2019-1_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0253_HTTPD.NASL", "PHOTONOS_PHSA-2019-1_0-0262_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LIBPNG.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0171_EXPAT.NASL", "PHOTONOS_PHSA-2019-2_0-0178_HTTPD.NASL", "PHOTONOS_PHSA-2019-2_0-0189_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0015_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0024_APACHE.NASL", "PHOTONOS_PHSA-2019-3_0-0026_EXPAT.NASL", "PHOTONOS_PHSA-2019-3_0-0026_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0035_HTTPD.NASL", "PHOTONOS_PHSA-2019-3_0-0046_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0264_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0289_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0290_HTTPD.NASL", "PHOTONOS_PHSA-2020-1_0-0292_GO.NASL", "PHOTONOS_PHSA-2020-1_0-0295_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0298_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0298_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0301_PERL.NASL", "PHOTONOS_PHSA-2020-1_0-0302_PERL.NASL", "PHOTONOS_PHSA-2020-1_0-0308_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0309_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0314_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0316_GO.NASL", "PHOTONOS_PHSA-2020-1_0-0324_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0335_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0338_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0345_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0346_CURL.NASL", "PHOTONOS_PHSA-2020-1_0-0350_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0204_NXTGN.NASL", "PHOTONOS_PHSA-2020-2_0-0225_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0228_HTTPD.NASL", "PHOTONOS_PHSA-2020-2_0-0231_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0234_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0238_GO.NASL", "PHOTONOS_PHSA-2020-2_0-0245_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0246_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0248_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0249_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0254_PERL.NASL", "PHOTONOS_PHSA-2020-2_0-0261_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0265_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0272_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0276_GO.NASL", "PHOTONOS_PHSA-2020-2_0-0284_OPENSSL.NASL", "PHOTONOS_PHSA-2020-2_0-0288_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0291_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0295_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0304_CURL.NASL", "PHOTONOS_PHSA-2020-2_0-0304_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0048_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0054_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0079_HTTPD.NASL", "PHOTONOS_PHSA-2020-3_0-0081_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0082_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0083_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0087_GO.NASL", "PHOTONOS_PHSA-2020-3_0-0099_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0100_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0101_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0104_PERL.NASL", "PHOTONOS_PHSA-2020-3_0-0113_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0116_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0127_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0130_GO.NASL", "PHOTONOS_PHSA-2020-3_0-0141_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0155_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0161_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0174_CURL.NASL", "PHOTONOS_PHSA-2020-3_0-0175_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0175_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0180_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0366_OPENSSL.NASL", "PHOTONOS_PHSA-2021-1_0-0373_NODEJS10.NASL", "PHOTONOS_PHSA-2021-1_0-0378_C.NASL", "PHOTONOS_PHSA-2021-1_0-0390_MYSQL.NASL", "PHOTONOS_PHSA-2021-2_0-0308_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0327_PYTHON3.NASL", "PHOTONOS_PHSA-2021-2_0-0330_NODEJS.NASL", "PHOTONOS_PHSA-2021-2_0-0331_NXTGN.NASL", "PHOTONOS_PHSA-2021-2_0-0337_C.NASL", "PHOTONOS_PHSA-2021-3_0-0200_OPENSSL.NASL", "PHOTONOS_PHSA-2021-3_0-0209_C.NASL", "PHOTONOS_PHSA-2021-3_0-0210_NXTGN.NASL", "PHOTONOS_PHSA-2021-3_0-0227_SQLITE.NASL", "PHOTONOS_PHSA-2021-3_0-0231_MYSQL.NASL", "PHOTONOS_PHSA-2021-3_0-0248_GO.NASL", "PHOTONOS_PHSA-2021-3_0-0342_KRB5.NASL", "PHOTONOS_PHSA-2021-4_0-0006_C.NASL", "PHOTONOS_PHSA-2021-4_0-0006_PERL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_APACHE.NASL", "PHOTONOS_PHSA-2021-4_0-0007_MYSQL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_NODEJS.NASL", "PHOTONOS_PHSA-2021-4_0-0007_OPENSSL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_PYTHON3.NASL", "PHP_7_4_11.NASL", "PHP_7_4_2.NASL", "PULSE_CONNECT_SECURE-SA44601.NASL", "PULSE_POLICY_SECURE-SA44601.NASL", "PVS_5_2_0.NASL", "REDHAT-RHSA-2017-1801.NASL", "REDHAT-RHSA-2017-2423.NASL", "REDHAT-RHSA-2017-2492.NASL", "REDHAT-RHSA-2017-2635.NASL", "REDHAT-RHSA-2017-2636.NASL", "REDHAT-RHSA-2017-2637.NASL", "REDHAT-RHSA-2017-2638.NASL", "REDHAT-RHSA-2017-2808.NASL", "REDHAT-RHSA-2017-2809.NASL", "REDHAT-RHSA-2017-2811.NASL", "REDHAT-RHSA-2017-3399.NASL", "REDHAT-RHSA-2018-2423.NASL", "REDHAT-RHSA-2018-2424.NASL", "REDHAT-RHSA-2018-2643.NASL", "REDHAT-RHSA-2019-0364.NASL", "REDHAT-RHSA-2019-0365.NASL", "REDHAT-RHSA-2019-1160.NASL", "REDHAT-RHSA-2019-1161.NASL", "REDHAT-RHSA-2019-1265.NASL", "REDHAT-RHSA-2019-1267.NASL", "REDHAT-RHSA-2019-1269.NASL", "REDHAT-RHSA-2019-1308.NASL", "REDHAT-RHSA-2019-1309.NASL", "REDHAT-RHSA-2019-1310.NASL", "REDHAT-RHSA-2019-1873.NASL", "REDHAT-RHSA-2019-1891.NASL", "REDHAT-RHSA-2019-1973.NASL", "REDHAT-RHSA-2019-2029.NASL", "REDHAT-RHSA-2019-2043.NASL", "REDHAT-RHSA-2019-2494.NASL", "REDHAT-RHSA-2019-2495.NASL", "REDHAT-RHSA-2019-2585.NASL", "REDHAT-RHSA-2019-2590.NASL", "REDHAT-RHSA-2019-2592.NASL", "REDHAT-RHSA-2019-2696.NASL", "REDHAT-RHSA-2019-2703.NASL", "REDHAT-RHSA-2019-2730.NASL", "REDHAT-RHSA-2019-2737.NASL", "REDHAT-RHSA-2019-2741.NASL", "REDHAT-RHSA-2019-2935.NASL", "REDHAT-RHSA-2019-2936.NASL", "REDHAT-RHSA-2019-2937.NASL", "REDHAT-RHSA-2019-3023.NASL", "REDHAT-RHSA-2019-3024.NASL", "REDHAT-RHSA-2019-3044.NASL", "REDHAT-RHSA-2019-3045.NASL", "REDHAT-RHSA-2019-3046.NASL", "REDHAT-RHSA-2019-3172.NASL", "REDHAT-RHSA-2019-3220.NASL", "REDHAT-RHSA-2019-3309.NASL", "REDHAT-RHSA-2019-3517.NASL", "REDHAT-RHSA-2019-3836.NASL", "REDHAT-RHSA-2019-3929.NASL", "REDHAT-RHSA-2019-3967.NASL", "REDHAT-RHSA-2019-4058.NASL", "REDHAT-RHSA-2020-0057.NASL", "REDHAT-RHSA-2020-0100.NASL", "REDHAT-RHSA-2020-0103.NASL", "REDHAT-RHSA-2020-0159.NASL", "REDHAT-RHSA-2020-0160.NASL", "REDHAT-RHSA-2020-0161.NASL", "REDHAT-RHSA-2020-0174.NASL", "REDHAT-RHSA-2020-0179.NASL", "REDHAT-RHSA-2020-0194.NASL", "REDHAT-RHSA-2020-0204.NASL", "REDHAT-RHSA-2020-0328.NASL", "REDHAT-RHSA-2020-0339.NASL", "REDHAT-RHSA-2020-0374.NASL", "REDHAT-RHSA-2020-0375.NASL", "REDHAT-RHSA-2020-0543.NASL", "REDHAT-RHSA-2020-0592.NASL", "REDHAT-RHSA-2020-0609.NASL", "REDHAT-RHSA-2020-0653.NASL", "REDHAT-RHSA-2020-0661.NASL", "REDHAT-RHSA-2020-0664.NASL", "REDHAT-RHSA-2020-0790.NASL", "REDHAT-RHSA-2020-0804.NASL", "REDHAT-RHSA-2020-0805.NASL", "REDHAT-RHSA-2020-0806.NASL", "REDHAT-RHSA-2020-0834.NASL", "REDHAT-RHSA-2020-0839.NASL", "REDHAT-RHSA-2020-0861.NASL", "REDHAT-RHSA-2020-1016.NASL", "REDHAT-RHSA-2020-1070.NASL", "REDHAT-RHSA-2020-1308.NASL", "REDHAT-RHSA-2020-1318.NASL", "REDHAT-RHSA-2020-1325.NASL", "REDHAT-RHSA-2020-1334.NASL", "REDHAT-RHSA-2020-1335.NASL", "REDHAT-RHSA-2020-1337.NASL", "REDHAT-RHSA-2020-1342.NASL", "REDHAT-RHSA-2020-1349.NASL", "REDHAT-RHSA-2020-1454.NASL", "REDHAT-RHSA-2020-1493.NASL", "REDHAT-RHSA-2020-1567.NASL", "REDHAT-RHSA-2020-1644.NASL", "REDHAT-RHSA-2020-1769.NASL", "REDHAT-RHSA-2020-2058.NASL", "REDHAT-RHSA-2020-2059.NASL", "REDHAT-RHSA-2020-2060.NASL", "REDHAT-RHSA-2020-2217.NASL", "REDHAT-RHSA-2020-2263.NASL", "REDHAT-RHSA-2020-2362.NASL", "REDHAT-RHSA-2020-2483.NASL", "REDHAT-RHSA-2020-2506.NASL", "REDHAT-RHSA-2020-2511.NASL", "REDHAT-RHSA-2020-2512.NASL", "REDHAT-RHSA-2020-2513.NASL", "REDHAT-RHSA-2020-2522.NASL", "REDHAT-RHSA-2020-2529.NASL", "REDHAT-RHSA-2020-2530.NASL", "REDHAT-RHSA-2020-2605.NASL", "REDHAT-RHSA-2020-2644.NASL", "REDHAT-RHSA-2020-2740.NASL", "REDHAT-RHSA-2020-2851.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-3230.NASL", "REDHAT-RHSA-2020-3266.NASL", "REDHAT-RHSA-2020-3303.NASL", "REDHAT-RHSA-2020-3306.NASL", "REDHAT-RHSA-2020-3369.NASL", "REDHAT-RHSA-2020-3383.NASL", "REDHAT-RHSA-2020-3461.NASL", "REDHAT-RHSA-2020-3462.NASL", "REDHAT-RHSA-2020-3463.NASL", "REDHAT-RHSA-2020-3518.NASL", "REDHAT-RHSA-2020-3545.NASL", "REDHAT-RHSA-2020-3637.NASL", "REDHAT-RHSA-2020-3638.NASL", "REDHAT-RHSA-2020-3639.NASL", "REDHAT-RHSA-2020-3662.NASL", "REDHAT-RHSA-2020-3665.NASL", "REDHAT-RHSA-2020-3730.NASL", "REDHAT-RHSA-2020-3732.NASL", "REDHAT-RHSA-2020-3755.NASL", "REDHAT-RHSA-2020-3757.NASL", "REDHAT-RHSA-2020-3807.NASL", "REDHAT-RHSA-2020-3808.NASL", "REDHAT-RHSA-2020-3817.NASL", "REDHAT-RHSA-2020-3841.NASL", "REDHAT-RHSA-2020-3936.NASL", "REDHAT-RHSA-2020-3952.NASL", "REDHAT-RHSA-2020-3958.NASL", "REDHAT-RHSA-2020-4004.NASL", "REDHAT-RHSA-2020-4026.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4173.NASL", "REDHAT-RHSA-2020-4182.NASL", "REDHAT-RHSA-2020-4214.NASL", "REDHAT-RHSA-2020-4223.NASL", "REDHAT-RHSA-2020-4279.NASL", "REDHAT-RHSA-2020-4297.NASL", "REDHAT-RHSA-2020-4312.NASL", "REDHAT-RHSA-2020-4366.NASL", "REDHAT-RHSA-2020-4384.NASL", "REDHAT-RHSA-2020-4401.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-4442.NASL", "REDHAT-RHSA-2020-4484.NASL", "REDHAT-RHSA-2020-4514.NASL", "REDHAT-RHSA-2020-4609.NASL", "REDHAT-RHSA-2020-4670.NASL", "REDHAT-RHSA-2020-4751.NASL", "REDHAT-RHSA-2020-4807.NASL", "REDHAT-RHSA-2020-4846.NASL", "REDHAT-RHSA-2020-4847.NASL", "REDHAT-RHSA-2020-5119.NASL", "REDHAT-RHSA-2020-5159.NASL", "REDHAT-RHSA-2020-5168.NASL", "REDHAT-RHSA-2020-5179.NASL", "REDHAT-RHSA-2020-5246.NASL", "REDHAT-RHSA-2020-5275.NASL", "REDHAT-RHSA-2020-5305.NASL", "REDHAT-RHSA-2020-5340.NASL", "REDHAT-RHSA-2020-5341.NASL", "REDHAT-RHSA-2020-5342.NASL", "REDHAT-RHSA-2020-5412.NASL", "REDHAT-RHSA-2020-5418.NASL", "REDHAT-RHSA-2020-5422.NASL", "REDHAT-RHSA-2020-5428.NASL", "REDHAT-RHSA-2020-5437.NASL", "REDHAT-RHSA-2020-5439.NASL", "REDHAT-RHSA-2020-5441.NASL", "REDHAT-RHSA-2020-5473.NASL", "REDHAT-RHSA-2020-5476.NASL", "REDHAT-RHSA-2020-5493.NASL", "REDHAT-RHSA-2020-5499.NASL", "REDHAT-RHSA-2020-5500.NASL", "REDHAT-RHSA-2020-5506.NASL", "REDHAT-RHSA-2020-5566.NASL", "REDHAT-RHSA-2020-5571.NASL", "REDHAT-RHSA-2020-5581.NASL", "REDHAT-RHSA-2020-5588.NASL", "REDHAT-RHSA-2020-5611.NASL", "REDHAT-RHSA-2020-5623.NASL", "REDHAT-RHSA-2020-5637.NASL", "REDHAT-RHSA-2020-5639.NASL", "REDHAT-RHSA-2020-5640.NASL", "REDHAT-RHSA-2020-5641.NASL", "REDHAT-RHSA-2020-5642.NASL", "REDHAT-RHSA-2020-5649.NASL", "REDHAT-RHSA-2020-5654.NASL", "REDHAT-RHSA-2020-5663.NASL", "REDHAT-RHSA-2020-5665.NASL", "REDHAT-RHSA-2021-0056.NASL", "REDHAT-RHSA-2021-0162.NASL", "REDHAT-RHSA-2021-0172.NASL", "REDHAT-RHSA-2021-0184.NASL", "REDHAT-RHSA-2021-0246.NASL", "REDHAT-RHSA-2021-0247.NASL", "REDHAT-RHSA-2021-0248.NASL", "REDHAT-RHSA-2021-0343.NASL", "REDHAT-RHSA-2021-0381.NASL", "REDHAT-RHSA-2021-0421.NASL", "REDHAT-RHSA-2021-0423.NASL", "REDHAT-RHSA-2021-0429.NASL", "REDHAT-RHSA-2021-0486.NASL", "REDHAT-RHSA-2021-0489.NASL", "REDHAT-RHSA-2021-0494.NASL", "REDHAT-RHSA-2021-0521.NASL", "REDHAT-RHSA-2021-0526.NASL", "REDHAT-RHSA-2021-0548.NASL", "REDHAT-RHSA-2021-0551.NASL", "REDHAT-RHSA-2021-0557.NASL", "REDHAT-RHSA-2021-0637.NASL", "REDHAT-RHSA-2021-0713.NASL", "REDHAT-RHSA-2021-0734.NASL", "REDHAT-RHSA-2021-0735.NASL", "REDHAT-RHSA-2021-0738.NASL", "REDHAT-RHSA-2021-0739.NASL", "REDHAT-RHSA-2021-0740.NASL", "REDHAT-RHSA-2021-0741.NASL", "REDHAT-RHSA-2021-0744.NASL", "REDHAT-RHSA-2021-0760.NASL", "REDHAT-RHSA-2021-0827.NASL", "REDHAT-RHSA-2021-0830.NASL", "REDHAT-RHSA-2021-0831.NASL", "REDHAT-RHSA-2021-0860.NASL", "REDHAT-RHSA-2021-0872.NASL", "REDHAT-RHSA-2021-0873.NASL", "REDHAT-RHSA-2021-0874.NASL", "REDHAT-RHSA-2021-0878.NASL", "REDHAT-RHSA-2021-0883.NASL", "REDHAT-RHSA-2021-0956.NASL", "REDHAT-RHSA-2021-1016.NASL", "REDHAT-RHSA-2021-1024.NASL", "REDHAT-RHSA-2021-1032.NASL", "REDHAT-RHSA-2021-1063.NASL", "REDHAT-RHSA-2021-1131.NASL", "REDHAT-RHSA-2021-1189.NASL", "REDHAT-RHSA-2021-1195.NASL", "REDHAT-RHSA-2021-1199.NASL", "REDHAT-RHSA-2021-1202.NASL", "REDHAT-RHSA-2021-1266.NASL", "REDHAT-RHSA-2021-1297.NASL", "REDHAT-RHSA-2021-1298.NASL", "REDHAT-RHSA-2021-1299.NASL", "REDHAT-RHSA-2021-1301.NASL", "REDHAT-RHSA-2021-1305.NASL", "REDHAT-RHSA-2021-1306.NASL", "REDHAT-RHSA-2021-1307.NASL", "REDHAT-RHSA-2021-1313.NASL", "REDHAT-RHSA-2021-1315.NASL", "REDHAT-RHSA-2021-1354.NASL", "REDHAT-RHSA-2021-1366.NASL", "REDHAT-RHSA-2021-1511.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1581.NASL", "REDHAT-RHSA-2021-1593.NASL", "REDHAT-RHSA-2021-1610.NASL", "REDHAT-RHSA-2021-1633.NASL", "REDHAT-RHSA-2021-1647.NASL", "REDHAT-RHSA-2021-1678.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-1846.NASL", "REDHAT-RHSA-2021-1968.NASL", "REDHAT-RHSA-2021-2046.NASL", "REDHAT-RHSA-2021-2047.NASL", "REDHAT-RHSA-2021-2048.NASL", "REDHAT-RHSA-2021-2122.NASL", "REDHAT-RHSA-2021-2184.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-2239.NASL", "REDHAT-RHSA-2021-2431.NASL", "REDHAT-RHSA-2021-2472.NASL", "REDHAT-RHSA-2021-2499.NASL", "REDHAT-RHSA-2021-2517.NASL", "REDHAT-RHSA-2021-2561.NASL", "REDHAT-RHSA-2021-2792.NASL", "REDHAT-RHSA-2021-2992.NASL", "REDHAT-RHSA-2021-3252.NASL", "REDHAT-RHSA-2021-3254.NASL", "REDHAT-RHSA-2021-3590.NASL", "REDHAT-RHSA-2021-3723.NASL", "REDHAT-RHSA-2021-3798.NASL", "REDHAT-RHSA-2021-3811.NASL", "REDHAT-RHSA-2021-4142.NASL", "REDHAT-RHSA-2021-4151.NASL", "REDHAT-RHSA-2021-4162.NASL", "REDHAT-RHSA-2021-4198.NASL", "REDHAT-RHSA-2021-4213.NASL", "REDHAT-RHSA-2021-4251.NASL", "REDHAT-RHSA-2021-4396.NASL", "REDHAT-RHSA-2021-4424.NASL", "REDHAT-RHSA-2021-4614.NASL", "REDHAT-RHSA-2021-4702.NASL", "REDHAT-RHSA-2021-4861.NASL", "REDHAT-RHSA-2022-0011.NASL", "REDHAT-RHSA-2022-0158.NASL", "REDHAT-RHSA-2022-0190.NASL", "REDHAT-RHSA-2022-0722.NASL", "REDHAT-RHSA-2022-1007.NASL", "REDHAT-RHSA-2022-1010.NASL", "REDHAT-RHSA-2022-1556.NASL", "REDHAT-RHSA-2022-1557.NASL", "REDHAT-RHSA-2022-1860.NASL", "REDHAT-RHSA-2022-1861.NASL", "REDHAT-RHSA-2022-4818.NASL", "REDHAT-RHSA-2022-5053.NASL", "REDHAT-RHSA-2022-5459.NASL", "REDHAT-RHSA-2022-5460.NASL", "REDHAT-RHSA-2022-6393.NASL", "REDHAT-RHSA-2022-6735.NASL", "REDHAT-RHSA-2022-6755.NASL", "REDHAT-RHSA-2022-6756.NASL", "REDHAT-RHSA-2022-7343.NASL", "REDHAT-RHSA-2022-8848.NASL", "REDHAT-RHSA-2023-0552.NASL", "REDHAT-RHSA-2023-0553.NASL", "REDHAT-RHSA-2023-0554.NASL", "REDHAT-RHSA-2023-1043.NASL", "REDHAT-RHSA-2023-1044.NASL", "REDHAT-RHSA-2023-1045.NASL", "ROCKY_LINUX_RLSA-2021-3590.NASL", "SECURITYCENTER_5_14_0_TNS_2020_02.NASL", "SECURITYCENTER_5_17_0_TNS_2020_11.NASL", "SECURITYCENTER_5_17_0_TNS_2021_06.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08_XSS.NASL", "SECURITYCENTER_5_19_0_TNS_2021_14.NASL", "SECURITYCENTER_5_4_1.NASL", "SECURITYCENTER_OPENSSL_1_1_1J_TNS_2021_03.NASL", "SECURITYCENTER_OPENSSL_1_1_1K_TNS_2021_03.NASL", "SLACKWARE_SSA_2019-030-01.NASL", "SLACKWARE_SSA_2019-107-01.NASL", "SLACKWARE_SSA_2019-202-01.NASL", "SLACKWARE_SSA_2019-311-01.NASL", "SLACKWARE_SSA_2019-354-01.NASL", "SLACKWARE_SSA_2020-008-01.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SLACKWARE_SSA_2020-091-02.NASL", "SLACKWARE_SSA_2020-163-01.NASL", "SLACKWARE_SSA_2020-295-01.NASL", "SLACKWARE_SSA_2020-344-01.NASL", "SL_20170807_LOG4J_ON_SL7_X.NASL", "SL_20170821_XMLSEC1_ON_SL7_X.NASL", "SL_20190523_FIREFOX_ON_SL6_X.NASL", "SL_20190524_FIREFOX_ON_SL7_X.NASL", "SL_20190604_THUNDERBIRD_ON_SL6_X.NASL", "SL_20190604_THUNDERBIRD_ON_SL7_X.NASL", "SL_20190729_KERNEL_ON_SL7_X.NASL", "SL_20190806_KERNEL_ON_SL7_X.NASL", "SL_20191113_KERNEL_ON_SL6_X.NASL", "SL_20200121_APACHE_COMMONS_BEANUTILS_ON_SL7_X.NASL", "SL_20200205_KERNEL_ON_SL7_X.NASL", "SL_20200311_KERNEL_ON_SL6_X.NASL", "SL_20200317_KERNEL_ON_SL7_X.NASL", "SL_20200406_TELNET_ON_SL6_X.NASL", "SL_20200407_KERNEL_ON_SL7_X.NASL", "SL_20200407_KRB5_APPL_ON_SL6_X.NASL", "SL_20200407_TELNET_ON_SL7_X.NASL", "SL_20200611_TOMCAT6_ON_SL6_X.NASL", "SL_20200611_TOMCAT_ON_SL7_X.NASL", "SL_20201001_EXPAT_ON_SL7_X.NASL", "SL_20201001_HTTPD_ON_SL7_X.NASL", "SL_20201001_IPA_ON_SL7_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SL_20201001_TOMCAT_ON_SL7_X.NASL", "SL_20201012_KERNEL_ON_SL6_X.NASL", "SL_20201215_KERNEL_ON_SL7_X.NASL", "SL_20201215_SAMBA_ON_SL7_X.NASL", "SL_20201217_OPENSSL_ON_SL7_X.NASL", "SL_20210119_XSTREAM_ON_SL7_X.NASL", "SL_20210202_PERL_ON_SL7_X.NASL", "SL_20221103_PCS_ON_SL7_X.NASL", "SMB_NT_MS19_SEP_4512578.NASL", "SMB_NT_MS19_SEP_4515384.NASL", "SMB_NT_MS19_SEP_4516026.NASL", "SMB_NT_MS19_SEP_4516044.NASL", "SMB_NT_MS19_SEP_4516055.NASL", "SMB_NT_MS19_SEP_4516058.NASL", "SMB_NT_MS19_SEP_4516065.NASL", "SMB_NT_MS19_SEP_4516066.NASL", "SMB_NT_MS19_SEP_4516067.NASL", "SMB_NT_MS19_SEP_4516068.NASL", "SMB_NT_MS19_SEP_4516070.NASL", "SMB_NT_MS20_AUG_4565349.NASL", "SMB_NT_MS20_AUG_4571694.NASL", "SMB_NT_MS20_AUG_4571703.NASL", "SMB_NT_MS20_AUG_4571729.NASL", "SMB_NT_MS20_AUG_4571736.NASL", "SMB_NT_MS21_FEB_4601347.NASL", "SMB_NT_MS21_NOV_VISUAL_STUDIO.NASL", "SMB_NT_MS21_OCT_VISUAL_STUDIO.NASL", "SOLARIS10_125279-10.NASL", "SOLARIS10_X86_125280-10.NASL", "SOLARIS_APR2021_SRU11_4_30_88_3.NASL", "SOLARIS_JAN2022_SRU11_4_39_107_1.NASL", "SOLARIS_JUL2021_SRU11_3_36_26_0.NASL", "SOLARWINDS_ORION_CVE-2020-14005.NASL", "SPLUNK_905_CVE-2023-32711.NASL", "SPRING_CVE-2020-5398.NASL", "STRUTS_2_5_22.NASL", "STRUTS_2_5_26.NASL", "STRUTS_S2-061.NASL", "STRUTS_S2-062.NASL", "SUN_JAVA_WEB_SERVER_7_0_27.NASL", "SUSE_SU-2018-2980-1.NASL", "SUSE_SU-2018-3003-1.NASL", "SUSE_SU-2019-0095-1.NASL", "SUSE_SU-2019-0148-1.NASL", "SUSE_SU-2019-0196-1.NASL", "SUSE_SU-2019-0222-1.NASL", "SUSE_SU-2019-0224-1.NASL", "SUSE_SU-2019-0326-1.NASL", "SUSE_SU-2019-0356-1.NASL", "SUSE_SU-2019-0439-1.NASL", "SUSE_SU-2019-0541-1.NASL", "SUSE_SU-2019-1289-1.NASL", "SUSE_SU-2019-1388-1.NASL", "SUSE_SU-2019-1398-1.NASL", "SUSE_SU-2019-1398-2.NASL", "SUSE_SU-2019-1405-1.NASL", "SUSE_SU-2019-14160-1.NASL", "SUSE_SU-2019-14218-1.NASL", "SUSE_SU-2019-1529-1.NASL", "SUSE_SU-2019-1530-1.NASL", "SUSE_SU-2019-1535-1.NASL", "SUSE_SU-2019-1536-1.NASL", "SUSE_SU-2019-1550-1.NASL", "SUSE_SU-2019-1668-1.NASL", "SUSE_SU-2019-1671-1.NASL", "SUSE_SU-2019-1767-1.NASL", "SUSE_SU-2019-1823-1.NASL", "SUSE_SU-2019-1829-1.NASL", "SUSE_SU-2019-1834-1.NASL", "SUSE_SU-2019-1835-1.NASL", "SUSE_SU-2019-1851-1.NASL", "SUSE_SU-2019-1852-1.NASL", "SUSE_SU-2019-1854-1.NASL", "SUSE_SU-2019-1855-1.NASL", "SUSE_SU-2019-1870-1.NASL", "SUSE_SU-2019-2002-1.NASL", "SUSE_SU-2019-2021-1.NASL", "SUSE_SU-2019-2028-1.NASL", "SUSE_SU-2019-2036-1.NASL", "SUSE_SU-2019-2237-1.NASL", "SUSE_SU-2019-2291-1.NASL", "SUSE_SU-2019-2329-1.NASL", "SUSE_SU-2019-2336-1.NASL", "SUSE_SU-2019-2371-1.NASL", "SUSE_SU-2019-2412-1.NASL", "SUSE_SU-2019-2414-1.NASL", "SUSE_SU-2019-2424-1.NASL", "SUSE_SU-2019-2430-1.NASL", "SUSE_SU-2019-2648-1.NASL", "SUSE_SU-2019-2738-1.NASL", "SUSE_SU-2019-2821-1.NASL", "SUSE_SU-2019-2829-1.NASL", "SUSE_SU-2019-2879-1.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2019-3060-1.NASL", "SUSE_SU-2019-3060-2.NASL", "SUSE_SU-2019-3200-1.NASL", "SUSE_SU-2019-3237-1.NASL", "SUSE_SU-2019-3295-1.NASL", "SUSE_SU-2019-3316-1.NASL", "SUSE_SU-2019-3317-1.NASL", "SUSE_SU-2019-3371-1.NASL", "SUSE_SU-2019-3379-1.NASL", "SUSE_SU-2019-3381-1.NASL", "SUSE_SU-2019-3389-1.NASL", "SUSE_SU-2020-0002-1.NASL", "SUSE_SU-2020-0028-1.NASL", "SUSE_SU-2020-0064-1.NASL", "SUSE_SU-2020-0069-1.NASL", "SUSE_SU-2020-0093-1.NASL", "SUSE_SU-2020-0099-1.NASL", "SUSE_SU-2020-0397-1.NASL", "SUSE_SU-2020-0474-1.NASL", "SUSE_SU-2020-0522-1.NASL", "SUSE_SU-2020-0559-1.NASL", "SUSE_SU-2020-0560-1.NASL", "SUSE_SU-2020-0584-1.NASL", "SUSE_SU-2020-0613-1.NASL", "SUSE_SU-2020-0622-1.NASL", "SUSE_SU-2020-0868-1.NASL", "SUSE_SU-2020-1058-1.NASL", "SUSE_SU-2020-1111-1.NASL", "SUSE_SU-2020-1126-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1272-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2020-14267-1.NASL", "SUSE_SU-2020-14289-1.NASL", "SUSE_SU-2020-14354-1.NASL", "SUSE_SU-2020-14375-1.NASL", "SUSE_SU-2020-14442-1.NASL", "SUSE_SU-2020-14491-1.NASL", "SUSE_SU-2020-14511-1.NASL", "SUSE_SU-2020-14560-1.NASL", "SUSE_SU-2020-14585-1.NASL", "SUSE_SU-2020-1533-1.NASL", "SUSE_SU-2020-1587-1.NASL", "SUSE_SU-2020-1596-1.NASL", "SUSE_SU-2020-1597-1.NASL", "SUSE_SU-2020-1599-1.NASL", "SUSE_SU-2020-1602-1.NASL", "SUSE_SU-2020-1603-1.NASL", "SUSE_SU-2020-1605-1.NASL", "SUSE_SU-2020-1662-1.NASL", "SUSE_SU-2020-1663-1.NASL", "SUSE_SU-2020-1682-1.NASL", "SUSE_SU-2020-1682-2.NASL", "SUSE_SU-2020-2041-1.NASL", "SUSE_SU-2020-2105-1.NASL", "SUSE_SU-2020-2106-1.NASL", "SUSE_SU-2020-2107-1.NASL", "SUSE_SU-2020-2119-1.NASL", "SUSE_SU-2020-2121-1.NASL", "SUSE_SU-2020-2122-1.NASL", "SUSE_SU-2020-2134-1.NASL", "SUSE_SU-2020-2152-1.NASL", "SUSE_SU-2020-2486-1.NASL", "SUSE_SU-2020-2487-1.NASL", "SUSE_SU-2020-2491-1.NASL", "SUSE_SU-2020-2492-1.NASL", "SUSE_SU-2020-2497-1.NASL", "SUSE_SU-2020-2498-1.NASL", "SUSE_SU-2020-2499-1.NASL", "SUSE_SU-2020-2502-1.NASL", "SUSE_SU-2020-2540-1.NASL", "SUSE_SU-2020-2562-1.NASL", "SUSE_SU-2020-2574-1.NASL", "SUSE_SU-2020-2575-1.NASL", "SUSE_SU-2020-2576-1.NASL", "SUSE_SU-2020-2582-1.NASL", "SUSE_SU-2020-2610-1.NASL", "SUSE_SU-2020-2623-1.NASL", "SUSE_SU-2020-2631-1.NASL", "SUSE_SU-2020-2634-1.NASL", "SUSE_SU-2020-2719-1.NASL", "SUSE_SU-2020-2720-1.NASL", "SUSE_SU-2020-2721-1.NASL", "SUSE_SU-2020-2722-1.NASL", "SUSE_SU-2020-2724-1.NASL", "SUSE_SU-2020-2730-1.NASL", "SUSE_SU-2020-2761-1.NASL", "SUSE_SU-2020-2776-1.NASL", "SUSE_SU-2020-2896-1.NASL", "SUSE_SU-2020-2941-1.NASL", "SUSE_SU-2020-2943-1.NASL", "SUSE_SU-2020-2997-1.NASL", "SUSE_SU-2020-3375-1.NASL", "SUSE_SU-2020-3377-1.NASL", "SUSE_SU-2020-3379-1.NASL", "SUSE_SU-2020-3478-1.NASL", "SUSE_SU-2020-3503-1.NASL", "SUSE_SU-2020-3549-1.NASL", "SUSE_SU-2020-3720-1.NASL", "SUSE_SU-2020-3721-1.NASL", "SUSE_SU-2020-3722-1.NASL", "SUSE_SU-2020-3732-1.NASL", "SUSE_SU-2020-3733-1.NASL", "SUSE_SU-2020-3735-1.NASL", "SUSE_SU-2020-3739-1.NASL", "SUSE_SU-2020-3740-1.NASL", "SUSE_SU-2020-3762-1.NASL", "SUSE_SU-2020-3763-1.NASL", "SUSE_SU-2021-0060-1.NASL", "SUSE_SU-2021-0061-1.NASL", "SUSE_SU-2021-0062-1.NASL", "SUSE_SU-2021-0068-1.NASL", "SUSE_SU-2021-0082-1.NASL", "SUSE_SU-2021-0437-1.NASL", "SUSE_SU-2021-0648-1.NASL", "SUSE_SU-2021-0649-1.NASL", "SUSE_SU-2021-0650-1.NASL", "SUSE_SU-2021-0651-1.NASL", "SUSE_SU-2021-0673-1.NASL", "SUSE_SU-2021-0674-1.NASL", "SUSE_SU-2021-0686-1.NASL", "SUSE_SU-2021-0725-1.NASL", "SUSE_SU-2021-0752-1.NASL", "SUSE_SU-2021-0753-1.NASL", "SUSE_SU-2021-0754-1.NASL", "SUSE_SU-2021-0755-1.NASL", "SUSE_SU-2021-0768-1.NASL", "SUSE_SU-2021-0769-1.NASL", "SUSE_SU-2021-0793-1.NASL", "SUSE_SU-2021-0794-1.NASL", "SUSE_SU-2021-0886-1.NASL", "SUSE_SU-2021-0887-1.NASL", "SUSE_SU-2021-0939-1.NASL", "SUSE_SU-2021-0947-1.NASL", "SUSE_SU-2021-0954-1.NASL", "SUSE_SU-2021-0955-1.NASL", "SUSE_SU-2021-0955-2.NASL", "SUSE_SU-2021-1314-1.NASL", "SUSE_SU-2021-14630-1.NASL", "SUSE_SU-2021-14667-1.NASL", "SUSE_SU-2021-14670-1.NASL", "SUSE_SU-2021-14705-1.NASL", "SUSE_SU-2021-1554-1.NASL", "SUSE_SU-2021-1786-1.NASL", "SUSE_SU-2021-1876-1.NASL", "SUSE_SU-2021-1980-1.NASL", "SUSE_SU-2021-1989-1.NASL", "SUSE_SU-2021-2125-1.NASL", "SUSE_SU-2021-2319-1.NASL", "SUSE_SU-2021-2320-1.NASL", "SUSE_SU-2021-2323-1.NASL", "SUSE_SU-2021-2326-1.NASL", "SUSE_SU-2021-2327-1.NASL", "SUSE_SU-2021-2353-1.NASL", "SUSE_SU-2021-2354-1.NASL", "SUSE_SU-2021-2605-1.NASL", "SUSE_SU-2021-2616-1.NASL", "SUSE_SU-2021-2617-1.NASL", "SUSE_SU-2021-2618-1.NASL", "SUSE_SU-2021-2620-1.NASL", "SUSE_SU-2021-2634-1.NASL", "SUSE_SU-2021-2797-1.NASL", "SUSE_SU-2021-2798-1.NASL", "SUSE_SU-2021-3007-1.NASL", "SUSE_SU-2021-3192-1.NASL", "SUSE_SU-2021-3206-1.NASL", "SUSE_SU-2021-3215-1.NASL", "SUSE_SU-2021-3217-1.NASL", "SUSE_SU-2021-3876-1.NASL", "SUSE_SU-2021-3969-1.NASL", "SUSE_SU-2021-3972-1.NASL", "SUSE_SU-2022-0107-1.NASL", "SUSE_SU-2022-0108-1.NASL", "SUSE_SU-2022-0166-1.NASL", "SUSE_SU-2022-0694-1.NASL", "SUSE_SU-2022-0695-1.NASL", "SUSE_SU-2022-0784-1.NASL", "SUSE_SU-2022-0818-1.NASL", "SUSE_SU-2022-1271-1.NASL", "SUSE_SU-2022-14875-1.NASL", "SUSE_SU-2022-14876-1.NASL", "SUSE_SU-2022-1678-1.NASL", "SUSE_SU-2022-2077-1.NASL", "SUSE_SU-2022-2082-1.NASL", "SUSE_SU-2022-3263-1.NASL", "SUSE_SU-2022-3294-1.NASL", "SUSE_SU-2022-3801-1.NASL", "SUSE_SU-2022-3802-1.NASL", "SUSE_SU-2022-4022-1.NASL", "SUSE_SU-2022-4067-1.NASL", "SUSE_SU-2022-4068-1.NASL", "SUSE_SU-2022-4069-1.NASL", "SUSE_SU-2022-4082-1.NASL", "SUSE_SU-2022-4561-1.NASL", "SUSE_SU-2022-4611-1.NASL", "SUSE_SU-2023-2096-1.NASL", "SUSE_SU-2023-2096-2.NASL", "SUSE_SU-2023-3090-1.NASL", "TELNETD_CVE-2020-10188_DIRECT.NASL", "TENABLE_NESSUS_AGENT_TNS_2020_03.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_04.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_08.NASL", "TENABLE_OT_SIEMENS_CVE-2021-3449.NASL", "TOMCAT_10_0_0_M10.NASL", "TOMCAT_10_0_0_M5.NASL", "TOMCAT_10_0_0_M7.NASL", "TOMCAT_10_0_0_M8.NASL", "TOMCAT_10_0_16.NASL", "TOMCAT_10_0_2.NASL", "TOMCAT_10_1_0_M10.NASL", "TOMCAT_7_0_104.NASL", "TOMCAT_7_0_105.NASL", "TOMCAT_7_0_108.NASL", "TOMCAT_7_0_94.NASL", "TOMCAT_8_5_40.NASL", "TOMCAT_8_5_41.NASL", "TOMCAT_8_5_55.NASL", "TOMCAT_8_5_57.NASL", "TOMCAT_8_5_60.NASL", "TOMCAT_8_5_63.NASL", "TOMCAT_8_5_75.NASL", "TOMCAT_9_0_18.NASL", "TOMCAT_9_0_20.NASL", "TOMCAT_9_0_35.NASL", "TOMCAT_9_0_37.NASL", "TOMCAT_9_0_38.NASL", "TOMCAT_9_0_40.NASL", "TOMCAT_9_0_43.NASL", "TOMCAT_9_0_58.NASL", "TYPO3_9_5_4.NASL", "UBUNTU_USN-3932-1.NASL", "UBUNTU_USN-3932-2.NASL", "UBUNTU_USN-3962-1.NASL", "UBUNTU_USN-3979-1.NASL", "UBUNTU_USN-3980-1.NASL", "UBUNTU_USN-3980-2.NASL", "UBUNTU_USN-3981-1.NASL", "UBUNTU_USN-3981-2.NASL", "UBUNTU_USN-3982-1.NASL", "UBUNTU_USN-3982-2.NASL", "UBUNTU_USN-3991-1.NASL", "UBUNTU_USN-3991-2.NASL", "UBUNTU_USN-3991-3.NASL", "UBUNTU_USN-3997-1.NASL", "UBUNTU_USN-4040-1.NASL", "UBUNTU_USN-4069-1.NASL", "UBUNTU_USN-4069-2.NASL", "UBUNTU_USN-4080-1.NASL", "UBUNTU_USN-4083-1.NASL", "UBUNTU_USN-4094-1.NASL", "UBUNTU_USN-4095-1.NASL", "UBUNTU_USN-4113-1.NASL", "UBUNTU_USN-4113-2.NASL", "UBUNTU_USN-4114-1.NASL", "UBUNTU_USN-4115-1.NASL", "UBUNTU_USN-4115-2.NASL", "UBUNTU_USN-4116-1.NASL", "UBUNTU_USN-4117-1.NASL", "UBUNTU_USN-4118-1.NASL", "UBUNTU_USN-4128-1.NASL", "UBUNTU_USN-4128-2.NASL", "UBUNTU_USN-4145-1.NASL", "UBUNTU_USN-4147-1.NASL", "UBUNTU_USN-4183-1.NASL", "UBUNTU_USN-4183-2.NASL", "UBUNTU_USN-4186-1.NASL", "UBUNTU_USN-4186-3.NASL", "UBUNTU_USN-4208-1.NASL", "UBUNTU_USN-4209-1.NASL", "UBUNTU_USN-4210-1.NASL", "UBUNTU_USN-4211-1.NASL", "UBUNTU_USN-4225-1.NASL", "UBUNTU_USN-4225-2.NASL", "UBUNTU_USN-4226-1.NASL", "UBUNTU_USN-4227-1.NASL", "UBUNTU_USN-4228-1.NASL", "UBUNTU_USN-4254-1.NASL", "UBUNTU_USN-4258-1.NASL", "UBUNTU_USN-4279-1.NASL", "UBUNTU_USN-4279-2.NASL", "UBUNTU_USN-4284-1.NASL", "UBUNTU_USN-4285-1.NASL", "UBUNTU_USN-4286-1.NASL", "UBUNTU_USN-4287-1.NASL", "UBUNTU_USN-4298-1.NASL", "UBUNTU_USN-4300-1.NASL", "UBUNTU_USN-4301-1.NASL", "UBUNTU_USN-4302-1.NASL", "UBUNTU_USN-4376-1.NASL", "UBUNTU_USN-4380-1.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4390-1.NASL", "UBUNTU_USN-4391-1.NASL", "UBUNTU_USN-4394-1.NASL", "UBUNTU_USN-4412-1.NASL", "UBUNTU_USN-4413-1.NASL", "UBUNTU_USN-4438-1.NASL", "UBUNTU_USN-4448-1.NASL", "UBUNTU_USN-4458-1.NASL", "UBUNTU_USN-4462-1.NASL", "UBUNTU_USN-4463-1.NASL", "UBUNTU_USN-4465-1.NASL", "UBUNTU_USN-4483-1.NASL", "UBUNTU_USN-4485-1.NASL", "UBUNTU_USN-4495-1.NASL", "UBUNTU_USN-4504-1.NASL", "UBUNTU_USN-4510-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4527-1.NASL", "UBUNTU_USN-4559-1.NASL", "UBUNTU_USN-4575-1.NASL", "UBUNTU_USN-4583-2.NASL", "UBUNTU_USN-4596-1.NASL", "UBUNTU_USN-4600-2.NASL", "UBUNTU_USN-4602-1.NASL", "UBUNTU_USN-4619-1.NASL", "UBUNTU_USN-4635-1.NASL", "UBUNTU_USN-4638-1.NASL", "UBUNTU_USN-4662-1.NASL", "UBUNTU_USN-4665-1.NASL", "UBUNTU_USN-4685-1.NASL", "UBUNTU_USN-4686-1.NASL", "UBUNTU_USN-4699-1.NASL", "UBUNTU_USN-4714-1.NASL", "UBUNTU_USN-4732-1.NASL", "UBUNTU_USN-4738-1.NASL", "UBUNTU_USN-4742-1.NASL", "UBUNTU_USN-4758-1.NASL", "UBUNTU_USN-4880-1.NASL", "UBUNTU_USN-4891-1.NASL", "UBUNTU_USN-4892-1.NASL", "UBUNTU_USN-4943-1.NASL", "UBUNTU_USN-4952-1.NASL", "UBUNTU_USN-5022-3.NASL", "UBUNTU_USN-5038-1.NASL", "UBUNTU_USN-5048-1.NASL", "UBUNTU_USN-5088-1.NASL", "UBUNTU_USN-5340-1.NASL", "UBUNTU_USN-5360-1.NASL", "UBUNTU_USN-5674-1.NASL", "UBUNTU_USN-5725-1.NASL", "UBUNTU_USN-5725-2.NASL", "UBUNTU_USN-5952-1.NASL", "UBUNTU_USN-5998-1.NASL", "UBUNTU_USN-6049-1.NASL", "UBUNTU_USN-6117-1.NASL", "VIRTUALBOX_APR_2021_CPU.NASL", "VIRTUOZZO_VZA-2018-089.NASL", "VIRTUOZZO_VZA-2019-089.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "WEBSPHERE_1115085.NASL", "WEBSPHERE_1288774.NASL", "WEBSPHERE_6322683.NASL", "WEB_APPLICATION_SCANNING_112430", "WEB_APPLICATION_SCANNING_112437", "WEB_APPLICATION_SCANNING_112438", "WEB_APPLICATION_SCANNING_112485", "WEB_APPLICATION_SCANNING_112602", "WEB_APPLICATION_SCANNING_112603", "WEB_APPLICATION_SCANNING_112604", "WEB_APPLICATION_SCANNING_112709", "WEB_APPLICATION_SCANNING_112710", "WEB_APPLICATION_SCANNING_112711", "WEB_APPLICATION_SCANNING_112712", "WEB_APPLICATION_SCANNING_113226", "WEB_APPLICATION_SCANNING_113626", "WEB_APPLICATION_SCANNING_113627", "WEB_APPLICATION_SCANNING_113628", "WEB_APPLICATION_SCANNING_113629", "WEB_APPLICATION_SCANNING_98669", "WEB_APPLICATION_SCANNING_98932", "WEB_APPLICATION_SCANNING_98933", "WEB_APPLICATION_SCANNING_98934", "WEB_APPLICATION_SCANNING_98998", "WIRESHARK_3_2_12.NASL", "WIRESHARK_3_2_9.NASL", "WIRESHARK_3_4_1.NASL", "WIRESHARK_3_4_2.NASL", "WIRESHARK_3_4_3.NASL", "WIRESHARK_3_4_4.NASL"]}, {"type": "nodejs", "idList": ["NODEJS:127", "NODEJS:1467", "NODEJS:1518", "NODEJS:1654", "NODEJS:1702", "NODEJS:796", "NODEJS:891"]}, {"type": "nodejsblog", "idList": ["NODEJSBLOG:APRIL-2021-SECURITY-RELEASES", "NODEJSBLOG:FEBRUARY-2021-SECURITY-RELEASES", "NODEJSBLOG:JANUARY-2021-SECURITY-RELEASES", "NODEJSBLOG:JULY-2022-SECURITY-RELEASES", "NODEJSBLOG:NOVEMBER-2020-SECURITY-RELEASES"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2019-1551", "OPENSSL:CVE-2020-1967", "OPENSSL:CVE-2020-1968", "OPENSSL:CVE-2020-1971", "OPENSSL:CVE-2021-23839", "OPENSSL:CVE-2021-23840", "OPENSSL:CVE-2021-23841", "OPENSSL:CVE-2021-3449", "OPENSSL:CVE-2021-3450"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310107013", "OPENVAS:1361412562310107014", "OPENVAS:1361412562310108601", "OPENVAS:1361412562310108752", "OPENVAS:1361412562310108753", "OPENVAS:1361412562310108764", "OPENVAS:1361412562310108811", "OPENVAS:1361412562310113369", "OPENVAS:1361412562310114143", "OPENVAS:1361412562310114144", "OPENVAS:1361412562310141924", "OPENVAS:1361412562310142265", "OPENVAS:1361412562310142300", "OPENVAS:1361412562310142301", "OPENVAS:1361412562310142309", "OPENVAS:136141256231014231", "OPENVAS:1361412562310142311", "OPENVAS:1361412562310142314", "OPENVAS:1361412562310142479", "OPENVAS:1361412562310142480", "OPENVAS:1361412562310142508", "OPENVAS:1361412562310142509", "OPENVAS:1361412562310142811", "OPENVAS:1361412562310142812", "OPENVAS:1361412562310143027", "OPENVAS:1361412562310143028", "OPENVAS:1361412562310143193", "OPENVAS:1361412562310143194", "OPENVAS:1361412562310143392", "OPENVAS:1361412562310143393", "OPENVAS:1361412562310143612", "OPENVAS:1361412562310143613", "OPENVAS:1361412562310143671", "OPENVAS:1361412562310143672", "OPENVAS:1361412562310143812", "OPENVAS:1361412562310143813", "OPENVAS:1361412562310143881", "OPENVAS:1361412562310143963", "OPENVAS:1361412562310143964", "OPENVAS:1361412562310144144", "OPENVAS:1361412562310144145", "OPENVAS:1361412562310144238", "OPENVAS:1361412562310144239", "OPENVAS:1361412562310144273", "OPENVAS:1361412562310144274", "OPENVAS:1361412562310704233", "OPENVAS:1361412562310704434", "OPENVAS:1361412562310704435", "OPENVAS:1361412562310704448", "OPENVAS:1361412562310704451", "OPENVAS:1361412562310704452", "OPENVAS:1361412562310704460", "OPENVAS:1361412562310704465", "OPENVAS:1361412562310704472", "OPENVAS:1361412562310704495", "OPENVAS:1361412562310704497", "OPENVAS:1361412562310704509", "OPENVAS:1361412562310704542", "OPENVAS:1361412562310704594", "OPENVAS:1361412562310704596", "OPENVAS:1361412562310704626", "OPENVAS:1361412562310704628", "OPENVAS:1361412562310704661", "OPENVAS:1361412562310704680", "OPENVAS:1361412562310704686", "OPENVAS:1361412562310704693", "OPENVAS:1361412562310704698", "OPENVAS:1361412562310704699", "OPENVAS:1361412562310704727", "OPENVAS:1361412562310809006", "OPENVAS:1361412562310811726", "OPENVAS:1361412562310813437", "OPENVAS:1361412562310814409", "OPENVAS:1361412562310814895", "OPENVAS:1361412562310814896", "OPENVAS:1361412562310814897", "OPENVAS:1361412562310814898", "OPENVAS:1361412562310815082", "OPENVAS:1361412562310815083", "OPENVAS:1361412562310815177", "OPENVAS:1361412562310815180", "OPENVAS:1361412562310815453", "OPENVAS:1361412562310815454", "OPENVAS:1361412562310815455", "OPENVAS:1361412562310815456", "OPENVAS:1361412562310815457", "OPENVAS:1361412562310815458", "OPENVAS:1361412562310815459", "OPENVAS:1361412562310815461", "OPENVAS:1361412562310815462", "OPENVAS:1361412562310815463", "OPENVAS:1361412562310843951", "OPENVAS:1361412562310843957", "OPENVAS:1361412562310843990", "OPENVAS:1361412562310844004", "OPENVAS:1361412562310844006", "OPENVAS:1361412562310844008", "OPENVAS:1361412562310844009", "OPENVAS:1361412562310844010", "OPENVAS:1361412562310844012", "OPENVAS:1361412562310844018", "OPENVAS:1361412562310844026", "OPENVAS:1361412562310844045", "OPENVAS:1361412562310844052", "OPENVAS:1361412562310844072", "OPENVAS:1361412562310844102", "OPENVAS:1361412562310844116", "OPENVAS:1361412562310844118", "OPENVAS:1361412562310844121", "OPENVAS:1361412562310844133", "OPENVAS:1361412562310844134", "OPENVAS:1361412562310844154", "OPENVAS:1361412562310844156", "OPENVAS:1361412562310844157", "OPENVAS:1361412562310844158", "OPENVAS:1361412562310844159", "OPENVAS:1361412562310844160", "OPENVAS:1361412562310844170", "OPENVAS:1361412562310844174", "OPENVAS:1361412562310844179", "OPENVAS:1361412562310844181", "OPENVAS:1361412562310844192", "OPENVAS:1361412562310844194", "OPENVAS:1361412562310844231", "OPENVAS:1361412562310844236", "OPENVAS:1361412562310844256", "OPENVAS:1361412562310844257", "OPENVAS:1361412562310844258", "OPENVAS:1361412562310844259", "OPENVAS:1361412562310844274", "OPENVAS:1361412562310844277", "OPENVAS:1361412562310844281", "OPENVAS:1361412562310844282", "OPENVAS:1361412562310844283", "OPENVAS:1361412562310844284", "OPENVAS:1361412562310844298", "OPENVAS:1361412562310844314", "OPENVAS:1361412562310844316", "OPENVAS:1361412562310844340", "OPENVAS:1361412562310844341", "OPENVAS:1361412562310844342", "OPENVAS:1361412562310844343", "OPENVAS:1361412562310844347", "OPENVAS:1361412562310844349", "OPENVAS:1361412562310844360", "OPENVAS:1361412562310844362", "OPENVAS:1361412562310844364", "OPENVAS:1361412562310844365", "OPENVAS:1361412562310844450", "OPENVAS:1361412562310844454", "OPENVAS:1361412562310844461", "OPENVAS:1361412562310844462", "OPENVAS:1361412562310844464", "OPENVAS:1361412562310844465", "OPENVAS:1361412562310844466", "OPENVAS:1361412562310844467", "OPENVAS:1361412562310844484", "OPENVAS:1361412562310844485", "OPENVAS:1361412562310851830", "OPENVAS:1361412562310851908", "OPENVAS:1361412562310851918", "OPENVAS:1361412562310851937", "OPENVAS:1361412562310851938", "OPENVAS:1361412562310852032", "OPENVAS:1361412562310852091", "OPENVAS:1361412562310852163", "OPENVAS:1361412562310852240", "OPENVAS:1361412562310852274", "OPENVAS:1361412562310852528", "OPENVAS:1361412562310852547", "OPENVAS:1361412562310852552", "OPENVAS:1361412562310852568", "OPENVAS:1361412562310852570", "OPENVAS:1361412562310852602", "OPENVAS:1361412562310852611", "OPENVAS:1361412562310852631", "OPENVAS:1361412562310852649", "OPENVAS:1361412562310852657", "OPENVAS:1361412562310852684", "OPENVAS:1361412562310852686", "OPENVAS:1361412562310852705", "OPENVAS:1361412562310852750", "OPENVAS:1361412562310852855", "OPENVAS:1361412562310852859", "OPENVAS:1361412562310852917", "OPENVAS:1361412562310852928", "OPENVAS:1361412562310852953", "OPENVAS:1361412562310852959", "OPENVAS:1361412562310852971", "OPENVAS:1361412562310852980", "OPENVAS:1361412562310852991", "OPENVAS:1361412562310853001", "OPENVAS:1361412562310853070", "OPENVAS:1361412562310853072", "OPENVAS:1361412562310853132", "OPENVAS:1361412562310853141", "OPENVAS:1361412562310853179", "OPENVAS:1361412562310853182", "OPENVAS:1361412562310853206", "OPENVAS:1361412562310853223", "OPENVAS:1361412562310853226", "OPENVAS:1361412562310853254", "OPENVAS:1361412562310853258", "OPENVAS:1361412562310853260", "OPENVAS:1361412562310871877", "OPENVAS:1361412562310872637", "OPENVAS:1361412562310872638", "OPENVAS:1361412562310872757", "OPENVAS:1361412562310872759", "OPENVAS:1361412562310873687", "OPENVAS:1361412562310873774", "OPENVAS:1361412562310874701", "OPENVAS:1361412562310874704", "OPENVAS:1361412562310874986", "OPENVAS:1361412562310875011", "OPENVAS:1361412562310875421", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875426", "OPENVAS:1361412562310875681", "OPENVAS:1361412562310875697", "OPENVAS:1361412562310876030", "OPENVAS:1361412562310876319", "OPENVAS:1361412562310876320", "OPENVAS:1361412562310876322", "OPENVAS:1361412562310876325", "OPENVAS:1361412562310876327", "OPENVAS:1361412562310876331", "OPENVAS:1361412562310876334", "OPENVAS:1361412562310876342", "OPENVAS:1361412562310876360", "OPENVAS:1361412562310876361", "OPENVAS:1361412562310876377", "OPENVAS:1361412562310876399", "OPENVAS:1361412562310876410", "OPENVAS:1361412562310876414", "OPENVAS:1361412562310876417", "OPENVAS:1361412562310876423", "OPENVAS:1361412562310876445", "OPENVAS:1361412562310876476", "OPENVAS:1361412562310876479", "OPENVAS:1361412562310876489", "OPENVAS:1361412562310876510", "OPENVAS:1361412562310876515", "OPENVAS:1361412562310876519", "OPENVAS:1361412562310876532", "OPENVAS:1361412562310876543", "OPENVAS:1361412562310876555", "OPENVAS:1361412562310876556", "OPENVAS:1361412562310876566", "OPENVAS:1361412562310876577", "OPENVAS:1361412562310876586", "OPENVAS:1361412562310876611", "OPENVAS:1361412562310876621", "OPENVAS:1361412562310876638", "OPENVAS:1361412562310876653", "OPENVAS:1361412562310876666", "OPENVAS:1361412562310876707", "OPENVAS:1361412562310876711", "OPENVAS:1361412562310876750", "OPENVAS:1361412562310876753", "OPENVAS:1361412562310876784", "OPENVAS:1361412562310876785", "OPENVAS:1361412562310876809", "OPENVAS:1361412562310876828", "OPENVAS:1361412562310876829", "OPENVAS:1361412562310876830", "OPENVAS:1361412562310876832", "OPENVAS:1361412562310876833", "OPENVAS:1361412562310876834", "OPENVAS:1361412562310876835", "OPENVAS:1361412562310876837", "OPENVAS:1361412562310876841", "OPENVAS:1361412562310876859", "OPENVAS:1361412562310876862", "OPENVAS:1361412562310876869", "OPENVAS:1361412562310876898", "OPENVAS:1361412562310876900", "OPENVAS:1361412562310876901", "OPENVAS:1361412562310876904", "OPENVAS:1361412562310876908", "OPENVAS:1361412562310876918", "OPENVAS:1361412562310876923", "OPENVAS:1361412562310876925", "OPENVAS:1361412562310876940", "OPENVAS:1361412562310876943", "OPENVAS:1361412562310876994", "OPENVAS:1361412562310876995", "OPENVAS:1361412562310876999", "OPENVAS:1361412562310877052", "OPENVAS:1361412562310877058", "OPENVAS:1361412562310877070", "OPENVAS:1361412562310877098", "OPENVAS:1361412562310877109", "OPENVAS:1361412562310877113", "OPENVAS:1361412562310877119", "OPENVAS:1361412562310877127", "OPENVAS:1361412562310877132", "OPENVAS:1361412562310877134", "OPENVAS:1361412562310877136", "OPENVAS:1361412562310877141", "OPENVAS:1361412562310877152", "OPENVAS:1361412562310877162", "OPENVAS:1361412562310877176", "OPENVAS:1361412562310877192", "OPENVAS:1361412562310877209", "OPENVAS:1361412562310877212", "OPENVAS:1361412562310877251", "OPENVAS:1361412562310877261", "OPENVAS:1361412562310877267", "OPENVAS:1361412562310877291", "OPENVAS:1361412562310877322", "OPENVAS:1361412562310877358", "OPENVAS:1361412562310877370", "OPENVAS:1361412562310877393", "OPENVAS:1361412562310877410", "OPENVAS:1361412562310877418", "OPENVAS:1361412562310877421", "OPENVAS:1361412562310877476", "OPENVAS:1361412562310877479", "OPENVAS:1361412562310877533", "OPENVAS:1361412562310877540", "OPENVAS:1361412562310877541", "OPENVAS:1361412562310877616", "OPENVAS:1361412562310877618", "OPENVAS:1361412562310877622", "OPENVAS:1361412562310877658", "OPENVAS:1361412562310877665", "OPENVAS:1361412562310877668", "OPENVAS:1361412562310877690", "OPENVAS:1361412562310877736", "OPENVAS:1361412562310877748", "OPENVAS:1361412562310877752", "OPENVAS:1361412562310877761", "OPENVAS:1361412562310877816", "OPENVAS:1361412562310877866", "OPENVAS:1361412562310877876", "OPENVAS:1361412562310877898", "OPENVAS:1361412562310877925", "OPENVAS:1361412562310877930", "OPENVAS:1361412562310877939", "OPENVAS:1361412562310877942", "OPENVAS:1361412562310877945", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310877967", "OPENVAS:1361412562310877975", "OPENVAS:1361412562310877986", "OPENVAS:1361412562310877995", "OPENVAS:1361412562310883059", "OPENVAS:1361412562310883061", "OPENVAS:1361412562310883063", "OPENVAS:1361412562310883064", "OPENVAS:1361412562310883095", "OPENVAS:1361412562310883131", "OPENVAS:1361412562310883171", "OPENVAS:1361412562310883179", "OPENVAS:1361412562310883191", "OPENVAS:1361412562310883200", "OPENVAS:1361412562310883210", "OPENVAS:1361412562310883217", "OPENVAS:1361412562310883219", "OPENVAS:1361412562310883252", "OPENVAS:1361412562310891479", "OPENVAS:1361412562310891517", "OPENVAS:1361412562310891715", "OPENVAS:1361412562310891731", "OPENVAS:1361412562310891771", "OPENVAS:1361412562310891777", "OPENVAS:1361412562310891797", "OPENVAS:1361412562310891798", "OPENVAS:1361412562310891799", "OPENVAS:1361412562310891800", "OPENVAS:1361412562310891806", "OPENVAS:1361412562310891810", "OPENVAS:1361412562310891824", "OPENVAS:1361412562310891839", "OPENVAS:1361412562310891862", "OPENVAS:1361412562310891879", "OPENVAS:1361412562310891883", "OPENVAS:1361412562310891884", "OPENVAS:1361412562310891885", "OPENVAS:1361412562310891896", "OPENVAS:1361412562310891900", "OPENVAS:1361412562310891919", "OPENVAS:1361412562310891930", "OPENVAS:1361412562310891943", "OPENVAS:1361412562310892065", "OPENVAS:1361412562310892068", "OPENVAS:1361412562310892114", "OPENVAS:1361412562310892118", "OPENVAS:1361412562310892124", "OPENVAS:1361412562310892176", "OPENVAS:1361412562310892184", "OPENVAS:1361412562310892191", "OPENVAS:1361412562310892203", "OPENVAS:1361412562310892209", "OPENVAS:1361412562310892217", "OPENVAS:1361412562310892221", "OPENVAS:1361412562310892241", "OPENVAS:1361412562310892242", "OPENVAS:1361412562310892270", "OPENVAS:1361412562310892279", "OPENVAS:1361412562311220171193", "OPENVAS:1361412562311220171194", "OPENVAS:1361412562311220171213", "OPENVAS:1361412562311220171214", "OPENVAS:1361412562311220191304", "OPENVAS:1361412562311220191506", "OPENVAS:1361412562311220191586", "OPENVAS:1361412562311220191587", "OPENVAS:1361412562311220191588", "OPENVAS:1361412562311220191612", "OPENVAS:1361412562311220191635", "OPENVAS:1361412562311220191636", "OPENVAS:1361412562311220191639", "OPENVAS:1361412562311220191671", "OPENVAS:1361412562311220191672", "OPENVAS:1361412562311220191758", "OPENVAS:1361412562311220191783", "OPENVAS:1361412562311220191787", "OPENVAS:1361412562311220191793", "OPENVAS:1361412562311220191813", "OPENVAS:1361412562311220191819", "OPENVAS:1361412562311220191841", "OPENVAS:1361412562311220191847", "OPENVAS:1361412562311220191885", "OPENVAS:1361412562311220191926", "OPENVAS:1361412562311220191935", "OPENVAS:1361412562311220191960", "OPENVAS:1361412562311220192047", "OPENVAS:1361412562311220192063", "OPENVAS:1361412562311220192068", "OPENVAS:1361412562311220192094", "OPENVAS:1361412562311220192201", "OPENVAS:1361412562311220192274", "OPENVAS:1361412562311220192283", "OPENVAS:1361412562311220192331", "OPENVAS:1361412562311220192353", "OPENVAS:1361412562311220192361", "OPENVAS:1361412562311220192405", "OPENVAS:1361412562311220192531", "OPENVAS:1361412562311220192569", "OPENVAS:1361412562311220192599", "OPENVAS:1361412562311220192691", "OPENVAS:1361412562311220192693", "OPENVAS:1361412562311220192699", "OPENVAS:1361412562311220201012", "OPENVAS:1361412562311220201015", "OPENVAS:1361412562311220201021", "OPENVAS:1361412562311220201042", "OPENVAS:1361412562311220201063", "OPENVAS:1361412562311220201078", "OPENVAS:1361412562311220201112", "OPENVAS:1361412562311220201158", "OPENVAS:1361412562311220201186", "OPENVAS:1361412562311220201197", "OPENVAS:1361412562311220201269", "OPENVAS:1361412562311220201289", "OPENVAS:1361412562311220201300", "OPENVAS:1361412562311220201333", "OPENVAS:1361412562311220201342", "OPENVAS:1361412562311220201364", "OPENVAS:1361412562311220201370", "OPENVAS:1361412562311220201396", "OPENVAS:1361412562311220201444", "OPENVAS:1361412562311220201452", "OPENVAS:1361412562311220201455", "OPENVAS:1361412562311220201505", "OPENVAS:1361412562311220201512", "OPENVAS:1361412562311220201536", "OPENVAS:1361412562311220201538", "OPENVAS:1361412562311220201541", "OPENVAS:1361412562311220201552", "OPENVAS:1361412562311220201577", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201596", "OPENVAS:1361412562311220201601", "OPENVAS:1361412562311220201606", "OPENVAS:1361412562311220201613", "OPENVAS:1361412562311220201617", "OPENVAS:1361412562311220201625", "OPENVAS:1361412562311220201629", "OPENVAS:1361412562311220201645", "OPENVAS:1361412562311220201650", "OPENVAS:1361412562311220201674", "OPENVAS:1361412562311220201677", "OPENVAS:1361412562311220201692", "OPENVAS:1361412562311220201693", "OPENVAS:1361412562311220201698", "OPENVAS:1361412562311220201710", "OPENVAS:1361412562311220201749", "OPENVAS:1361412562311220201765"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2018", "ORACLE:CPUAPR2019", "ORACLE:CPUAPR2020", "ORACLE:CPUAPR2022", "ORACLE:CPUAPR2023", "ORACLE:CPUJAN2018", "ORACLE:CPUJAN2019", "ORACLE:CPUJAN2020", "ORACLE:CPUJAN2021", "ORACLE:CPUJAN2022", "ORACLE:CPUJAN2023", "ORACLE:CPUJUL2018", "ORACLE:CPUJUL2019", "ORACLE:CPUJUL2020", "ORACLE:CPUJUL2021", "ORACLE:CPUJUL2022", "ORACLE:CPUJUL2023", "ORACLE:CPUOCT2018", "ORACLE:CPUOCT2019", "ORACLE:CPUOCT2020", "ORACLE:CPUOCT2021", "ORACLE:CPUOCT2022"]}, {"type": "oraclelinux", "idList": ["ELSA-2017-2423", "ELSA-2017-2492", "ELSA-2019-1265", "ELSA-2019-1267", "ELSA-2019-1269", "ELSA-2019-1308", "ELSA-2019-1309", "ELSA-2019-1310", "ELSA-2019-1873", "ELSA-2019-2029", "ELSA-2019-2703", "ELSA-2019-3517", "ELSA-2019-3836", "ELSA-2020-0194", "ELSA-2020-0339", "ELSA-2020-0374", "ELSA-2020-0790", "ELSA-2020-0834", "ELSA-2020-1016", "ELSA-2020-1318", "ELSA-2020-1334", "ELSA-2020-1335", "ELSA-2020-1349", "ELSA-2020-1644", "ELSA-2020-1769", "ELSA-2020-2529", "ELSA-2020-2530", "ELSA-2020-3662", "ELSA-2020-3665", "ELSA-2020-3936", "ELSA-2020-3952", "ELSA-2020-3958", "ELSA-2020-4004", "ELSA-2020-4060", "ELSA-2020-4182", "ELSA-2020-4431", "ELSA-2020-4442", "ELSA-2020-4484", "ELSA-2020-4514", "ELSA-2020-4670", "ELSA-2020-4751", "ELSA-2020-4807", "ELSA-2020-4847", "ELSA-2020-5437", "ELSA-2020-5439", "ELSA-2020-5473", "ELSA-2020-5476", "ELSA-2020-5493", "ELSA-2020-5499", "ELSA-2020-5566-1", "ELSA-2020-5715", "ELSA-2020-5823", "ELSA-2020-5825", "ELSA-2020-5827", "ELSA-2020-5828", "ELSA-2020-5837", "ELSA-2020-5841", "ELSA-2020-5844", "ELSA-2020-5845", "ELSA-2020-5848", "ELSA-2020-5866", "ELSA-2020-5879", "ELSA-2020-5881", "ELSA-2020-5885", "ELSA-2020-5900", "ELSA-2020-5962", "ELSA-2020-5966", "ELSA-2020-5968", "ELSA-2020-5983", "ELSA-2021-0162", "ELSA-2021-0343", "ELSA-2021-0548", "ELSA-2021-0551", "ELSA-2021-0557", "ELSA-2021-0734", "ELSA-2021-0735", "ELSA-2021-0744", "ELSA-2021-0860", "ELSA-2021-1024", "ELSA-2021-1297", "ELSA-2021-1298", "ELSA-2021-1301", "ELSA-2021-1307", "ELSA-2021-1354", "ELSA-2021-1578", "ELSA-2021-1581", "ELSA-2021-1593", "ELSA-2021-1610", "ELSA-2021-1633", "ELSA-2021-1647", "ELSA-2021-1678", "ELSA-2021-1846", "ELSA-2021-3590", "ELSA-2021-3798", "ELSA-2021-4151", "ELSA-2021-4162", "ELSA-2021-4213", "ELSA-2021-4251", "ELSA-2021-4396", "ELSA-2021-4424", "ELSA-2021-9121", "ELSA-2021-9137", "ELSA-2021-9150", "ELSA-2021-9151", "ELSA-2021-9238", "ELSA-2021-9294", "ELSA-2021-9400", "ELSA-2021-9459", "ELSA-2021-9473", "ELSA-2021-9478", "ELSA-2021-9528", "ELSA-2021-9552", "ELSA-2021-9561", "ELSA-2022-1556", "ELSA-2022-1557", "ELSA-2022-1860", "ELSA-2022-1861", "ELSA-2022-7343", "ELSA-2022-9177", "ELSA-2022-9419"]}, {"type": "osv", "idList": ["OSV:ASB-A-145728612", "OSV:ASB-A-192605364", "OSV:ASB-A-192606047", "OSV:CVE-2018-14550", "OSV:CVE-2020-13434", "OSV:CVE-2020-27844", "OSV:CVE-2020-7774", "OSV:CVE-2021-20227", "OSV:CVE-2021-22883", "OSV:CVE-2021-23839", "OSV:CVE-2021-23841", "OSV:DLA-1517-1", "OSV:DLA-1715-1", "OSV:DLA-1731-1", "OSV:DLA-1771-1", "OSV:DLA-1797-1", "OSV:DLA-1799-1", "OSV:DLA-1800-1", "OSV:DLA-1806-1", "OSV:DLA-1824-1", "OSV:DLA-1839-1", "OSV:DLA-1862-1", "OSV:DLA-1883-1", "OSV:DLA-1884-1", "OSV:DLA-1885-1", "OSV:DLA-1896-1", "OSV:DLA-1900-1", "OSV:DLA-1900-2", "OSV:DLA-1919-1", "OSV:DLA-1930-1", "OSV:DLA-2065-1", "OSV:DLA-2068-1", "OSV:DLA-2114-1", "OSV:DLA-2118-1", "OSV:DLA-2124-1", "OSV:DLA-2176-1", "OSV:DLA-2184-1", "OSV:DLA-2191-1", "OSV:DLA-2203-1", "OSV:DLA-2209-1", "OSV:DLA-2211-1", "OSV:DLA-2217-1", "OSV:DLA-2241-1", "OSV:DLA-2242-1", "OSV:DLA-2270-1", "OSV:DLA-2279-1", "OSV:DLA-2286-1", "OSV:DLA-2323-1", "OSV:DLA-2340-1", "OSV:DLA-2340-2", "OSV:DLA-2364-1", "OSV:DLA-2378-1", "OSV:DLA-2385-1", "OSV:DLA-2405-1", "OSV:DLA-2406-1", "OSV:DLA-2407-1", "OSV:DLA-2420-1", "OSV:DLA-2437-1", "OSV:DLA-2459-1", "OSV:DLA-2460-1", "OSV:DLA-2463-1", "OSV:DLA-2471-1", "OSV:DLA-2492-1", "OSV:DLA-2493-1", "OSV:DLA-2495-1", "OSV:DLA-2500-1", "OSV:DLA-2547-1", "OSV:DLA-2550-1", "OSV:DLA-2555-1", "OSV:DLA-2563-1", "OSV:DLA-2565-1", "OSV:DLA-2569-1", "OSV:DLA-2594-1", "OSV:DLA-2616-1", "OSV:DLA-2619-1", "OSV:DLA-2628-1", "OSV:DLA-2634-1", "OSV:DLA-2638-1", "OSV:DLA-2661-1", "OSV:DLA-2706-1", "OSV:DLA-2751-1", "OSV:DLA-2821-1", "OSV:DLA-2852-1", "OSV:DLA-2889-1", "OSV:DLA-2967-1", "OSV:DLA-2975-1", "OSV:DLA-3160-1", "OSV:DLA-3164-1", "OSV:DLA-3205-1", "OSV:DLA-3351-1", "OSV:DSA-4233-1", "OSV:DSA-4434-1", "OSV:DSA-4435-1", "OSV:DSA-4448-1", "OSV:DSA-4451-1", "OSV:DSA-4452-1", "OSV:DSA-4460-1", "OSV:DSA-4465-1", "OSV:DSA-4472-1", "OSV:DSA-4495-1", "OSV:DSA-4497-1", "OSV:DSA-4509-1", "OSV:DSA-4509-2", "OSV:DSA-4509-3", "OSV:DSA-4594-1", "OSV:DSA-4596-1", "OSV:DSA-4626-1", "OSV:DSA-4628-1", "OSV:DSA-4661-1", "OSV:DSA-4680-1", "OSV:DSA-4698-1", "OSV:DSA-4699-1", "OSV:DSA-4727-1", "OSV:DSA-4757-1", "OSV:DSA-4772-1", "OSV:DSA-4789-1", "OSV:DSA-4795-1", "OSV:DSA-4811-1", "OSV:DSA-4848-1", "OSV:DSA-4863-1", "OSV:DSA-4875-1", "OSV:DSA-4881-1", "OSV:DSA-4882-1", "OSV:DSA-4885-1", "OSV:DSA-4899-1", "OSV:DSA-5020-1", "OSV:DSA-5265-1", "OSV:GHSA-25XM-HR59-7C27", "OSV:GHSA-269G-PWP5-87PP", "OSV:GHSA-269Q-HMXG-M83Q", "OSV:GHSA-288C-CQ4H-88GQ", "OSV:GHSA-2CWJ-8CHV-9PP9", "OSV:GHSA-2H63-QP69-FWVW", "OSV:GHSA-2PPP-9496-P23Q", "OSV:GHSA-2QRG-X229-3V8Q", "OSV:GHSA-344F-F5VG-2JFJ", "OSV:GHSA-3WQF-4X89-9G79", "OSV:GHSA-3XXV-P78R-4FC6", "OSV:GHSA-42F2-F9VC-6365", "OSV:GHSA-4446-656P-F54G", "OSV:GHSA-48RW-J489-928M", "OSV:GHSA-4GW3-8F77-F72C", "OSV:GHSA-4M44-5J2G-XF64", "OSV:GHSA-4P24-VMCR-4GQJ", "OSV:GHSA-4P6W-M9WC-C9C9", "OSV:GHSA-4PV3-63JW-4JW2", "OSV:GHSA-523C-XH4G-MH5M", "OSV:GHSA-53X6-4X5P-RRVV", "OSV:GHSA-562R-VG33-8X8H", "OSV:GHSA-58P8-9G59-Q2HR", "OSV:GHSA-5H9J-Q6J2-253F", "OSV:GHSA-5MCR-GQ6C-3HQ2", "OSV:GHSA-5MG8-W23W-74H3", "OSV:GHSA-5R5R-6HPJ-8GG9", "OSV:GHSA-5WW9-J83M-Q7QX", "OSV:GHSA-64X2-GQ24-75PV", "OSV:GHSA-6C3J-C64M-QHGQ", "OSV:GHSA-6FPP-RGJ9-8RWC", "OSV:GHSA-6JMF-MXWF-R3JC", "OSV:GHSA-6PCC-3RFX-4GPM", "OSV:GHSA-6PHF-73Q6-GH87", "OSV:GHSA-73XV-W5GP-FRXH", "OSV:GHSA-744R-VV2G-2X6G", "OSV:GHSA-7MVR-5X2G-WFC8", "OSV:GHSA-7R82-7XV7-XCPJ", "OSV:GHSA-8222-6FC8-MHVF", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-84RM-QF37-FGC2", "OSV:GHSA-86QR-9VQC-PGC6", "OSV:GHSA-86WM-RRJM-8WH8", "OSV:GHSA-89QR-369F-5M5X", "OSV:GHSA-8C4J-34R4-XR8G", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-8HXH-R6F7-JF45", "OSV:GHSA-8VMX-QMCH-MPQG", "OSV:GHSA-8W26-6F25-CM9X", "OSV:GHSA-8WX2-9Q48-VM9R", "OSV:GHSA-96JQ-75WH-2658", "OSV:GHSA-9F3J-PM6F-9FM5", "OSV:GHSA-9GPH-22XH-8X98", "OSV:GHSA-9JWC-Q6J3-8G9G", "OSV:GHSA-9M6F-7XCQ-8VF8", "OSV:GHSA-9V3M-8FP8-MJ99", "OSV:GHSA-9VFJ-5G7H-4P24", "OSV:GHSA-C265-37VJ-CWCC", "OSV:GHSA-C27H-MCMW-48HV", "OSV:GHSA-C2Q3-4QRH-FM48", "OSV:GHSA-C427-HJC3-WRFW", "OSV:GHSA-C43Q-5HPJ-4CRV", "OSV:GHSA-C4W7-XM78-47VH", "OSV:GHSA-C6PW-Q7F2-97HV", "OSV:GHSA-C9JJ-3WVG-Q65H", "OSV:GHSA-CC94-3V9C-7RM8", "OSV:GHSA-CCP5-GG58-PXFM", "OSV:GHSA-CJJC-XP8V-855W", "OSV:GHSA-CMX4-P4V5-HMR5", "OSV:GHSA-CQCC-MM6X-VMVW", "OSV:GHSA-CVM9-FJM9-3572", "OSV:GHSA-CW6W-Q88J-6MQF", "OSV:GHSA-F268-65QC-98VG", "OSV:GHSA-F62V-XPXF-3V68", "OSV:GHSA-F6VF-PQ8C-69M4", "OSV:GHSA-F93P-F762-VR53", "OSV:GHSA-F9XH-2QGP-CQ57", "OSV:GHSA-FXPH-Q3J8-MV87", "OSV:GHSA-G3WG-6MCF-8JJ6", "OSV:GHSA-GQ28-H5VG-8PRX", "OSV:GHSA-GXR4-XJJ5-5PX2", "OSV:GHSA-H3CW-G4MQ-C5X2", "OSV:GHSA-H79P-32MX-FJJ9", "OSV:GHSA-H9GJ-RQRW-X4FQ", "OSV:GHSA-HF23-9PF7-388P", "OSV:GHSA-HPCF-8VF9-Q4GJ", "OSV:GHSA-HWJ3-M3P6-HJ38", "OSV:GHSA-HWPC-8XQV-JVJ4", "OSV:GHSA-HWVM-VFW8-93MW", "OSV:GHSA-J823-4QCH-3RGM", "OSV:GHSA-JC35-Q369-45PV", "OSV:GHSA-JGWR-3QM3-26F3", "OSV:GHSA-JJPQ-GP5Q-8Q6W", "OSV:GHSA-JPCQ-CGW6-V4J6", "OSV:GHSA-JQ65-29V4-4X35", "OSV:GHSA-M394-8RWW-3JR7", "OSV:GHSA-M6VM-8G8V-XFJH", "OSV:GHSA-M6X4-97WX-4Q27", "OSV:GHSA-M7JV-HQ7H-MQ7C", "OSV:GHSA-MC6H-4QGP-37QH", "OSV:GHSA-MM9X-G8PC-W292", "OSV:GHSA-MW36-7C6C-Q4Q2", "OSV:GHSA-MX7P-6679-8G3Q", "OSV:GHSA-P6MC-M468-83GW", "OSV:GHSA-PJ7M-G53M-7638", "OSV:GHSA-Q446-82VQ-W674", "OSV:GHSA-Q44V-XC3G-V7JQ", "OSV:GHSA-Q4HG-RMQ2-52Q9", "OSV:GHSA-Q6GQ-997W-F55G", "OSV:GHSA-Q799-Q27X-VP7W", "OSV:GHSA-QGM6-9472-PWQ7", "OSV:GHSA-QJW2-HR98-QGFH", "OSV:GHSA-QWWR-QC2P-6283", "OSV:GHSA-R28M-G6J9-R2H5", "OSV:GHSA-R3GR-CXRF-HG25", "OSV:GHSA-R695-7VR9-JGC2", "OSV:GHSA-RCJJ-H6GH-JF3R", "OSV:GHSA-RV39-3QH7-9V7W", "OSV:GHSA-RVWF-54QP-4R6V", "OSV:GHSA-V585-23HC-C647", "OSV:GHSA-V73W-R9XG-7CR9", "OSV:GHSA-V8J6-6C2R-R27C", "OSV:GHSA-VCJF-MGCG-JXJQ", "OSV:GHSA-VF77-8H7G-GGHP", "OSV:GHSA-VFQX-33QM-G869", "OSV:GHSA-VVW4-RFWF-P6HX", "OSV:GHSA-VWQQ-5VRC-XW9H", "OSV:GHSA-WGX7-JWWM-CGJV", "OSV:GHSA-WH8G-3J2C-RQJ5", "OSV:GHSA-WP4H-PVGW-5727", "OSV:GHSA-WQFH-9M4G-7X6X", "OSV:GHSA-X3RH-M7VP-35F2", "OSV:GHSA-XC67-HJX6-CGG6", "OSV:GHSA-XQJ7-J8J5-F2XR", "OSV:GO-2021-0140", "OSV:GO-2021-0141", "OSV:GO-2021-0142", "OSV:GO-2021-0143", "OSV:GO-2021-0223", "OSV:GO-2021-0224", "OSV:GO-2021-0225", "OSV:GO-2021-0226", "OSV:GO-2022-0229", "OSV:PYSEC-2020-95", "OSV:PYSEC-2021-4", "OSV:RUSTSEC-2020-0015", "OSV:RUSTSEC-2021-0055", "OSV:RUSTSEC-2021-0056", "OSV:RUSTSEC-2021-0057", "OSV:RUSTSEC-2021-0058"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152462", "PACKETSTORM:152663", "PACKETSTORM:153506", "PACKETSTORM:159049", "PACKETSTORM:160108", "PACKETSTORM:160127", "PACKETSTORM:160721", "PACKETSTORM:162159", "PACKETSTORM:162160", "PACKETSTORM:163457", "PACKETSTORM:170373", "PACKETSTORM:171344", "PACKETSTORM:174448"]}, {"type": "paloalto", "idList": ["PA-CVE-2020-10188", "PA-CVE-2020-1968"]}, {"type": "pentestpartners", "idList": ["PENTESTPARTNERS:8FD1C9A0D76A3084445136A0275847C0"]}, {"type": "photon", "idList": ["PHSA-2019-0014", "PHSA-2019-0015", "PHSA-2019-0021", "PHSA-2019-0024", "PHSA-2019-0026", "PHSA-2019-0035", "PHSA-2019-0036", "PHSA-2019-0041", "PHSA-2019-0046", "PHSA-2019-0128", "PHSA-2019-0160", "PHSA-2019-0161", "PHSA-2019-0165", "PHSA-2019-0171", "PHSA-2019-0178", "PHSA-2019-0189", "PHSA-2019-0194", "PHSA-2019-0206", "PHSA-2019-0224", "PHSA-2019-0234", "PHSA-2019-0235", "PHSA-2019-0240", "PHSA-2019-0244", "PHSA-2019-0247", "PHSA-2019-0250", "PHSA-2019-0251", "PHSA-2019-0253", "PHSA-2019-0262", "PHSA-2019-1.0-0206", "PHSA-2019-1.0-0224", "PHSA-2019-1.0-0234", "PHSA-2019-1.0-0235", "PHSA-2019-1.0-0238", "PHSA-2019-1.0-0244", "PHSA-2019-1.0-0247", "PHSA-2019-1.0-0248", "PHSA-2019-1.0-0251", "PHSA-2019-1.0-0253", "PHSA-2019-1.0-0262", "PHSA-2019-2.0-0160", "PHSA-2019-2.0-0161", "PHSA-2019-2.0-0171", "PHSA-2019-2.0-0178", "PHSA-2019-2.0-0189", "PHSA-2019-3.0-0014", "PHSA-2019-3.0-0015", "PHSA-2019-3.0-0021", "PHSA-2019-3.0-0024", "PHSA-2019-3.0-0026", "PHSA-2019-3.0-0035", "PHSA-2019-3.0-0036", "PHSA-2019-3.0-0041", "PHSA-2019-3.0-0046", "PHSA-2020-0048", "PHSA-2020-0052", "PHSA-2020-0054", "PHSA-2020-0079", "PHSA-2020-0081", "PHSA-2020-0082", "PHSA-2020-0083", "PHSA-2020-0087", "PHSA-2020-0093", "PHSA-2020-0099", "PHSA-2020-0100", "PHSA-2020-0101", "PHSA-2020-0104", "PHSA-2020-0113", "PHSA-2020-0116", "PHSA-2020-0127", "PHSA-2020-0130", "PHSA-2020-0141", "PHSA-2020-0142", "PHSA-2020-0153", "PHSA-2020-0155", "PHSA-2020-0161", "PHSA-2020-0174", "PHSA-2020-0175", "PHSA-2020-0180", "PHSA-2020-0203", "PHSA-2020-0204", "PHSA-2020-0212", "PHSA-2020-0219", "PHSA-2020-0225", "PHSA-2020-0228", "PHSA-2020-0231", "PHSA-2020-0233", "PHSA-2020-0234", "PHSA-2020-0238", "PHSA-2020-0239", "PHSA-2020-0244", "PHSA-2020-0245", "PHSA-2020-0246", "PHSA-2020-0247", "PHSA-2020-0248", "PHSA-2020-0249", "PHSA-2020-0254", "PHSA-2020-0261", "PHSA-2020-0264", "PHSA-2020-0274", "PHSA-2020-0279", "PHSA-2020-0289", "PHSA-2020-0290", "PHSA-2020-0292", "PHSA-2020-0295", "PHSA-2020-0297", "PHSA-2020-0298", "PHSA-2020-0301", "PHSA-2020-0302", "PHSA-2020-0305", "PHSA-2020-0308", "PHSA-2020-0309", "PHSA-2020-0314", "PHSA-2020-0316", "PHSA-2020-0324", "PHSA-2020-0325", "PHSA-2020-0335", "PHSA-2020-0338", "PHSA-2020-0345", "PHSA-2020-0346", "PHSA-2020-0350", "PHSA-2020-1.0-0264", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0289", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0295", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0301", "PHSA-2020-1.0-0302", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0308", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0314", "PHSA-2020-1.0-0316", "PHSA-2020-1.0-0324", "PHSA-2020-1.0-0335", "PHSA-2020-1.0-0338", "PHSA-2020-1.0-0345", "PHSA-2020-1.0-0346", "PHSA-2020-1.0-0350", "PHSA-2020-2.0-0201", "PHSA-2020-2.0-0204", "PHSA-2020-2.0-0225", "PHSA-2020-2.0-0227", "PHSA-2020-2.0-0228", "PHSA-2020-2.0-0231", "PHSA-2020-2.0-0233", "PHSA-2020-2.0-0234", "PHSA-2020-2.0-0238", "PHSA-2020-2.0-0244", "PHSA-2020-2.0-0245", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0247", "PHSA-2020-2.0-0248", "PHSA-2020-2.0-0249", "PHSA-2020-2.0-0254", "PHSA-2020-2.0-0261", "PHSA-2020-2.0-0265", "PHSA-2020-2.0-0272", "PHSA-2020-2.0-0276", "PHSA-2020-2.0-0284", "PHSA-2020-2.0-0288", "PHSA-2020-2.0-0291", "PHSA-2020-2.0-0295", "PHSA-2020-2.0-0304", "PHSA-2020-3.0-0048", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0054", "PHSA-2020-3.0-0079", "PHSA-2020-3.0-0081", "PHSA-2020-3.0-0082", "PHSA-2020-3.0-0083", "PHSA-2020-3.0-0087", "PHSA-2020-3.0-0093", "PHSA-2020-3.0-0099", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0101", "PHSA-2020-3.0-0104", "PHSA-2020-3.0-0113", "PHSA-2020-3.0-0116", "PHSA-2020-3.0-0118", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0130", "PHSA-2020-3.0-0141", "PHSA-2020-3.0-0142", "PHSA-2020-3.0-0153", "PHSA-2020-3.0-0155", "PHSA-2020-3.0-0161", "PHSA-2020-3.0-0174", "PHSA-2020-3.0-0175", "PHSA-2020-3.0-0180", "PHSA-2021-0006", "PHSA-2021-0007", "PHSA-2021-0018", "PHSA-2021-0036", "PHSA-2021-0197", "PHSA-2021-0200", "PHSA-2021-0204", "PHSA-2021-0209", "PHSA-2021-0210", "PHSA-2021-0227", "PHSA-2021-0231", "PHSA-2021-0248", "PHSA-2021-0308", "PHSA-2021-0325", "PHSA-2021-0327", "PHSA-2021-0330", "PHSA-2021-0331", "PHSA-2021-0337", "PHSA-2021-0343", "PHSA-2021-0366", "PHSA-2021-0373", "PHSA-2021-0390", "PHSA-2021-0422", "PHSA-2021-0455", "PHSA-2021-1.0-0366", "PHSA-2021-1.0-0373", "PHSA-2021-1.0-0378", "PHSA-2021-1.0-0390", "PHSA-2021-2.0-0308", "PHSA-2021-2.0-0323", "PHSA-2021-2.0-0325", "PHSA-2021-2.0-0327", "PHSA-2021-2.0-0330", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0337", "PHSA-2021-3.0-0197", "PHSA-2021-3.0-0200", "PHSA-2021-3.0-0204", "PHSA-2021-3.0-0209", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0227", "PHSA-2021-3.0-0231", "PHSA-2021-3.0-0248", "PHSA-2021-3.0-0342", "PHSA-2021-4.0-0006", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0018", "PHSA-2021-4.0-0036", "PHSA-2021-4.0-0139", "PHSA-2022-0216", "PHSA-2022-0476", "PHSA-2022-3.0-0342", "PHSA-2022-4.0-0216", "PHSA-2023-3.0-0602", "PHSA-2023-3.0-0603", "PHSA-2023-4.0-0413", "PHSA-2023-4.0-0415", "PHSA-2023-5.0-0033", "PHSA-2023-5.0-0041"]}, {"type": "prion", "idList": ["PRION:CVE-2020-10188", "PRION:CVE-2020-10543", "PRION:CVE-2020-10683", "PRION:CVE-2020-10751", "PRION:CVE-2020-10769", "PRION:CVE-2020-10878", "PRION:CVE-2020-11022", "PRION:CVE-2020-11023", "PRION:CVE-2020-11612", "PRION:CVE-2020-11655", "PRION:CVE-2020-11656", "PRION:CVE-2020-11973", "PRION:CVE-2020-11979", "PRION:CVE-2020-11987", "PRION:CVE-2020-11994", "PRION:CVE-2020-11998", "PRION:CVE-2020-12114", "PRION:CVE-2021-2008", "PRION:CVE-2021-20227", "PRION:CVE-2021-2053", "PRION:CVE-2021-21290", "PRION:CVE-2021-2134", "PRION:CVE-2021-21345", "PRION:CVE-2021-2135", "PRION:CVE-2021-2136", "PRION:CVE-2021-2140", "PRION:CVE-2021-2141", "PRION:CVE-2021-2142", "PRION:CVE-2021-2144", "PRION:CVE-2021-2145", "PRION:CVE-2021-2146", "PRION:CVE-2021-2147", "PRION:CVE-2021-2149", "PRION:CVE-2021-2150", "PRION:CVE-2021-2151", "PRION:CVE-2021-2152", "PRION:CVE-2021-2153", "PRION:CVE-2021-2154", "PRION:CVE-2021-2155", "PRION:CVE-2021-2156", "PRION:CVE-2021-2157", "PRION:CVE-2021-2158", "PRION:CVE-2021-2159", "PRION:CVE-2021-2160", "PRION:CVE-2021-2161", "PRION:CVE-2021-2162", "PRION:CVE-2021-2163", "PRION:CVE-2021-2164", "PRION:CVE-2021-2166", "PRION:CVE-2021-2167", "PRION:CVE-2021-2169", "PRION:CVE-2021-2170", "PRION:CVE-2021-2171", "PRION:CVE-2021-2172", "PRION:CVE-2021-2173", "PRION:CVE-2021-2174", "PRION:CVE-2021-2175", "PRION:CVE-2021-2177", "PRION:CVE-2021-2178", "PRION:CVE-2021-2179", "PRION:CVE-2021-2180", "PRION:CVE-2021-2181", "PRION:CVE-2021-2182", "PRION:CVE-2021-2183", "PRION:CVE-2021-2184", "PRION:CVE-2021-2185", "PRION:CVE-2021-2186", "PRION:CVE-2021-2187", "PRION:CVE-2021-2188", "PRION:CVE-2021-2189", "PRION:CVE-2021-2190", "PRION:CVE-2021-2191", "PRION:CVE-2021-2192", "PRION:CVE-2021-2193", "PRION:CVE-2021-2194", "PRION:CVE-2021-2195", "PRION:CVE-2021-2196", "PRION:CVE-2021-2197", "PRION:CVE-2021-2198", "PRION:CVE-2021-2199", "PRION:CVE-2021-2200", "PRION:CVE-2021-2201", "PRION:CVE-2021-2202", "PRION:CVE-2021-2203", "PRION:CVE-2021-2204", "PRION:CVE-2021-2205", "PRION:CVE-2021-2206", "PRION:CVE-2021-2207", "PRION:CVE-2021-2208", "PRION:CVE-2021-2209", "PRION:CVE-2021-2210", "PRION:CVE-2021-2211", "PRION:CVE-2021-22112", "PRION:CVE-2021-2212", "PRION:CVE-2021-2213", "PRION:CVE-2021-2214", "PRION:CVE-2021-2215", "PRION:CVE-2021-2216", "PRION:CVE-2021-2217", "PRION:CVE-2021-22173", "PRION:CVE-2021-22174", "PRION:CVE-2021-2218", "PRION:CVE-2021-2219", "PRION:CVE-2021-22191", "PRION:CVE-2021-2220", "PRION:CVE-2021-2221", "PRION:CVE-2021-2222", "PRION:CVE-2021-2223", "PRION:CVE-2021-2224", "PRION:CVE-2021-2225", "PRION:CVE-2021-2226", "PRION:CVE-2021-2227", "PRION:CVE-2021-2228", "PRION:CVE-2021-2229", "PRION:CVE-2021-2230", "PRION:CVE-2021-2231", "PRION:CVE-2021-2232", "PRION:CVE-2021-2233", "PRION:CVE-2021-2234", "PRION:CVE-2021-2235", "PRION:CVE-2021-2236", "PRION:CVE-2021-2237", "PRION:CVE-2021-2238", "PRION:CVE-2021-2239", "PRION:CVE-2021-2240", "PRION:CVE-2021-2241", "PRION:CVE-2021-2242", "PRION:CVE-2021-2244", "PRION:CVE-2021-2245", "PRION:CVE-2021-2246", "PRION:CVE-2021-2247", "PRION:CVE-2021-2248", "PRION:CVE-2021-2249", "PRION:CVE-2021-2250", "PRION:CVE-2021-2251", "PRION:CVE-2021-2252", "PRION:CVE-2021-2253", "PRION:CVE-2021-2254", "PRION:CVE-2021-2255", "PRION:CVE-2021-2256", "PRION:CVE-2021-2257", "PRION:CVE-2021-2258", "PRION:CVE-2021-2259", "PRION:CVE-2021-2260", "PRION:CVE-2021-2261", "PRION:CVE-2021-2262", "PRION:CVE-2021-2263", "PRION:CVE-2021-2264", "PRION:CVE-2021-2266", "PRION:CVE-2021-2267", "PRION:CVE-2021-2268", "PRION:CVE-2021-2269", "PRION:CVE-2021-2270", "PRION:CVE-2021-2271", "PRION:CVE-2021-2272", "PRION:CVE-2021-2273", "PRION:CVE-2021-2274", "PRION:CVE-2021-2275", "PRION:CVE-2021-2276", "PRION:CVE-2021-2277", "PRION:CVE-2021-2278", "PRION:CVE-2021-2279", "PRION:CVE-2021-2280", "PRION:CVE-2021-2281", "PRION:CVE-2021-2282", "PRION:CVE-2021-2283", "PRION:CVE-2021-2284", "PRION:CVE-2021-2285", "PRION:CVE-2021-2286", "PRION:CVE-2021-2287", "PRION:CVE-2021-2288", "PRION:CVE-2021-22883", "PRION:CVE-2021-22884", "PRION:CVE-2021-2289", "PRION:CVE-2021-2290", "PRION:CVE-2021-2291", "PRION:CVE-2021-2292", "PRION:CVE-2021-2293", "PRION:CVE-2021-2294", "PRION:CVE-2021-2295", "PRION:CVE-2021-2296", "PRION:CVE-2021-2297", "PRION:CVE-2021-2298", "PRION:CVE-2021-2299", "PRION:CVE-2021-2300", "PRION:CVE-2021-2301", "PRION:CVE-2021-2302", "PRION:CVE-2021-2303", "PRION:CVE-2021-2304", "PRION:CVE-2021-2305", "PRION:CVE-2021-2306", "PRION:CVE-2021-2307", "PRION:CVE-2021-2308", "PRION:CVE-2021-2309", "PRION:CVE-2021-2310", "PRION:CVE-2021-2311", "PRION:CVE-2021-2312", "PRION:CVE-2021-2314", "PRION:CVE-2021-2315", "PRION:CVE-2021-2316", "PRION:CVE-2021-2317", "PRION:CVE-2021-2318", "PRION:CVE-2021-2319", "PRION:CVE-2021-2320", "PRION:CVE-2021-2321", "PRION:CVE-2021-23336", "PRION:CVE-2021-23839", "PRION:CVE-2021-23840", "PRION:CVE-2021-23841", "PRION:CVE-2021-25329", "PRION:CVE-2021-28359", "PRION:CVE-2021-29482", "PRION:CVE-2021-31805", "PRION:CVE-2021-3449", "PRION:CVE-2021-3450", "PRION:CVE-2021-40491", "PRION:CVE-2021-44028", "PRION:CVE-2022-23181", "PRION:CVE-2022-24823", "PRION:CVE-2022-39950", "PRION:CVE-2023-32711"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:01C65083E501A6BAFB08FCDA1D561012", "QUALYSBLOG:192411B44569225E2F2632594DC4308C", "QUALYSBLOG:1D4C1F32168D08F694C602531AEBC9D9", "QUALYSBLOG:282A52EA9B1F4C4F3F084197709217B0", "QUALYSBLOG:3B1C0CD4DA2F528B07C93411EA447658", "QUALYSBLOG:5A5094DBFA525D07EBC3EBA036CDF81A", "QUALYSBLOG:6652DB89D03D8AA145C2F888B5590E3F", "QUALYSBLOG:6AFD8E9AB405FBE460877D857273A9AF", "QUALYSBLOG:8DC9B53E981BBE193F6EC369D7FA85F8", "QUALYSBLOG:9D071EBE42634FFBB58CB68A83252B41", "QUALYSBLOG:A730164ABD0AA0A58D62EAFAB48628AD", "QUALYSBLOG:BC22CE22A3E70823D5F0E944CBD5CE4A", "QUALYSBLOG:CAF5B766E6B0E6C1A5ADF56D442E7BB2", "QUALYSBLOG:CD2337322AF45A03293696D535E4CBF8", "QUALYSBLOG:DE1FEC2B9B661D42DAA0BA398DBFD24E", "QUALYSBLOG:FE0BAF7268104D525CC0A2ABC0471C4C"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:0C3EDBDC537092A20C850F762D5A5856", "RAPID7BLOG:24E0BE5176F6D3963E1824AD4A55019E", "RAPID7BLOG:44EA89871AFF6881B909B9FD0E07034F", "RAPID7BLOG:486F801929E1F794197FC08AE13E4CB5", "RAPID7BLOG:49C18614AD01B6865616A65F734B9F71", "RAPID7BLOG:5482AC1594C82A230828023816657B57", "RAPID7BLOG:5586742AC0F1C66F56B3583482B0960A", "RAPID7BLOG:73EAE8A2825E9B6764F314122B4E5F25", "RAPID7BLOG:88A83067D8D3C5AEBAF1B793818EEE53", "RAPID7BLOG:C628D3D68DF3AE5A40A1F0C9DFA38860"]}, {"type": "redhat", "idList": ["RHSA-2016:2932", "RHSA-2016:2933", "RHSA-2017:0161", "RHSA-2017:1417", "RHSA-2017:1801", "RHSA-2017:1802", "RHSA-2017:2423", "RHSA-2017:2492", "RHSA-2017:2633", "RHSA-2017:2635", "RHSA-2017:2636", "RHSA-2017:2637", "RHSA-2017:2638", "RHSA-2017:2808", "RHSA-2017:2809", "RHSA-2017:2810", "RHSA-2017:2811", "RHSA-2017:2888", "RHSA-2017:2889", "RHSA-2017:3115", "RHSA-2017:3244", "RHSA-2017:3399", "RHSA-2017:3400", "RHSA-2018:1322", "RHSA-2018:2423", "RHSA-2018:2424", "RHSA-2018:2425", "RHSA-2018:2428", "RHSA-2018:2643", "RHSA-2018:2669", "RHSA-2019:0362", "RHSA-2019:0364", "RHSA-2019:0365", "RHSA-2019:0380", "RHSA-2019:0877", "RHSA-2019:1159", "RHSA-2019:1160", "RHSA-2019:1161", "RHSA-2019:1162", "RHSA-2019:1265", "RHSA-2019:1267", "RHSA-2019:1269", "RHSA-2019:1308", "RHSA-2019:1309", "RHSA-2019:1310", "RHSA-2019:1456", "RHSA-2019:1545", "RHSA-2019:1712", "RHSA-2019:1822", "RHSA-2019:1823", "RHSA-2019:1873", "RHSA-2019:1891", "RHSA-2019:1973", "RHSA-2019:2029", "RHSA-2019:2043", "RHSA-2019:2494", "RHSA-2019:2495", "RHSA-2019:2585", "RHSA-2019:2587", "RHSA-2019:2590", "RHSA-2019:2592", "RHSA-2019:2696", "RHSA-2019:2703", "RHSA-2019:2730", "RHSA-2019:2737", "RHSA-2019:2741", "RHSA-2019:2743", "RHSA-2019:2858", "RHSA-2019:2935", "RHSA-2019:2936", "RHSA-2019:2937", "RHSA-2019:2938", "RHSA-2019:2998", "RHSA-2019:3023", "RHSA-2019:3024", "RHSA-2019:3044", "RHSA-2019:3045", "RHSA-2019:3046", "RHSA-2019:3050", "RHSA-2019:3149", "RHSA-2019:3172", "RHSA-2019:3200", "RHSA-2019:3220", "RHSA-2019:3292", "RHSA-2019:3297", "RHSA-2019:3309", "RHSA-2019:3517", "RHSA-2019:3836", "RHSA-2019:3892", "RHSA-2019:3901", "RHSA-2019:3929", "RHSA-2019:3931", "RHSA-2019:3967", "RHSA-2019:4058", "RHSA-2019:4317", "RHSA-2019:4352", "RHSA-2020:0057", "RHSA-2020:0100", "RHSA-2020:0103", "RHSA-2020:0159", "RHSA-2020:0160", "RHSA-2020:0161", "RHSA-2020:0164", "RHSA-2020:0174", "RHSA-2020:0179", "RHSA-2020:0192", "RHSA-2020:0194", "RHSA-2020:0204", "RHSA-2020:0328", "RHSA-2020:0339", "RHSA-2020:0374", "RHSA-2020:0375", "RHSA-2020:0445", "RHSA-2020:0543", "RHSA-2020:0556", "RHSA-2020:0592", "RHSA-2020:0609", "RHSA-2020:0653", "RHSA-2020:0661", "RHSA-2020:0664", "RHSA-2020:0727", "RHSA-2020:0790", "RHSA-2020:0804", "RHSA-2020:0805", "RHSA-2020:0806", "RHSA-2020:0811", "RHSA-2020:0824", "RHSA-2020:0834", "RHSA-2020:0839", "RHSA-2020:0860", "RHSA-2020:0861", "RHSA-2020:0895", "RHSA-2020:0899", "RHSA-2020:0922", "RHSA-2020:0939", "RHSA-2020:0951", "RHSA-2020:0983", "RHSA-2020:1016", "RHSA-2020:1070", "RHSA-2020:1308", "RHSA-2020:1318", "RHSA-2020:1325", "RHSA-2020:1334", "RHSA-2020:1335", "RHSA-2020:1336", "RHSA-2020:1337", "RHSA-2020:1342", "RHSA-2020:1349", "RHSA-2020:1422", "RHSA-2020:1445", "RHSA-2020:1454", "RHSA-2020:1493", "RHSA-2020:1538", "RHSA-2020:1567", "RHSA-2020:1644", "RHSA-2020:1769", "RHSA-2020:2058", "RHSA-2020:2059", "RHSA-2020:2060", "RHSA-2020:2061", "RHSA-2020:2067", "RHSA-2020:2112", "RHSA-2020:2217", "RHSA-2020:2263", "RHSA-2020:2321", "RHSA-2020:2333", "RHSA-2020:2362", "RHSA-2020:2391", "RHSA-2020:2412", "RHSA-2020:2483", "RHSA-2020:2487", "RHSA-2020:2506", "RHSA-2020:2509", "RHSA-2020:2511", "RHSA-2020:2512", "RHSA-2020:2513", "RHSA-2020:2515", "RHSA-2020:2522", "RHSA-2020:2529", "RHSA-2020:2530", "RHSA-2020:2603", "RHSA-2020:2605", "RHSA-2020:2618", "RHSA-2020:2619", "RHSA-2020:2644", "RHSA-2020:2646", "RHSA-2020:2740", "RHSA-2020:2751", "RHSA-2020:2813", "RHSA-2020:2851", "RHSA-2020:2854", "RHSA-2020:2905", "RHSA-2020:3017", "RHSA-2020:3133", "RHSA-2020:3192", "RHSA-2020:3196", "RHSA-2020:3197", "RHSA-2020:3230", "RHSA-2020:3247", "RHSA-2020:3266", "RHSA-2020:3303", "RHSA-2020:3305", "RHSA-2020:3306", "RHSA-2020:3308", "RHSA-2020:3369", "RHSA-2020:3382", "RHSA-2020:3383", "RHSA-2020:3461", "RHSA-2020:3462", "RHSA-2020:3463", "RHSA-2020:3464", "RHSA-2020:3501", "RHSA-2020:3518", "RHSA-2020:3545", "RHSA-2020:3585", "RHSA-2020:3587", "RHSA-2020:3626", "RHSA-2020:3637", "RHSA-2020:3638", "RHSA-2020:3639", "RHSA-2020:3642", "RHSA-2020:3662", "RHSA-2020:3665", "RHSA-2020:3730", "RHSA-2020:3731", "RHSA-2020:3732", "RHSA-2020:3755", "RHSA-2020:3757", "RHSA-2020:3779", "RHSA-2020:3806", "RHSA-2020:3807", "RHSA-2020:3808", "RHSA-2020:3817", "RHSA-2020:3841", "RHSA-2020:3936", "RHSA-2020:3952", "RHSA-2020:3958", "RHSA-2020:4004", "RHSA-2020:4026", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4173", "RHSA-2020:4182", "RHSA-2020:4201", "RHSA-2020:4211", "RHSA-2020:4214", "RHSA-2020:4220", "RHSA-2020:4223", "RHSA-2020:4252", "RHSA-2020:4254", "RHSA-2020:4255", "RHSA-2020:4264", "RHSA-2020:4279", "RHSA-2020:4297", "RHSA-2020:4298", "RHSA-2020:4312", "RHSA-2020:4366", "RHSA-2020:4379", "RHSA-2020:4383", "RHSA-2020:4384", "RHSA-2020:4401", "RHSA-2020:4402", "RHSA-2020:4431", "RHSA-2020:4442", "RHSA-2020:4484", "RHSA-2020:4514", "RHSA-2020:4609", "RHSA-2020:4670", "RHSA-2020:4751", "RHSA-2020:4807", "RHSA-2020:4846", "RHSA-2020:4847", "RHSA-2020:4960", "RHSA-2020:4961", "RHSA-2020:5118", "RHSA-2020:5119", "RHSA-2020:5149", "RHSA-2020:5159", "RHSA-2020:5168", "RHSA-2020:5179", "RHSA-2020:5246", "RHSA-2020:5249", "RHSA-2020:5275", "RHSA-2020:5305", "RHSA-2020:5340", "RHSA-2020:5341", "RHSA-2020:5342", "RHSA-2020:5344", "RHSA-2020:5361", "RHSA-2020:5364", "RHSA-2020:5365", "RHSA-2020:5410", "RHSA-2020:5412", "RHSA-2020:5418", "RHSA-2020:5422", "RHSA-2020:5428", "RHSA-2020:5437", "RHSA-2020:5439", "RHSA-2020:5441", "RHSA-2020:5473", "RHSA-2020:5476", "RHSA-2020:5493", "RHSA-2020:5499", "RHSA-2020:5500", "RHSA-2020:5506", "RHSA-2020:5533", "RHSA-2020:5566", "RHSA-2020:5568", "RHSA-2020:5571", "RHSA-2020:5581", "RHSA-2020:5588", "RHSA-2020:5605", "RHSA-2020:5606", "RHSA-2020:5611", "RHSA-2020:5614", "RHSA-2020:5623", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2020:5637", "RHSA-2020:5639", "RHSA-2020:5640", "RHSA-2020:5641", "RHSA-2020:5642", "RHSA-2020:5649", "RHSA-2020:5654", "RHSA-2020:5663", "RHSA-2020:5665", "RHSA-2021:0037", "RHSA-2021:0039", "RHSA-2021:0050", "RHSA-2021:0056", "RHSA-2021:0072", "RHSA-2021:0083", "RHSA-2021:0084", "RHSA-2021:0105", "RHSA-2021:0106", "RHSA-2021:0145", "RHSA-2021:0146", "RHSA-2021:0162", "RHSA-2021:0172", "RHSA-2021:0184", "RHSA-2021:0187", "RHSA-2021:0190", "RHSA-2021:0246", "RHSA-2021:0247", "RHSA-2021:0248", "RHSA-2021:0250", "RHSA-2021:0327", "RHSA-2021:0329", "RHSA-2021:0343", "RHSA-2021:0381", "RHSA-2021:0384", "RHSA-2021:0417", "RHSA-2021:0421", "RHSA-2021:0423", "RHSA-2021:0429", "RHSA-2021:0433", "RHSA-2021:0436", "RHSA-2021:0486", "RHSA-2021:0488", "RHSA-2021:0489", "RHSA-2021:0491", "RHSA-2021:0494", "RHSA-2021:0495", "RHSA-2021:0521", "RHSA-2021:0526", "RHSA-2021:0548", "RHSA-2021:0551", "RHSA-2021:0557", "RHSA-2021:0603", "RHSA-2021:0607", "RHSA-2021:0637", "RHSA-2021:0713", "RHSA-2021:0719", "RHSA-2021:0734", "RHSA-2021:0735", "RHSA-2021:0738", "RHSA-2021:0739", "RHSA-2021:0740", "RHSA-2021:0741", "RHSA-2021:0744", "RHSA-2021:0760", "RHSA-2021:0778", "RHSA-2021:0779", "RHSA-2021:0780", "RHSA-2021:0799", "RHSA-2021:0811", "RHSA-2021:0827", "RHSA-2021:0830", "RHSA-2021:0831", "RHSA-2021:0860", "RHSA-2021:0872", "RHSA-2021:0873", "RHSA-2021:0874", "RHSA-2021:0878", "RHSA-2021:0883", "RHSA-2021:0885", "RHSA-2021:0943", "RHSA-2021:0949", "RHSA-2021:0956", "RHSA-2021:0974", "RHSA-2021:0986", "RHSA-2021:1016", "RHSA-2021:1024", "RHSA-2021:1032", "RHSA-2021:1044", "RHSA-2021:1063", "RHSA-2021:1079", "RHSA-2021:1129", "RHSA-2021:1131", "RHSA-2021:1168", "RHSA-2021:1189", "RHSA-2021:1195", "RHSA-2021:1196", "RHSA-2021:1199", "RHSA-2021:1200", "RHSA-2021:1202", "RHSA-2021:1203", "RHSA-2021:1230", "RHSA-2021:1260", "RHSA-2021:1266", "RHSA-2021:1297", "RHSA-2021:1298", "RHSA-2021:1299", "RHSA-2021:1301", "RHSA-2021:1305", "RHSA-2021:1306", "RHSA-2021:1307", "RHSA-2021:1313", "RHSA-2021:1315", "RHSA-2021:1338", "RHSA-2021:1354", "RHSA-2021:1366", "RHSA-2021:1369", "RHSA-2021:1401", "RHSA-2021:1429", "RHSA-2021:1444", "RHSA-2021:1445", "RHSA-2021:1446", "RHSA-2021:1447", "RHSA-2021:1448", "RHSA-2021:1511", "RHSA-2021:1515", "RHSA-2021:1578", "RHSA-2021:1581", "RHSA-2021:1593", "RHSA-2021:1610", "RHSA-2021:1633", "RHSA-2021:1647", "RHSA-2021:1678", "RHSA-2021:1739", "RHSA-2021:1846", "RHSA-2021:1968", "RHSA-2021:2021", "RHSA-2021:2039", "RHSA-2021:2041", "RHSA-2021:2046", "RHSA-2021:2047", "RHSA-2021:2048", "RHSA-2021:2051", "RHSA-2021:2053", "RHSA-2021:2070", "RHSA-2021:2121", "RHSA-2021:2122", "RHSA-2021:2130", "RHSA-2021:2136", "RHSA-2021:2139", "RHSA-2021:2184", "RHSA-2021:2185", "RHSA-2021:2190", "RHSA-2021:2210", "RHSA-2021:2239", "RHSA-2021:2431", "RHSA-2021:2438", "RHSA-2021:2461", "RHSA-2021:2471", "RHSA-2021:2472", "RHSA-2021:2475", "RHSA-2021:2476", "RHSA-2021:2479", "RHSA-2021:2499", "RHSA-2021:2517", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:2561", "RHSA-2021:2562", "RHSA-2021:2689", "RHSA-2021:2705", "RHSA-2021:2755", "RHSA-2021:2792", "RHSA-2021:2920", "RHSA-2021:2992", "RHSA-2021:3016", "RHSA-2021:3119", "RHSA-2021:3140", "RHSA-2021:3205", "RHSA-2021:3207", "RHSA-2021:3225", "RHSA-2021:3252", "RHSA-2021:3254", "RHSA-2021:3259", "RHSA-2021:3425", "RHSA-2021:3556", "RHSA-2021:3590", "RHSA-2021:3700", "RHSA-2021:3723", "RHSA-2021:3798", "RHSA-2021:3811", "RHSA-2021:3873", "RHSA-2021:3880", "RHSA-2021:3917", "RHSA-2021:3925", "RHSA-2021:3949", "RHSA-2021:4012", "RHSA-2021:4032", "RHSA-2021:4100", "RHSA-2021:4103", "RHSA-2021:4142", "RHSA-2021:4151", "RHSA-2021:4162", "RHSA-2021:4198", "RHSA-2021:4213", "RHSA-2021:4251", "RHSA-2021:4396", "RHSA-2021:4424", "RHSA-2021:4613", "RHSA-2021:4614", "RHSA-2021:4627", "RHSA-2021:4702", "RHSA-2021:4767", "RHSA-2021:4845", "RHSA-2021:4848", "RHSA-2021:4861", "RHSA-2021:4863", "RHSA-2021:4902", "RHSA-2021:4914", "RHSA-2021:4918", "RHSA-2021:5038", "RHSA-2021:5127", "RHSA-2021:5128", "RHSA-2021:5129", "RHSA-2021:5134", "RHSA-2021:5137", "RHSA-2022:0011", "RHSA-2022:0056", "RHSA-2022:0158", "RHSA-2022:0190", "RHSA-2022:0202", "RHSA-2022:0318", "RHSA-2022:0434", "RHSA-2022:0497", "RHSA-2022:0507", "RHSA-2022:0580", "RHSA-2022:0722", "RHSA-2022:0842", "RHSA-2022:0856", "RHSA-2022:1007", "RHSA-2022:1010", "RHSA-2022:1013", "RHSA-2022:1029", "RHSA-2022:1081", "RHSA-2022:1108", "RHSA-2022:1110", "RHSA-2022:1396", "RHSA-2022:1556", "RHSA-2022:1557", "RHSA-2022:1860", "RHSA-2022:1861", "RHSA-2022:4818", "RHSA-2022:5053", "RHSA-2022:5069", "RHSA-2022:5070", "RHSA-2022:5458", "RHSA-2022:5459", "RHSA-2022:5460", "RHSA-2022:5498", "RHSA-2022:5532", "RHSA-2022:5924", "RHSA-2022:6393", "RHSA-2022:6407", "RHSA-2022:6429", "RHSA-2022:6526", "RHSA-2022:6735", "RHSA-2022:6755", "RHSA-2022:6756", "RHSA-2022:7343", "RHSA-2022:8652", "RHSA-2022:8848", "RHSA-2022:8865", "RHSA-2023:0552", "RHSA-2023:0553", "RHSA-2023:0554", "RHSA-2023:0556", "RHSA-2023:1043", "RHSA-2023:1044", "RHSA-2023:1045", "RHSA-2023:1047", "RHSA-2023:1049", "RHSA-2023:3954"]}, {"type": "redhatcve", "idList": ["RH:CVE-2016-7103", "RH:CVE-2017-1000061", "RH:CVE-2017-12626", "RH:CVE-2017-18640", "RH:CVE-2017-5645", "RH:CVE-2018-1000180", "RH:CVE-2018-1000613", "RH:CVE-2018-1000632", "RH:CVE-2018-14040", "RH:CVE-2018-14041", "RH:CVE-2018-14042", "RH:CVE-2018-14550", "RH:CVE-2018-14613", "RH:CVE-2018-16884", "RH:CVE-2018-20843", "RH:CVE-2018-8032", "RH:CVE-2019-0221", "RH:CVE-2019-0227", "RH:CVE-2019-0228", "RH:CVE-2019-0230", "RH:CVE-2019-0232", "RH:CVE-2019-0233", "RH:CVE-2019-10072", "RH:CVE-2019-10086", "RH:CVE-2019-10098", "RH:CVE-2019-10173", "RH:CVE-2019-10202", "RH:CVE-2019-10246", "RH:CVE-2019-10247", "RH:CVE-2019-10638", "RH:CVE-2019-10639", "RH:CVE-2019-11358", "RH:CVE-2019-11487", "RH:CVE-2019-11599", "RH:CVE-2019-12086", "RH:CVE-2019-12399", "RH:CVE-2019-12402", "RH:CVE-2019-12406", "RH:CVE-2019-12415", "RH:CVE-2019-12419", "RH:CVE-2019-12423", "RH:CVE-2019-14379", "RH:CVE-2019-14898", "RH:CVE-2019-15218", "RH:CVE-2019-1551", "RH:CVE-2019-16746", "RH:CVE-2019-16942", "RH:CVE-2019-17075", "RH:CVE-2019-17133", "RH:CVE-2019-17195", "RH:CVE-2019-17566", "RH:CVE-2019-17571", "RH:CVE-2019-17573", "RH:CVE-2019-17632", "RH:CVE-2019-17638", "RH:CVE-2019-18885", "RH:CVE-2019-19052", "RH:CVE-2019-19063", "RH:CVE-2019-19066", "RH:CVE-2019-19073", "RH:CVE-2019-19074", "RH:CVE-2019-19078", "RH:CVE-2019-19535", "RH:CVE-2019-19922", "RH:CVE-2019-20812", "RH:CVE-2019-3773", "RH:CVE-2019-3874", "RH:CVE-2019-3892", "RH:CVE-2019-3900", "RH:CVE-2019-5063", "RH:CVE-2019-5064", "RH:CVE-2019-5108", "RH:CVE-2019-7317", "RH:CVE-2019-8331", "RH:CVE-2020-10188", "RH:CVE-2020-10543", "RH:CVE-2020-10683", "RH:CVE-2020-10751", "RH:CVE-2020-10769", "RH:CVE-2020-10878", "RH:CVE-2020-11022", "RH:CVE-2020-11023", "RH:CVE-2020-11612", "RH:CVE-2020-11655", "RH:CVE-2020-11656", "RH:CVE-2020-11973", "RH:CVE-2020-11979", "RH:CVE-2020-11987", "RH:CVE-2020-11994", "RH:CVE-2020-12114", "RH:CVE-2020-12723", "RH:CVE-2020-12771", "RH:CVE-2020-13434", "RH:CVE-2020-13435", "RH:CVE-2020-13871", "RH:CVE-2020-13934", "RH:CVE-2020-13935", "RH:CVE-2020-13943", "RH:CVE-2020-13954", "RH:CVE-2020-13956", "RH:CVE-2020-14060", "RH:CVE-2020-14061", "RH:CVE-2020-14062", "RH:CVE-2020-14195", "RH:CVE-2020-14384", "RH:CVE-2020-1472", "RH:CVE-2020-15358", "RH:CVE-2020-15586", "RH:CVE-2020-16166", "RH:CVE-2020-16845", "RH:CVE-2020-17521", "RH:CVE-2020-17527", "RH:CVE-2020-17530", "RH:CVE-2020-1927", "RH:CVE-2020-1941", "RH:CVE-2020-1945", "RH:CVE-2020-1967", "RH:CVE-2020-1968", "RH:CVE-2020-1971", "RH:CVE-2020-24394", "RH:CVE-2020-24553", "RH:CVE-2020-24616", "RH:CVE-2020-24750", "RH:CVE-2020-25649", "RH:CVE-2020-26217", "RH:CVE-2020-26418", "RH:CVE-2020-26419", "RH:CVE-2020-26420", "RH:CVE-2020-26421", "RH:CVE-2020-26422", "RH:CVE-2020-27216", "RH:CVE-2020-27218", "RH:CVE-2020-27223", "RH:CVE-2020-27841", "RH:CVE-2020-27842", "RH:CVE-2020-27843", "RH:CVE-2020-27844", "RH:CVE-2020-27845", "RH:CVE-2020-28052", "RH:CVE-2020-28196", "RH:CVE-2020-35490", "RH:CVE-2020-35491", "RH:CVE-2020-35728", "RH:CVE-2020-36179", "RH:CVE-2020-36180", "RH:CVE-2020-36181", "RH:CVE-2020-36182", "RH:CVE-2020-36183", "RH:CVE-2020-36184", "RH:CVE-2020-36185", "RH:CVE-2020-36186", "RH:CVE-2020-36187", "RH:CVE-2020-36188", "RH:CVE-2020-36189", "RH:CVE-2020-36242", "RH:CVE-2020-5398", "RH:CVE-2020-5421", "RH:CVE-2020-7059", "RH:CVE-2020-7060", "RH:CVE-2020-7069", "RH:CVE-2020-7760", "RH:CVE-2020-7774", "RH:CVE-2020-7919", "RH:CVE-2020-8203", "RH:CVE-2020-8277", "RH:CVE-2020-8284", "RH:CVE-2020-8285", "RH:CVE-2020-8286", "RH:CVE-2020-8908", "RH:CVE-2020-9281", "RH:CVE-2020-9327", "RH:CVE-2020-9480", "RH:CVE-2020-9484", "RH:CVE-2020-9488", "RH:CVE-2020-9489", "RH:CVE-2021-20227", "RH:CVE-2021-21290", "RH:CVE-2021-21345", "RH:CVE-2021-2144", "RH:CVE-2021-2146", "RH:CVE-2021-2154", "RH:CVE-2021-2160", "RH:CVE-2021-2161", "RH:CVE-2021-2162", "RH:CVE-2021-2163", "RH:CVE-2021-2164", "RH:CVE-2021-2166", "RH:CVE-2021-2169", "RH:CVE-2021-2170", "RH:CVE-2021-2171", "RH:CVE-2021-2172", "RH:CVE-2021-2174", "RH:CVE-2021-2178", "RH:CVE-2021-2179", "RH:CVE-2021-2180", "RH:CVE-2021-2193", "RH:CVE-2021-2194", "RH:CVE-2021-2196", "RH:CVE-2021-2201", "RH:CVE-2021-2202", "RH:CVE-2021-2203", "RH:CVE-2021-2208", "RH:CVE-2021-22112", "RH:CVE-2021-2212", "RH:CVE-2021-2213", "RH:CVE-2021-2215", "RH:CVE-2021-2217", "RH:CVE-2021-22173", "RH:CVE-2021-22174", "RH:CVE-2021-22191", "RH:CVE-2021-2226", "RH:CVE-2021-2230", "RH:CVE-2021-2232", "RH:CVE-2021-2278", "RH:CVE-2021-22883", "RH:CVE-2021-22884", "RH:CVE-2021-2293", "RH:CVE-2021-2298", "RH:CVE-2021-2299", "RH:CVE-2021-2300", "RH:CVE-2021-2301", "RH:CVE-2021-2304", "RH:CVE-2021-2305", "RH:CVE-2021-2307", "RH:CVE-2021-2308", "RH:CVE-2021-23336", "RH:CVE-2021-23839", "RH:CVE-2021-23840", "RH:CVE-2021-23841", "RH:CVE-2021-25329", "RH:CVE-2021-31805", "RH:CVE-2021-3449", "RH:CVE-2021-3450", "RH:CVE-2022-23181", "RH:CVE-2022-24823", "RH:CVE-2022-32212"]}, {"type": "rhino", "idList": ["RHINO:ADD7C478031F3DD8CC7E20F3B676DB4B"]}, {"type": "rocky", "idList": ["RLBA-2019:3416", "RLSA-2020:1644", "RLSA-2020:3662", "RLSA-2020:3732", "RLSA-2020:4484", "RLSA-2020:4670", "RLSA-2020:4751", "RLSA-2020:4807", "RLSA-2020:4846", "RLSA-2020:4847", "RLSA-2020:5499", "RLSA-2020:5500", "RLSA-2021:0548", "RLSA-2021:0551", "RLSA-2021:0734", "RLSA-2021:0735", "RLSA-2021:0744", "RLSA-2021:1024", "RLSA-2021:1581", "RLSA-2021:1593", "RLSA-2021:1610", "RLSA-2021:1647", "RLSA-2021:1678", "RLSA-2021:1846", "RLSA-2021:1968", "RLSA-2021:3590", "RLSA-2021:4142", "RLSA-2021:4151", "RLSA-2021:4162", "RLSA-2021:4198", "RLSA-2021:4213", "RLSA-2021:4251", "RLSA-2021:4396", "RLSA-2021:4424", "RLSA-2022:1556", "RLSA-2022:1557", "RLSA-2022:1860", "RLSA-2022:1861", "RLSA-2022:5498"]}, {"type": "rosalinux", "idList": ["ROSA-SA-2021-1957", "ROSA-SA-2021-1967", "ROSA-SA-2021-1975", "ROSA-SA-2021-1988", "ROSA-SA-2023-2133", "ROSA-SA-2023-2169", "ROSA-SA-2023-2211"]}, {"type": "rubygems", "idList": ["RUBY:BOOTSTRAP-2018-14040", "RUBY:BOOTSTRAP-2018-14042"]}, {"type": "rustsec", "idList": ["RUSTSEC-2020-0015", "RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2021-0057", "RUSTSEC-2021-0058"]}, {"type": "saint", "idList": ["SAINT:1126B0AA9A8BD987E404F1746F1D8BFA", "SAINT:61E99B83D8C03F67350245D1B8BDC99C", "SAINT:891A42933A0DE986694E3B7D51B3F2F1", "SAINT:AE1DA80E6B0E4C12B5D781794166897B", "SAINT:D1B88155F516D415CE4F67A190458DDB"]}, {"type": "samba", "idList": ["SAMBA:CVE-2020-1472", "SAMBA:CVE-2022-38023"]}, {"type": "securelist", "idList": ["SECURELIST:73735B62C781261398E44FFF82262BCD", "SECURELIST:847981DCB9E90C51F963EE1727E40915", "SECURELIST:8499F8DA2C6A39EA56D9B664EE7B6360", "SECURELIST:BB0230F9CE86B3F1994060AA0A809C08"]}, {"type": "seebug", "idList": ["SSV:92965", "SSV:99170", "SSV:99225"]}, {"type": "slackware", "idList": ["SSA-2019-030-01", "SSA-2019-107-01", "SSA-2019-141-01", "SSA-2019-202-01", "SSA-2019-311-01", "SSA-2019-354-01", "SSA-2020-008-01", "SSA-2020-086-01", "SSA-2020-091-02", "SSA-2020-163-01", "SSA-2020-295-01", "SSA-2020-344-01"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "sqlite", "idList": ["SQLT:CVE-2020-11655", "SQLT:CVE-2020-11656", "SQLT:CVE-2020-13434", "SQLT:CVE-2020-13435", "SQLT:CVE-2020-13871", "SQLT:CVE-2020-15358", "SQLT:CVE-2020-9327", "SQLT:CVE-2021-20227"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2131-1", "OPENSUSE-SU-2018:2180-1", "OPENSUSE-SU-2018:2820-1", "OPENSUSE-SU-2018:2931-1", "OPENSUSE-SU-2018:3071-1", "OPENSUSE-SU-2018:3202-1", "OPENSUSE-SU-2018:3218-1", "OPENSUSE-SU-2018:3998-1", "OPENSUSE-SU-2018:4045-1", "OPENSUSE-SU-2019:0065-1", "OPENSUSE-SU-2019:0140-1", "OPENSUSE-SU-2019:1484-1", "OPENSUSE-SU-2019:1530-1", "OPENSUSE-SU-2019:1534-1", "OPENSUSE-SU-2019:1570-1", "OPENSUSE-SU-2019:1571-1", "OPENSUSE-SU-2019:1579-1", "OPENSUSE-SU-2019:1664-1", "OPENSUSE-SU-2019:1673-1", "OPENSUSE-SU-2019:1716-1", "OPENSUSE-SU-2019:1757-1", "OPENSUSE-SU-2019:1777-1", "OPENSUSE-SU-2019:1808-1", "OPENSUSE-SU-2019:1839-1", "OPENSUSE-SU-2019:1872-1", "OPENSUSE-SU-2019:1912-1", "OPENSUSE-SU-2019:1916-1", "OPENSUSE-SU-2019:2051-1", "OPENSUSE-SU-2019:2058-1", "OPENSUSE-SU-2019:2173-1", "OPENSUSE-SU-2019:2181-1", "OPENSUSE-SU-2019:2392-1", "OPENSUSE-SU-2019:2444-1", "OPENSUSE-SU-2019:2675-1", "OPENSUSE-SU-2020:0038-1", "OPENSUSE-SU-2020:0051-1", "OPENSUSE-SU-2020:0062-1", "OPENSUSE-SU-2020:0336-1", "OPENSUSE-SU-2020:0341-1", "OPENSUSE-SU-2020:0597-1", "OPENSUSE-SU-2020:0607-1", "OPENSUSE-SU-2020:0711-1", "OPENSUSE-SU-2020:0719-1", "OPENSUSE-SU-2020:0801-1", "OPENSUSE-SU-2020:0850-1", "OPENSUSE-SU-2020:0851-1", "OPENSUSE-SU-2020:0933-1", "OPENSUSE-SU-2020:0935-1", "OPENSUSE-SU-2020:0945-1", "OPENSUSE-SU-2020:1022-1", "OPENSUSE-SU-2020:1043-1", "OPENSUSE-SU-2020:1060-1", "OPENSUSE-SU-2020:1062-1", "OPENSUSE-SU-2020:1087-1", "OPENSUSE-SU-2020:1095-1", "OPENSUSE-SU-2020:1102-1", "OPENSUSE-SU-2020:1106-1", "OPENSUSE-SU-2020:1111-1", "OPENSUSE-SU-2020:1153-1", "OPENSUSE-SU-2020:1178-1", "OPENSUSE-SU-2020:1194-1", "OPENSUSE-SU-2020:1236-1", "OPENSUSE-SU-2020:1325-1", "OPENSUSE-SU-2020:1405-1", "OPENSUSE-SU-2020:1407-1", "OPENSUSE-SU-2020:1513-1", "OPENSUSE-SU-2020:1526-1", "OPENSUSE-SU-2020:1584-1", "OPENSUSE-SU-2020:1587-1", "OPENSUSE-SU-2020:1703-1", "OPENSUSE-SU-2020:1767-1", "OPENSUSE-SU-2020:1799-1", "OPENSUSE-SU-2020:1842-1", "OPENSUSE-SU-2020:1888-1", "OPENSUSE-SU-2020:2037-1", "OPENSUSE-SU-2020:2045-1", "OPENSUSE-SU-2020:2062-1", "OPENSUSE-SU-2020:2092-1", "OPENSUSE-SU-2020:2223-1", "OPENSUSE-SU-2020:2236-1", "OPENSUSE-SU-2020:2238-1", "OPENSUSE-SU-2020:2245-1", "OPENSUSE-SU-2020:2249-1", "OPENSUSE-SU-2020:2269-1", "OPENSUSE-SU-2020:2367-1", "OPENSUSE-SU-2021:0012-1", "OPENSUSE-SU-2021:0043-1", "OPENSUSE-SU-2021:0064-1", "OPENSUSE-SU-2021:0065-1", "OPENSUSE-SU-2021:0066-1", "OPENSUSE-SU-2021:0081-1", "OPENSUSE-SU-2021:0082-1", "OPENSUSE-SU-2021:0140-1", "OPENSUSE-SU-2021:0242-1", "OPENSUSE-SU-2021:0356-1", "OPENSUSE-SU-2021:0357-1", "OPENSUSE-SU-2021:0372-1", "OPENSUSE-SU-2021:0389-1", "OPENSUSE-SU-2021:0392-1", "OPENSUSE-SU-2021:0401-1", "OPENSUSE-SU-2021:0427-1", "OPENSUSE-SU-2021:0430-1", "OPENSUSE-SU-2021:0435-1", "OPENSUSE-SU-2021:0476-1", "OPENSUSE-SU-2021:0496-1", "OPENSUSE-SU-2021:0630-1", "OPENSUSE-SU-2021:0719-1", "OPENSUSE-SU-2021:0723-1", "OPENSUSE-SU-2021:0776-1", "OPENSUSE-SU-2021:0832-1", "OPENSUSE-SU-2021:0909-1", "OPENSUSE-SU-2021:0933-1", "OPENSUSE-SU-2021:0977-1", "OPENSUSE-SU-2021:1058-1", "OPENSUSE-SU-2021:1059-1", "OPENSUSE-SU-2021:1060-1", "OPENSUSE-SU-2021:1061-1", "OPENSUSE-SU-2021:1113-1", "OPENSUSE-SU-2021:1176-1", "OPENSUSE-SU-2021:1455-1", "OPENSUSE-SU-2021:1666-1", "OPENSUSE-SU-2021:1840-1", "OPENSUSE-SU-2021:1876-1", "OPENSUSE-SU-2021:1989-1", "OPENSUSE-SU-2021:2125-1", "OPENSUSE-SU-2021:2320-1", "OPENSUSE-SU-2021:2327-1", "OPENSUSE-SU-2021:2353-1", "OPENSUSE-SU-2021:2354-1", "OPENSUSE-SU-2021:2605-1", "OPENSUSE-SU-2021:2616-1", "OPENSUSE-SU-2021:2617-1", "OPENSUSE-SU-2021:2618-1", "OPENSUSE-SU-2021:2798-1", "OPENSUSE-SU-2021:3615-1", "OPENSUSE-SU-2021:3876-1", "OPENSUSE-SU-2022:0108-1", "SUSE-SU-2022:1271-1", "SUSE-SU-2022:1678-1", "SUSE-SU-2022:3802-1"]}, {"type": "symantec", "idList": ["SMNTC-102879", "SMNTC-105656", "SMNTC-107867", "SMNTC-107906", "SMNTC-108023", "SMNTC-108874", "SMNTC-109227", "SMNTC-109425", "SMNTC-109915", "SMNTC-109929", "SMNTC-110274", "SMNTC-110476", "SMNTC-110478", "SMNTC-110516", "SMNTC-110895", "SMNTC-110956", "SMNTC-110969", "SMNTC-111028", "SMNTC-111133", "SMNTC-111264", "SMNTC-111341", "SMNTC-111398", "SMNTC-111546", "SMNTC-16056", "SMNTC-17570", "SMNTC-1765", "SMNTC-17650", "SMNTC-1768", "SMNTC-17849", "SMNTC-97702"]}, {"type": "talos", "idList": ["TALOS-2019-0849", "TALOS-2019-0852", "TALOS-2019-0853", "TALOS-2019-0900"]}, {"type": "talosblog", "idList": ["TALOSBLOG:309A8BCC0A7CD66A2777CFCCF3B46465", "TALOSBLOG:3408EA53C759FF775E8D772720035A70", "TALOSBLOG:A654303FB4331FDBB91B999EC882BE7A", "TALOSBLOG:AFFA9F54A1744A8B65903B06E9C56C3A", "TALOSBLOG:C3F889D9C3C954C42160A3C26034C2F6", "TALOSBLOG:C9F50677FB4030903E6114F7C17FD8DB"]}, {"type": "tenable", "idList": ["TENABLE:F29BAD72446123F9BCC7E3C50234FFF8"]}, {"type": "thn", "idList": ["THN:00FA264E8FCF40A8A062B16DE5C9136E", "THN:0A61A90DD0F88453854B73FE249BC379", "THN:0C87C22B19E7073574F7BA69985A07BF", "THN:23ADB89A5DA622FFE2242173C6438C19", "THN:2AE638B06506778A5F779054ACB99CDC", "THN:2B49FD6B1FE640C017C0531F850B4C11", "THN:5A2336DDF5F519EE27D85DAAB3059B95", "THN:6F9D6D4546C3D4DA1164354C8E552FDC", "THN:7FD924637D99697D78D53283817508DA", "THN:9FB8DE3BF545932321335F2C525A4A36", "THN:A1FA44D6DEC0509E076C54E227E6E6A1", "THN:A30AE10A13D33189456EB192DDF2B8C2", "THN:B95DC27A89565323F0F8E6350D24D801", "THN:D65992731CD4A3B443CD2E03761CE18B", "THN:D7DBE5ECBAF3E906ECA544B7E150594A", "THN:E9454DED855ABE5718E4612A2A750A98", "THN:F4928090525451C50A1B016ED3B0650F", "THN:F53D18B9EB0F8CD70C9289288AC9E2E1"]}, {"type": "threatpost", "idList": ["THREATPOST:0B290DDF3FE14178760FDC2229CB1383", "THREATPOST:0DD2AEA1738F9B6612B1C845F3BC949F", "THREATPOST:1322630273A25CA5A68246679553E2B8", "THREATPOST:136544A8850662645EB54E79AAB40F75", "THREATPOST:1502920D4F50B0D128077B515815C023", "THREATPOST:199785A97C530FECDF2B53B871FBE1C2", "THREATPOST:1D03F5885684829E899CEE4F63F5AC27", "THREATPOST:20EAC8CBCC0B2A55B8195EB5B485B9D6", "THREATPOST:23D55C85EA8B442C858FF058C5E25DBC", "THREATPOST:27150C099FB4771B9DED4F6372D27EB7", "THREATPOST:2F655C93B7912A7C776E1DC1D39822D0", "THREATPOST:30D70449EF03FFC5099B5B141FA079E2", "THREATPOST:45F91A2DD716E93AA4DA0D9441E725C6", "THREATPOST:49274446DFD14E2B0DF948DA83A07ECB", "THREATPOST:51A2EB5F46817EF77631C9F4C6429714", "THREATPOST:6B7259AD7487C6D17E0A301E14AEB7CB", "THREATPOST:7016E3D2F3480C9399BCD12F9CE0D562", "THREATPOST:71C45E867DCD99278A38088B59938B48", "THREATPOST:779B904F971138531725D1E57FDFF9DD", "THREATPOST:870C912F079364DE3A8DADFDBE4E42D1", "THREATPOST:891CC19008EEE7B8F1523A2BD4A37993", "THREATPOST:8D6D4C10987CBF3434080EFF240D2E74", "THREATPOST:A1A1E1AC8DB384C8FA2988F9A9121141", "THREATPOST:A47D83D4BBBE115E6424755328525B9D", "THREATPOST:A5FC4C5797CA53E30A3426AF0843BFFE", "THREATPOST:AD8A075328874910E8DCBC149A6CA284", "THREATPOST:BBAE8AE32C2E8EC0271BBA9D0498A825", "THREATPOST:C408DF21547B7B4327FBAB82B97A4C96", "THREATPOST:DBA639CBD82839FDE8E9F4AE1031AAF7", "THREATPOST:E95FF75420C541DF65D4D795CF73B5CE", "THREATPOST:F1065D29808C9165285986CCB6DEBB5A", "THREATPOST:F60D403369A535076F39A474F74C925E", "THREATPOST:F9CF34A304B5CA2189D5CEDA09C8B0CB"]}, {"type": "tomcat", "idList": ["TOMCAT:0272BA84012892D369AEA1B59399E0A5", "TOMCAT:045D264F03959F4DF2D140C7A3C6A05B", "TOMCAT:05A191E24B2303184CA1970729C00C81", "TOMCAT:134FFF2A5E889835054EC92E557C984D", "TOMCAT:297A2EAE99263A165E24C66156B7872A", "TOMCAT:324E50A03961FCE2265C4097A2D9383A", "TOMCAT:36341E62C29FA8D208E5019D7D60DFC8", "TOMCAT:38E1DC5950ADDBB8A055F354B172C65E", "TOMCAT:47B91042927062AB4C945C176AD09B02", "TOMCAT:5FF617CEB667027ABB70FDFB3A8FFD4C", "TOMCAT:72A659F35396F865D9A18EB5614CF486", "TOMCAT:75BDD1762995663D2613C2EC3D1F16DD", "TOMCAT:8A2C262DE6E0BAC59E53AD562A9743FE", "TOMCAT:909935A4BEB7C54CD1FA804D13CDD890", "TOMCAT:95E28D1C95DD85DE7ADBDED721C3DA07", "TOMCAT:9B658D22C08634C8C17F1EFEE3366D4D", "TOMCAT:A01991EC43D0F6A28E9CB4553C6B4670", "TOMCAT:BAAFFB46A35FA23A4961B3B00F383DC9", "TOMCAT:BD106E970B6D4964B80C5CC3715C6DD2", "TOMCAT:C3F367059A3E9B8636ED41FF901D93F9", "TOMCAT:C5537152452B543D3F3B9565BB62CA70", "TOMCAT:C878975BAAD7823EE793B63FC6053125", "TOMCAT:D3D93576ACEA30F0105FC0FE43E2BF2B", "TOMCAT:E4520A0C2F785FBF22985309FA3E3B08", "TOMCAT:E76617B2A121AAAE8F7420BCA50A252C", "TOMCAT:E79D9E905E19211D175E5D0226367AEA", "TOMCAT:F0049A2F4586A81E86FFD36E3616FCA3"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:8A87E8F1BA63B9BB2E84C23288C44FDC", "TRENDMICROBLOG:A2FAFD5078CBD03DAF767DD2496552A5"]}, {"type": "typo3", "idList": ["TYPO3-CORE-SA-2019-006", "TYPO3-EXT-SA-2020-015", "TYPO3-PSA-2019-004", "TYPO3-PSA-2019-005"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "LSN-0072-1", "USN-3932-1", "USN-3932-2", "USN-3962-1", "USN-3979-1", "USN-3980-1", "USN-3980-2", "USN-3981-1", "USN-3981-2", "USN-3982-1", "USN-3982-2", "USN-3991-1", "USN-3991-2", "USN-3991-3", "USN-3997-1", "USN-4040-1", "USN-4040-2", "USN-4069-1", "USN-4069-2", "USN-4080-1", "USN-4083-1", "USN-4094-1", "USN-4095-1", "USN-4113-1", "USN-4113-2", "USN-4114-1", "USN-4115-1", "USN-4115-2", "USN-4116-1", "USN-4117-1", "USN-4118-1", "USN-4128-1", "USN-4128-2", "USN-4145-1", "USN-4147-1", "USN-4183-1", "USN-4183-2", "USN-4186-1", "USN-4186-3", "USN-4208-1", "USN-4209-1", "USN-4210-1", "USN-4211-1", "USN-4211-2", "USN-4225-1", "USN-4225-2", "USN-4226-1", "USN-4227-1", "USN-4227-2", "USN-4228-1", "USN-4228-2", "USN-4254-1", "USN-4254-2", "USN-4258-1", "USN-4279-1", "USN-4279-2", "USN-4284-1", "USN-4285-1", "USN-4286-1", "USN-4286-2", "USN-4287-1", "USN-4287-2", "USN-4298-1", "USN-4300-1", "USN-4301-1", "USN-4302-1", "USN-4376-1", "USN-4380-1", "USN-4387-1", "USN-4388-1", "USN-4389-1", "USN-4390-1", "USN-4391-1", "USN-4392-1", "USN-4394-1", "USN-4412-1", "USN-4413-1", "USN-4438-1", "USN-4448-1", "USN-4458-1", "USN-4462-1", "USN-4463-1", "USN-4465-1", "USN-4483-1", "USN-4485-1", "USN-4495-1", "USN-4504-1", "USN-4510-1", "USN-4510-2", "USN-4525-1", "USN-4526-1", "USN-4527-1", "USN-4559-1", "USN-4575-1", "USN-4583-1", "USN-4583-2", "USN-4596-1", "USN-4600-2", "USN-4602-1", "USN-4602-2", "USN-4619-1", "USN-4635-1", "USN-4638-1", "USN-4662-1", "USN-4665-1", "USN-4665-2", "USN-4685-1", "USN-4686-1", "USN-4699-1", "USN-4714-1", "USN-4732-1", "USN-4738-1", "USN-4742-1", "USN-4745-1", "USN-4758-1", "USN-4766-1", "USN-4813-1", "USN-4852-1", "USN-4874-1", "USN-4880-1", "USN-4891-1", "USN-4892-1", "USN-4943-1", "USN-4952-1", "USN-5022-3", "USN-5038-1", "USN-5048-1", "USN-5048-2", "USN-5088-1", "USN-5239-1", "USN-5340-1", "USN-5340-2", "USN-5360-1", "USN-5455-1", "USN-5674-1", "USN-5725-1", "USN-5725-2", "USN-5952-1", "USN-5998-1", "USN-6049-1", "USN-6117-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2016-10735", "UB:CVE-2016-5725", "UB:CVE-2016-7103", "UB:CVE-2017-1000061", "UB:CVE-2017-12626", "UB:CVE-2017-18640", "UB:CVE-2017-5645", "UB:CVE-2018-1000180", "UB:CVE-2018-1000613", "UB:CVE-2018-1000632", "UB:CVE-2018-1285", "UB:CVE-2018-14040", "UB:CVE-2018-14041", "UB:CVE-2018-14042", "UB:CVE-2018-14550", "UB:CVE-2018-14613", "UB:CVE-2018-16884", "UB:CVE-2018-20843", "UB:CVE-2018-8032", "UB:CVE-2019-0221", "UB:CVE-2019-0227", "UB:CVE-2019-0228", "UB:CVE-2019-0230", "UB:CVE-2019-0232", "UB:CVE-2019-0233", "UB:CVE-2019-10072", "UB:CVE-2019-10086", "UB:CVE-2019-10098", "UB:CVE-2019-10173", "UB:CVE-2019-10246", "UB:CVE-2019-10247", "UB:CVE-2019-10638", "UB:CVE-2019-10639", "UB:CVE-2019-11358", "UB:CVE-2019-11487", "UB:CVE-2019-11599", "UB:CVE-2019-12086", "UB:CVE-2019-12402", "UB:CVE-2019-12415", "UB:CVE-2019-14379", "UB:CVE-2019-14898", "UB:CVE-2019-15218", "UB:CVE-2019-1551", "UB:CVE-2019-16746", "UB:CVE-2019-16942", "UB:CVE-2019-17075", "UB:CVE-2019-17133", "UB:CVE-2019-17566", "UB:CVE-2019-17571", "UB:CVE-2019-17632", "UB:CVE-2019-17638", "UB:CVE-2019-18885", "UB:CVE-2019-19052", "UB:CVE-2019-19063", "UB:CVE-2019-19066", "UB:CVE-2019-19073", "UB:CVE-2019-19074", "UB:CVE-2019-19078", "UB:CVE-2019-19535", "UB:CVE-2019-19922", "UB:CVE-2019-20812", "UB:CVE-2019-3874", "UB:CVE-2019-3900", "UB:CVE-2019-5063", "UB:CVE-2019-5064", "UB:CVE-2019-5108", "UB:CVE-2019-7317", "UB:CVE-2019-8331", "UB:CVE-2020-10188", "UB:CVE-2020-10543", "UB:CVE-2020-10683", "UB:CVE-2020-10751", "UB:CVE-2020-10769", "UB:CVE-2020-10878", "UB:CVE-2020-11022", "UB:CVE-2020-11023", "UB:CVE-2020-11612", "UB:CVE-2020-11655", "UB:CVE-2020-11656", "UB:CVE-2020-11979", "UB:CVE-2020-11987", "UB:CVE-2020-11998", "UB:CVE-2020-12114", "UB:CVE-2020-12723", "UB:CVE-2020-12771", "UB:CVE-2020-13434", "UB:CVE-2020-13435", "UB:CVE-2020-13871", "UB:CVE-2020-13934", "UB:CVE-2020-13935", "UB:CVE-2020-13943", "UB:CVE-2020-13956", "UB:CVE-2020-14039", "UB:CVE-2020-14060", "UB:CVE-2020-14061", "UB:CVE-2020-14062", "UB:CVE-2020-14195", "UB:CVE-2020-1472", "UB:CVE-2020-15358", "UB:CVE-2020-15586", "UB:CVE-2020-16166", "UB:CVE-2020-16845", "UB:CVE-2020-17521", "UB:CVE-2020-17527", "UB:CVE-2020-17530", "UB:CVE-2020-1927", "UB:CVE-2020-1941", "UB:CVE-2020-1945", "UB:CVE-2020-1967", "UB:CVE-2020-1968", "UB:CVE-2020-1971", "UB:CVE-2020-23064", "UB:CVE-2020-24394", "UB:CVE-2020-24553", "UB:CVE-2020-24616", "UB:CVE-2020-24750", "UB:CVE-2020-25649", "UB:CVE-2020-26217", "UB:CVE-2020-26418", "UB:CVE-2020-26419", "UB:CVE-2020-26420", "UB:CVE-2020-26421", "UB:CVE-2020-26422", "UB:CVE-2020-27216", "UB:CVE-2020-27218", "UB:CVE-2020-27223", "UB:CVE-2020-27841", "UB:CVE-2020-27842", "UB:CVE-2020-27843", "UB:CVE-2020-27844", "UB:CVE-2020-27845", "UB:CVE-2020-28052", "UB:CVE-2020-28196", "UB:CVE-2020-35490", "UB:CVE-2020-35491", "UB:CVE-2020-35728", "UB:CVE-2020-36179", "UB:CVE-2020-36180", "UB:CVE-2020-36181", "UB:CVE-2020-36182", "UB:CVE-2020-36183", "UB:CVE-2020-36184", "UB:CVE-2020-36185", "UB:CVE-2020-36186", "UB:CVE-2020-36187", "UB:CVE-2020-36188", "UB:CVE-2020-36189", "UB:CVE-2020-5398", "UB:CVE-2020-5407", "UB:CVE-2020-5408", "UB:CVE-2020-5421", "UB:CVE-2020-7059", "UB:CVE-2020-7060", "UB:CVE-2020-7069", "UB:CVE-2020-7760", "UB:CVE-2020-7774", "UB:CVE-2020-7919", "UB:CVE-2020-8203", "UB:CVE-2020-8277", "UB:CVE-2020-8284", "UB:CVE-2020-8285", "UB:CVE-2020-8286", "UB:CVE-2020-8908", "UB:CVE-2020-9281", "UB:CVE-2020-9327", "UB:CVE-2020-9484", "UB:CVE-2020-9488", "UB:CVE-2020-9489", "UB:CVE-2021-0646", "UB:CVE-2021-20227", "UB:CVE-2021-21290", "UB:CVE-2021-21345", "UB:CVE-2021-2144", "UB:CVE-2021-2145", "UB:CVE-2021-2146", "UB:CVE-2021-2154", "UB:CVE-2021-2160", "UB:CVE-2021-2161", "UB:CVE-2021-2162", "UB:CVE-2021-2163", "UB:CVE-2021-2164", "UB:CVE-2021-2166", "UB:CVE-2021-2169", "UB:CVE-2021-2170", "UB:CVE-2021-2171", "UB:CVE-2021-2172", "UB:CVE-2021-2174", "UB:CVE-2021-2178", "UB:CVE-2021-2179", "UB:CVE-2021-2180", "UB:CVE-2021-2193", "UB:CVE-2021-2194", "UB:CVE-2021-2196", "UB:CVE-2021-2201", "UB:CVE-2021-2202", "UB:CVE-2021-2203", "UB:CVE-2021-2208", "UB:CVE-2021-2212", "UB:CVE-2021-2213", "UB:CVE-2021-2215", "UB:CVE-2021-2217", "UB:CVE-2021-22173", "UB:CVE-2021-22174", "UB:CVE-2021-22191", "UB:CVE-2021-2226", "UB:CVE-2021-2230", "UB:CVE-2021-2232", "UB:CVE-2021-2250", "UB:CVE-2021-2264", "UB:CVE-2021-2266", "UB:CVE-2021-2278", "UB:CVE-2021-2279", "UB:CVE-2021-2280", "UB:CVE-2021-2281", "UB:CVE-2021-2282", "UB:CVE-2021-2283", "UB:CVE-2021-2284", "UB:CVE-2021-2285", "UB:CVE-2021-2286", "UB:CVE-2021-2287", "UB:CVE-2021-22883", "UB:CVE-2021-22884", "UB:CVE-2021-2291", "UB:CVE-2021-2293", "UB:CVE-2021-2296", "UB:CVE-2021-2297", "UB:CVE-2021-2298", "UB:CVE-2021-2299", "UB:CVE-2021-2300", "UB:CVE-2021-2301", "UB:CVE-2021-2304", "UB:CVE-2021-2305", "UB:CVE-2021-2306", "UB:CVE-2021-2307", "UB:CVE-2021-2308", "UB:CVE-2021-2309", "UB:CVE-2021-2310", "UB:CVE-2021-2312", "UB:CVE-2021-2321", "UB:CVE-2021-23336", "UB:CVE-2021-23839", "UB:CVE-2021-23840", "UB:CVE-2021-23841", "UB:CVE-2021-25329", "UB:CVE-2021-29482", "UB:CVE-2021-31805", "UB:CVE-2021-3449", "UB:CVE-2021-3450", "UB:CVE-2021-40491", "UB:CVE-2022-23181", "UB:CVE-2022-24823"]}, {"type": "veracode", "idList": ["VERACODE:12232", "VERACODE:12485", "VERACODE:13238", "VERACODE:13348", "VERACODE:13633", "VERACODE:13637", "VERACODE:13659", "VERACODE:13666", "VERACODE:13667", "VERACODE:13707", "VERACODE:20298", "VERACODE:20300", "VERACODE:20574", "VERACODE:20639", "VERACODE:20878", "VERACODE:20928", "VERACODE:20976", "VERACODE:20986", "VERACODE:21062", "VERACODE:21070", "VERACODE:21314", "VERACODE:21389", "VERACODE:21602", "VERACODE:21686", "VERACODE:21707", "VERACODE:21775", "VERACODE:21820", "VERACODE:21916", "VERACODE:21922", "VERACODE:21926", "VERACODE:21984", "VERACODE:22052", "VERACODE:22080", "VERACODE:22144", "VERACODE:22224", "VERACODE:22253", "VERACODE:22272", "VERACODE:22296", "VERACODE:22312", "VERACODE:22317", "VERACODE:22319", "VERACODE:22401", "VERACODE:22470", "VERACODE:22499", "VERACODE:22653", "VERACODE:22739", "VERACODE:22967", "VERACODE:25055", "VERACODE:25075", "VERACODE:25078", "VERACODE:25079", "VERACODE:25140", "VERACODE:25141", "VERACODE:25177", "VERACODE:25178", "VERACODE:25182", "VERACODE:25370", "VERACODE:25412", "VERACODE:25419", "VERACODE:25429", "VERACODE:25438", "VERACODE:25439", "VERACODE:25441", "VERACODE:25469", "VERACODE:25497", "VERACODE:25679", "VERACODE:25680", "VERACODE:25681", "VERACODE:25693", "VERACODE:25696", "VERACODE:25735", "VERACODE:25845", "VERACODE:25873", "VERACODE:25888", "VERACODE:25889", "VERACODE:25900", "VERACODE:25907", "VERACODE:25945", "VERACODE:26067", "VERACODE:26072", "VERACODE:26073", "VERACODE:26076", "VERACODE:26179", "VERACODE:26180", "VERACODE:26245", "VERACODE:26329", "VERACODE:26331", "VERACODE:26332", "VERACODE:26493", "VERACODE:26602", "VERACODE:26731", "VERACODE:26747", "VERACODE:26773", "VERACODE:26780", "VERACODE:26795", "VERACODE:26927", "VERACODE:26968", "VERACODE:27162", "VERACODE:27184", "VERACODE:27227", "VERACODE:27511", "VERACODE:27516", "VERACODE:27548", "VERACODE:27558", "VERACODE:27564", "VERACODE:27566", "VERACODE:27584", "VERACODE:27639", "VERACODE:27671", "VERACODE:27672", "VERACODE:27726", "VERACODE:27758", "VERACODE:27776", "VERACODE:27787", "VERACODE:27879", "VERACODE:27884", "VERACODE:27911", "VERACODE:27978", "VERACODE:28028", "VERACODE:28029", "VERACODE:28030", "VERACODE:28041", "VERACODE:28046", "VERACODE:28388", "VERACODE:28516", "VERACODE:28524", "VERACODE:28525", "VERACODE:28551", "VERACODE:28552", "VERACODE:28553", "VERACODE:28566", "VERACODE:28567", "VERACODE:28570", "VERACODE:28595", "VERACODE:28632", "VERACODE:28637", "VERACODE:28648", "VERACODE:28818", "VERACODE:28823", "VERACODE:28909", "VERACODE:28915", "VERACODE:28916", "VERACODE:28917", "VERACODE:28920", "VERACODE:28931", "VERACODE:28932", "VERACODE:28933", "VERACODE:28934", "VERACODE:28935", "VERACODE:28936", "VERACODE:28938", "VERACODE:28939", "VERACODE:28940", "VERACODE:28941", "VERACODE:28942", "VERACODE:29283", "VERACODE:29314", "VERACODE:29324", "VERACODE:29325", "VERACODE:29331", "VERACODE:29332", "VERACODE:29417", "VERACODE:29418", "VERACODE:29419", "VERACODE:29449", "VERACODE:29475", "VERACODE:29476", "VERACODE:29490", "VERACODE:29523", "VERACODE:29541", "VERACODE:29554", "VERACODE:29680", "VERACODE:29683", "VERACODE:29789", "VERACODE:29835", "VERACODE:29836", "VERACODE:29909", "VERACODE:30095", "VERACODE:30096", "VERACODE:30097", "VERACODE:30099", "VERACODE:30100", "VERACODE:30101", "VERACODE:30102", "VERACODE:30123", "VERACODE:30124", "VERACODE:30125", "VERACODE:30126", "VERACODE:30127", "VERACODE:30128", "VERACODE:30129", "VERACODE:30130", "VERACODE:30131", "VERACODE:30132", "VERACODE:30133", "VERACODE:30148", "VERACODE:30149", "VERACODE:30152", "VERACODE:30183", "VERACODE:30293", "VERACODE:30556", "VERACODE:30571", "VERACODE:30981", "VERACODE:30982", "VERACODE:31224", "VERACODE:32584", "VERACODE:32586", "VERACODE:32587", "VERACODE:32588", "VERACODE:32589", "VERACODE:32592", "VERACODE:32593", "VERACODE:32595", "VERACODE:32600", "VERACODE:32601", "VERACODE:32602", "VERACODE:32603", "VERACODE:32604", "VERACODE:32605", "VERACODE:32606", "VERACODE:32608", "VERACODE:32612", "VERACODE:32613", "VERACODE:32614", "VERACODE:33645", "VERACODE:35070", "VERACODE:35443", "VERACODE:3919", "VERACODE:5414", "VERACODE:5760", "VERACODE:6444", "VERACODE:6449", "VERACODE:6514", "VERACODE:6578", "VERACODE:7056", "VERACODE:7341", "VERACODE:7856"]}, {"type": "virtuozzo", "idList": ["VZA-2018-089", "VZA-2019-088", "VZA-2019-089", "VZA-2020-036", "VZA-2020-037", "VZA-2020-046", "VZA-2020-048", "VZA-2021-040"]}, {"type": "zdi", "idList": ["ZDI-19-1024", "ZDI-19-582", "ZDI-19-807", "ZDI-21-451", "ZDI-21-452", "ZDI-21-453", "ZDI-21-454", "ZDI-21-455", "ZDI-21-456", "ZDI-21-457", "ZDI-21-458", "ZDI-21-459", "ZDI-21-460", "ZDI-21-461", "ZDI-21-462", "ZDI-21-483", "ZDI-21-484"]}, {"type": "zdt", "idList": ["1337DAY-ID-24818", "1337DAY-ID-32519", "1337DAY-ID-32619", "1337DAY-ID-32925", "1337DAY-ID-33577", "1337DAY-ID-35263", "1337DAY-ID-35274", "1337DAY-ID-35571", "1337DAY-ID-36102", "1337DAY-ID-36103", "1337DAY-ID-36546", "1337DAY-ID-38139", "1337DAY-ID-38262", "1337DAY-ID-39013"]}]}, "score": {"value": 7.7, "vector": "NONE"}, "backreferences": {"references": [{"type": "aix", "idList": ["JAVA_JULY2019_ADVISORY.ASC", "OPENSSL_ADVISORY32.ASC"]}, {"type": "almalinux", "idList": ["ALSA-2020:4431", "ALSA-2020:4846", "ALSA-2021:3590"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2020-11656", "ALPINE:CVE-2020-13434", "ALPINE:CVE-2020-13435", "ALPINE:CVE-2020-15358", "ALPINE:CVE-2021-20227"]}, {"type": "amazon", "idList": ["ALAS-2017-890", "ALAS-2017-891", "ALAS-2019-1149", "ALAS-2019-1208", "ALAS-2019-1232", "ALAS-2019-1234", "ALAS-2019-1235", "ALAS-2019-1311", "ALAS-2020-1370", "ALAS-2020-1377", "ALAS-2020-1417", "ALAS-2020-1436", "ALAS-2020-1440", "ALAS-2020-1445", "ALAS-2021-1459", "ALAS-2021-1469", "ALAS-2021-1473", "ALAS-2021-1500", "ALAS-2021-1504", "ALAS-2022-1562", "ALAS2-2019-1149", "ALAS2-2019-1229", "ALAS2-2019-1232", "ALAS2-2019-1246", "ALAS2-2019-1341", "ALAS2-2020-1395", "ALAS2-2020-1422", "ALAS2-2020-1427", "ALAS2-2020-1431", "ALAS2-2020-1449", "ALAS2-2020-1465", "ALAS2-2020-1479", "ALAS2-2020-1480", "ALAS2-2020-1494", "ALAS2-2020-1513", "ALAS2-2020-1519", "ALAS2-2020-1537", "ALAS2-2020-1554", "ALAS2-2021-1585", "ALAS2-2021-1593", "ALAS2-2021-1626", "ALAS2-2021-1640", "ALAS2-2021-1645", "ALAS2-2021-1649"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-02-01", "ANDROID:2020-08-01", "ANDROID:2021-11-01"]}, {"type": "apple", "idList": ["APPLE:2A32C0762786DF36357D645066CDC600", "APPLE:3D7765FAAA5588336144E1B60D0B775E", "APPLE:47A6F4E1660238E39625B31A34F6CDF1", "APPLE:7B414D7D6363796AB8F0EB89C5EEC383", "APPLE:8592A5882F33472850FF959BB2667129", "APPLE:914AF8F52D4AB5DC92631271089CEE87", "APPLE:9AAA600C4496E1F352EC9F07A8BDC39B", "APPLE:B08BBADEFC88806E12CB234F1EB6C4C6", "APPLE:BEC13883FC65A6FD008F312DB93C0A36", "APPLE:BF1622028DAB7FB7B0D91852357DB961", "APPLE:CABE34499864F4FA47751E5A9FCC58AC", "APPLE:F7DADB3E958148A6B63512580383CEA2", "APPLE:HT211843", "APPLE:HT211844", "APPLE:HT211850", "APPLE:HT211931", "APPLE:HT211935", "APPLE:HT211952", "APPLE:HT212147"]}, {"type": "archlinux", "idList": ["ASA-201904-10", "ASA-201905-8", "ASA-201905-9", "ASA-201906-2", "ASA-202004-14", "ASA-202004-18", "ASA-202004-19", "ASA-202005-15", "ASA-202006-11", "ASA-202006-5", "ASA-202006-6", "ASA-202006-7", "ASA-202009-17", "ASA-202009-3", "ASA-202011-18", "ASA-202102-3", "ASA-202104-9", "ASA-202105-14"]}, {"type": "atlassian", "idList": ["ATLASSIAN:BSERV-11753", "ATLASSIAN:CRUC-8408", "ATLASSIAN:CRUC-8410", "ATLASSIAN:CWD-5683", "ATLASSIAN:FE-7196", "ATLASSIAN:FE-7202", "ATLASSIAN:JRASERVER-69725", "ATLASSIAN:JRASERVER-70929", "JRASERVER-73223"]}, {"type": "attackerkb", "idList": ["AKB:1D624C3C-7F37-4D01-82C2-583BB1E19E4F", "AKB:289DC3CE-ED8A-4366-89F0-46E148584C36", "AKB:38F76C83-56D0-4112-A583-4513CC15B1B3", "AKB:71F77351-1AE5-4161-8836-D26680828466", "AKB:7C5703D3-9E18-4F5C-A4D2-25E1F09B43CB", "AKB:FB2F65B2-D10B-4622-AEE6-41AAD3C1E6E7"]}, {"type": "avleonov", "idList": ["AVLEONOV:28E47C69DA4A069031694EB4C2C931BA", "AVLEONOV:93A5CCFA19B815AE15942F533FFD65C4", "AVLEONOV:F17F36C3CC642EBDC27E43900FE3905E"]}, {"type": "broadcom", "idList": ["BSA-2021-1013"]}, {"type": "carbonblack", "idList": ["CARBONBLACK:19B4E04F8F1723A4F28FA7A8354698AF", "CARBONBLACK:91F55D2B8B2999589579EACB1542A3E9", "CARBONBLACK:A526657711947788A54505B0330C16A0"]}, {"type": "centos", "idList": ["CESA-2017:2423", "CESA-2017:2492", "CESA-2019:1873", "CESA-2019:2029", "CESA-2019:3836", "CESA-2020:0839", "CESA-2020:1016", "CESA-2020:1335", "CESA-2020:1349", "CESA-2020:2530", "CESA-2020:5437", "CESA-2021:0162", "CESA-2021:1297", "CESA-2021:1298", "CESA-2021:1354"]}, {"type": "cert", "idList": ["VU:490028", "VU:567764", "VU:930724"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2019-0531", "CPAI-2019-0539", "CPAI-2019-0561", "CPAI-2019-1720", "CPAI-2019-1870", "CPAI-2019-2071", "CPAI-2019-2209", "CPAI-2020-0407", "CPAI-2020-0416", "CPAI-2020-0872", "CPAI-2020-1091", "CPAI-2020-1095", "CPAI-2020-1183", "CPAI-2020-1284", "CPAI-2020-1285", "CPAI-2020-1331", "CPAI-2020-1346", "CPAI-2020-1379", "CPAI-2020-3205", "CPAI-2020-3308", "CPAI-2021-0298", "CPAI-2021-0517"]}, {"type": "checkpoint_security", "idList": ["CPS:SK172983"]}, {"type": "chrome", "idList": ["GCSA-2509954079155194578", "GCSA-3803715665928870837"]}, {"type": "cisa", "idList": ["CISA:2B970469D89016F563E142BE209443D8", "CISA:3D9E69A26C68866B64ED6E4B31E270E6", "CISA:406AECF81233D47A32B44C16D7A13849", "CISA:433F588AAEF2DF2A0B46FE60687F19E0", "CISA:519C5EFD37846AD34AA43099C8D86620", "CISA:61F2653EF56231DB3AEC3A9E938133FE", "CISA:69BE91A89A9A3F3041ED791289DF9FDB", "CISA:7E752ED3C4545FF8F72629B02D303E84", "CISA:7E93687DEED7F2EA7EFAEBA997B30A5D", "CISA:7FB0A467C0EB89B6198A58418B43D50C", "CISA:990FCFCEB1D9B60F5FAA47A1F537A3CB", "CISA:B47E8667695B59F24286931C39664E52", "CISA:EDD759FDD1E894174F1778F4D96FA2FF"]}, {"type": "cisco", "idList": ["CISCO-SA-TELNETD-EFJREZPX"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:02669B806A06D41B24DA398CE2D4EEFD", "CFOUNDRY:3B9568B5C673F722E180705DE02F0625", "CFOUNDRY:3CD9371F7B812821D289B3B89526722F", "CFOUNDRY:40058483A2E2195544934D494FF464F7", "CFOUNDRY:63AC599C6730C4293761CECD360AA195", "CFOUNDRY:87EED6F38C9114A077795F94CEE1CCD3", "CFOUNDRY:A005A5D22D18F966EBF6C011F833E895", "CFOUNDRY:AA356DA8CD5E3C69DBEE45AEF6C8C74F", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190", "CFOUNDRY:BCFE0333C3F2E89FFDF11615D117C9AF", "CFOUNDRY:BD71AB043932448695E8B3D20302D582", "CFOUNDRY:BFC28EFEE9A9ABA8EC627AB7942BCFD7", "CFOUNDRY:D09A12445CD6214C067F9255280BC24D", "CFOUNDRY:DBBC716FD85510861511BDE10DD24963", "CFOUNDRY:DC7BE5C08671B54CC5F39351987D8CA3", "CFOUNDRY:E9CE0268DAFD76AE052E27B69A06ACBD"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1608724009", "CLSA-2020:1608724134", "CLSA-2021:1632261785", "CLSA-2021:1632328234", "CLSA-2021:1632328264"]}, {"type": "cve", "idList": ["CVE-2016-2542", "CVE-2016-7103", "CVE-2017-1000061", "CVE-2017-5645", "CVE-2018-14040", "CVE-2018-14041", "CVE-2018-14042", "CVE-2018-14550", "CVE-2018-14613", "CVE-2019-0227", "CVE-2019-0228", "CVE-2019-0230", "CVE-2019-0232", "CVE-2019-0233", "CVE-2019-10080", "CVE-2019-10086", "CVE-2019-10098", "CVE-2019-10173", "CVE-2019-10246", "CVE-2019-10247", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11048", "CVE-2019-11358", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-12086", "CVE-2019-12402", "CVE-2019-12406", "CVE-2019-1241", "CVE-2019-12415", "CVE-2019-12419", "CVE-2019-14379", "CVE-2019-15218", "CVE-2019-16746", "CVE-2019-16942", "CVE-2019-17075", "CVE-2019-17133", "CVE-2019-17195", "CVE-2019-17495", "CVE-2019-17566", "CVE-2019-17632", "CVE-2019-18885", "CVE-2019-19052", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19078", "CVE-2019-20812", "CVE-2019-2904", "CVE-2019-3738", "CVE-2019-3739", "CVE-2019-3740", "CVE-2019-3773", "CVE-2019-3874", "CVE-2019-3900", "CVE-2019-5428", "CVE-2019-7317", "CVE-2019-8331", "CVE-2020-10543", "CVE-2020-10751", "CVE-2020-10878", "CVE-2020-11612", "CVE-2020-11655", "CVE-2020-11656", "CVE-2020-11973", "CVE-2020-12723", "CVE-2020-13434", "CVE-2020-13435", "CVE-2020-13871", "CVE-2020-13934", "CVE-2020-13935", "CVE-2020-13954", "CVE-2020-13956", "CVE-2020-1941", "CVE-2020-1945", "CVE-2020-24750", "CVE-2020-26217", "CVE-2020-26422", "CVE-2020-27193", "CVE-2020-27216", "CVE-2020-27218", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5408", "CVE-2020-5421", "CVE-2020-7774", "CVE-2020-8203", "CVE-2020-8277", "CVE-2020-9484", "CVE-2021-2008", "CVE-2021-2053", "CVE-2021-2134", "CVE-2021-2135", "CVE-2021-2136", "CVE-2021-2140", "CVE-2021-2141", "CVE-2021-2142", "CVE-2021-2144", "CVE-2021-2145", "CVE-2021-2146", "CVE-2021-2147", "CVE-2021-2149", "CVE-2021-2150", "CVE-2021-2151", "CVE-2021-2152", "CVE-2021-2153", "CVE-2021-2154", "CVE-2021-2155", "CVE-2021-2156", "CVE-2021-2157", "CVE-2021-2158", "CVE-2021-2159", "CVE-2021-2160", "CVE-2021-2161", "CVE-2021-2162", "CVE-2021-2163", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2167", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2173", "CVE-2021-2174", "CVE-2021-2175", "CVE-2021-2177", "CVE-2021-2178", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2181", "CVE-2021-2182", "CVE-2021-2183", "CVE-2021-2184", "CVE-2021-2185", "CVE-2021-2186", "CVE-2021-2187", "CVE-2021-2188", "CVE-2021-2189", "CVE-2021-2190", "CVE-2021-2191", "CVE-2021-2192", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2195", "CVE-2021-2196", "CVE-2021-2197", "CVE-2021-2198", "CVE-2021-2199", "CVE-2021-2200", "CVE-2021-2201", "CVE-2021-2202", "CVE-2021-2203", "CVE-2021-2204", "CVE-2021-2205", "CVE-2021-2206", "CVE-2021-2207", "CVE-2021-2208", "CVE-2021-2209", "CVE-2021-2210", "CVE-2021-2211", "CVE-2021-2212", "CVE-2021-2213", "CVE-2021-2214", "CVE-2021-2215", "CVE-2021-2216", "CVE-2021-2217", "CVE-2021-2218", "CVE-2021-2219", "CVE-2021-2220", "CVE-2021-2221", "CVE-2021-2222", "CVE-2021-2223", "CVE-2021-2224", "CVE-2021-2225", "CVE-2021-2226", "CVE-2021-2227", "CVE-2021-2228", "CVE-2021-2229", "CVE-2021-2230", "CVE-2021-2231", "CVE-2021-2232", "CVE-2021-2233", "CVE-2021-2234", "CVE-2021-2235", "CVE-2021-2236", "CVE-2021-2237", "CVE-2021-2238", "CVE-2021-2239", "CVE-2021-2240", "CVE-2021-2241", "CVE-2021-2242", "CVE-2021-2244", "CVE-2021-2245", "CVE-2021-2246", "CVE-2021-2247", "CVE-2021-2248", "CVE-2021-2249", "CVE-2021-2250", "CVE-2021-2251", "CVE-2021-2252", "CVE-2021-2253", "CVE-2021-2254", "CVE-2021-2255", "CVE-2021-2256", "CVE-2021-2257", "CVE-2021-2258", "CVE-2021-2259", "CVE-2021-2260", "CVE-2021-2261", "CVE-2021-2262", "CVE-2021-2263", "CVE-2021-2264", "CVE-2021-2266", "CVE-2021-2267", "CVE-2021-2268", "CVE-2021-2269", "CVE-2021-2270", "CVE-2021-2271", "CVE-2021-2272", "CVE-2021-2273", "CVE-2021-2274", "CVE-2021-2275", "CVE-2021-2276", "CVE-2021-2277", "CVE-2021-2278", "CVE-2021-2279", "CVE-2021-2280", "CVE-2021-2281", "CVE-2021-2282", "CVE-2021-2283", "CVE-2021-2284", "CVE-2021-2285", "CVE-2021-2286", "CVE-2021-2287", "CVE-2021-2288", "CVE-2021-2289", "CVE-2021-2290", "CVE-2021-2291", "CVE-2021-2292", "CVE-2021-2293", "CVE-2021-2294", "CVE-2021-2295", "CVE-2021-2296", "CVE-2021-2297", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2302", "CVE-2021-2303", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2306", "CVE-2021-2307", "CVE-2021-2308", "CVE-2021-2309", "CVE-2021-2310", "CVE-2021-2311", "CVE-2021-2312", "CVE-2021-2314", "CVE-2021-2315", "CVE-2021-2316", "CVE-2021-2317", "CVE-2021-2318", "CVE-2021-2319", "CVE-2021-2320", "CVE-2021-2321", "CVE-2021-26117"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1479-1:ABA01", "DEBIAN:DLA-1517-1:358D4", "DEBIAN:DLA-1517-1:7BA55", "DEBIAN:DLA-1715-1:4A3F9", "DEBIAN:DLA-1731-1:D19BD", "DEBIAN:DLA-1731-2:E6E1E", "DEBIAN:DLA-1771-1:3CE68", "DEBIAN:DLA-1777-1:55799", "DEBIAN:DLA-1797-1:1A7B8", "DEBIAN:DLA-1797-1:A2877", "DEBIAN:DLA-1798-1:E389B", "DEBIAN:DLA-1800-1:756F1", "DEBIAN:DLA-1806-1:715A9", "DEBIAN:DLA-1810-1:6874E", "DEBIAN:DLA-1839-1:13DB7", "DEBIAN:DLA-1839-1:728E0", "DEBIAN:DLA-1862-1:8E150", "DEBIAN:DLA-1879-1:41860", "DEBIAN:DLA-1884-1:61F35", "DEBIAN:DLA-1885-1:84558", "DEBIAN:DLA-1896-1:572E2", "DEBIAN:DLA-1896-1:853E6", "DEBIAN:DLA-1900-1:23801", "DEBIAN:DLA-1900-1:EE6D1", "DEBIAN:DLA-1919-1:239EC", "DEBIAN:DLA-1919-2:858F8", "DEBIAN:DLA-1930-1:DFCDE", "DEBIAN:DLA-1943-1:5F5AB", "DEBIAN:DLA-1943-1:9AD98", "DEBIAN:DLA-2065-1:517F5", "DEBIAN:DLA-2191-1:6C344", "DEBIAN:DLA-2203-1:86D5F", "DEBIAN:DLA-2209-1:84C77", "DEBIAN:DLA-2209-1:D154F", "DEBIAN:DLA-2217-1:0ED90", "DEBIAN:DLA-2221-1:3C6AD", "DEBIAN:DLA-2221-1:DCC99", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DLA-2270-1:4546C", "DEBIAN:DLA-2279-1:771F3", "DEBIAN:DLA-2279-1:AB3FB", "DEBIAN:DLA-2286-1:A2783", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2385-1:FDE93", "DEBIAN:DLA-2405-1:33C7A", "DEBIAN:DLA-2406-1:00733", "DEBIAN:DLA-2407-1:CBAA5", "DEBIAN:DLA-2437-1:9852C", "DEBIAN:DLA-2459-1:C9586", "DEBIAN:DLA-2460-1:279E8", "DEBIAN:DLA-2463-1:1381E", "DEBIAN:DLA-2471-1:AFC93", "DEBIAN:DLA-2555-1:64862", "DEBIAN:DLA-2563-1:B363B", "DEBIAN:DLA-2565-1:CC1A3", "DEBIAN:DLA-2569-1:11737", "DEBIAN:DLA-2628-1:6F808", "DEBIAN:DLA-2634-1:2F707", "DEBIAN:DLA-2638-1:5B442", "DEBIAN:DLA-2638-1:AB692", "DEBIAN:DLA-2751-1:5F8DA", "DEBIAN:DLA-2821-1:A72F4", "DEBIAN:DSA-4233-1:7C3A1", "DEBIAN:DSA-4434-1:82FB6", "DEBIAN:DSA-4434-1:D2F07", "DEBIAN:DSA-4435-1:0A830", "DEBIAN:DSA-4435-1:1D8EB", "DEBIAN:DSA-4465-1:DDE47", "DEBIAN:DSA-4472-1:4A655", "DEBIAN:DSA-4472-1:97343", "DEBIAN:DSA-4495-1:1269E", "DEBIAN:DSA-4495-1:258DC", "DEBIAN:DSA-4497-1:7E46B", "DEBIAN:DSA-4509-1:7B58D", "DEBIAN:DSA-4509-1:D6C70", "DEBIAN:DSA-4542-1:03F2D", "DEBIAN:DSA-4542-1:432E5", "DEBIAN:DSA-4686-1:A3244", "DEBIAN:DSA-4686-1:EDCC0", "DEBIAN:DSA-4693-1:F5786", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4698-1:E1A7D", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4699-1:D5D43", "DEBIAN:DSA-4757-1:5C812", "DEBIAN:DSA-4757-1:83F60", "DEBIAN:DSA-4789-1:72A9C", "DEBIAN:DSA-4789-1:817CC", "DEBIAN:DSA-4795-1:5CD54", "DEBIAN:DSA-4807-1:1C1CB", "DEBIAN:DSA-4835-1:22674", "DEBIAN:DSA-4855-1:B091B", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4899-1:2F354", "DEBIAN:DSA-5004-1:999C3", "DEBIAN:DSA-5020-1:32A64"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-1000061", "DEBIANCVE:CVE-2017-5645", "DEBIANCVE:CVE-2018-1000180", "DEBIANCVE:CVE-2018-1000613", "DEBIANCVE:CVE-2018-8032", "DEBIANCVE:CVE-2019-0227", "DEBIANCVE:CVE-2019-10086", "DEBIANCVE:CVE-2019-10098", "DEBIANCVE:CVE-2019-17566", "DEBIANCVE:CVE-2019-17571", "DEBIANCVE:CVE-2020-11979", "DEBIANCVE:CVE-2020-11987", "DEBIANCVE:CVE-2020-11998", "DEBIANCVE:CVE-2020-1927", "DEBIANCVE:CVE-2020-1941", "DEBIANCVE:CVE-2020-1945", "DEBIANCVE:CVE-2020-28052", "DEBIANCVE:CVE-2020-7760", "DEBIANCVE:CVE-2020-8277", "DEBIANCVE:CVE-2020-9488"]}, {"type": "drupal", "idList": ["DRUPAL-SA-CORE-2022-002"]}, {"type": "exploitdb", "idList": ["EDB-ID:46682", "EDB-ID:47073", "EDB-ID:49068", "EDB-ID:49071"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:A8C8424AAD98145F43A2AF9734E0BCF4"]}, {"type": "f5", "idList": ["F5:K13184144", "F5:K14255532", "F5:K17321505", "F5:K21430012", "F5:K23630542", "F5:K24383845", "F5:K25126370", "F5:K32804955", "F5:K40508224", "F5:K51011533", "F5:K51674118", "F5:K95208524"]}, {"type": "fedora", "idList": ["FEDORA:000423094DC3", "FEDORA:0051430CF91F", "FEDORA:017273129EBB", "FEDORA:041196190421", "FEDORA:04868606351B", "FEDORA:0491B668B8F5", "FEDORA:05AFB3091421", "FEDORA:0730C6051059", "FEDORA:07B5A6CB4421", "FEDORA:07D2762C825F", "FEDORA:0A47230D7963", "FEDORA:0AC1C60C76B5", "FEDORA:0D1FF66FAB6D", "FEDORA:0D4A66058533", "FEDORA:0D7F230979AB", "FEDORA:0FDC630A5C68", "FEDORA:10ED96049C48", "FEDORA:11C9F606DF50", "FEDORA:11D1460CADC2", "FEDORA:12C83309E79F", "FEDORA:1364530979AB", "FEDORA:146FE30DD5E7", "FEDORA:16B2E6344278", "FEDORA:16BDD6092702", "FEDORA:18A7960877B3", "FEDORA:18B6A601B8F9", "FEDORA:1BD5B6389B47", "FEDORA:1CAC0608E6F2", "FEDORA:21C3E309DE29", "FEDORA:224AE608F491", "FEDORA:267796076024", "FEDORA:26A3B606353E", "FEDORA:277F560476FA", "FEDORA:2836F613193B", "FEDORA:2A5B86076F48", "FEDORA:2BAD930CF289", "FEDORA:2BD533098BA0", "FEDORA:2D51F60C28B2", "FEDORA:2ED3A6058506", "FEDORA:2F93B6076D15", "FEDORA:30E656126A67", "FEDORA:320386075B54", "FEDORA:328696076D30", "FEDORA:341EA6057129", "FEDORA:344346042F3E", "FEDORA:3706260609AC", "FEDORA:371D8608F499", "FEDORA:371E06040B12", "FEDORA:376506075014", "FEDORA:3787360525AF", "FEDORA:38BDC3095ADB", "FEDORA:38D8230C58CD", "FEDORA:398FD60CEC5A", "FEDORA:3A3766C5B5A2", "FEDORA:3A69E60B3E88", "FEDORA:3AEB830B2656", "FEDORA:3B84A305A8AE", "FEDORA:3C394606D98F", "FEDORA:3F234602D69C", "FEDORA:3F6FC603B27A", "FEDORA:4002B609954A", "FEDORA:4036A60ACFA8", "FEDORA:438D16045644", "FEDORA:44652606F1D1", "FEDORA:44F56325DDAB", "FEDORA:4788E309FF20", "FEDORA:481D1608F47B", "FEDORA:48CC5309B6F7", "FEDORA:48D7A3098BA2", "FEDORA:49205309799A", "FEDORA:49A0E6048FEB", "FEDORA:4A1276046F94", "FEDORA:4A64830CFCDC", "FEDORA:4C04C605CB70", "FEDORA:4CEF5610D7CA", "FEDORA:4D359608778C", "FEDORA:4F21B6125E50", "FEDORA:4FB5560427DA", "FEDORA:511986124F82", "FEDORA:511A7608E6E1", "FEDORA:51B856067EB8", "FEDORA:52396606732B", "FEDORA:53C3261278CC", "FEDORA:54575302587A", "FEDORA:59A883072F03", "FEDORA:59E3F606D998", "FEDORA:5A27030A7064", "FEDORA:5A4D662AE22C", "FEDORA:5A7AC6087A51", "FEDORA:5BC786077CC2", "FEDORA:5D29C6345DD2", "FEDORA:5E5506051725", "FEDORA:5F36E6079A0D", "FEDORA:61A713098ED5", "FEDORA:628EB603ECD0", "FEDORA:6869030D3139", "FEDORA:690DE6022BA8", "FEDORA:6976D62A089B", "FEDORA:6B66A6047312", "FEDORA:6C06860BAFF2", "FEDORA:6E66C608B5D9", "FEDORA:6E67663233DB", "FEDORA:707E930AB4A5", "FEDORA:748BC6048FFE", "FEDORA:754F860A98ED", "FEDORA:758FA61278EA", "FEDORA:76CFD605E21F", "FEDORA:772A7605712B", "FEDORA:77A873096A19", "FEDORA:79EAC605FC25", "FEDORA:7A1EA3098BA2", "FEDORA:7B34D3127D43", "FEDORA:7CFF660874FE", "FEDORA:7D962606E7C6", "FEDORA:7F23B6061573", "FEDORA:803AE30C6416", "FEDORA:822D960BF257", "FEDORA:84FBF6179A05", "FEDORA:8514B6312F21", "FEDORA:85B0430979AB", "FEDORA:86D5D3097097", "FEDORA:87CE1617FCD1", "FEDORA:87DD160648EE", "FEDORA:882916051CFA", "FEDORA:8836630BDEAC", "FEDORA:88EAA30905CF", "FEDORA:89C9C6051B3A", "FEDORA:8B34C608D224", "FEDORA:8B7ED61120D5", "FEDORA:8C11E6076D27", "FEDORA:8C9CB30BDABD", "FEDORA:8E08F605F09F", "FEDORA:8FEA960A4096", "FEDORA:91BCA30520E0", "FEDORA:929076060E6D", "FEDORA:93A083094AEF", "FEDORA:941CE60BDCAF", "FEDORA:94A8C309799A", "FEDORA:94BC060A4ECF", "FEDORA:973BC60CDD88", "FEDORA:9801060D30FA", "FEDORA:98E8F6079A11", "FEDORA:993EF606D491", "FEDORA:9970030A594F", "FEDORA:9BFED31347B3", "FEDORA:9F2FE3098B94", "FEDORA:A071E60419A6", "FEDORA:A09EE6087595", "FEDORA:A387A3072636", "FEDORA:A8ABE60560A2", "FEDORA:A94C730ECAFD", "FEDORA:A99066078F69", "FEDORA:AA46430A6A34", "FEDORA:AAF643072F13", "FEDORA:AC9AB30BBFBA", "FEDORA:AE3D830AB4B2", "FEDORA:AE8886060E81", "FEDORA:AF19730979AB", "FEDORA:B0BBE6085FBF", "FEDORA:B0F9260499C1", "FEDORA:B87A730E900E", "FEDORA:BA292604B38E", "FEDORA:BACE03098BA0", "FEDORA:BB774312EFDE", "FEDORA:BDC9D3090DB1", "FEDORA:BF5EC607125E", "FEDORA:BF8D031075B1", "FEDORA:BFF95608779F", "FEDORA:C0A2E30B00AE", "FEDORA:C1EA6603ECEC", "FEDORA:C3ED760C452F", "FEDORA:C4D496071279", "FEDORA:C63656040AE1", "FEDORA:C6ACE30A5262", "FEDORA:C6AD93098B94", "FEDORA:C6AF860C4240", "FEDORA:C7391611860D", "FEDORA:C7AFE309727E", "FEDORA:C91E46060E8C", "FEDORA:CB0956087865", "FEDORA:CD864304939A", "FEDORA:CF92F602C6D5", "FEDORA:D091860478FA", "FEDORA:D1CD060F60C5", "FEDORA:D3523607924A", "FEDORA:D3C883052BBC", "FEDORA:D4B143098BA2", "FEDORA:D8A0E3053060", "FEDORA:D948D608771F", "FEDORA:DA60861278C0", "FEDORA:DBC4662F3455", "FEDORA:DC7DF3111B2E", "FEDORA:E0E2C3098BA0", "FEDORA:E37FD60924F1", "FEDORA:E700F3072E21", "FEDORA:E8332604D4B4", "FEDORA:E9B1430CC2C0", "FEDORA:E9B236090C2D", "FEDORA:EA4F2309E0EF", "FEDORA:EC9F26076D31", "FEDORA:EDF1E309799A", "FEDORA:EE46664638EB", "FEDORA:EEC036047C93", "FEDORA:EF5B36120D8F", "FEDORA:EFDAB6050C3B", "FEDORA:F015D61278C8", "FEDORA:F02C560914F4", "FEDORA:F12FB31404B0", "FEDORA:F149334E497A", "FEDORA:F41A860321C6"]}, {"type": "fireeye", "idList": ["FIREEYE:D64714BFF80E34308579150D4C839557"]}, {"type": "freebsd", "idList": ["012809CE-83F3-11EA-92AB-00163E433440", "08B553ED-537A-11EB-BE6E-0022489AD614", "10E3ED8A-DB7F-11EA-8BDF-643150D3111D", "1FB13175-ED52-11EA-8B93-001B217B3468", "20006B5F-A0BC-11EB-8AE6-FC4DD43E2B6A", "24ACE516-FAD7-11EA-8D8C-005056A311D1", "3C5A4FE0-9EBB-11E9-9169-FCAA147E860E", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "676CA486-9C1E-11EA-8B5E-B42E99A1B9C3", "67B050AE-EC82-11EA-9071-10C37B4AC2EA", "81FCC2F9-E15A-11E9-ABBF-800DD28B22BD", "AD792169-2AA4-11EB-AB71-0022489AD614", "CAF545F2-C0D9-11E9-9051-4C72B94353B5", "FE93803C-883F-11E8-9F0C-001B216D295B"]}, {"type": "gentoo", "idList": ["GLSA-201908-02", "GLSA-201909-04", "GLSA-201911-08", "GLSA-202003-57", "GLSA-202006-03", "GLSA-202011-17", "GLSA-202011-18", "GLSA-202012-11", "GLSA-202012-13", "GLSA-202012-14", "GLSA-202012-16", "GLSA-202012-23", "GLSA-202012-24", "GLSA-202101-07", "GLSA-202101-12", "GLSA-202101-29", "GLSA-202104-04", "GLSA-202105-27", "GLSA-202105-28"]}, {"type": "github", "idList": ["GHSA-2CWJ-8CHV-9PP9", "GHSA-344F-F5VG-2JFJ", "GHSA-42F2-F9VC-6365", "GHSA-4446-656P-F54G", "GHSA-48RW-J489-928M", "GHSA-4PV3-63JW-4JW2", "GHSA-523C-XH4G-MH5M", "GHSA-53X6-4X5P-RRVV", "GHSA-58P8-9G59-Q2HR", "GHSA-5R5R-6HPJ-8GG9", "GHSA-5WW9-J83M-Q7QX", "GHSA-64X2-GQ24-75PV", "GHSA-6C3J-C64M-QHGQ", "GHSA-6FPP-RGJ9-8RWC", "GHSA-6PCC-3RFX-4GPM", "GHSA-73XV-W5GP-FRXH", "GHSA-744R-VV2G-2X6G", "GHSA-7MVR-5X2G-WFC8", "GHSA-8222-6FC8-MHVF", "GHSA-83MX-573X-5RW9", "GHSA-84RM-QF37-FGC2", "GHSA-86WM-RRJM-8WH8", "GHSA-89QR-369F-5M5X", "GHSA-8C4J-34R4-XR8G", "GHSA-8HFJ-XRJ2-PM22", "GHSA-8VMX-QMCH-MPQG", "GHSA-8W26-6F25-CM9X", "GHSA-96JQ-75WH-2658", "GHSA-9GPH-22XH-8X98", "GHSA-9M6F-7XCQ-8VF8", "GHSA-9V3M-8FP8-MJ99", "GHSA-C427-HJC3-WRFW", "GHSA-C9JJ-3WVG-Q65H", "GHSA-CC94-3V9C-7RM8", "GHSA-CJJC-XP8V-855W", "GHSA-CVM9-FJM9-3572", "GHSA-CW6W-Q88J-6MQF", "GHSA-F6VF-PQ8C-69M4", "GHSA-F93P-F762-VR53", "GHSA-F9XH-2QGP-CQ57", "GHSA-FXWM-579Q-49QQ", "GHSA-H3CW-G4MQ-C5X2", "GHSA-H79P-32MX-FJJ9", "GHSA-H9GJ-RQRW-X4FQ", "GHSA-HF23-9PF7-388P", "GHSA-HPCF-8VF9-Q4GJ", "GHSA-HWJ3-M3P6-HJ38", "GHSA-JJPQ-GP5Q-8Q6W", "GHSA-JQ65-29V4-4X35", "GHSA-M6X4-97WX-4Q27", "GHSA-MW36-7C6C-Q4Q2", "GHSA-MX7P-6679-8G3Q", "GHSA-P6MC-M468-83GW", "GHSA-PJ7M-G53M-7638", "GHSA-Q44V-XC3G-V7JQ", "GHSA-Q4HG-RMQ2-52Q9", "GHSA-QGM6-9472-PWQ7", "GHSA-QJW2-HR98-QGFH", "GHSA-R28M-G6J9-R2H5", "GHSA-R3GR-CXRF-HG25", "GHSA-R695-7VR9-JGC2", "GHSA-RV39-3QH7-9V7W", "GHSA-VCJF-MGCG-JXJQ", "GHSA-VFQX-33QM-G869", "GHSA-VWQQ-5VRC-XW9H", "GHSA-WH77-3X4M-4Q9G", "GHSA-WH8G-3J2C-RQJ5", "GHSA-WP4H-PVGW-5727", "GHSA-WV67-Q8RR-GRJP", "GHSA-XC67-HJX6-CGG6", "GHSA-XQJ7-J8J5-F2XR"]}, {"type": "githubexploit", "idList": ["042AB58A-C86A-5A8B-AED3-2FF3624E97E3", "04BCA9BC-E3AD-5234-A5F0-7A1ED826F600", "06BAC40D-74DF-5994-909F-3A87FC3B76C8", "07DF268C-467E-54A3-B713-057BA19C72F7", "07E56BF6-A72B-5ACD-A2FF-818C48E4E132", "0CFAB531-412C-57A0-BD9E-EF072620C078", "12E44744-1AF0-523A-ACA2-593B4D33E014", "14BD2DBD-3A91-55FC-9836-14EF9ABF56CF", "14CD7401-C309-52B2-B4EE-AD54900F0455", "18F5237C-DCAC-5831-AED6-F0880A11DFF2", "194C161A-A17E-51A4-97CC-179E45EC7253", "20466D13-6C5B-5326-9C8B-160E9BE37195", "2255B39F-1B91-56F4-A323-8704808620D3", "24B7AC9D-6C5E-545B-97E4-F20711FFCF8F", "2691C74B-4ECB-5E22-8BDF-7784E321BE55", "28D42B84-AB24-5FC6-ADE1-610374D67F21", "2B8C7714-D2D7-50C4-BEB8-B616BD51A554", "2D16FB2A-7A61-5E45-AAF8-1E090E0ADCC0", "2E71FF50-1B48-5A8E-9212-C4CF9399715C", "32FB08A0-ACB0-5E2F-8691-570E7B806086", "3640EAF9-330F-508E-A488-D3A51649AD96", "37DBE88A-3249-51AF-8021-8619CFD56A4B", "3A26C086-A741-585B-8FA9-F90780E2CA16", "3DFE8091-03AE-565B-A198-BD509784502C", "3F400483-1F7E-5BE5-8612-4D55D450D553", "4278B435-D22E-57E8-ABC4-639BAAFA6FC9", "453574C2-C801-529D-A0A6-5C5E1471F1AC", "458891C6-0BE7-5AC1-8119-7DD6B0884A9A", "49EC151F-12F0-59CF-960C-25BD54F46680", "4CB63A18-5D6F-57E3-8CD8-9110CF63E120", "4D38002E-58DF-5264-9A2E-9E446EDF6721", "4E339DB6-4704-5991-B690-DF8D7307532E", "504D019A-423C-50A0-9677-93192F0ECDFC", "50FA6373-CBCD-5EF5-B37D-0ECD621C6134", "5602A60A-886A-598C-99B3-EE2E820506AD", "58CD2EEE-5826-5136-84D4-BCAC28741415", "5B025A0D-055E-552C-B1FB-287C6F191F8E", "5E7409E5-7716-5F40-999C-E6622B806F5E", "5E80DB20-575C-537A-9B83-CCFCCB55E448", "6083DCC3-CA9C-58A4-9FBC-983DF1E52584", "63C36F7A-5F99-5A79-B99F-260360AC237F", "6FB0B63E-DE9A-5065-B577-ECA3ED5E9F4B", "7078ED42-959E-5242-BE9D-17F2F99C76A8", "7247E67F-6DD7-5526-8312-91D0D99FED26", "72ACBBC1-E9FB-5A12-8614-06BEF5F96394", "743F51FB-8BF4-5425-AEFA-10B2A14C8F3B", "79FADEDE-9F29-583A-908E-676A91E2F562", "7C6A25CE-E02A-57D4-B020-A998CFA24D76", "879CF3A7-ECBC-552A-A044-5E2724F63279", "87B06BBD-7ED2-5BD2-95E1-21EE66501505", "92CE6110-40F8-5FE5-909B-BE6B59186578", "939F3BE7-AF69-5351-BD56-12412FA184C5", "958F00F1-C4FC-5213-82EA-290A530F859B", "95E9031F-A021-5296-ADC3-71E43A95A049", "968DBE0A-CC05-5F47-B348-E8E33AA33F6C", "9C9BD402-511C-597D-9864-647131FE6647", "9D1AE9EC-AAED-5991-9F41-9458ABC7EFC3", "9E63B0B5-5583-5FC0-85B1-048296D9FC6A", "A24AC1AC-55EF-51D8-B696-32F369DCAB96", "A435389F-9C9F-5CEA-8255-C23422F533AB", "A46721A6-23E8-5E16-B9CA-0C887A66551D", "A4A33F39-BA6F-5AC0-B72C-30F0E4D6CD56", "A906B17D-A78F-5755-8763-7D1AA7E65750", "AEF449B8-DC3E-544A-A748-5A1C6F7EBA59", "B0BA17F5-F171-5C97-9F6C-D5F38B5B64F5", "B0E0C8DF-3D79-58BC-881A-52FFBFBDE3F8", "B1E738E0-BF1B-50E1-88E2-1D265CF9AEB8", "B2E1F725-D74D-5E81-88CC-6530BC9BAB30", "B38C8387-765B-587E-BBED-9336E586B3E2", "B4CCD6DC-671B-58FE-9826-B4F9C361A650", "B663ED8E-3FC8-597C-94C8-F7D1BA5DAF2B", "B7C1C535-3653-5D12-8922-4C6A5CCBD5F3", "B9EB8E0F-C53A-5795-92FA-1994F120A1CF", "BA280EB1-2FF9-52DA-8BA4-A276A1158DD8", "BA9D322B-4694-5B07-BD2F-83E700A62DE8", "BBE1926E-1EC7-5657-8766-3CA8418F815C", "BC46DAAE-9274-500B-A6A2-DB7DA8EAF068", "BD05B538-25EA-5C42-AE8D-229D78B57CB1", "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "C2D99D6A-1A8C-5D55-BBB7-34A978AAC642", "C3C9928F-AC84-5B3E-980E-F594CABE8EA3", "C4EDB405-454C-5160-9A99-21A930740C3F", "C5B49BD0-D347-5AEB-A774-EE7BB35688E9", "C7CE5D12-A4E5-5FF2-9F07-CD5E84B4C02F", "C7E2EC97-A49D-5063-BC43-995A0E058FCF", "C7F6FB3B-581D-53E1-A2BF-C935FE7B03C8", "C878132C-FB46-5C51-9D3B-B87DB3578112", "C9BC03B4-078B-5F3C-815A-98E0F8AAA33B", "CF07CF32-0B8E-58E5-A410-8FA68D411ED0", "D178DAA4-01D0-50D0-A741-1C3C76A7D023", "D3C401E0-D013-59E2-8FFB-6BEF41DA3D1B", "D5CBA0E2-A4B0-52CE-B93B-F433CE8662DA", "DB8D8364-06FB-55E8-934E-C013B00821B5", "DC2FB701-98C0-58E1-9CBB-F9E17BA3A8A0", "DEC5B8BB-1933-54FF-890E-9C2720E9966E", "E33DA23C-583C-5F85-BB23-9315943B5C00", "E56192E7-FC31-58F7-A982-BEA41F95D172", "E83D6606-6F89-5700-B703-B87CF90D6565", "E95D9A0E-E9DE-5D95-9879-E07C0257318C", "E9F25671-2BEF-5E8B-A60A-55C6DD9DE820", "EA74F876-4376-5A5F-B6EE-1AA5B4690A29", "EF08F582-5E5C-506D-B223-26A7028B4A16", "EF22B1BD-85C3-525C-B7D6-94014939E96B", "F085F702-F1C3-5ACB-99BE-086DA182D98B", "F13B1CEC-8713-5A1E-8117-F6BED15AEA04", "F3523D8D-36CF-530B-85DD-013275F7D552", "F60737C1-A24B-51C1-AE8D-73A65C778FFF", "FC661572-B96B-5B2C-B12F-E8D279E189BF"]}, {"type": "hackerone", "idList": ["H1:1045844", "H1:874427"]}, {"type": "hivepro", "idList": ["HIVEPRO:8DA601C83DB9C139357327C06B06CB36"]}, {"type": "hp", "idList": ["HP:C06911998"]}, {"type": "httpd", "idList": ["HTTPD:5FF2D6B51D8115FFCB653949D8D36345"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20200715-01-OPENSSL", "HUAWEI-SA-20200902-01-STRUTS2", "HUAWEI-SA-20201105-01-NETLOGON"]}, {"type": "ibm", "idList": ["007E1AC1E4228B8135E45C63FCEF82799BD02C157157F082CD8D3E0F0D61C361", "023AF7CE811F35CB9EA5BD22171F66AA17D83D1B9FF44FF925D320814BAE40E2", "07988475CE9095B9471700FFB4FFB199A58AB32837E3178BE094D53E97B8461A", "087CD3B8800A1EB017C933808D8D5E610496ED972CA8243894CB2435705F3CAF", "0BDDBA484F3367829DBE683BE155B8F63CE6E7CF5747401F154DB308D91D8FD4", "0E93ED5DE66ECEEBDC351B52A02102977F0EC054248E1231FACE079530976EB4", "1360BEF97E01B87A4E58CA581A1F32ECD385845F24783D4980B6E64F68F389FB", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "17179127276D2C8BCC739D66B23A070D5DCF232A120A9E4EF31DA0C49E8077B9", "175009EB341D97448B52AD259BC76696D2A9138DEEB2C7A2778DE2B09D846193", "17E2A2234B8EB1A1FD88875B4639DD7977B1A0F62BC6D5F9D6C40BAFB9288E47", "1816205804EFBBBBB94018144A008A33799E226A9B559AA545872E5FBE25A885", "18E3835EB48610335189B66CA3B787759BF28CEA62D84163A3574C70FFE6874A", "1A35248CBBA17AE981ED0B52B133E7CA1678042C1A9C93C2EC8BED2EF8994420", "1A7668E81452E83AB00678328095567DA17543F8BDE6DB1EE678E96C5B064FD6", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1E31E5192E10CAAECCFE249B0EEB57518F8681EB105FB477D1D108CDEEAD4DD9", "217BB6C17A6FD504F278CE0259F71540873D9ACBEC02EC2F580CED3F0A79FB4A", "21FAA8B3214081B02B5CB45D8150D70F352C2BC0EC67E463FBA7D35DF6B2614C", "226FFFCDF94FA8471AA279C7EA3B887FAA510E3463B5ABDBC303B7D6583EE6BE", "22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "22FE69B31A10A2D1A4C8753B638EBDDDA55E81977EC4563B990767DDEB64861F", "24998913BBA24560DF90F23DACB1EE1AF91DAA3212C9A03EEBBD3A5EFE2155E0", "2A203D8BF52DCAFF8B5E95996A1B55C43D9BF20BC5F58B0B4D388698819D6CF7", "2B4BFF0D4D521D5012752D32EC9AED8D7B42C9CCDA58A0989CACAC0FE91E3799", "2B8ED03AFB64688F7C236312BC8155AB0C092B0BB10F225899EEE28BFC95B925", "2BD4C17835FEE75B5DD82D43E16DF6D6AFA1DE77CB24213DFD8CE6D73C92BEDD", "2E0D3D0CF86F6C48B680F76C93BAE1886AC182B679AAB019C0AA49D79D2D84BA", "2E99FBB731310229E5D67CCF834D84A3C63F588068BE4D2601929B95EFC9AA89", "2FBDB647A432042A10EC78183C73C0F6FB59930DA021F42ACDA90C79715CDA31", "301104FD8A64B7CFFEF0D7B773C4EB91D8D4FF589C9D5CCC6FB24E276422E1A4", "30A5CA62F6580AAFA852738DF5325C812D685A3292E94F7A9E759C1125E79A0A", "30C160035BB3D7D8CCEFC976E9A66E721135E92A5F2BC6D96A0922DAD970B145", "3155E4C578E235596C383461692E605196F27EF7EBE1510C68AECA994099E83C", "31D774CF733E3311087AF9DBF776C5768E99CD088E058FFAFD8CB6ADDEE91194", "3410A57294243E5BBAFB4C69F17AC837FB02B049396A85D095AF16279272DED9", "34BD53EB31AD88FE6BCD0318A3283205983F8374B4E36C18A2AB87E881443510", "353C8048EB40D7C11CD60ABB9D7F5DFD666EDB60B698E9932FC1A04919041609", "359D81A32B636B6B41B26FA1EB195DCDD898364CBE4C284C377BC53F3B665B24", "3685B92248F5EF5F87E22332608BA77B6E0CBEC5E65184E9ED006251D92D1762", "37B1C13D57560AD2D5EFC78D9765E406257D9DEC561AC751A89056CBB0B78CDF", "3806864362596B8F499C9B331631D79EC751CD68B24068ED9B36CFB553A6D005", "3A0EC58D68A9FF044EFDD59A19016C7F96E811E1FC47D2E23F42FDF074B43F35", "3C732FE7415FBA3DE391A641FEEFD9EF355B5481A82CB22A125F154F83F4488A", "3C757E6C207C325B90893148C70649850957A2F8AB27DE4E6D68D3EA4F71D013", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "43889098AF27B56E1AAC2C0ADC87D15751A2B0CCE3BF25260E32BBE3CCA7CE93", "441A6459C1CBE843EDD7F5C4D862AA7C6F90584EA901F82EF1B6D31B418078EB", "470748236CF687BBC17C70DFCCF5107CED7FA6CB57B3A02A0A94855B02E20BF9", "47274321AA3430917FC9FF88F99229CD7614CD6268ABCD535250486839A8D636", "49ED43DAA523C79B0D499D6AAAF1DB03BC188989246D9E4075BF6071BC1F62AD", "4A91EBA290B30504A8EF2EE87060FA1D3D5EF2F7A2869B4D9ACCE1C477DA4795", "4E6353F1062DDEE2F859DA9376A59A0A02E58324E8A0BB460968024ADB369792", "4EEA40866A50FD47B88CDEDFE5D4501E3C595A076C9874F03873B7D7BEC2B0F8", "4F83742D4D9E3F03A6481F27A21969D4333962D309ACFDC2D174BF09D63F0F8A", "4F8D39F3F464E5E9FD3000C317BC69CF4FEEE9F0605C69E62D810607C6BB87CD", "50AFB1284FA10D4E83AEFE409E8E05B67E7E2BCCAE0E467F68601455F164F5E3", "5A2425933E89E2C50FE1F3B1903983FFF1089EEE55483682712FA0DB9D6A700B", "5DC8FB040A584733A88E3C4FB30004B815F71BE1D0193C00019FE31037DC709D", "620DEEE8E25F410CD7D5D914617F8424D18C6FBA60049459E6DDEF27E51FE74C", "643278CE1BB636D8764FFFB99832A74E1EB43BC79E059A2AF6DA2A9DF4BB4FCB", "644A8D20EA5C122A543FD2875F814F29458A670A8F81310C4182A6D4DD814E43", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "68659D93A7B4C79150F4B62DF02E4CA34859145C18B4D4E7381CBF880486F5BA", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6CFD1F4E92DE674FABBF5CB0AB382F8E451BC50559AF2503871032E5B3345584", "6D14A4B63C553D8F0F27D90830AAE51E6B540ABC64ADB3C84D42F5E358D5DEBB", "6D72F5E2F90CAC5A4D151DD3483103FAB60A4A6FCD9FF4EB47E5E45ACF7A4129", "778EA31981EC95B7D8915FD854BC6A0D98BB9A839E808A14D3C548C3A88F9D2D", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "7CC35644F6B021F831E7F0CE6202E800E4D6128DCDC6A585E8A27C3D0C5B672E", "7E908C54FE9150C3B09D4779711C48C66901453652E1833B9998EC652FE7B869", "7FD9F7FFE1C0EF8F68DFE234A094535CE5CD56211AA4CA79732A71BF6B3C0262", "81D5F6F41E5617EDA7FF694BBE43496FC48B7577BB4C9C238127ECCCB1D40118", "8405678496B3F9D576311647EA784131ED1CC62B9B29E00D7E50D121BEBDAC6E", "86C7951371BC0A7800D1FEBC038565FA28DED7D904E47462C3F5395FDE8AB9C9", "88030D4F1517AC9EC8202290C87E6CA9AE0FE862783A643A8EA37C2CBB13C39A", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8DAEC6BCDE7A61BCB818037C4AAA2835BC75563C598312914F7766E39155FAB3", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "90D59D207E240BE5AC750765C539B8ED7F5604D85518190296B85710EF6190ED", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "981346B4F2948F216BED89C4CD8BE79AD6F63DE1FBA4E88FB16B5600DC4A27C5", "98B323422CA792F32B2EA7482D9D79B9F9D15C3830E9ED03453DF7CC38205557", "9987E875C9C70BDC98BBCFA96D1053320128B489B65C198738DCE478B17F732F", "9A04620999F6A5C33EA2D706818867EC5FDA6193AE9CFACF3632E54A7A590B2D", "9BBB794BF1DCF8660F8460268754D1A7E827EF26EEF07D631316C9EF5FC3CBDD", "9D10729AB8873D23F2244363D8A1DDDC6F4683B3420052FC513112D30B8E6FC8", "A1EF9298714E6ED876FC447E879AE4AEF24B3BAE418A5BF1CCD587D6F1B0DF70", "A253C518E6F506AA657A30BCF5C28CD2BD5AAE549B0C7517660542C70E8B897B", "A545DB1C220C2CED88336E81FF848EF91603811394EF649FEC94F4D2653CBD45", "A5A892259BF44584524D97B2CB83E9150F24F7E5C20081122730CDDBEA729805", "A5DABD1C1B1C58D900A9518CCA7EC1C03488CC2DF1750F65600D7F0C8E0E4763", "A87D3B01BEB3628C5A4865D02456C6AE700642AF49B89B34D8697869591CCEC7", "AA4FDE0C6B204D3B97E506557D8877E2EEC378624BA08168CE105CA385AA1400", "AAF4BDDA7ECF566534F1FC9D951BC20C97D4E89F8F43C5F79B8F6AA13170E4D9", "AB1AC7E7CE95316265077790DC2D6CE23068401552650F2CE08BCFDA4CE41AA9", "AC5DE01326AFA37CBA7F799502684F57AF3D9271EC49734648DB7797522AF2E8", "ACBA42A9F266755DB30CE35DBA1907FB61B1687AAD3415499AF5573BC67595AA", "AD93426B49228B04BDAB79161DCBCCF882ED48D9F34985BDEF0F8736255A81ED", "AE9AE27A2F9D74588E4BD4733FD267C7A7AFFE6114F53DACEBDC4FEAEEAC13DA", "AF51E1CC97DA90D00CDACD35B02B7E7108FB894DA97EFC4B711F84EEBE554D1F", "B0FF85DCDE8644B3484BD6CF258480DD40154E7BDFEEDF7A128BF747F3AC618F", "B5AA883A7ECBB98CC082171970FB0FD2158AEB520B2B654518056D674E2939C5", "B9609A42BFED86C36189258C748597C29F9D824D3DD52ECECFEEA902FDA884B1", "BD254A15BAD5E287C6B2C82F2D724824C0DAE3774F51EFD21CA2855E0233A70B", "C034F4A93C7986F86B5276634B82B774DA1796B9A2CC2371DA4859670D82233E", "C06037486063080DAF0903578E651F281F08105507F07A61B0292AD4FC96B7DB", "C0BDB67449527274F6BF935813A76F827DBFB1EAD61444E49DD24177F6B0ABE0", "C240DF09D934E998A5A6E9F16EE5D00606D3852B389FD502ED34EB411645C177", "C44205BD925B3B63D65D5FA991188252016274A35741248C9CE3855AD19580EC", "C653CBC867105CF4C768835C9EDDEDF60AF058B89DAF4ECE572AC72BEA4EB1D8", "C65722F809C01B5483BEFD48484EDC46960C65030D132C9D08F70EDB8A00D231", "C8805CB7A9877952E3B667A528AE49619053A2D7DB5F1F65CA2C84C382A15EAE", "CBD8847E98393D15AF7D2691A1958B4AAF9058B018D5E477DFB037CCB9D75D3F", "CED843D7D4246954CE05AFA7281A1AAFE1CB3941999D193D72B79F3086C39822", "D3DCE49F85FE68AF51C5D2B463504D5A7870D422F5ACFC1E2C0DCB64F7543F5E", "D4552FDC70931CD8B4AD1900AAFD91F4395F28D6E61914A873226147AFDAF729", "D64BC5FE778E62F52FAF1A558C46AB9C63D2D06A74FDE22CC1A16BB67C6A0E8C", "D783A7F4DFFB9905E79E357ACA80CE9623FFC55147AEC4BAF71DFFC0CC45C9F3", "D794EA27CA7E3FF8825CDCEFF3439F08F1C4C2B94C2E54C22629BF94087D371F", "D90882A3E95B0A521011936122CA086C48D9FEF441869C5BF302F67319C3A703", "D92ADA90B46EC7B09898EB31D2D008827097E27BEC48AE4B2D1B9121A6F37C05", "D99368A75ACAE1BA071AB4642187D64BD6775A4C21AC3701A9903B0394B40C87", "DB7E13AA3FC7A85023493B236DF17D2598630CB39A19C53964F1CB0981572C36", "DC05F94C20E54530B22A0F7C5D47B16BEB79F796391043B6D8D2F3934DA6C247", "DD34B9BC3B107A1DC572E91FE164C11C4D3B050CFD5A53884C66DA680566DEB4", "DFF1640DBEB48B8BDF07B3856E1B96CFEE191A513A8879122CB35B6ECF091230", "E07C0C4D82739BCF3EC12790499FE045BA8E517D49D7B04601CDBB95AF91DA23", "E4BF18E141DF994DA14A3731342314B60F8A9B7863C10CD9B3821AFA750D3B31", "E51DDF73E3F5CD96B12560329D18889F698C09D96494E43FCCF428FEC32A1F2E", "F479B1D4D6CE6F94562BE83AEBC7D30E6633A6727AB24138B99039D7EB3AB70F", "F75806AF51F262CD91F3E2017F6775AF7816B8E15289C5596B33856B18979E5B", "F9F3B4261A18C4DCE8B16610FB2521F9D859E86F8EE3010A1231A24FF23D52DB", "FB37F0F7CF6522CCB3B684C95B5F64BEC8DDF83F29BF1BF109AD27B6810731D6", "FC367D3847B3B18A075985BFC8A2A8898C7B9AFE3FE16A6F84968131CD5047B4", "FD3F7FDFA4DAAB71D175F1E137285D1F69A465922921368206BF33D36AB43D22", "FE682ECFC10CBB3EA19CC98A95397F776F34168220DD72550FAE4CF5E216A9CC", "FEE45A44E8C46E13896C20C8C9B2A275C16E5652E4DF723FE4A044838B932DB1"]}, {"type": "ics", "idList": ["ICSA-22-055-02"]}, {"type": "intothesymmetry", "idList": ["INTOTHESYMMETRY:03170E09A2C6F4BE8A3B9D5EF113B293"]}, {"type": "joomla", "idList": ["JOOMLA-779", "JOOMLA-816"]}, {"type": "jvn", "idList": ["JVN:06527859"]}, {"type": "kaspersky", "idList": ["KLA11472", "KLA11486", "KLA11487", "KLA11488", "KLA11520", "KLA11552", "KLA11555", "KLA11571", "KLA11641", "KLA11784", "KLA11785", "KLA11929", "KLA11931", "KLA12437"]}, {"type": "kitploit", "idList": ["KITPLOIT:7323577050718865961"]}, {"type": "krebs", "idList": ["KREBS:A8F0DD3F6E965A3A66B2CCBB003ACF62"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:78E91E28F51B0A15B6CA53FF8A9B480B"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/WINDOWS/HTTP/TOMCAT_CGI_CMDLINEARGS", "MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2021-23841/", "MSF:ILITIES/CENTOS_LINUX-CVE-2019-11487/", "MSF:ILITIES/CENTOS_LINUX-CVE-2020-26217/", "MSF:ILITIES/DEBIAN-CVE-2020-26217/", "MSF:ILITIES/FREEBSD-CVE-2019-1551/", "MSF:ILITIES/GENTOO-LINUX-CVE-2019-0221/", "MSF:ILITIES/GENTOO-LINUX-CVE-2019-1551/", "MSF:ILITIES/HTTP-OPENSSL-CVE-2021-23841/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2019-1551/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP3-CVE-2019-0221/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2019-1551/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2019-0221/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2021-23841/", "MSF:ILITIES/JUNIPER-JUNOS-OS-JSA11025/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2020-5398/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2170/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2178/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2180/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2196/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2208/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2215/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2230/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2278/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2293/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2304/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2021-2308/", "MSF:ILITIES/ORACLE-SOLARIS-CVE-2019-1551/", "MSF:ILITIES/ORACLE-WEBLOGIC-CVE-2020-5398/", "MSF:ILITIES/ORACLE_LINUX-CVE-2019-1551/", "MSF:ILITIES/ORACLE_LINUX-CVE-2020-26217/", "MSF:ILITIES/ORACLE_LINUX-CVE-2021-2163/", "MSF:ILITIES/REDHAT-OPENSHIFT-CVE-2019-1551/", "MSF:ILITIES/REDHAT_LINUX-CVE-2019-1551/", "MSF:ILITIES/REDHAT_LINUX-CVE-2020-26217/", "MSF:ILITIES/RED_HAT-JBOSS_EAP-CVE-2019-10202/", "MSF:ILITIES/SUSE-CVE-2020-25649/", "MSF:ILITIES/SUSE-CVE-2020-26217/", "MSF:ILITIES/SUSE-CVE-2021-2161/", "MSF:ILITIES/SUSE-CVE-2021-2163/", "MSF:ILITIES/SUSE-CVE-2021-2264/", "MSF:ILITIES/SUSE-CVE-2021-2281/", "MSF:ILITIES/SUSE-CVE-2021-2287/", "MSF:ILITIES/SUSE-CVE-2021-2296/", "MSF:ILITIES/SUSE-CVE-2021-3496/", "MSF:ILITIES/UBUNTU-CVE-2019-11487/", "MSF:ILITIES/UBUNTU-CVE-2019-1551/", "MSF:ILITIES/UBUNTU-CVE-2021-2162/", "MSF:ILITIES/UBUNTU-CVE-2021-2194/", "MSF:ILITIES/UBUNTU-CVE-2021-2196/", "MSF:ILITIES/UBUNTU-CVE-2021-23841/"]}, {"type": "mmpc", "idList": ["MMPC:D6D537E875C3CBD84822A868D24B31BA"]}, {"type": "mozilla", "idList": ["MFSA2019-13"]}, {"type": "mscve", "idList": ["MS:ADV200007", "MS:CVE-2019-1241", "MS:CVE-2020-1472", "MS:CVE-2020-1971", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "mskb", "idList": ["KB4601347", "KB4601357", "KB4601363"]}, {"type": "msrc", "idList": ["MSRC:5B84BD451283462DC81D4090EFE66280", "MSRC:96F2FB0D77EED0ABDED8EBD64AEBEA09"]}, {"type": "mssecure", "idList": ["MSSECURE:D6D537E875C3CBD84822A868D24B31BA"]}, {"type": "myhack58", "idList": ["MYHACK58:62201785372"]}, {"type": "nessus", "idList": ["701350.PASL", "701351.PASL", "AL2_ALAS-2019-1149.NASL", "AL2_ALAS-2019-1229.NASL", "AL2_ALAS-2019-1232.NASL", "AL2_ALAS-2019-1246.NASL", "AL2_ALAS-2019-1341.NASL", "AL2_ALAS-2020-1427.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1479.NASL", "AL2_ALAS-2020-1480.NASL", "AL2_ALAS-2020-1513.NASL", "AL2_ALAS-2020-1519.NASL", "AL2_ALAS-2020-1554.NASL", "AL2_ALAS-2021-1585.NASL", "AL2_ALAS-2021-1593.NASL", "AL2_ALAS-2021-1626.NASL", "AL2_ALAS-2021-1640.NASL", "AL2_ALAS-2021-1645.NASL", "ALA_ALAS-2019-1149.NASL", "ALA_ALAS-2019-1208.NASL", "ALA_ALAS-2019-1232.NASL", "ALA_ALAS-2019-1234.NASL", "ALA_ALAS-2019-1235.NASL", "ALA_ALAS-2019-1311.NASL", "ALA_ALAS-2020-1370.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1436.NASL", "ALA_ALAS-2020-1440.NASL", "ALA_ALAS-2020-1445.NASL", "ALA_ALAS-2021-1459.NASL", "ALA_ALAS-2021-1469.NASL", "ALA_ALAS-2021-1473.NASL", "ALA_ALAS-2021-1500.NASL", "ALA_ALAS-2021-1504.NASL", "APACHE_2_4_42.NASL", "CENTOS8_RHSA-2019-1269.NASL", "CENTOS8_RHSA-2019-1308.NASL", "CENTOS8_RHSA-2019-2703.NASL", "CENTOS8_RHSA-2019-3517.NASL", "CENTOS8_RHSA-2020-0339.NASL", "CENTOS8_RHSA-2020-1318.NASL", "CENTOS8_RHSA-2020-1644.NASL", "CENTOS8_RHSA-2020-1769.NASL", "CENTOS8_RHSA-2020-3662.NASL", "CENTOS8_RHSA-2020-3665.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS8_RHSA-2020-4442.NASL", "CENTOS8_RHSA-2020-4484.NASL", "CENTOS8_RHSA-2020-4514.NASL", "CENTOS8_RHSA-2020-4670.NASL", "CENTOS8_RHSA-2020-4751.NASL", "CENTOS8_RHSA-2020-4807.NASL", "CENTOS8_RHSA-2020-4846.NASL", "CENTOS8_RHSA-2020-4847.NASL", "CENTOS8_RHSA-2020-5476.NASL", "CENTOS8_RHSA-2020-5493.NASL", "CENTOS8_RHSA-2020-5499.NASL", "CENTOS8_RHSA-2021-1301.NASL", "CENTOS8_RHSA-2021-1307.NASL", "CENTOS8_RHSA-2021-1578.NASL", "CENTOS8_RHSA-2021-1581.NASL", "CENTOS8_RHSA-2021-1593.NASL", "CENTOS8_RHSA-2021-1610.NASL", "CENTOS8_RHSA-2021-1633.NASL", "CENTOS8_RHSA-2021-1647.NASL", "CENTOS8_RHSA-2021-1678.NASL", "CENTOS8_RHSA-2021-1846.NASL", "CENTOS8_RHSA-2021-1968.NASL", "CENTOS8_RHSA-2021-3590.NASL", "CENTOS_RHSA-2019-1265.NASL", "CENTOS_RHSA-2019-1267.NASL", "CENTOS_RHSA-2019-1309.NASL", "CENTOS_RHSA-2019-1310.NASL", "CENTOS_RHSA-2019-1873.NASL", "CENTOS_RHSA-2019-2029.NASL", "CENTOS_RHSA-2019-3836.NASL", "CENTOS_RHSA-2020-0839.NASL", "CENTOS_RHSA-2020-1016.NASL", "CENTOS_RHSA-2020-1335.NASL", "CENTOS_RHSA-2020-1349.NASL", "CENTOS_RHSA-2020-4182.NASL", "CENTOS_RHSA-2020-5437.NASL", "CENTOS_RHSA-2020-5439.NASL", "CENTOS_RHSA-2020-5566.NASL", "CENTOS_RHSA-2021-0162.NASL", "CENTOS_RHSA-2021-1297.NASL", "CENTOS_RHSA-2021-1298.NASL", "CENTOS_RHSA-2021-1354.NASL", "DEBIAN_DLA-1517.NASL", "DEBIAN_DLA-1715.NASL", "DEBIAN_DLA-1731.NASL", "DEBIAN_DLA-1771.NASL", "DEBIAN_DLA-1797.NASL", "DEBIAN_DLA-1798.NASL", "DEBIAN_DLA-1799.NASL", "DEBIAN_DLA-1800.NASL", "DEBIAN_DLA-1806.NASL", "DEBIAN_DLA-1810.NASL", "DEBIAN_DLA-1824.NASL", "DEBIAN_DLA-1839.NASL", "DEBIAN_DLA-1862.NASL", "DEBIAN_DLA-1879.NASL", "DEBIAN_DLA-1884.NASL", "DEBIAN_DLA-1885.NASL", "DEBIAN_DLA-1896.NASL", "DEBIAN_DLA-1919.NASL", "DEBIAN_DLA-1930.NASL", "DEBIAN_DLA-1943.NASL", "DEBIAN_DLA-2176.NASL", "DEBIAN_DLA-2209.NASL", "DEBIAN_DLA-2217.NASL", "DEBIAN_DLA-2221.NASL", "DEBIAN_DLA-2279.NASL", "DEBIAN_DLA-2341.NASL", "DEBIAN_DLA-2378.NASL", "DEBIAN_DLA-2385.NASL", "DEBIAN_DLA-2437.NASL", "DEBIAN_DLA-2459.NASL", "DEBIAN_DLA-2460.NASL", "DEBIAN_DLA-2463.NASL", "DEBIAN_DLA-2471.NASL", "DEBIAN_DLA-2500.NASL", "DEBIAN_DLA-2628.NASL", "DEBIAN_DLA-2634.NASL", "DEBIAN_DLA-2638.NASL", "DEBIAN_DLA-2661.NASL", "DEBIAN_DLA-2751.NASL", "DEBIAN_DLA-2852.NASL", "DEBIAN_DSA-4233.NASL", "DEBIAN_DSA-4434.NASL", "DEBIAN_DSA-4435.NASL", "DEBIAN_DSA-4448.NASL", "DEBIAN_DSA-4451.NASL", "DEBIAN_DSA-4452.NASL", "DEBIAN_DSA-4460.NASL", "DEBIAN_DSA-4465.NASL", "DEBIAN_DSA-4472.NASL", "DEBIAN_DSA-4495.NASL", "DEBIAN_DSA-4497.NASL", "DEBIAN_DSA-4509.NASL", "DEBIAN_DSA-4542.NASL", "DEBIAN_DSA-4686.NASL", "DEBIAN_DSA-4693.NASL", "DEBIAN_DSA-4789.NASL", "DEBIAN_DSA-4795.NASL", "DEBIAN_DSA-4835.NASL", "DEBIAN_DSA-4899.NASL", "DEBIAN_DSA-5020.NASL", "EULEROS_SA-2019-1304.NASL", "EULEROS_SA-2019-1506.NASL", "EULEROS_SA-2019-1586.NASL", "EULEROS_SA-2019-1587.NASL", "EULEROS_SA-2019-1588.NASL", "EULEROS_SA-2019-1612.NASL", "EULEROS_SA-2019-1636.NASL", "EULEROS_SA-2019-1639.NASL", "EULEROS_SA-2019-1671.NASL", "EULEROS_SA-2019-1672.NASL", "EULEROS_SA-2019-1758.NASL", "EULEROS_SA-2019-1783.NASL", "EULEROS_SA-2019-1787.NASL", "EULEROS_SA-2019-1793.NASL", "EULEROS_SA-2019-1813.NASL", "EULEROS_SA-2019-1819.NASL", "EULEROS_SA-2019-1841.NASL", "EULEROS_SA-2019-1847.NASL", "EULEROS_SA-2019-1885.NASL", "EULEROS_SA-2019-1926.NASL", "EULEROS_SA-2019-1935.NASL", "EULEROS_SA-2019-1960.NASL", "EULEROS_SA-2019-2047.NASL", "EULEROS_SA-2019-2068.NASL", "EULEROS_SA-2019-2094.NASL", "EULEROS_SA-2019-2201.NASL", "EULEROS_SA-2019-2274.NASL", "EULEROS_SA-2020-1269.NASL", "EULEROS_SA-2020-1289.NASL", "EULEROS_SA-2020-1300.NASL", "EULEROS_SA-2020-1333.NASL", "EULEROS_SA-2020-1342.NASL", "EULEROS_SA-2020-1364.NASL", "EULEROS_SA-2020-1370.NASL", "EULEROS_SA-2020-1444.NASL", "EULEROS_SA-2020-1452.NASL", "EULEROS_SA-2020-1455.NASL", "EULEROS_SA-2020-1577.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1596.NASL", "EULEROS_SA-2020-1601.NASL", "EULEROS_SA-2020-1606.NASL", "EULEROS_SA-2020-1613.NASL", "EULEROS_SA-2020-1617.NASL", "EULEROS_SA-2020-1852.NASL", "EULEROS_SA-2020-1859.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1894.NASL", "EULEROS_SA-2020-1895.NASL", "EULEROS_SA-2020-1908.NASL", "EULEROS_SA-2020-2011.NASL", "EULEROS_SA-2020-2059.NASL", "EULEROS_SA-2020-2065.NASL", "EULEROS_SA-2020-2078.NASL", "EULEROS_SA-2020-2085.NASL", "EULEROS_SA-2020-2093.NASL", "EULEROS_SA-2020-2102.NASL", "EULEROS_SA-2020-2103.NASL", "EULEROS_SA-2020-2132.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2151.NASL", "EULEROS_SA-2021-1003.NASL", "EULEROS_SA-2021-1010.NASL", "EULEROS_SA-2021-1014.NASL", "EULEROS_SA-2021-1022.NASL", "EULEROS_SA-2021-1029.NASL", "EULEROS_SA-2021-1033.NASL", "EULEROS_SA-2021-1050.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1063.NASL", "EULEROS_SA-2021-1073.NASL", "EULEROS_SA-2021-1079.NASL", "EULEROS_SA-2021-1080.NASL", "EULEROS_SA-2021-1104.NASL", "EULEROS_SA-2021-1118.NASL", "EULEROS_SA-2021-1133.NASL", "EULEROS_SA-2021-1137.NASL", "EULEROS_SA-2021-1149.NASL", "EULEROS_SA-2021-1156.NASL", "EULEROS_SA-2021-1160.NASL", "EULEROS_SA-2021-1175.NASL", "EULEROS_SA-2021-1825.NASL", "EULEROS_SA-2021-1826.NASL", "EULEROS_SA-2021-1831.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1868.NASL", "EULEROS_SA-2021-1882.NASL", "EULEROS_SA-2021-1886.NASL", "EULEROS_SA-2021-1907.NASL", "EULEROS_SA-2021-1908.NASL", "EULEROS_SA-2021-1909.NASL", "EULEROS_SA-2021-1911.NASL", "EULEROS_SA-2021-2335.NASL", "EULEROS_SA-2021-2456.NASL", "EULEROS_SA-2021-2542.NASL", "EULEROS_SA-2021-2566.NASL", "EULEROS_SA-2021-2808.NASL", "F5_BIGIP_SOL40508224.NASL", "FEDORA_2017-11EDC0D6C3.NASL", "FEDORA_2017-B8358CDA24.NASL", "FEDORA_2019-038D78EAA5.NASL", "FEDORA_2019-057D691FD4.NASL", "FEDORA_2019-099575A123.NASL", "FEDORA_2019-139FCDA84D.NASL", "FEDORA_2019-18868E1715.NASL", "FEDORA_2019-1A3EDD7E8A.NASL", "FEDORA_2019-1A3F878D27.NASL", "FEDORA_2019-20A89CA9AF.NASL", "FEDORA_2019-2A0CE0C58C.NASL", "FEDORA_2019-335C3AD86A.NASL", "FEDORA_2019-6FA01D12B4.NASL", "FEDORA_2019-79B5790566.NASL", "FEDORA_2019-7EAF0BBE7C.NASL", "FEDORA_2019-8219EFA9F6.NASL", "FEDORA_2019-87D807D7CB.NASL", "FEDORA_2019-88F53A7433.NASL", "FEDORA_2019-99FF6AA32C.NASL", "FEDORA_2019-9E91AFA2BE.NASL", "FEDORA_2019-A06DFFAB1C.NASL", "FEDORA_2019-A6CD583A8D.NASL", "FEDORA_2019-AE6A703B8F.NASL", "FEDORA_2019-B171554877.NASL", "FEDORA_2019-BCAD44B5D6.NASL", "FEDORA_2019-C96A8D12B0.NASL", "FEDORA_2019-D66FEBB5DF.NASL", "FEDORA_2019-DA0EAC1EB6.NASL", "FEDORA_2019-EBA8E44EE6.NASL", "FEDORA_2019-F563E66380.NASL", "FEDORA_2019-FB23ECCC03.NASL", "FEDORA_2020-0477F8840E.NASL", "FEDORA_2020-0B32A59B54.NASL", "FEDORA_2020-0DF38B2843.NASL", "FEDORA_2020-11BE4B36D4.NASL", "FEDORA_2020-12BC5B5597.NASL", "FEDORA_2020-261449D821.NASL", "FEDORA_2020-2640AA4E19.NASL", "FEDORA_2020-27B577AB23.NASL", "FEDORA_2020-32193CBBE6.NASL", "FEDORA_2020-3CE0F55BC5.NASL", "FEDORA_2020-3E00413763.NASL", "FEDORA_2020-4021BF2AE8.NASL", "FEDORA_2020-52741B0A49.NASL", "FEDORA_2020-6B07FF2526.NASL", "FEDORA_2020-7473744DE1.NASL", "FEDORA_2020-7AB62C73BC.NASL", "FEDORA_2020-7F07DA3FEF.NASL", "FEDORA_2020-847775BF79.NASL", "FEDORA_2020-92B1D001B3.NASL", "FEDORA_2020-A31B01E945.NASL", "FEDORA_2020-A832C215BF.NASL", "FEDORA_2020-CFC319E067.NASL", "FEDORA_2020-D32853A28D.NASL", "FEDORA_2020-E7B942A47A.NASL", "FEDORA_2020-FBB94073A1.NASL", "FEDORA_2021-33A1B73E48.NASL", "FLEXERA_INSTALLSHIELD_CVE-2016-2542.NASL", "FOXIT_PDF_EDITOR_11_2_1.NASL", "FOXIT_READER_11_2_1.NASL", "FREEBSD_PKG_08B553ED537A11EBBE6E0022489AD614.NASL", "FREEBSD_PKG_10E3ED8ADB7F11EA8BDF643150D3111D.NASL", "FREEBSD_PKG_20006B5FA0BC11EB8AE6FC4DD43E2B6A.NASL", "FREEBSD_PKG_24ACE516FAD711EA8D8C005056A311D1.NASL", "FREEBSD_PKG_3C5A4FE09EBB11E99169FCAA147E860E.NASL", "FREEBSD_PKG_44B6DFBF4EF74D52AD522B1B05D81272.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_676CA4869C1E11EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_6D5F1B0BB86548D5935B3FB6EBB425FC.NASL", "FREEBSD_PKG_81FCC2F9E15A11E9ABBF800DD28B22BD.NASL", "FREEBSD_PKG_AD7921692AA411EBAB710022489AD614.NASL", "FREEBSD_PKG_B360B12074B111EAA84A4C72B94353B5.NASL", "FREEBSD_PKG_CAF545F2C0D911E990514C72B94353B5.NASL", "FREEBSD_PKG_FE93803C883F11E89F0C001B216D295B.NASL", "FREEBSD_PKG_FFC73E8787F011E9AD56FCAA147E860E.NASL", "GENTOO_GLSA-201908-02.NASL", "GENTOO_GLSA-201909-04.NASL", "GENTOO_GLSA-201911-08.NASL", "GENTOO_GLSA-202003-43.NASL", "GENTOO_GLSA-202003-57.NASL", "GENTOO_GLSA-202011-17.NASL", "GENTOO_GLSA-202011-18.NASL", "GENTOO_GLSA-202012-11.NASL", "GENTOO_GLSA-202012-13.NASL", "GENTOO_GLSA-202012-14.NASL", "GENTOO_GLSA-202012-16.NASL", "GENTOO_GLSA-202012-23.NASL", "GENTOO_GLSA-202012-24.NASL", "GENTOO_GLSA-202101-07.NASL", "GENTOO_GLSA-202101-12.NASL", "GENTOO_GLSA-202101-29.NASL", "GENTOO_GLSA-202104-04.NASL", "IBM_HTTP_SERVER_964768.NASL", "JQUERY_3_4_0.NASL", "JQUERY_CVE-2020-11022.NASL", "LCE_6_0_9.NASL", "MACOSX_WIRESHARK_3_2_9.NASL", "MACOSX_WIRESHARK_3_4_1.NASL", "MACOSX_WIRESHARK_3_4_2.NASL", "MACOS_HT211931.NASL", "MACOS_HT212325.NASL", "MACOS_HT212326.NASL", "MACOS_HT212327.NASL", "MACOS_HT212529.NASL", "MACOS_THUNDERBIRD_60_7.NASL", "MOZILLA_FIREFOX_60_7_ESR.NASL", "MOZILLA_FIREFOX_67_0.NASL", "MOZILLA_THUNDERBIRD_60_7.NASL", "MYSQL_5_7_30.NASL", "MYSQL_5_7_34.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "NEWSTART_CGSL_NS-SA-2019-0087_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0088_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0158_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0159_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0167_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0169_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0175_FIREFOX.NASL", "NEWSTART_CGSL_NS-SA-2019-0178_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0180_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0183_KERNEL-RT.NASL", "NODEJS_2020_NOV.NASL", "NODEJS_2021_JAN.NASL", "OPENSUSE-2018-1043.NASL", "OPENSUSE-2018-1077.NASL", "OPENSUSE-2018-1140.NASL", "OPENSUSE-2019-140.NASL", "OPENSUSE-2019-1484.NASL", "OPENSUSE-2019-1530.NASL", "OPENSUSE-2019-1534.NASL", "OPENSUSE-2019-1570.NASL", "OPENSUSE-2019-1571.NASL", "OPENSUSE-2019-1579.NASL", "OPENSUSE-2019-1673.NASL", "OPENSUSE-2019-1716.NASL", "OPENSUSE-2019-1757.NASL", "OPENSUSE-2019-1777.NASL", "OPENSUSE-2019-1808.NASL", "OPENSUSE-2019-1839.NASL", "OPENSUSE-2019-1912.NASL", "OPENSUSE-2019-1916.NASL", "OPENSUSE-2019-2051.NASL", "OPENSUSE-2019-2058.NASL", "OPENSUSE-2019-2173.NASL", "OPENSUSE-2019-2181.NASL", "OPENSUSE-2019-2392.NASL", "OPENSUSE-2019-2444.NASL", "OPENSUSE-2019-546.NASL", "OPENSUSE-2019-65.NASL", "OPENSUSE-2019-769.NASL", "OPENSUSE-2019-792.NASL", "OPENSUSE-2019-958.NASL", "OPENSUSE-2020-1178.NASL", "OPENSUSE-2020-1236.NASL", "OPENSUSE-2020-1405.NASL", "OPENSUSE-2020-1407.NASL", "OPENSUSE-2020-1526.NASL", "OPENSUSE-2020-1888.NASL", "OPENSUSE-2020-2037.NASL", "OPENSUSE-2020-2045.NASL", "OPENSUSE-2020-2062.NASL", "OPENSUSE-2020-2092.NASL", "OPENSUSE-2020-2245.NASL", "OPENSUSE-2020-2249.NASL", "OPENSUSE-2020-2269.NASL", "OPENSUSE-2020-2367.NASL", "OPENSUSE-2020-711.NASL", "OPENSUSE-2020-719.NASL", "OPENSUSE-2021-12.NASL", "OPENSUSE-2021-140.NASL", "OPENSUSE-2021-43.NASL", "OPENSUSE-2021-630.NASL", "OPENSUSE-2021-64.NASL", "OPENSUSE-2021-65.NASL", "OPENSUSE-2021-66.NASL", "OPENSUSE-2021-719.NASL", "OPENSUSE-2021-723.NASL", "OPENSUSE-2021-776.NASL", "OPENSUSE-2021-81.NASL", "OPENSUSE-2021-82.NASL", "ORACLELINUX_ELSA-2017-2423.NASL", "ORACLELINUX_ELSA-2017-2492.NASL", "ORACLELINUX_ELSA-2019-1265.NASL", "ORACLELINUX_ELSA-2019-1267.NASL", "ORACLELINUX_ELSA-2019-1269.NASL", "ORACLELINUX_ELSA-2019-1308.NASL", "ORACLELINUX_ELSA-2019-1309.NASL", "ORACLELINUX_ELSA-2019-1310.NASL", "ORACLELINUX_ELSA-2019-1873.NASL", "ORACLELINUX_ELSA-2019-2703.NASL", "ORACLELINUX_ELSA-2019-3836.NASL", "ORACLELINUX_ELSA-2020-0834.NASL", "ORACLELINUX_ELSA-2020-1318.NASL", "ORACLELINUX_ELSA-2020-1334.NASL", "ORACLELINUX_ELSA-2020-1335.NASL", "ORACLELINUX_ELSA-2020-1349.NASL", "ORACLELINUX_ELSA-2020-4442.NASL", "ORACLELINUX_ELSA-2020-4484.NASL", "ORACLELINUX_ELSA-2020-4514.NASL", "ORACLELINUX_ELSA-2020-4751.NASL", "ORACLELINUX_ELSA-2020-4807.NASL", "ORACLELINUX_ELSA-2020-5493.NASL", "ORACLELINUX_ELSA-2020-5715.NASL", "ORACLELINUX_ELSA-2020-5825.NASL", "ORACLELINUX_ELSA-2020-5848.NASL", "ORACLELINUX_ELSA-2020-5962.NASL", "ORACLELINUX_ELSA-2021-0162.NASL", "ORACLELINUX_ELSA-2021-1297.NASL", "ORACLELINUX_ELSA-2021-1298.NASL", "ORACLELINUX_ELSA-2021-1301.NASL", "ORACLELINUX_ELSA-2021-1307.NASL", "ORACLELINUX_ELSA-2021-1354.NASL", "ORACLELINUX_ELSA-2021-1578.NASL", "ORACLELINUX_ELSA-2021-1581.NASL", "ORACLELINUX_ELSA-2021-1593.NASL", "ORACLELINUX_ELSA-2021-1610.NASL", "ORACLELINUX_ELSA-2021-1633.NASL", "ORACLELINUX_ELSA-2021-1647.NASL", "ORACLELINUX_ELSA-2021-1678.NASL", "ORACLELINUX_ELSA-2021-3590.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-9238.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLELINUX_ELSA-2021-9561.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLE_BI_PUBLISHER_APR_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_OCT_2019_CPU.NASL", "ORACLE_BPM_CPU_JAN_2021.NASL", "ORACLE_COHERENCE_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_APR_2021_CPU.NASL", "ORACLE_HTTP_SERVER_CPU_APR_2021.NASL", "ORACLE_HTTP_SERVER_CPU_JAN_2018.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2021.NASL", "ORACLE_JAVA_CPU_APR_2021.NASL", "ORACLE_JAVA_CPU_APR_2021_UNIX.NASL", "ORACLE_NOSQL_CPU_APR_2021.NASL", "ORACLE_OATS_CPU_APR_2020.NASL", "ORACLE_OATS_CPU_APR_2021.NASL", "ORACLE_OATS_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2019.NASL", "ORACLE_RDBMS_CPU_APR_2020.NASL", "ORACLE_RDBMS_CPU_APR_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2021.NASL", "ORACLE_RDBMS_CPU_JUL_2020.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2021.NASL", "ORACLE_WEBCENTER_SITES_APR_2020_CPU.NASL", "ORACLE_WEBCENTER_SITES_JAN_2021_CPU.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2021.NASL", "PALO_ALTO_CVE-2020-10188.NASL", "PHOTONOS_PHSA-2019-1_0-0235_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0244_APACHE.NASL", "PHOTONOS_PHSA-2019-1_0-0247_EXPAT.NASL", "PHOTONOS_PHSA-2019-1_0-0251_LINUX.NASL", "PHOTONOS_PHSA-2019-1_0-0253_HTTPD.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LIBPNG.NASL", "PHOTONOS_PHSA-2019-2_0-0160_LINUX.NASL", "PHOTONOS_PHSA-2019-2_0-0171_EXPAT.NASL", "PHOTONOS_PHSA-2019-2_0-0178_HTTPD.NASL", "PHOTONOS_PHSA-2019-3_0-0015_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0024_APACHE.NASL", "PHOTONOS_PHSA-2019-3_0-0026_EXPAT.NASL", "PHOTONOS_PHSA-2019-3_0-0026_LINUX.NASL", "PHOTONOS_PHSA-2019-3_0-0035_HTTPD.NASL", "PHOTONOS_PHSA-2020-1_0-0295_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0308_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0316_GO.NASL", "PHOTONOS_PHSA-2020-1_0-0324_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0338_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0350_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0225_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0245_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0248_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0249_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0261_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0276_GO.NASL", "PHOTONOS_PHSA-2020-2_0-0284_OPENSSL.NASL", "PHOTONOS_PHSA-2020-2_0-0295_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0099_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0100_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0101_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0113_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0141_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0155_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0161_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0180_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0378_C.NASL", "PHOTONOS_PHSA-2021-1_0-0390_MYSQL.NASL", "PHOTONOS_PHSA-2021-2_0-0308_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0337_C.NASL", "PHOTONOS_PHSA-2021-3_0-0227_SQLITE.NASL", "PHOTONOS_PHSA-2021-3_0-0231_MYSQL.NASL", "REDHAT-RHSA-2017-2423.NASL", "REDHAT-RHSA-2017-2492.NASL", "REDHAT-RHSA-2017-2808.NASL", "REDHAT-RHSA-2019-0364.NASL", "REDHAT-RHSA-2019-0365.NASL", "REDHAT-RHSA-2019-1160.NASL", "REDHAT-RHSA-2019-1161.NASL", "REDHAT-RHSA-2019-1265.NASL", "REDHAT-RHSA-2019-1267.NASL", "REDHAT-RHSA-2019-1269.NASL", "REDHAT-RHSA-2019-1308.NASL", "REDHAT-RHSA-2019-1309.NASL", "REDHAT-RHSA-2019-1310.NASL", "REDHAT-RHSA-2019-1873.NASL", "REDHAT-RHSA-2019-1891.NASL", "REDHAT-RHSA-2019-1973.NASL", "REDHAT-RHSA-2019-2029.NASL", "REDHAT-RHSA-2019-2043.NASL", "REDHAT-RHSA-2019-2494.NASL", "REDHAT-RHSA-2019-2495.NASL", "REDHAT-RHSA-2019-2585.NASL", "REDHAT-RHSA-2019-2590.NASL", "REDHAT-RHSA-2019-2592.NASL", "REDHAT-RHSA-2019-2696.NASL", "REDHAT-RHSA-2019-2703.NASL", "REDHAT-RHSA-2019-2730.NASL", "REDHAT-RHSA-2019-2737.NASL", "REDHAT-RHSA-2019-2741.NASL", "REDHAT-RHSA-2019-2935.NASL", "REDHAT-RHSA-2019-2936.NASL", "REDHAT-RHSA-2019-2937.NASL", "REDHAT-RHSA-2019-3023.NASL", "REDHAT-RHSA-2019-3024.NASL", "REDHAT-RHSA-2019-3044.NASL", "REDHAT-RHSA-2019-3045.NASL", "REDHAT-RHSA-2019-3046.NASL", "REDHAT-RHSA-2019-3172.NASL", "REDHAT-RHSA-2019-3220.NASL", "REDHAT-RHSA-2019-3309.NASL", "REDHAT-RHSA-2019-3517.NASL", "REDHAT-RHSA-2019-3836.NASL", "REDHAT-RHSA-2019-3929.NASL", "REDHAT-RHSA-2020-0839.NASL", "REDHAT-RHSA-2020-1016.NASL", "REDHAT-RHSA-2020-1070.NASL", "REDHAT-RHSA-2020-1308.NASL", "REDHAT-RHSA-2020-1318.NASL", "REDHAT-RHSA-2020-1325.NASL", "REDHAT-RHSA-2020-1334.NASL", "REDHAT-RHSA-2020-1335.NASL", "REDHAT-RHSA-2020-1337.NASL", "REDHAT-RHSA-2020-1342.NASL", "REDHAT-RHSA-2020-1349.NASL", "REDHAT-RHSA-2020-1493.NASL", "REDHAT-RHSA-2020-2217.NASL", "REDHAT-RHSA-2020-2362.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-3383.NASL", "REDHAT-RHSA-2020-3545.NASL", "REDHAT-RHSA-2020-3936.NASL", "REDHAT-RHSA-2020-3952.NASL", "REDHAT-RHSA-2020-3958.NASL", "REDHAT-RHSA-2020-4004.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4297.NASL", "REDHAT-RHSA-2020-4384.NASL", "REDHAT-RHSA-2020-4401.NASL", "REDHAT-RHSA-2020-4484.NASL", "REDHAT-RHSA-2020-4514.NASL", "REDHAT-RHSA-2020-5119.NASL", "REDHAT-RHSA-2020-5159.NASL", "REDHAT-RHSA-2020-5168.NASL", "REDHAT-RHSA-2020-5179.NASL", "REDHAT-RHSA-2020-5637.NASL", "REDHAT-RHSA-2020-5639.NASL", "REDHAT-RHSA-2020-5640.NASL", "REDHAT-RHSA-2020-5641.NASL", "REDHAT-RHSA-2020-5642.NASL", "REDHAT-RHSA-2020-5649.NASL", "REDHAT-RHSA-2021-0162.NASL", "REDHAT-RHSA-2021-0184.NASL", "REDHAT-RHSA-2021-0246.NASL", "REDHAT-RHSA-2021-0247.NASL", "REDHAT-RHSA-2021-0248.NASL", "REDHAT-RHSA-2021-1032.NASL", "REDHAT-RHSA-2021-1266.NASL", "REDHAT-RHSA-2021-1297.NASL", "REDHAT-RHSA-2021-1298.NASL", "REDHAT-RHSA-2021-1299.NASL", "REDHAT-RHSA-2021-1301.NASL", "REDHAT-RHSA-2021-1305.NASL", "REDHAT-RHSA-2021-1306.NASL", "REDHAT-RHSA-2021-1307.NASL", "REDHAT-RHSA-2021-1315.NASL", "REDHAT-RHSA-2021-1354.NASL", "REDHAT-RHSA-2021-1366.NASL", "REDHAT-RHSA-2021-1511.NASL", "REDHAT-RHSA-2021-1578.NASL", "REDHAT-RHSA-2021-1581.NASL", "REDHAT-RHSA-2021-1593.NASL", "REDHAT-RHSA-2021-1610.NASL", "REDHAT-RHSA-2021-1633.NASL", "REDHAT-RHSA-2021-1647.NASL", "REDHAT-RHSA-2021-1678.NASL", "REDHAT-RHSA-2021-1739.NASL", "REDHAT-RHSA-2021-1846.NASL", "REDHAT-RHSA-2021-1968.NASL", "REDHAT-RHSA-2021-2046.NASL", "REDHAT-RHSA-2021-2047.NASL", "REDHAT-RHSA-2021-2048.NASL", "REDHAT-RHSA-2021-2184.NASL", "REDHAT-RHSA-2021-2185.NASL", "REDHAT-RHSA-2021-2190.NASL", "REDHAT-RHSA-2021-2472.NASL", "REDHAT-RHSA-2021-3590.NASL", "REDHAT-RHSA-2022-0158.NASL", "SECURITYCENTER_5_17_0_TNS_2020_11.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08_XSS.NASL", "SLACKWARE_SSA_2019-030-01.NASL", "SLACKWARE_SSA_2019-107-01.NASL", "SLACKWARE_SSA_2019-202-01.NASL", "SLACKWARE_SSA_2019-311-01.NASL", "SLACKWARE_SSA_2020-086-01.NASL", "SLACKWARE_SSA_2020-091-02.NASL", "SL_20170807_LOG4J_ON_SL7_X.NASL", "SL_20170821_XMLSEC1_ON_SL7_X.NASL", "SL_20190523_FIREFOX_ON_SL6_X.NASL", "SL_20190524_FIREFOX_ON_SL7_X.NASL", "SL_20190604_THUNDERBIRD_ON_SL6_X.NASL", "SL_20190604_THUNDERBIRD_ON_SL7_X.NASL", "SL_20190729_KERNEL_ON_SL7_X.NASL", "SL_20190806_KERNEL_ON_SL7_X.NASL", "SL_20191113_KERNEL_ON_SL6_X.NASL", "SL_20200406_TELNET_ON_SL6_X.NASL", "SL_20200407_KRB5_APPL_ON_SL6_X.NASL", "SL_20210119_XSTREAM_ON_SL7_X.NASL", "SMB_NT_MS19_SEP_4512578.NASL", "SMB_NT_MS19_SEP_4515384.NASL", "SMB_NT_MS19_SEP_4516026.NASL", "SMB_NT_MS19_SEP_4516044.NASL", "SMB_NT_MS19_SEP_4516055.NASL", "SMB_NT_MS19_SEP_4516058.NASL", "SMB_NT_MS19_SEP_4516065.NASL", "SMB_NT_MS19_SEP_4516066.NASL", "SMB_NT_MS19_SEP_4516067.NASL", "SMB_NT_MS19_SEP_4516068.NASL", "SMB_NT_MS19_SEP_4516070.NASL", "SOLARIS10_125279-10.NASL", "SOLARIS10_X86_125280-10.NASL", "SOLARIS_APR2021_SRU11_4_30_88_3.NASL", "SUSE_SU-2018-3003-1.NASL", "SUSE_SU-2019-0148-1.NASL", "SUSE_SU-2019-0196-1.NASL", "SUSE_SU-2019-0222-1.NASL", "SUSE_SU-2019-0224-1.NASL", "SUSE_SU-2019-0326-1.NASL", "SUSE_SU-2019-0356-1.NASL", "SUSE_SU-2019-0439-1.NASL", "SUSE_SU-2019-0541-1.NASL", "SUSE_SU-2019-1289-1.NASL", "SUSE_SU-2019-1388-1.NASL", "SUSE_SU-2019-1398-1.NASL", "SUSE_SU-2019-1398-2.NASL", "SUSE_SU-2019-1405-1.NASL", "SUSE_SU-2019-1529-1.NASL", "SUSE_SU-2019-1530-1.NASL", "SUSE_SU-2019-1535-1.NASL", "SUSE_SU-2019-1536-1.NASL", "SUSE_SU-2019-1550-1.NASL", "SUSE_SU-2019-1668-1.NASL", "SUSE_SU-2019-1671-1.NASL", "SUSE_SU-2019-1767-1.NASL", "SUSE_SU-2019-1823-1.NASL", "SUSE_SU-2019-1829-1.NASL", "SUSE_SU-2019-1834-1.NASL", "SUSE_SU-2019-1835-1.NASL", "SUSE_SU-2019-1851-1.NASL", "SUSE_SU-2019-1852-1.NASL", "SUSE_SU-2019-1854-1.NASL", "SUSE_SU-2019-1855-1.NASL", "SUSE_SU-2019-1870-1.NASL", "SUSE_SU-2019-2002-1.NASL", "SUSE_SU-2019-2021-1.NASL", "SUSE_SU-2019-2028-1.NASL", "SUSE_SU-2019-2036-1.NASL", "SUSE_SU-2019-2237-1.NASL", "SUSE_SU-2019-2291-1.NASL", "SUSE_SU-2019-2329-1.NASL", "SUSE_SU-2019-2336-1.NASL", "SUSE_SU-2019-2371-1.NASL", "SUSE_SU-2019-2412-1.NASL", "SUSE_SU-2019-2414-1.NASL", "SUSE_SU-2019-2424-1.NASL", "SUSE_SU-2019-2430-1.NASL", "SUSE_SU-2019-2648-1.NASL", "SUSE_SU-2019-2738-1.NASL", "SUSE_SU-2019-2821-1.NASL", "SUSE_SU-2019-2829-1.NASL", "SUSE_SU-2019-2879-1.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2019-3060-1.NASL", "SUSE_SU-2020-0868-1.NASL", "SUSE_SU-2020-1255-1.NASL", "SUSE_SU-2020-1272-1.NASL", "SUSE_SU-2020-1275-1.NASL", "SUSE_SU-2021-0060-1.NASL", "SUSE_SU-2021-0061-1.NASL", "SUSE_SU-2021-0062-1.NASL", "SUSE_SU-2021-0068-1.NASL", "SUSE_SU-2021-0082-1.NASL", "SUSE_SU-2021-1314-1.NASL", "SUSE_SU-2021-1786-1.NASL", "SUSE_SU-2021-1980-1.NASL", "SUSE_SU-2021-1989-1.NASL", "SUSE_SU-2021-3192-1.NASL", "SUSE_SU-2021-3206-1.NASL", "SUSE_SU-2021-3217-1.NASL", "SUSE_SU-2021-3972-1.NASL", "SUSE_SU-2022-0107-1.NASL", "SUSE_SU-2022-0108-1.NASL", "SUSE_SU-2022-14875-1.NASL", "TELNETD_CVE-2020-10188_DIRECT.NASL", "TOMCAT_10_0_0_M5.NASL", "TOMCAT_10_0_2.NASL", "TOMCAT_7_0_104.NASL", "TOMCAT_8_5_41.NASL", "TOMCAT_8_5_55.NASL", "TOMCAT_9_0_20.NASL", "TOMCAT_9_0_35.NASL", "UBUNTU_USN-3932-1.NASL", "UBUNTU_USN-3932-2.NASL", "UBUNTU_USN-3962-1.NASL", "UBUNTU_USN-3979-1.NASL", "UBUNTU_USN-3980-1.NASL", "UBUNTU_USN-3980-2.NASL", "UBUNTU_USN-3981-1.NASL", "UBUNTU_USN-3981-2.NASL", "UBUNTU_USN-3982-1.NASL", "UBUNTU_USN-3982-2.NASL", "UBUNTU_USN-3991-1.NASL", "UBUNTU_USN-3991-2.NASL", "UBUNTU_USN-3991-3.NASL", "UBUNTU_USN-3997-1.NASL", "UBUNTU_USN-4040-1.NASL", "UBUNTU_USN-4069-1.NASL", "UBUNTU_USN-4069-2.NASL", "UBUNTU_USN-4080-1.NASL", "UBUNTU_USN-4083-1.NASL", "UBUNTU_USN-4094-1.NASL", "UBUNTU_USN-4095-1.NASL", "UBUNTU_USN-4113-1.NASL", "UBUNTU_USN-4113-2.NASL", "UBUNTU_USN-4114-1.NASL", "UBUNTU_USN-4115-1.NASL", "UBUNTU_USN-4115-2.NASL", "UBUNTU_USN-4116-1.NASL", "UBUNTU_USN-4117-1.NASL", "UBUNTU_USN-4118-1.NASL", "UBUNTU_USN-4128-1.NASL", "UBUNTU_USN-4128-2.NASL", "UBUNTU_USN-4145-1.NASL", "UBUNTU_USN-4147-1.NASL", "UBUNTU_USN-4183-1.NASL", "UBUNTU_USN-4183-2.NASL", "UBUNTU_USN-4186-1.NASL", "UBUNTU_USN-4186-3.NASL", "UBUNTU_USN-4376-1.NASL", "UBUNTU_USN-4380-1.NASL", "UBUNTU_USN-4387-1.NASL", "UBUNTU_USN-4388-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4495-1.NASL", "UBUNTU_USN-4504-1.NASL", "UBUNTU_USN-4510-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4527-1.NASL", "UBUNTU_USN-4583-2.NASL", "UBUNTU_USN-4596-1.NASL", "UBUNTU_USN-4600-2.NASL", "UBUNTU_USN-4602-1.NASL", "UBUNTU_USN-4635-1.NASL", "UBUNTU_USN-4638-1.NASL", "UBUNTU_USN-4685-1.NASL", "UBUNTU_USN-4686-1.NASL", "UBUNTU_USN-4699-1.NASL", "UBUNTU_USN-4714-1.NASL", "UBUNTU_USN-4892-1.NASL", "UBUNTU_USN-5088-1.NASL", "VIRTUALBOX_APR_2021_CPU.NASL", "VIRTUOZZO_VZA-2019-089.NASL", "VIRTUOZZO_VZA-2020-037.NASL", "WIRESHARK_3_2_9.NASL", "WIRESHARK_3_4_1.NASL", "WIRESHARK_3_4_2.NASL"]}, {"type": "nodejs", "idList": ["NODEJS:1467"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2021-23840"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108764", "OPENVAS:1361412562310114143", "OPENVAS:1361412562310114144", "OPENVAS:1361412562310141924", "OPENVAS:1361412562310142265", "OPENVAS:1361412562310142309", "OPENVAS:136141256231014231", "OPENVAS:1361412562310142311", "OPENVAS:1361412562310142314", "OPENVAS:1361412562310142508", "OPENVAS:1361412562310142509", "OPENVAS:1361412562310142811", "OPENVAS:1361412562310142812", "OPENVAS:1361412562310143027", "OPENVAS:1361412562310143028", "OPENVAS:1361412562310143613", "OPENVAS:1361412562310143963", "OPENVAS:1361412562310143964", "OPENVAS:1361412562310704233", "OPENVAS:1361412562310704434", "OPENVAS:1361412562310704435", "OPENVAS:1361412562310704472", "OPENVAS:1361412562310704495", "OPENVAS:1361412562310704509", "OPENVAS:1361412562310704542", "OPENVAS:1361412562310704686", "OPENVAS:1361412562310704693", "OPENVAS:1361412562310815177", "OPENVAS:1361412562310815180", "OPENVAS:1361412562310815453", "OPENVAS:1361412562310815454", "OPENVAS:1361412562310815455", "OPENVAS:1361412562310815456", "OPENVAS:1361412562310815457", "OPENVAS:1361412562310815458", "OPENVAS:1361412562310815459", "OPENVAS:1361412562310815461", "OPENVAS:1361412562310815462", "OPENVAS:1361412562310815463", "OPENVAS:1361412562310843951", "OPENVAS:1361412562310843957", "OPENVAS:1361412562310843990", "OPENVAS:1361412562310844004", "OPENVAS:1361412562310844006", "OPENVAS:1361412562310844008", "OPENVAS:1361412562310844009", "OPENVAS:1361412562310844010", "OPENVAS:1361412562310844012", "OPENVAS:1361412562310844072", "OPENVAS:1361412562310844102", "OPENVAS:1361412562310844116", "OPENVAS:1361412562310844118", "OPENVAS:1361412562310844121", "OPENVAS:1361412562310844133", "OPENVAS:1361412562310844134", "OPENVAS:1361412562310844154", "OPENVAS:1361412562310844156", "OPENVAS:1361412562310844157", "OPENVAS:1361412562310844158", "OPENVAS:1361412562310844159", "OPENVAS:1361412562310844160", "OPENVAS:1361412562310844170", "OPENVAS:1361412562310844174", "OPENVAS:1361412562310844179", "OPENVAS:1361412562310844181", "OPENVAS:1361412562310844192", "OPENVAS:1361412562310844194", "OPENVAS:1361412562310844231", "OPENVAS:1361412562310844236", "OPENVAS:1361412562310844362", "OPENVAS:1361412562310844364", "OPENVAS:1361412562310844365", "OPENVAS:1361412562310844450", "OPENVAS:1361412562310844454", "OPENVAS:1361412562310851908", "OPENVAS:1361412562310851918", "OPENVAS:1361412562310852240", "OPENVAS:1361412562310852274", "OPENVAS:1361412562310852602", "OPENVAS:1361412562310852611", "OPENVAS:1361412562310852631", "OPENVAS:1361412562310852649", "OPENVAS:1361412562310852657", "OPENVAS:1361412562310852684", "OPENVAS:1361412562310852686", "OPENVAS:1361412562310852705", "OPENVAS:1361412562310852750", "OPENVAS:1361412562310853179", "OPENVAS:1361412562310853182", "OPENVAS:1361412562310872637", "OPENVAS:1361412562310872638", "OPENVAS:1361412562310872757", "OPENVAS:1361412562310872759", "OPENVAS:1361412562310875421", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875426", "OPENVAS:1361412562310875681", "OPENVAS:1361412562310875697", "OPENVAS:1361412562310876030", "OPENVAS:1361412562310876319", "OPENVAS:1361412562310876320", "OPENVAS:1361412562310876322", "OPENVAS:1361412562310876325", "OPENVAS:1361412562310876327", "OPENVAS:1361412562310876334", "OPENVAS:1361412562310876360", "OPENVAS:1361412562310876361", "OPENVAS:1361412562310876377", "OPENVAS:1361412562310876532", "OPENVAS:1361412562310876543", "OPENVAS:1361412562310876555", "OPENVAS:1361412562310876556", "OPENVAS:1361412562310876566", "OPENVAS:1361412562310876577", "OPENVAS:1361412562310876586", "OPENVAS:1361412562310876611", "OPENVAS:1361412562310876621", "OPENVAS:1361412562310876638", "OPENVAS:1361412562310876653", "OPENVAS:1361412562310876666", "OPENVAS:1361412562310876707", "OPENVAS:1361412562310876711", "OPENVAS:1361412562310876750", "OPENVAS:1361412562310876753", "OPENVAS:1361412562310876784", "OPENVAS:1361412562310876785", "OPENVAS:1361412562310876809", "OPENVAS:1361412562310876828", "OPENVAS:1361412562310876829", "OPENVAS:1361412562310876830", "OPENVAS:1361412562310876832", "OPENVAS:1361412562310876833", "OPENVAS:1361412562310876834", "OPENVAS:1361412562310876835", "OPENVAS:1361412562310876837", "OPENVAS:1361412562310876841", "OPENVAS:1361412562310876859", "OPENVAS:1361412562310876862", "OPENVAS:1361412562310876869", "OPENVAS:1361412562310876898", "OPENVAS:1361412562310876900", "OPENVAS:1361412562310876901", "OPENVAS:1361412562310876904", "OPENVAS:1361412562310876908", "OPENVAS:1361412562310876918", "OPENVAS:1361412562310876923", "OPENVAS:1361412562310876925", "OPENVAS:1361412562310876940", "OPENVAS:1361412562310876943", "OPENVAS:1361412562310876994", "OPENVAS:1361412562310876995", "OPENVAS:1361412562310876999", "OPENVAS:1361412562310877616", "OPENVAS:1361412562310877618", "OPENVAS:1361412562310877622", "OPENVAS:1361412562310877658", "OPENVAS:1361412562310877665", "OPENVAS:1361412562310877668", "OPENVAS:1361412562310877690", "OPENVAS:1361412562310877866", "OPENVAS:1361412562310877876", "OPENVAS:1361412562310877898", "OPENVAS:1361412562310877925", "OPENVAS:1361412562310877930", "OPENVAS:1361412562310877939", "OPENVAS:1361412562310877942", "OPENVAS:1361412562310877945", "OPENVAS:1361412562310883095", "OPENVAS:1361412562310883131", "OPENVAS:1361412562310883179", "OPENVAS:1361412562310883210", "OPENVAS:1361412562310883217", "OPENVAS:1361412562310883219", "OPENVAS:1361412562310891715", "OPENVAS:1361412562310891731", "OPENVAS:1361412562310891771", "OPENVAS:1361412562310891777", "OPENVAS:1361412562310891839", "OPENVAS:1361412562310891862", "OPENVAS:1361412562310891879", "OPENVAS:1361412562310891884", "OPENVAS:1361412562310891885", "OPENVAS:1361412562310891896", "OPENVAS:1361412562310891900", "OPENVAS:1361412562310891919", "OPENVAS:1361412562310891930", "OPENVAS:1361412562310891943", "OPENVAS:1361412562310892209", "OPENVAS:1361412562310892217", "OPENVAS:1361412562310892221", "OPENVAS:1361412562311220201269", "OPENVAS:1361412562311220201289", "OPENVAS:1361412562311220201300", "OPENVAS:1361412562311220201444", "OPENVAS:1361412562311220201452", "OPENVAS:1361412562311220201505", "OPENVAS:1361412562311220201512", "OPENVAS:1361412562311220201577", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201596", "OPENVAS:1361412562311220201601", "OPENVAS:1361412562311220201606", "OPENVAS:1361412562311220201613", "OPENVAS:1361412562311220201617"]}, {"type": "oracle", "idList": ["ORACLE:CPUJUL2021"]}, {"type": "oraclelinux", "idList": ["ELSA-2017-2423", "ELSA-2017-2492", "ELSA-2019-1269", "ELSA-2019-1308", "ELSA-2019-1873", "ELSA-2019-2029", "ELSA-2019-2703", "ELSA-2019-3517", "ELSA-2019-3836", "ELSA-2020-1016", "ELSA-2020-1318", "ELSA-2020-1334", "ELSA-2020-1335", "ELSA-2020-1349", "ELSA-2020-1769", "ELSA-2020-2530", "ELSA-2020-4431", "ELSA-2020-4442", "ELSA-2020-4484", "ELSA-2020-4514", "ELSA-2020-4751", "ELSA-2020-4807", "ELSA-2020-5493", "ELSA-2020-5715", "ELSA-2020-5900", "ELSA-2020-5962", "ELSA-2021-0162", "ELSA-2021-1297", "ELSA-2021-1298", "ELSA-2021-1301", "ELSA-2021-1307", "ELSA-2021-1354", "ELSA-2021-1578", "ELSA-2021-1581", "ELSA-2021-1593", "ELSA-2021-1610", "ELSA-2021-1633", "ELSA-2021-1647", "ELSA-2021-1678", "ELSA-2021-3590", "ELSA-2021-4151", "ELSA-2021-4162", "ELSA-2021-9238", "ELSA-2021-9459"]}, {"type": "osv", "idList": ["OSV:GHSA-288C-CQ4H-88GQ", "OSV:GHSA-2PPP-9496-P23Q", "OSV:GHSA-2QRG-X229-3V8Q", "OSV:GHSA-344F-F5VG-2JFJ", "OSV:GHSA-4446-656P-F54G", "OSV:GHSA-48RW-J489-928M", "OSV:GHSA-4GW3-8F77-F72C", "OSV:GHSA-4P6W-M9WC-C9C9", "OSV:GHSA-4PV3-63JW-4JW2", "OSV:GHSA-523C-XH4G-MH5M", "OSV:GHSA-53X6-4X5P-RRVV", "OSV:GHSA-5R5R-6HPJ-8GG9", "OSV:GHSA-6C3J-C64M-QHGQ", "OSV:GHSA-6FPP-RGJ9-8RWC", "OSV:GHSA-6JMF-MXWF-R3JC", "OSV:GHSA-6PCC-3RFX-4GPM", "OSV:GHSA-6PHF-73Q6-GH87", "OSV:GHSA-744R-VV2G-2X6G", "OSV:GHSA-7R82-7XV7-XCPJ", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-84RM-QF37-FGC2", "OSV:GHSA-89QR-369F-5M5X", "OSV:GHSA-8C4J-34R4-XR8G", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-8W26-6F25-CM9X", "OSV:GHSA-9GPH-22XH-8X98", "OSV:GHSA-9M6F-7XCQ-8VF8", "OSV:GHSA-9V3M-8FP8-MJ99", "OSV:GHSA-9VFJ-5G7H-4P24", "OSV:GHSA-C265-37VJ-CWCC", "OSV:GHSA-C427-HJC3-WRFW", "OSV:GHSA-C4W7-XM78-47VH", "OSV:GHSA-C6PW-Q7F2-97HV", "OSV:GHSA-C9JJ-3WVG-Q65H", "OSV:GHSA-CC94-3V9C-7RM8", "OSV:GHSA-CJJC-XP8V-855W", "OSV:GHSA-CVM9-FJM9-3572", "OSV:GHSA-F9XH-2QGP-CQ57", "OSV:GHSA-GXR4-XJJ5-5PX2", "OSV:GHSA-H3CW-G4MQ-C5X2", "OSV:GHSA-H9GJ-RQRW-X4FQ", "OSV:GHSA-HPCF-8VF9-Q4GJ", "OSV:GHSA-HWJ3-M3P6-HJ38", "OSV:GHSA-HWPC-8XQV-JVJ4", "OSV:GHSA-J823-4QCH-3RGM", "OSV:GHSA-JPCQ-CGW6-V4J6", "OSV:GHSA-JQ65-29V4-4X35", "OSV:GHSA-M6X4-97WX-4Q27", "OSV:GHSA-P6MC-M468-83GW", "OSV:GHSA-PJ7M-G53M-7638", "OSV:GHSA-Q44V-XC3G-V7JQ", "OSV:GHSA-Q6GQ-997W-F55G", "OSV:GHSA-QGM6-9472-PWQ7", "OSV:GHSA-QJW2-HR98-QGFH", "OSV:GHSA-R3GR-CXRF-HG25", "OSV:GHSA-R695-7VR9-JGC2", "OSV:GHSA-RVWF-54QP-4R6V", "OSV:GHSA-V585-23HC-C647", "OSV:GHSA-VCJF-MGCG-JXJQ", "OSV:GHSA-VFQX-33QM-G869", "OSV:GHSA-WH8G-3J2C-RQJ5", "OSV:GHSA-XQJ7-J8J5-F2XR"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152462", "PACKETSTORM:152663", "PACKETSTORM:153506", "PACKETSTORM:159049", "PACKETSTORM:160108", "PACKETSTORM:160127", "PACKETSTORM:160721"]}, {"type": "paloalto", "idList": ["PA-CVE-2020-10188"]}, {"type": "pentestpartners", "idList": ["PENTESTPARTNERS:8FD1C9A0D76A3084445136A0275847C0"]}, {"type": "photon", "idList": ["PHSA-2019-1.0-0206", "PHSA-2019-1.0-0224", "PHSA-2019-1.0-0234", "PHSA-2019-1.0-0235", "PHSA-2019-1.0-0238", "PHSA-2019-1.0-0244", "PHSA-2019-1.0-0247", "PHSA-2019-1.0-0251", "PHSA-2019-1.0-0253", "PHSA-2019-1.0-0262", "PHSA-2019-2.0-0160", "PHSA-2019-2.0-0161", "PHSA-2019-2.0-0171", "PHSA-2019-2.0-0178", "PHSA-2019-2.0-0189", "PHSA-2019-3.0-0014", "PHSA-2019-3.0-0015", "PHSA-2019-3.0-0024", "PHSA-2019-3.0-0026", "PHSA-2019-3.0-0035", "PHSA-2019-3.0-0036", "PHSA-2019-3.0-0046", "PHSA-2020-0279", "PHSA-2020-0289", "PHSA-2020-0290", "PHSA-2020-0292", "PHSA-2020-0297", "PHSA-2020-0298", "PHSA-2020-0301", "PHSA-2020-0305", "PHSA-2020-1.0-0264", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0289", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0295", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0301", "PHSA-2020-1.0-0302", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0308", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0314", "PHSA-2020-1.0-0316", "PHSA-2020-1.0-0324", "PHSA-2020-1.0-0335", "PHSA-2020-1.0-0338", "PHSA-2020-1.0-0345", "PHSA-2020-1.0-0346", "PHSA-2020-1.0-0350", "PHSA-2020-2.0-0201", "PHSA-2020-2.0-0204", "PHSA-2020-2.0-0225", "PHSA-2020-2.0-0227", "PHSA-2020-2.0-0228", "PHSA-2020-2.0-0231", "PHSA-2020-2.0-0233", "PHSA-2020-2.0-0234", "PHSA-2020-2.0-0238", "PHSA-2020-2.0-0244", "PHSA-2020-2.0-0245", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0247", "PHSA-2020-2.0-0248", "PHSA-2020-2.0-0249", "PHSA-2020-2.0-0254", "PHSA-2020-2.0-0261", "PHSA-2020-2.0-0265", "PHSA-2020-2.0-0272", "PHSA-2020-2.0-0276", "PHSA-2020-2.0-0284", "PHSA-2020-2.0-0291", "PHSA-2020-2.0-0295", "PHSA-2020-2.0-0304", "PHSA-2020-3.0-0048", "PHSA-2020-3.0-0054", "PHSA-2020-3.0-0079", "PHSA-2020-3.0-0081", "PHSA-2020-3.0-0082", "PHSA-2020-3.0-0083", "PHSA-2020-3.0-0087", "PHSA-2020-3.0-0093", "PHSA-2020-3.0-0099", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0101", "PHSA-2020-3.0-0104", "PHSA-2020-3.0-0113", "PHSA-2020-3.0-0116", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0130", "PHSA-2020-3.0-0153", "PHSA-2020-3.0-0155", "PHSA-2020-3.0-0161", "PHSA-2020-3.0-0174", "PHSA-2020-3.0-0175", "PHSA-2020-3.0-0180", "PHSA-2021-0308", "PHSA-2021-0325", "PHSA-2021-0327", "PHSA-2021-0337", "PHSA-2021-0366", "PHSA-2021-0373", "PHSA-2021-0378", "PHSA-2021-0390", "PHSA-2021-0422", "PHSA-2021-1.0-0366", "PHSA-2021-1.0-0373", "PHSA-2021-1.0-0378", "PHSA-2021-1.0-0390", "PHSA-2021-2.0-0308", "PHSA-2021-2.0-0323", "PHSA-2021-2.0-0325", "PHSA-2021-2.0-0327", "PHSA-2021-2.0-0330", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0337", "PHSA-2021-3.0-0200", "PHSA-2021-3.0-0204", "PHSA-2021-3.0-0209", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0227", "PHSA-2021-3.0-0231", "PHSA-2021-3.0-0248", "PHSA-2021-4.0-0006", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0036"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:192411B44569225E2F2632594DC4308C", "QUALYSBLOG:FE0BAF7268104D525CC0A2ABC0471C4C"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:49C18614AD01B6865616A65F734B9F71", "RAPID7BLOG:5482AC1594C82A230828023816657B57", "RAPID7BLOG:5586742AC0F1C66F56B3583482B0960A", "RAPID7BLOG:C628D3D68DF3AE5A40A1F0C9DFA38860"]}, {"type": "redhat", "idList": ["RHSA-2017:0161", "RHSA-2017:2423", "RHSA-2017:2810", "RHSA-2017:3400", "RHSA-2019:0362", "RHSA-2019:0380", "RHSA-2019:1265", "RHSA-2019:1973", "RHSA-2019:2494", "RHSA-2019:2585", "RHSA-2019:2696", "RHSA-2019:3836", "RHSA-2020:0339", "RHSA-2020:0556", "RHSA-2020:0661", "RHSA-2020:1454", "RHSA-2020:1493", "RHSA-2020:3806", "RHSA-2020:4383", "RHSA-2020:4431", "RHSA-2020:4751", "RHSA-2020:4846", "RHSA-2020:5159", "RHSA-2020:5506", "RHSA-2020:5635", "RHSA-2020:5637", "RHSA-2021:0105", "RHSA-2021:0106", "RHSA-2021:0162", "RHSA-2021:0172", "RHSA-2021:0521", "RHSA-2021:0526", "RHSA-2021:0943", "RHSA-2021:1129", "RHSA-2021:1444", "RHSA-2021:1610", "RHSA-2021:2021", "RHSA-2021:2039", "RHSA-2021:2051", "RHSA-2021:2139", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:3723", "RHSA-2021:4142", "RHSA-2021:4213", "RHSA-2021:5127", "RHSA-2022:0011"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-11979", "RH:CVE-2020-11987", "RH:CVE-2020-13943", "RH:CVE-2020-13954", "RH:CVE-2020-13956", "RH:CVE-2020-17521", "RH:CVE-2020-17527", "RH:CVE-2020-17530", "RH:CVE-2020-1971", "RH:CVE-2020-24750", "RH:CVE-2020-26217", "RH:CVE-2020-26418", "RH:CVE-2020-26419", "RH:CVE-2020-26420", "RH:CVE-2020-26421", "RH:CVE-2020-26422", "RH:CVE-2020-27216", "RH:CVE-2020-27218", "RH:CVE-2020-27223", "RH:CVE-2020-27841", "RH:CVE-2020-27842", "RH:CVE-2020-27843", "RH:CVE-2020-27844", "RH:CVE-2020-27845", "RH:CVE-2020-28052", "RH:CVE-2020-28196", "RH:CVE-2020-35490", "RH:CVE-2020-35491", "RH:CVE-2020-35728", "RH:CVE-2020-36179", "RH:CVE-2020-36180", "RH:CVE-2020-36181", "RH:CVE-2020-36182", "RH:CVE-2020-36183", "RH:CVE-2020-36184", "RH:CVE-2020-36185", "RH:CVE-2020-36186", "RH:CVE-2020-36187", "RH:CVE-2020-36188", "RH:CVE-2020-36189", "RH:CVE-2020-36242", "RH:CVE-2020-7760", "RH:CVE-2020-7774", "RH:CVE-2020-8284", "RH:CVE-2020-8285", "RH:CVE-2020-8286", "RH:CVE-2021-20227", "RH:CVE-2021-21290", "RH:CVE-2021-21345", "RH:CVE-2021-2144", "RH:CVE-2021-2154", "RH:CVE-2021-2160", "RH:CVE-2021-2161", "RH:CVE-2021-2162", "RH:CVE-2021-2163", "RH:CVE-2021-2164", "RH:CVE-2021-2166", "RH:CVE-2021-2169", "RH:CVE-2021-2170", "RH:CVE-2021-2171", "RH:CVE-2021-2172", "RH:CVE-2021-2174", "RH:CVE-2021-2179", "RH:CVE-2021-2180", "RH:CVE-2021-2193", "RH:CVE-2021-2194", "RH:CVE-2021-2196", "RH:CVE-2021-2201", "RH:CVE-2021-2202", "RH:CVE-2021-2203", "RH:CVE-2021-2208", "RH:CVE-2021-22112", "RH:CVE-2021-2212", "RH:CVE-2021-2213", "RH:CVE-2021-2215", "RH:CVE-2021-2217", "RH:CVE-2021-22173", "RH:CVE-2021-22174", "RH:CVE-2021-22191", "RH:CVE-2021-2226", "RH:CVE-2021-2230", "RH:CVE-2021-2232", "RH:CVE-2021-2278", "RH:CVE-2021-22883", "RH:CVE-2021-22884", "RH:CVE-2021-2293", "RH:CVE-2021-2298", "RH:CVE-2021-2299", "RH:CVE-2021-2300", "RH:CVE-2021-2301", "RH:CVE-2021-2304", "RH:CVE-2021-2305", "RH:CVE-2021-2307", "RH:CVE-2021-2308", "RH:CVE-2021-23336", "RH:CVE-2021-23839", "RH:CVE-2021-23840", "RH:CVE-2021-23841", "RH:CVE-2021-25329", "RH:CVE-2021-3449", "RH:CVE-2021-3450"]}, {"type": "rhino", "idList": ["RHINO:ADD7C478031F3DD8CC7E20F3B676DB4B"]}, {"type": "rocky", "idList": ["RLSA-2021:3590"]}, {"type": "rustsec", "idList": ["RUSTSEC-2020-0015", "RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2021-0057", "RUSTSEC-2021-0058"]}, {"type": "saint", "idList": ["SAINT:1126B0AA9A8BD987E404F1746F1D8BFA", "SAINT:AE1DA80E6B0E4C12B5D781794166897B"]}, {"type": "samba", "idList": ["SAMBA:CVE-2020-1472"]}, {"type": "securelist", "idList": ["SECURELIST:73735B62C781261398E44FFF82262BCD"]}, {"type": "seebug", "idList": ["SSV:92965"]}, {"type": "slackware", "idList": ["SSA-2019-030-01", "SSA-2019-107-01", "SSA-2019-202-01", "SSA-2019-311-01", "SSA-2020-086-01", "SSA-2020-091-02", "SSA-2020-163-01", "SSA-2020-295-01"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2131-1", "OPENSUSE-SU-2018:2931-1", "OPENSUSE-SU-2018:3071-1", "OPENSUSE-SU-2018:3202-1", "OPENSUSE-SU-2018:3218-1", "OPENSUSE-SU-2019:0065-1", "OPENSUSE-SU-2019:0140-1", "OPENSUSE-SU-2019:1664-1", "OPENSUSE-SU-2019:1673-1", "OPENSUSE-SU-2019:1716-1", "OPENSUSE-SU-2019:1757-1", "OPENSUSE-SU-2019:1777-1", "OPENSUSE-SU-2019:1808-1", "OPENSUSE-SU-2019:1839-1", "OPENSUSE-SU-2019:1872-1", "OPENSUSE-SU-2019:1912-1", "OPENSUSE-SU-2019:1916-1", "OPENSUSE-SU-2019:2051-1", "OPENSUSE-SU-2019:2058-1", "OPENSUSE-SU-2019:2173-1", "OPENSUSE-SU-2019:2181-1", "OPENSUSE-SU-2019:2392-1", "OPENSUSE-SU-2019:2444-1", "OPENSUSE-SU-2020:0711-1", "OPENSUSE-SU-2020:0719-1", "OPENSUSE-SU-2020:1178-1", "OPENSUSE-SU-2020:1194-1", "OPENSUSE-SU-2020:1325-1", "OPENSUSE-SU-2020:1513-1", "OPENSUSE-SU-2020:1584-1", "OPENSUSE-SU-2020:1767-1", "OPENSUSE-SU-2020:1842-1", "OPENSUSE-SU-2020:1888-1", "OPENSUSE-SU-2021:3876-1", "OPENSUSE-SU-2022:0108-1"]}, {"type": "symantec", "idList": ["SMNTC-16056", "SMNTC-1765", "SMNTC-1768"]}, {"type": "talos", "idList": ["SAP", "TALOS-2019-0900"]}, {"type": "talosblog", "idList": ["TALOSBLOG:A654303FB4331FDBB91B999EC882BE7A", "TALOSBLOG:C3F889D9C3C954C42160A3C26034C2F6"]}, {"type": "thn", "idList": ["THN:0A61A90DD0F88453854B73FE249BC379", "THN:A1FA44D6DEC0509E076C54E227E6E6A1", "THN:F4928090525451C50A1B016ED3B0650F", "THN:F53D18B9EB0F8CD70C9289288AC9E2E1"]}, {"type": "threatpost", "idList": ["THREATPOST:0B290DDF3FE14178760FDC2229CB1383", "THREATPOST:1322630273A25CA5A68246679553E2B8", "THREATPOST:23D55C85EA8B442C858FF058C5E25DBC", "THREATPOST:27150C099FB4771B9DED4F6372D27EB7", "THREATPOST:2F655C93B7912A7C776E1DC1D39822D0", "THREATPOST:30D70449EF03FFC5099B5B141FA079E2", "THREATPOST:45F91A2DD716E93AA4DA0D9441E725C6", "THREATPOST:49274446DFD14E2B0DF948DA83A07ECB", "THREATPOST:891CC19008EEE7B8F1523A2BD4A37993", "THREATPOST:A1A1E1AC8DB384C8FA2988F9A9121141", "THREATPOST:A47D83D4BBBE115E6424755328525B9D", "THREATPOST:A5FC4C5797CA53E30A3426AF0843BFFE", "THREATPOST:BBAE8AE32C2E8EC0271BBA9D0498A825", "THREATPOST:DBA639CBD82839FDE8E9F4AE1031AAF7", "THREATPOST:F1065D29808C9165285986CCB6DEBB5A", "THREATPOST:F60D403369A535076F39A474F74C925E", "THREATPOST:F9CF34A304B5CA2189D5CEDA09C8B0CB"]}, {"type": "tomcat", "idList": ["TOMCAT:909935A4BEB7C54CD1FA804D13CDD890"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:8A87E8F1BA63B9BB2E84C23288C44FDC", "TRENDMICROBLOG:A2FAFD5078CBD03DAF767DD2496552A5"]}, {"type": "typo3", "idList": ["TYPO3-PSA-2019-005"]}, {"type": "ubuntu", "idList": ["LSN-0068-1", "USN-3932-1", "USN-3932-2", "USN-3962-1", "USN-3979-1", "USN-3980-1", "USN-3980-2", "USN-3981-1", "USN-3981-2", "USN-3982-1", "USN-3982-2", "USN-4040-1", "USN-4040-2", "USN-4069-1", "USN-4069-2", "USN-4080-1", "USN-4083-1", "USN-4094-1", "USN-4095-1", "USN-4113-1", "USN-4113-2", "USN-4114-1", "USN-4115-1", "USN-4115-2", "USN-4116-1", "USN-4117-1", "USN-4118-1", "USN-4128-1", "USN-4128-2", "USN-4145-1", "USN-4147-1", "USN-4183-1", "USN-4183-2", "USN-4186-1", "USN-4186-3", "USN-4376-1", "USN-4380-1", "USN-4387-1", "USN-4389-1", "USN-4392-1", "USN-4394-1", "USN-4458-1", "USN-4495-1", "USN-4504-1", "USN-4510-1", "USN-4510-2", "USN-4525-1", "USN-4526-1", "USN-4527-1", "USN-4559-1", "USN-4602-1", "USN-4635-1", "USN-4638-1", "USN-4685-1", "USN-4686-1", "USN-4699-1", "USN-4714-1", "USN-4892-1", "USN-5088-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2021-2144", "UB:CVE-2021-2145", "UB:CVE-2021-2146", "UB:CVE-2021-2154", "UB:CVE-2021-2160", "UB:CVE-2021-2161", "UB:CVE-2021-2162", "UB:CVE-2021-2163", "UB:CVE-2021-2164", "UB:CVE-2021-2166", "UB:CVE-2021-2169", "UB:CVE-2021-2171", "UB:CVE-2021-2174", "UB:CVE-2021-2178", "UB:CVE-2021-2180", "UB:CVE-2021-2193", "UB:CVE-2021-2194", "UB:CVE-2021-2196", "UB:CVE-2021-2201", "UB:CVE-2021-2202", "UB:CVE-2021-2203", "UB:CVE-2021-2208", "UB:CVE-2021-2212", "UB:CVE-2021-2213", "UB:CVE-2021-2215", "UB:CVE-2021-2217", "UB:CVE-2021-2226", "UB:CVE-2021-2230", "UB:CVE-2021-2250", "UB:CVE-2021-2264", "UB:CVE-2021-2266", "UB:CVE-2021-2279", "UB:CVE-2021-2281", "UB:CVE-2021-2282", "UB:CVE-2021-2283", "UB:CVE-2021-2285", "UB:CVE-2021-2286", "UB:CVE-2021-2287", "UB:CVE-2021-2291", "UB:CVE-2021-2293", "UB:CVE-2021-2296", "UB:CVE-2021-2297", "UB:CVE-2021-2305", "UB:CVE-2021-2306", "UB:CVE-2021-2308", "UB:CVE-2021-2309", "UB:CVE-2021-2310", "UB:CVE-2021-2312", "UB:CVE-2021-2321", "UB:CVE-2021-3449", "UB:CVE-2021-3450"]}, {"type": "virtuozzo", "idList": ["VZA-2018-089", "VZA-2019-088", "VZA-2019-089", "VZA-2020-036", "VZA-2020-037"]}, {"type": "zdi", "idList": ["ZDI-19-1024", "ZDI-19-582", "ZDI-19-807", "ZDI-21-451", "ZDI-21-452", "ZDI-21-453", "ZDI-21-454", "ZDI-21-455", "ZDI-21-456", "ZDI-21-457", "ZDI-21-458", "ZDI-21-459", "ZDI-21-460", "ZDI-21-461", "ZDI-21-462", "ZDI-21-483", "ZDI-21-484"]}, {"type": "zdt", "idList": ["1337DAY-ID-24818", "1337DAY-ID-32519", "1337DAY-ID-32619", "1337DAY-ID-32925", "1337DAY-ID-35263", "1337DAY-ID-35274", "1337DAY-ID-35571"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2016-2542", "epss": 0.00042, "percentile": 0.05656, "modified": "2023-05-02"}, {"cve": "CVE-2016-5725", "epss": 0.00995, "percentile": 0.81363, "modified": "2023-05-01"}, {"cve": "CVE-2016-7103", "epss": 0.0034, "percentile": 0.67069, "modified": "2023-05-02"}, {"cve": "CVE-2017-1000061", "epss": 0.00263, "percentile": 0.62421, "modified": "2023-05-01"}, {"cve": "CVE-2017-12626", "epss": 0.01977, "percentile": 0.87059, "modified": "2023-05-02"}, {"cve": "CVE-2017-14735", "epss": 0.00444, "percentile": 0.71131, "modified": "2023-05-01"}, {"cve": "CVE-2017-18640", "epss": 0.00806, "percentile": 0.79241, "modified": "2023-05-02"}, {"cve": "CVE-2017-5645", "epss": 0.03119, "percentile": 0.89614, "modified": "2023-05-01"}, {"cve": "CVE-2018-1000180", "epss": 0.0076, "percentile": 0.78493, "modified": "2023-05-01"}, {"cve": "CVE-2018-1000613", "epss": 0.00697, "percentile": 0.77355, "modified": "2023-05-02"}, {"cve": "CVE-2018-1000632", "epss": 0.00335, "percentile": 0.66879, "modified": "2023-05-02"}, {"cve": "CVE-2018-1285", "epss": 0.00563, "percentile": 0.74437, "modified": "2023-05-01"}, {"cve": "CVE-2018-14040", "epss": 0.01073, "percentile": 0.82105, "modified": "2023-05-02"}, {"cve": "CVE-2018-14041", "epss": 0.00335, "percentile": 0.66859, "modified": "2023-05-02"}, {"cve": "CVE-2018-14042", "epss": 0.00335, "percentile": 0.66859, "modified": "2023-05-02"}, {"cve": "CVE-2018-14550", "epss": 0.00563, "percentile": 0.74453, "modified": "2023-05-02"}, {"cve": "CVE-2018-14613", "epss": 0.00102, "percentile": 0.40337, "modified": "2023-05-02"}, {"cve": "CVE-2018-16884", "epss": 0.00046, "percentile": 0.14044, "modified": "2023-05-02"}, {"cve": "CVE-2018-20843", "epss": 0.91481, "percentile": 0.98359, "modified": "2023-05-02"}, {"cve": "CVE-2018-8032", "epss": 0.00212, "percentile": 0.57688, "modified": "2023-05-02"}, {"cve": "CVE-2019-0219", "epss": 0.00356, "percentile": 0.67851, "modified": "2023-05-01"}, {"cve": "CVE-2019-0221", "epss": 0.01594, "percentile": 0.85474, "modified": "2023-05-02"}, {"cve": "CVE-2019-0227", "epss": 0.96322, "percentile": 0.99254, "modified": "2023-05-02"}, {"cve": "CVE-2019-0228", "epss": 0.00235, "percentile": 0.60104, "modified": "2023-05-02"}, {"cve": "CVE-2019-0230", "epss": 0.87271, "percentile": 0.98074, "modified": "2023-05-01"}, {"cve": "CVE-2019-0232", "epss": 0.97537, "percentile": 0.99985, "modified": "2023-05-02"}, {"cve": "CVE-2019-0233", "epss": 0.12368, "percentile": 0.94549, "modified": "2023-05-01"}, {"cve": "CVE-2019-10072", "epss": 0.29916, "percentile": 0.96276, "modified": "2023-05-02"}, {"cve": "CVE-2019-10080", "epss": 0.00114, "percentile": 0.4355, "modified": "2023-05-02"}, {"cve": "CVE-2019-10086", "epss": 0.00311, "percentile": 0.65581, "modified": "2023-05-02"}, {"cve": "CVE-2019-10098", "epss": 0.01289, "percentile": 0.83772, "modified": "2023-05-02"}, {"cve": "CVE-2019-10173", "epss": 0.95537, "percentile": 0.9902, "modified": "2023-05-02"}, {"cve": "CVE-2019-10246", "epss": 0.00642, "percentile": 0.76227, "modified": "2023-05-02"}, {"cve": "CVE-2019-10247", "epss": 0.00249, "percentile": 0.61275, "modified": "2023-05-02"}, {"cve": "CVE-2019-10638", "epss": 0.0018, "percentile": 0.53702, "modified": "2023-05-02"}, {"cve": "CVE-2019-10639", "epss": 0.00228, "percentile": 0.59466, "modified": "2023-05-02"}, {"cve": "CVE-2019-11358", "epss": 0.01863, "percentile": 0.8662, "modified": "2023-05-02"}, {"cve": "CVE-2019-11487", "epss": 0.00112, "percentile": 0.43132, "modified": "2023-05-02"}, {"cve": "CVE-2019-11599", "epss": 0.00043, "percentile": 0.0752, "modified": "2023-05-02"}, {"cve": "CVE-2019-12086", "epss": 0.00202, "percentile": 0.56602, "modified": "2023-05-02"}, {"cve": "CVE-2019-12399", "epss": 0.001, "percentile": 0.40059, "modified": "2023-05-01"}, {"cve": "CVE-2019-12402", "epss": 0.003, "percentile": 0.64937, "modified": "2023-05-02"}, {"cve": "CVE-2019-12406", "epss": 0.00245, "percentile": 0.60985, "modified": "2023-05-02"}, {"cve": "CVE-2019-1241", "epss": 0.00883, "percentile": 0.80181, "modified": "2023-05-02"}, {"cve": "CVE-2019-12415", "epss": 0.00069, "percentile": 0.28401, "modified": "2023-05-02"}, {"cve": "CVE-2019-12419", "epss": 0.00743, "percentile": 0.78187, "modified": "2023-05-02"}, {"cve": "CVE-2019-12423", "epss": 0.00239, "percentile": 0.60433, "modified": "2023-05-01"}, {"cve": "CVE-2019-14379", "epss": 0.00793, "percentile": 0.79085, "modified": "2023-05-02"}, {"cve": "CVE-2019-14898", "epss": 0.00042, "percentile": 0.05657, "modified": "2023-05-01"}, {"cve": "CVE-2019-15218", "epss": 0.00127, "percentile": 0.45928, "modified": "2023-05-02"}, {"cve": "CVE-2019-1551", "epss": 0.00261, "percentile": 0.62284, "modified": "2023-05-02"}, {"cve": "CVE-2019-16746", "epss": 0.00581, "percentile": 0.74879, "modified": "2023-05-02"}, {"cve": "CVE-2019-16942", "epss": 0.00292, "percentile": 0.6445, "modified": "2023-05-02"}, {"cve": "CVE-2019-17075", "epss": 0.00943, "percentile": 0.80829, "modified": "2023-05-02"}, {"cve": "CVE-2019-17133", "epss": 0.00576, "percentile": 0.74764, "modified": "2023-05-02"}, {"cve": "CVE-2019-17195", "epss": 0.00581, "percentile": 0.74887, "modified": "2023-05-02"}, {"cve": "CVE-2019-17495", "epss": 0.0098, "percentile": 0.81203, "modified": "2023-05-02"}, {"cve": "CVE-2019-17566", "epss": 0.00172, "percentile": 0.52789, "modified": "2023-05-01"}, {"cve": "CVE-2019-17571", "epss": 0.97471, "percentile": 0.99935, "modified": "2023-05-01"}, {"cve": "CVE-2019-17573", "epss": 0.00212, "percentile": 0.57714, "modified": "2023-05-01"}, {"cve": "CVE-2019-17632", "epss": 0.00099, "percentile": 0.39792, "modified": "2023-05-02"}, {"cve": "CVE-2019-17638", "epss": 0.0042, "percentile": 0.70376, "modified": "2023-05-01"}, {"cve": "CVE-2019-18885", "epss": 0.00098, "percentile": 0.39481, "modified": "2023-05-02"}, {"cve": "CVE-2019-19052", "epss": 0.00859, "percentile": 0.79897, "modified": "2023-05-02"}, {"cve": "CVE-2019-19063", "epss": 0.00138, "percentile": 0.47945, "modified": "2023-05-02"}, {"cve": "CVE-2019-19066", "epss": 0.00046, "percentile": 0.14044, "modified": "2023-05-02"}, {"cve": "CVE-2019-19073", "epss": 0.00158, "percentile": 0.50899, "modified": "2023-05-02"}, {"cve": "CVE-2019-19074", "epss": 0.02751, "percentile": 0.89016, "modified": "2023-05-02"}, {"cve": "CVE-2019-19078", "epss": 0.00721, "percentile": 0.77783, "modified": "2023-05-02"}, {"cve": "CVE-2019-19535", "epss": 0.00087, "percentile": 0.35275, "modified": "2023-05-02"}, {"cve": "CVE-2019-19922", "epss": 0.00078, "percentile": 0.3183, "modified": "2023-05-01"}, {"cve": "CVE-2019-20812", "epss": 0.00045, "percentile": 0.12116, "modified": "2023-05-01"}, {"cve": "CVE-2019-2904", "epss": 0.11998, "percentile": 0.94471, "modified": "2023-05-02"}, {"cve": "CVE-2019-3738", "epss": 0.0026, "percentile": 0.62209, "modified": "2023-05-02"}, {"cve": "CVE-2019-3739", "epss": 0.0027, "percentile": 0.62946, "modified": "2023-05-02"}, {"cve": "CVE-2019-3740", "epss": 0.0027, "percentile": 0.62946, "modified": "2023-05-02"}, {"cve": "CVE-2019-3773", "epss": 0.00636, "percentile": 0.76022, "modified": "2023-05-02"}, {"cve": "CVE-2019-3874", "epss": 0.00222, "percentile": 0.59015, "modified": "2023-05-02"}, {"cve": "CVE-2019-3900", "epss": 0.00165, "percentile": 0.51759, "modified": "2023-05-02"}, {"cve": "CVE-2019-5063", "epss": 0.1177, "percentile": 0.94434, "modified": "2023-05-01"}, {"cve": "CVE-2019-5064", "epss": 0.03184, "percentile": 0.89714, "modified": "2023-05-01"}, {"cve": "CVE-2019-5108", "epss": 0.00119, "percentile": 0.44697, "modified": "2023-05-02"}, {"cve": "CVE-2019-7317", "epss": 0.00397, "percentile": 0.69578, "modified": "2023-05-02"}, {"cve": "CVE-2019-8331", "epss": 0.00259, "percentile": 0.62146, "modified": "2023-05-02"}, {"cve": "CVE-2020-10188", "epss": 0.92813, "percentile": 0.98498, "modified": "2023-05-01"}, {"cve": "CVE-2020-10543", "epss": 0.00299, "percentile": 0.64884, "modified": "2023-05-01"}, {"cve": "CVE-2020-10683", "epss": 0.00261, "percentile": 0.62278, "modified": "2023-05-01"}, {"cve": "CVE-2020-10751", "epss": 0.0005, "percentile": 0.17028, "modified": "2023-05-01"}, {"cve": "CVE-2020-10769", "epss": 0.00042, "percentile": 0.05657, "modified": "2023-05-01"}, {"cve": "CVE-2020-10878", "epss": 0.00274, "percentile": 0.63229, "modified": "2023-05-01"}, {"cve": "CVE-2020-11022", "epss": 0.08634, "percentile": 0.93497, "modified": "2023-05-01"}, {"cve": "CVE-2020-11023", "epss": 0.00518, "percentile": 0.73312, "modified": "2023-05-01"}, {"cve": "CVE-2020-11612", "epss": 0.00593, "percentile": 0.75132, "modified": "2023-05-01"}, {"cve": "CVE-2020-11655", "epss": 0.01249, "percentile": 0.83499, "modified": "2023-05-01"}, {"cve": "CVE-2020-11656", "epss": 0.0079, "percentile": 0.79026, "modified": "2023-05-01"}, {"cve": "CVE-2020-11973", "epss": 0.01072, "percentile": 0.82098, "modified": "2023-05-01"}, {"cve": "CVE-2020-11979", "epss": 0.00177, "percentile": 0.53289, "modified": "2023-05-01"}, {"cve": "CVE-2020-11987", "epss": 0.00075, "percentile": 0.30478, "modified": "2023-05-01"}, {"cve": "CVE-2020-11994", "epss": 0.00056, "percentile": 0.21038, "modified": "2023-05-01"}, {"cve": "CVE-2020-11998", "epss": 0.00319, "percentile": 0.66014, "modified": "2023-05-01"}, {"cve": "CVE-2020-12114", "epss": 0.00044, "percentile": 0.08278, "modified": "2023-05-01"}, {"cve": "CVE-2020-12723", "epss": 0.00319, "percentile": 0.66045, "modified": "2023-05-01"}, {"cve": "CVE-2020-12771", "epss": 0.00054, "percentile": 0.19813, "modified": "2023-05-01"}, {"cve": "CVE-2020-13434", "epss": 0.00063, "percentile": 0.24986, "modified": "2023-05-01"}, {"cve": "CVE-2020-13435", "epss": 0.00106, "percentile": 0.41699, "modified": "2023-05-01"}, {"cve": "CVE-2020-13871", "epss": 0.01046, "percentile": 0.81814, "modified": "2023-05-01"}, {"cve": "CVE-2020-13934", "epss": 0.95922, "percentile": 0.99125, "modified": "2023-05-01"}, {"cve": "CVE-2020-13935", "epss": 0.38651, "percentile": 0.96656, "modified": "2023-05-01"}, {"cve": "CVE-2020-13943", "epss": 0.00072, "percentile": 0.29276, "modified": "2023-05-01"}, {"cve": "CVE-2020-13954", "epss": 0.95087, "percentile": 0.98889, "modified": "2023-05-01"}, {"cve": "CVE-2020-13956", "epss": 0.00124, "percentile": 0.45417, "modified": "2023-05-01"}, {"cve": "CVE-2020-14039", "epss": 0.00317, "percentile": 0.65891, "modified": "2023-05-01"}, {"cve": "CVE-2020-14060", "epss": 0.39335, "percentile": 0.96677, "modified": "2023-05-01"}, {"cve": "CVE-2020-14061", "epss": 0.02076, "percentile": 0.87406, "modified": "2023-05-01"}, {"cve": "CVE-2020-14062", "epss": 0.04035, "percentile": 0.90765, "modified": "2023-05-01"}, {"cve": "CVE-2020-14195", "epss": 0.02609, "percentile": 0.88739, "modified": "2023-05-01"}, {"cve": "CVE-2020-1472", "epss": 0.97362, "percentile": 0.99808, "modified": "2023-05-01"}, {"cve": "CVE-2020-15358", "epss": 0.00078, "percentile": 0.32192, "modified": "2023-05-01"}, {"cve": "CVE-2020-15586", "epss": 0.00337, "percentile": 0.66945, "modified": "2023-05-01"}, {"cve": "CVE-2020-16166", "epss": 0.00168, "percentile": 0.52024, "modified": "2023-05-01"}, {"cve": "CVE-2020-16845", "epss": 0.00337, "percentile": 0.66945, "modified": "2023-05-01"}, {"cve": "CVE-2020-17521", "epss": 0.00051, "percentile": 0.17713, "modified": "2023-05-01"}, {"cve": "CVE-2020-17527", "epss": 0.00219, "percentile": 0.58319, "modified": "2023-05-01"}, {"cve": "CVE-2020-17530", "epss": 0.96641, "percentile": 0.99383, "modified": "2023-05-01"}, {"cve": "CVE-2020-1927", "epss": 0.00155, "percentile": 0.50452, "modified": "2023-05-01"}, {"cve": "CVE-2020-1941", "epss": 0.00165, "percentile": 0.51728, "modified": "2023-05-01"}, {"cve": "CVE-2020-1945", "epss": 0.00062, "percentile": 0.24434, "modified": "2023-05-01"}, {"cve": "CVE-2020-1967", "epss": 0.06151, "percentile": 0.92437, "modified": "2023-05-01"}, {"cve": "CVE-2020-1968", "epss": 0.00388, "percentile": 0.69221, "modified": "2023-05-01"}, {"cve": "CVE-2020-1971", "epss": 0.00318, "percentile": 0.65957, "modified": "2023-05-01"}, {"cve": "CVE-2020-24394", "epss": 0.00049, "percentile": 0.16336, "modified": "2023-05-01"}, {"cve": "CVE-2020-24553", "epss": 0.00517, "percentile": 0.73287, "modified": "2023-05-01"}, {"cve": "CVE-2020-24616", "epss": 0.00322, "percentile": 0.6619, "modified": "2023-05-01"}, {"cve": "CVE-2020-24750", "epss": 0.00493, "percentile": 0.72636, "modified": "2023-05-01"}, {"cve": "CVE-2020-25649", "epss": 0.0014, "percentile": 0.48322, "modified": "2023-05-01"}, {"cve": "CVE-2020-26217", "epss": 0.97456, "percentile": 0.99914, "modified": "2023-05-01"}, {"cve": "CVE-2020-26418", "epss": 0.00269, "percentile": 0.62912, "modified": "2023-05-01"}, {"cve": "CVE-2020-26419", "epss": 0.00165, "percentile": 0.51757, "modified": "2023-05-01"}, {"cve": "CVE-2020-26420", "epss": 0.00165, "percentile": 0.51757, "modified": "2023-05-01"}, {"cve": "CVE-2020-26421", "epss": 0.00157, "percentile": 0.50724, "modified": "2023-05-01"}, {"cve": "CVE-2020-26422", "epss": 0.00148, "percentile": 0.4951, "modified": "2023-05-01"}, {"cve": "CVE-2020-27193", "epss": 0.00214, "percentile": 0.57948, "modified": "2023-05-01"}, {"cve": "CVE-2020-27216", "epss": 0.00052, "percentile": 0.18349, "modified": "2023-05-01"}, {"cve": "CVE-2020-27218", "epss": 0.00302, "percentile": 0.64996, "modified": "2023-05-01"}, {"cve": "CVE-2020-27223", "epss": 0.0095, "percentile": 0.80899, "modified": "2023-05-01"}, {"cve": "CVE-2020-27841", "epss": 0.00087, "percentile": 0.35349, "modified": "2023-05-01"}, {"cve": "CVE-2020-27842", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-27843", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-27844", "epss": 0.0009, "percentile": 0.37183, "modified": "2023-05-01"}, {"cve": "CVE-2020-27845", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-28052", "epss": 0.00199, "percentile": 0.56203, "modified": "2023-05-01"}, {"cve": "CVE-2020-28196", "epss": 0.00328, "percentile": 0.66518, "modified": "2023-05-01"}, {"cve": "CVE-2020-35490", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35491", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35728", "epss": 0.00367, "percentile": 0.68335, "modified": "2023-05-01"}, {"cve": "CVE-2020-36179", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36180", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36181", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36182", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36183", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36184", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36185", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36186", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36187", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36188", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36189", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-5359", "epss": 0.00124, "percentile": 0.45524, "modified": "2023-05-01"}, {"cve": "CVE-2020-5360", "epss": 0.0013, "percentile": 0.46477, "modified": "2023-05-01"}, {"cve": "CVE-2020-5398", "epss": 0.97067, "percentile": 0.99603, "modified": "2023-05-01"}, {"cve": "CVE-2020-5407", "epss": 0.00609, "percentile": 0.75511, "modified": "2023-05-01"}, {"cve": "CVE-2020-5408", "epss": 0.00191, "percentile": 0.55123, "modified": "2023-05-01"}, {"cve": "CVE-2020-5413", "epss": 0.0029, "percentile": 0.64361, "modified": "2023-05-01"}, {"cve": "CVE-2020-5421", "epss": 0.85045, "percentile": 0.97969, "modified": "2023-05-01"}, {"cve": "CVE-2020-7059", "epss": 0.00307, "percentile": 0.65393, "modified": "2023-05-01"}, {"cve": "CVE-2020-7060", "epss": 0.00324, "percentile": 0.66264, "modified": "2023-05-01"}, {"cve": "CVE-2020-7069", "epss": 0.00182, "percentile": 0.53903, "modified": "2023-05-01"}, {"cve": "CVE-2020-7760", "epss": 0.01176, "percentile": 0.82928, "modified": "2023-05-01"}, {"cve": "CVE-2020-7774", "epss": 0.45473, "percentile": 0.96847, "modified": "2023-05-01"}, {"cve": "CVE-2020-7919", "epss": 0.00824, "percentile": 0.79489, "modified": "2023-05-01"}, {"cve": "CVE-2020-8203", "epss": 0.01036, "percentile": 0.81708, "modified": "2023-05-01"}, {"cve": "CVE-2020-8277", "epss": 0.00379, "percentile": 0.68844, "modified": "2023-05-01"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49432, "modified": "2023-05-01"}, {"cve": "CVE-2020-8285", "epss": 0.00364, "percentile": 0.68199, "modified": "2023-05-01"}, {"cve": "CVE-2020-8286", "epss": 0.0021, "percentile": 0.57438, "modified": "2023-05-01"}, {"cve": "CVE-2020-8908", "epss": 0.0006, "percentile": 0.23242, "modified": "2023-05-01"}, {"cve": "CVE-2020-9281", "epss": 0.00145, "percentile": 0.4902, "modified": "2023-05-01"}, {"cve": "CVE-2020-9327", "epss": 0.00817, "percentile": 0.79388, "modified": "2023-05-01"}, {"cve": "CVE-2020-9480", "epss": 0.08706, "percentile": 0.93519, "modified": "2023-05-01"}, {"cve": "CVE-2020-9484", "epss": 0.9701, "percentile": 0.99569, "modified": "2023-05-01"}, {"cve": "CVE-2020-9488", "epss": 0.0026, "percentile": 0.62223, "modified": "2023-05-01"}, {"cve": "CVE-2020-9489", "epss": 0.00055, "percentile": 0.2089, "modified": "2023-05-01"}, {"cve": "CVE-2021-2008", "epss": 0.00071, "percentile": 0.2912, "modified": "2023-05-01"}, {"cve": "CVE-2021-20227", "epss": 0.00065, "percentile": 0.26819, "modified": "2023-05-01"}, {"cve": "CVE-2021-2053", "epss": 0.00092, "percentile": 0.38154, "modified": "2023-05-01"}, {"cve": "CVE-2021-21290", "epss": 0.00045, "percentile": 0.12536, "modified": "2023-05-01"}, {"cve": "CVE-2021-2134", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-21345", "epss": 0.46618, "percentile": 0.96873, "modified": "2023-05-01"}, {"cve": "CVE-2021-2135", "epss": 0.056, "percentile": 0.92074, "modified": "2023-05-01"}, {"cve": "CVE-2021-2136", "epss": 0.056, "percentile": 0.92074, "modified": "2023-05-01"}, {"cve": "CVE-2021-2140", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2141", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2142", "epss": 0.00098, "percentile": 0.39576, "modified": "2023-05-01"}, {"cve": "CVE-2021-2144", "epss": 0.00103, "percentile": 0.40677, "modified": "2023-05-01"}, {"cve": "CVE-2021-2145", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2146", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2147", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2149", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2150", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2151", "epss": 0.00071, "percentile": 0.28803, "modified": "2023-05-01"}, {"cve": "CVE-2021-2152", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2153", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2154", "epss": 0.00124, "percentile": 0.45487, "modified": "2023-05-01"}, {"cve": "CVE-2021-2155", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2156", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2157", "epss": 0.01577, "percentile": 0.85358, "modified": "2023-05-01"}, {"cve": "CVE-2021-2158", "epss": 0.00053, "percentile": 0.18993, "modified": "2023-05-01"}, {"cve": "CVE-2021-2159", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2160", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2161", "epss": 0.00085, "percentile": 0.34625, "modified": "2023-05-01"}, {"cve": "CVE-2021-2162", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2163", "epss": 0.00117, "percentile": 0.44183, "modified": "2023-05-01"}, {"cve": "CVE-2021-2164", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2166", "epss": 0.00231, "percentile": 0.59704, "modified": "2023-05-01"}, {"cve": "CVE-2021-2167", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2169", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2170", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2171", "epss": 0.00155, "percentile": 0.50479, "modified": "2023-05-01"}, {"cve": "CVE-2021-2172", "epss": 0.0029, "percentile": 0.64348, "modified": "2023-05-01"}, {"cve": "CVE-2021-2173", "epss": 0.00094, "percentile": 0.38655, "modified": "2023-05-01"}, {"cve": "CVE-2021-2174", "epss": 0.00139, "percentile": 0.48146, "modified": "2023-05-01"}, {"cve": "CVE-2021-2175", "epss": 0.00176, "percentile": 0.53187, "modified": "2023-05-01"}, {"cve": "CVE-2021-2177", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2178", "epss": 0.0029, "percentile": 0.64348, "modified": "2023-05-01"}, {"cve": "CVE-2021-2179", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2180", "epss": 0.00124, "percentile": 0.45487, "modified": "2023-05-01"}, {"cve": "CVE-2021-2181", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2182", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2183", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2184", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2185", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2186", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2187", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2188", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2189", "epss": 0.0008, "percentile": 0.32878, "modified": "2023-05-01"}, {"cve": "CVE-2021-2190", "epss": 0.0008, "percentile": 0.32878, "modified": "2023-05-01"}, {"cve": "CVE-2021-2191", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2192", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2193", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2194", "epss": 0.0015, "percentile": 0.49823, "modified": "2023-05-01"}, {"cve": "CVE-2021-2195", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2196", "epss": 0.00168, "percentile": 0.52084, "modified": "2023-05-01"}, {"cve": "CVE-2021-2197", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2198", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2199", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2200", "epss": 0.00167, "percentile": 0.52008, "modified": "2023-05-01"}, {"cve": "CVE-2021-2201", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2202", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2203", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2204", "epss": 0.0014, "percentile": 0.48259, "modified": "2023-05-01"}, {"cve": "CVE-2021-2205", "epss": 0.00167, "percentile": 0.52008, "modified": "2023-05-01"}, {"cve": "CVE-2021-2206", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2207", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2208", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2209", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2210", "epss": 0.00209, "percentile": 0.57312, "modified": "2023-05-01"}, {"cve": "CVE-2021-2211", "epss": 0.02093, "percentile": 0.87468, "modified": "2023-05-01"}, {"cve": "CVE-2021-22112", "epss": 0.00397, "percentile": 0.69564, "modified": "2023-05-01"}, {"cve": "CVE-2021-2212", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2213", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2214", "epss": 0.00184, "percentile": 0.54202, "modified": "2023-05-01"}, {"cve": "CVE-2021-2215", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2216", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2217", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-22173", "epss": 0.00197, "percentile": 0.56053, "modified": "2023-05-01"}, {"cve": "CVE-2021-22174", "epss": 0.00197, "percentile": 0.56053, "modified": "2023-05-01"}, {"cve": "CVE-2021-2218", "epss": 0.00071, "percentile": 0.2912, "modified": "2023-05-01"}, {"cve": "CVE-2021-2219", "epss": 0.00053, "percentile": 0.18993, "modified": "2023-05-01"}, {"cve": "CVE-2021-22191", "epss": 0.00461, "percentile": 0.71673, "modified": "2023-05-01"}, {"cve": "CVE-2021-2220", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2221", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2222", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2223", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2224", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2225", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2226", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2227", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2228", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2229", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2230", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2231", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2232", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2233", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2234", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2235", "epss": 0.00061, "percentile": 0.24015, "modified": "2023-05-01"}, {"cve": "CVE-2021-2236", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2237", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2238", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2239", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2240", "epss": 0.00071, "percentile": 0.2912, "modified": "2023-05-01"}, {"cve": "CVE-2021-2241", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2242", "epss": 0.00077, "percentile": 0.3136, "modified": "2023-05-01"}, {"cve": "CVE-2021-2244", "epss": 0.02117, "percentile": 0.87531, "modified": "2023-05-01"}, {"cve": "CVE-2021-2245", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2246", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2247", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2248", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2249", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2250", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2251", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2252", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2253", "epss": 0.00167, "percentile": 0.52008, "modified": "2023-05-01"}, {"cve": "CVE-2021-2254", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2255", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2256", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2257", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2258", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2259", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2260", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2261", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2262", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2263", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2264", "epss": 0.00052, "percentile": 0.18231, "modified": "2023-05-01"}, {"cve": "CVE-2021-2266", "epss": 0.00118, "percentile": 0.44384, "modified": "2023-05-01"}, {"cve": "CVE-2021-2267", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2268", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2269", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2270", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2271", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2272", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2273", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2274", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2275", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2276", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2277", "epss": 0.00168, "percentile": 0.52057, "modified": "2023-05-01"}, {"cve": "CVE-2021-2278", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2279", "epss": 0.03154, "percentile": 0.89666, "modified": "2023-05-01"}, {"cve": "CVE-2021-2280", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2281", "epss": 0.00059, "percentile": 0.22887, "modified": "2023-05-01"}, {"cve": "CVE-2021-2282", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2283", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2284", "epss": 0.00059, "percentile": 0.22887, "modified": "2023-05-01"}, {"cve": "CVE-2021-2285", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2286", "epss": 0.00059, "percentile": 0.22887, "modified": "2023-05-01"}, {"cve": "CVE-2021-2287", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2288", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-22883", "epss": 0.00315, "percentile": 0.65793, "modified": "2023-05-01"}, {"cve": "CVE-2021-22884", "epss": 0.00222, "percentile": 0.59044, "modified": "2023-05-01"}, {"cve": "CVE-2021-2289", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2290", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2291", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2292", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2293", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2294", "epss": 0.00129, "percentile": 0.4638, "modified": "2023-05-01"}, {"cve": "CVE-2021-2295", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2296", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2297", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2298", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2299", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2300", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2301", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2302", "epss": 0.66973, "percentile": 0.9739, "modified": "2023-05-01"}, {"cve": "CVE-2021-2303", "epss": 0.2745, "percentile": 0.96097, "modified": "2023-05-01"}, {"cve": "CVE-2021-2304", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2305", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2306", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2307", "epss": 0.00074, "percentile": 0.30353, "modified": "2023-05-01"}, {"cve": "CVE-2021-2308", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2309", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2310", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2311", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2312", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2314", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2315", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2316", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2317", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2318", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2319", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2320", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2321", "epss": 0.00117, "percentile": 0.44246, "modified": "2023-05-01"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.49521, "modified": "2023-05-01"}, {"cve": "CVE-2021-23839", "epss": 0.00174, "percentile": 0.52981, "modified": "2023-05-01"}, {"cve": "CVE-2021-23840", "epss": 0.00316, "percentile": 0.65886, "modified": "2023-05-01"}, {"cve": "CVE-2021-23841", "epss": 0.00299, "percentile": 0.64861, "modified": "2023-05-01"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64497, "modified": "2023-05-01"}, {"cve": "CVE-2021-3450", "epss": 0.00198, "percentile": 0.56154, "modified": "2023-05-01"}], "vulnersScore": 7.7}, "_state": {"dependencies": 1695284700, "score": 1695284977, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "bbb130a7e5b7a81fb15f6d96fe05cc67"}, "affectedSoftware": [{"version": "12.2.0.1.22", "operator": "le", "name": "oracle global lifecycle management opatch"}, {"version": "20.3", "operator": "le", "name": "oracle nosql database"}, {"version": "20.4.3.050.1904", "operator": "le", "name": "oracle rest data services"}, {"version": "19.1.0", "operator": "le", "name": "oracle spatial studio"}, {"version": "20.1.1", "operator": "le", "name": "oracle spatial studio"}, {"version": "20.4.1.407.0006", "operator": "le", "name": "oracle sql developer (apache httpclient)"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce guided search"}, {"version": "11.3.1", "operator": "le", "name": "oracle commerce guided search"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce guided search"}, {"version": "0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.2.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.3.1", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.0.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.1", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "7.4.2", "operator": "le", "name": "oracle communications design studio"}, {"version": "8.0.2", "operator": "le", "name": "oracle communications messaging server"}, {"version": "8.1.0", "operator": "le", "name": "oracle communications messaging server"}, {"version": "8.1", "operator": "le", "name": "oracle communications messaging server"}, {"version": "7.3.4", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.1", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.3.5", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.0", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "8.0", "operator": "le", "name": "oracle communications calendar server"}, {"version": "8.0", "operator": "le", "name": "oracle communications contacts server"}, {"version": "6.3.1", "operator": "le", "name": "oracle communications metasolv solution"}, {"version": "6.3.0", "operator": "le", "name": "oracle communications metasolv solution"}, {"version": "3.9m0p3", "operator": "le", "name": "oracle communications application session controller"}, {"version": "6.4", "operator": "le", "name": "oracle communications interactive session recorder"}, {"version": "6.3", "operator": "le", "name": "oracle communications interactive session recorder"}, {"version": "10.4.0.3", "operator": "le", "name": "oracle communications performance intelligence center software"}, {"version": "10.4.0.2", "operator": "le", "name": "oracle communications performance intelligence center software"}, {"version": "8.2", "operator": "le", "name": "oracle communications session border controller"}, {"version": "8.3", "operator": "le", "name": "oracle communications session border controller"}, {"version": "8.4", "operator": "le", "name": "oracle communications session border controller"}, {"version": "8.2", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "9.0", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "8.4", "operator": "le", "name": "oracle communications session router"}, {"version": "8.2", "operator": "le", "name": "oracle communications session router"}, {"version": "8.3", "operator": "le", "name": "oracle communications session router"}, {"version": "8.4", "operator": "le", "name": "oracle communications subscriber-aware load balancer"}, {"version": "8.2", "operator": "le", "name": "oracle communications subscriber-aware load balancer"}, {"version": "8.3", "operator": "le", "name": "oracle communications subscriber-aware load balancer"}, {"version": "3.1", "operator": "le", "name": "oracle enterprise communications broker"}, {"version": "3.3", "operator": "le", "name": "oracle enterprise communications broker"}, {"version": "3.2", "operator": "le", "name": "oracle enterprise communications broker"}, {"version": "8.2", "operator": "le", "name": "oracle sd-wan aware"}, {"version": "7.0", "operator": "le", "name": "oracle communications services gatekeeper"}, {"version": "6.0", "operator": "le", "name": "oracle communications services gatekeeper"}, {"version": "6.1", "operator": "le", "name": "oracle communications services gatekeeper"}, {"version": "6.2", "operator": "le", "name": "oracle communications converged application server - service controller"}, {"version": "8.2.5", "operator": "le", "name": "oracle communications unified session manager"}, {"version": "8.2", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "8.3", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "8.4", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "17.1", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "17.2", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "17.3", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "16.1", "operator": "le", "name": "primavera unifier"}, {"version": "18.8", "operator": "le", "name": "primavera unifier"}, {"version": "16.2", "operator": "le", "name": "primavera unifier"}, {"version": "20.12", "operator": "le", "name": "primavera unifier"}, {"version": "19.12", "operator": "le", "name": "primavera unifier"}, {"version": "17.7", "operator": "le", "name": "primavera unifier"}, {"version": "17.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "12.2.10", "operator": "le", "name": "oracle applications framework"}, {"version": "12.2.7", "operator": "le", "name": "oracle marketing"}, {"version": "12.1.1", "operator": "le", "name": "oracle email center"}, {"version": "12.2.3", "operator": "le", "name": "oracle email center"}, {"version": "12.1.1", "operator": "le", "name": "oracle istore"}, {"version": "12.2.3", "operator": "le", "name": "oracle istore"}, {"version": "12.1.1", "operator": "le", "name": "oracle knowledge management"}, {"version": "12.2.3", "operator": "le", "name": "oracle knowledge management"}, {"version": "12.2.3", "operator": "le", "name": "oracle partner management"}, {"version": "12.1.3", "operator": "le", "name": "oracle partner management"}, {"version": "12.1.1", "operator": "le", "name": "oracle trade management"}, {"version": "12.2.3", "operator": "le", "name": "oracle trade management"}, {"version": "12.1.1", "operator": "le", "name": "oracle advanced collections"}, {"version": "12.2.3", "operator": "le", "name": "oracle advanced collections"}, {"version": "12.1.3", "operator": "le", "name": "oracle advanced pricing"}, {"version": "12.2.3", "operator": "le", "name": "oracle application object library"}, {"version": "12.1.3", "operator": "le", "name": "oracle application object library"}, {"version": "12.1.1", "operator": "le", "name": "oracle bill presentment architecture"}, {"version": "12.2.3", "operator": "le", "name": "oracle bill presentment architecture"}, {"version": "12.1.1", "operator": "le", "name": "oracle bills of material"}, {"version": "12.1.1", "operator": "le", "name": "oracle cash management"}, {"version": "12.1.1", "operator": "le", "name": "oracle compensation workbench"}, {"version": "12.2.3", "operator": "le", "name": "oracle concurrent processing"}, {"version": "12.1.3", "operator": "le", "name": "oracle concurrent processing"}, {"version": "12.2.3", "operator": "le", "name": "oracle crm technical foundation"}, {"version": "12.1.3", "operator": "le", "name": "oracle crm technical foundation"}, {"version": "12.2.3", "operator": "le", "name": "oracle customers online"}, {"version": "12.1.3", "operator": "le", "name": "oracle customers online"}, {"version": "12.1.1", "operator": "le", "name": "oracle depot repair"}, {"version": "12.1.1", "operator": "le", "name": "oracle document management and collaboration"}, {"version": "12.2.3", "operator": "le", "name": "oracle document management and collaboration"}, {"version": "12.1.3", "operator": "le", "name": "oracle document management and collaboration"}, {"version": "12.1.1", "operator": "le", "name": "oracle e-business intelligence"}, {"version": "12.1.1", "operator": "le", "name": "oracle e-business tax"}, {"version": "12.2.3", "operator": "le", "name": "oracle e-business tax"}, {"version": "12.1.1", "operator": "le", "name": "oracle engineering"}, {"version": "12.2.3", "operator": "le", "name": "oracle engineering"}, {"version": "12.1.1", "operator": "le", "name": "oracle enterprise asset management"}, {"version": "12.2.3", "operator": "le", "name": "oracle enterprise asset management"}, {"version": "12.1.1", "operator": "le", "name": "oracle financials common modules"}, {"version": "12.1.1", "operator": "le", "name": "oracle general ledger"}, {"version": "12.1.1", "operator": "le", "name": "oracle hrms (france)"}, {"version": "12.1.3", "operator": "le", "name": "oracle human resources"}, {"version": "12.2.3", "operator": "le", "name": "oracle incentive compensation"}, {"version": "12.1.3", "operator": "le", "name": "oracle incentive compensation"}, {"version": "12.1.3", "operator": "le", "name": "oracle installed base"}, {"version": "12.2.3", "operator": "le", "name": "oracle isetup"}, {"version": "12.1.3", "operator": "le", "name": "oracle isetup"}, {"version": "12.1.1", "operator": "le", "name": "oracle labor distribution"}, {"version": "12.1.1", "operator": "le", "name": "oracle landed cost management"}, {"version": "12.2.3", "operator": "le", "name": "oracle landed cost management"}, {"version": "12.1.1", "operator": "le", "name": "oracle lease and finance management"}, {"version": "12.2.3", "operator": "le", "name": "oracle lease and finance management"}, {"version": "12.1.1", "operator": "le", "name": "oracle legal entity configurator"}, {"version": "12.1.1", "operator": "le", "name": "oracle loans"}, {"version": "12.1.3", "operator": "le", "name": "oracle mes for process manufacturing"}, {"version": "12.1.1", "operator": "le", "name": "oracle payables"}, {"version": "12.2.3", "operator": "le", "name": "oracle payables"}, {"version": "12.1.1", "operator": "le", "name": "oracle product hub"}, {"version": "12.2.3", "operator": "le", "name": "oracle product hub"}, {"version": "12.1.1", "operator": "le", "name": "oracle project contracts"}, {"version": "12.1.1", "operator": "le", "name": "oracle projects"}, {"version": "12.2.3", "operator": "le", "name": "oracle projects"}, {"version": "12.1.3", "operator": "le", "name": "oracle purchasing"}, {"version": "12.1.1", "operator": "le", "name": "oracle quoting"}, {"version": "12.1.1", "operator": "le", "name": "oracle receivables"}, {"version": "12.1.1", "operator": "le", "name": "oracle service contracts"}, {"version": "12.1.1", "operator": "le", "name": "oracle site hub"}, {"version": "12.1.1", "operator": "le", "name": "oracle sourcing"}, {"version": "12.1.1", "operator": "le", "name": "oracle subledger accounting"}, {"version": "12.1.1", "operator": "le", "name": "oracle time and labor"}, {"version": "12.2.3", "operator": "le", "name": "oracle time and labor"}, {"version": "12.1.1", "operator": "le", "name": "oracle transportation execution"}, {"version": "12.1.1", "operator": "le", "name": "oracle universal work queue"}, {"version": "12.2.3", "operator": "le", "name": "oracle work in process"}, {"version": "12.1.3", "operator": "le", "name": "oracle work in process"}, {"version": "12.1.3", "operator": "le", "name": "application server"}, {"version": "12.1.1", "operator": "le", "name": "oracle sales offline"}, {"version": "12.2.3", "operator": "le", "name": "oracle sales offline"}, {"version": "12.2.3", "operator": "le", "name": "oracle applications manager"}, {"version": "12.1.3", "operator": "le", "name": "oracle applications manager"}, {"version": "12.2.3", "operator": "le", "name": "oracle e-business suite technology stack"}, {"version": "12.1.3", "operator": "le", "name": "oracle e-business suite technology stack"}, {"version": "12.2.3", "operator": "le", "name": "oracle internet expenses"}, {"version": "12.1.1", "operator": "le", "name": "oracle one-to-one fulfillment"}, {"version": "12.2.3", "operator": "le", "name": "oracle one-to-one fulfillment"}, {"version": "13.4.0.0", "operator": "le", "name": "enterprise manager base platform"}, {"version": "13.3.0.1", "operator": "le", "name": "oracle application testing suite"}, {"version": "12.4.0.0", "operator": "le", "name": "enterprise manager ops center"}, {"version": "12.2.1.4", "operator": "le", "name": "enterprise manager for fusion middleware"}, {"version": "12.2.1.3", "operator": "le", "name": "enterprise manager for fusion middleware"}, {"version": "11.1.1.9", "operator": "le", "name": "enterprise manager for fusion middleware"}, {"version": "13.4.0.0", "operator": "le", "name": "enterprise manager for virtualization"}, {"version": "12.0.0", "operator": "le", "name": "oracle flexcube private banking"}, {"version": "12.1.0", "operator": "le", "name": "oracle flexcube private banking"}, {"version": "2.7.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.8.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.9.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.6.2", "operator": "le", "name": "oracle banking platform"}, {"version": "2.4.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.7.1", "operator": "le", "name": "oracle banking platform"}, {"version": "2.10.0", "operator": "le", "name": "oracle banking platform"}, {"version": "8.0.6", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "12.0.2", "operator": "le", "name": "oracle flexcube direct banking"}, {"version": "12.0.3", "operator": "le", "name": "oracle flexcube direct banking"}, {"version": "5.7.0", "operator": "le", "name": "oracle hospitality res 3700"}, {"version": "9.1.0", "operator": "le", "name": "oracle hospitality inventory management"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "5.5.0.0.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle fusion middleware"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle fusion middleware"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle fusion middleware"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle platform security for java"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle platform security for java"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle platform security for java"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.1.3.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "10.3.6.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "fmw platform"}, {"version": "12.2.1.3.0", "operator": "le", "name": "fmw platform"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "3.2.0.0", "operator": "le", "name": "oracle endeca information discovery studio"}, {"version": "8.5.5", "operator": "le", "name": "oracle outside in technology"}, {"version": "11.1.1.5.0", "operator": "le", "name": "oracle identity manager connector"}, {"version": "11.1.2.4.0", "operator": "le", "name": "oracle api gateway"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle coherence"}, {"version": "3.7.1.0", "operator": "le", "name": "oracle coherence"}, {"version": "12.1.3.0.0", "operator": "le", "name": "oracle coherence"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle coherence"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle coherence"}, {"version": "11.1.1.7.0", "operator": "le", "name": "oracle enterprise repository"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle fusion middleware mapviewer"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle http server"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle http server"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle http server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle security service"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle security service"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle security service"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle weblogic server proxy plug-in"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle weblogic server proxy plug-in"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle weblogic server proxy plug-in"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle service bus"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle service bus"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle service bus"}, {"version": "3.0.0", "operator": "le", "name": "oracle health sciences information manager"}, {"version": "9.0", "operator": "le", "name": "oracle health sciences empirica signal"}, {"version": "9.1", "operator": "le", "name": "oracle health sciences empirica signal"}, {"version": "7.2.2", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "7.3.0", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "7.1.5", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "8.0.1", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "7.3.1", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "5.6", "operator": "le", "name": "oracle hospitality opera 5"}, {"version": "5.5", "operator": "le", "name": "oracle hospitality opera 5"}, {"version": "20.1.0", "operator": "le", "name": "oracle hospitality cruise shipboard property management system"}, {"version": "12.2.1.4", "operator": "le", "name": "hyperion analytic provider services"}, {"version": "11.1.2.4", "operator": "le", "name": "hyperion analytic provider services"}, {"version": "11.1.2.4", "operator": "le", "name": "hyperion financial management"}, {"version": "6.2", "operator": "le", "name": "oracle ilearning"}, {"version": "6.3", "operator": "le", "name": "oracle ilearning"}, {"version": "1.0.2.3", "operator": "le", "name": "oracle insurance data gateway"}, {"version": "21.0.0.2", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "19.3.5", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "20.3.1.2", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "21.0.0.2", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "11.0.10", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "16", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "8u281", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "7u291", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "20.3.1.2", "operator": "le", "name": "java se, java se embedded, oracle graalvm enterprise edition"}, {"version": "9.2.5.0", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.2.5.3", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.2.4.0", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.2.5.2", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.4", "operator": "le", "name": "jd edwards world security"}, {"version": "9.2.5.3", "operator": "le", "name": "jd edwards enterpriseone orchestrator"}, {"version": "8.0.23", "operator": "le", "name": "mysql enterprise monitor"}, {"version": "8.0.23", "operator": "le", "name": "mysql cluster"}, {"version": "5.7.32", "operator": "le", "name": "mysql server"}, {"version": "8.0.19", "operator": "le", "name": "mysql server"}, {"version": "5.7.29", "operator": "le", "name": "mysql server"}, {"version": "8.0.17", "operator": "le", "name": "mysql server"}, {"version": "8.0.22", "operator": "le", "name": "mysql server"}, {"version": "5.7.33", "operator": "le", "name": "mysql server"}, {"version": "8.0.23", "operator": "le", "name": "mysql server"}, {"version": "5.7.30", "operator": "le", "name": "mysql server"}, {"version": "8.0.23", "operator": "le", "name": "mysql workbench"}, {"version": "8.58", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "8.57", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "8.56", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "8.58", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.57", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.56", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise fin common application objects"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise fin expenses"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise scm eprocurement"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise scm purchasing"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise cs campus community"}, {"version": "15.0.4", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "16.0.6", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "19.0.2", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "18.0.3", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "17.0.4", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "16.0", "operator": "le", "name": "oracle retail predictive application server"}, {"version": "14.1", "operator": "le", "name": "oracle retail predictive application server"}, {"version": "15.0", "operator": "le", "name": "oracle retail predictive application server"}, {"version": "14.1", "operator": "le", "name": "oracle retail advanced inventory planning"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail assortment planning"}, {"version": "14.1", "operator": "le", "name": "oracle retail back office"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail category management planning & optimization"}, {"version": "14.1", "operator": "le", "name": "oracle retail central office"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail eftlink"}, {"version": "15.0.2", "operator": "le", "name": "oracle retail eftlink"}, {"version": "20.0.0", "operator": "le", "name": "oracle retail eftlink"}, {"version": "19.0.1", "operator": "le", "name": "oracle retail eftlink"}, {"version": "17.0.2", "operator": "le", "name": "oracle retail eftlink"}, {"version": "18.0.1", "operator": "le", "name": "oracle retail eftlink"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail item planning"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail macro space optimization"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail merchandise financial planning"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "14.1", "operator": "le", "name": "oracle retail point-of-service"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail regular price optimization"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail replenishment optimization"}, {"version": "14.1", "operator": "le", "name": "oracle retail returns management"}, {"version": "14.0", "operator": "le", "name": "oracle retail sales audit"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail size profile optimization"}, {"version": "15.0.3.5", "operator": "le", "name": "oracle retail store inventory management"}, {"version": "16.0.3.5", "operator": "le", "name": "oracle retail store inventory management"}, {"version": "14.1.3.10", "operator": "le", "name": "oracle retail store inventory management"}, {"version": "19.0", "operator": "le", "name": "oracle retail insights cloud service suite"}, {"version": "21.0", "operator": "le", "name": "siebel ui framework"}, {"version": "21.2", "operator": "le", "name": "siebel ui framework"}, {"version": "21.1", "operator": "le", "name": "siebel engineering - installer & deployment"}, {"version": "21.0", "operator": "le", "name": "siebel apps - customer order management"}, {"version": "1.4", "operator": "le", "name": "oracle cloud infrastructure storage gateway"}, {"version": "16.3.1.4.2", "operator": "le", "name": "oracle storage cloud software appliance"}, {"version": "12.1.3", "operator": "le", "name": "oracle rapid planning"}, {"version": "12.1", "operator": "le", "name": "oracle advanced supply chain planning"}, {"version": "12.2", "operator": "le", "name": "oracle advanced supply chain planning"}, {"version": "3.6", "operator": "le", "name": "agile product lifecycle management integration pack for oracle e-business suite"}, {"version": "3.5", "operator": "le", "name": "agile product lifecycle management integration pack for oracle e-business suite"}, {"version": "3.6", "operator": "le", "name": "agile product lifecycle management integration pack for sap: design to release"}, {"version": "3.5", "operator": "le", "name": "agile product lifecycle management integration pack for sap: design to release"}, {"version": "9.3.6", "operator": "le", "name": "oracle agile plm"}, {"version": "9.3.3", "operator": "le", "name": "oracle agile plm"}, {"version": "9.3.5", "operator": "le", "name": "oracle agile plm"}, {"version": "2.12.41", "operator": "le", "name": "oss support tools"}, {"version": "8.8", "operator": "le", "name": "oracle zfs storage appliance kit"}, {"version": "10", "operator": "le", "name": "oracle solaris"}, {"version": "11", "operator": "le", "name": "oracle solaris"}, {"version": "4.4.0.3.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.2.0.3.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.3.0.5.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.3.0.1.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.3.0.6.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.2.0.2.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.4.0.0.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.4.0.2.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "5.6", "operator": "le", "name": "oracle secure global desktop"}, {"version": "6.1.20", "operator": "le", "name": "oracle vm virtualbox"}]}
{"nessus": [{"lastseen": "2023-05-18T15:27:04", "description": "The version of Oracle E-Business Suite installed on the remote host is affected by multiple vulnerabilities as referenced in the April 2021 CPU advisory.\n\n - A vulnerability exists in the Oracle Applications Framework product of Oracle E-Business Suite (component:\n Home page). The supported version that is affected is 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework.\n Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Applications Framework accessible data as well as unauthorized access to critical data or complete access to all Oracle Applications Framework accessible data.\n (CVE-2021-2200)\n\n - A vulnerability exists in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.2.7-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. (CVE-2021-2205)\n\n - A vulnerability exists in the Oracle Email Center product of Oracle E-Business Suite (component: Message Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Email Center. While the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. (CVE-2021-2209)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-04-23T00:00:00", "type": "nessus", "title": "Oracle E-Business Suite Multiple Vulnerabilities (April 2021 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-14735", "CVE-2019-10086", "CVE-2020-1967", "CVE-2020-9488", "CVE-2021-2150", "CVE-2021-2153", "CVE-2021-2155", "CVE-2021-2156", "CVE-2021-2181", "CVE-2021-2182", "CVE-2021-2183", "CVE-2021-2184", "CVE-2021-2185", "CVE-2021-2186", "CVE-2021-2187", "CVE-2021-2188", "CVE-2021-2189", "CVE-2021-2190", "CVE-2021-2195", "CVE-2021-2197", "CVE-2021-2198", "CVE-2021-2199", "CVE-2021-2200", "CVE-2021-2205", "CVE-2021-2206", "CVE-2021-2209", "CVE-2021-2210", "CVE-2021-2222", "CVE-2021-2223", "CVE-2021-2224", "CVE-2021-2225", "CVE-2021-2227", "CVE-2021-2228", "CVE-2021-2229", "CVE-2021-2231", "CVE-2021-2233", "CVE-2021-2235", "CVE-2021-2236", "CVE-2021-2237", "CVE-2021-2238", "CVE-2021-2239", "CVE-2021-2241", "CVE-2021-2246", "CVE-2021-2247", "CVE-2021-2249", "CVE-2021-2251", "CVE-2021-2252", "CVE-2021-2254", "CVE-2021-2255", "CVE-2021-2258", "CVE-2021-2259", "CVE-2021-2260", "CVE-2021-2261", "CVE-2021-2262", "CVE-2021-2263", "CVE-2021-2267", "CVE-2021-2268", "CVE-2021-2269", "CVE-2021-2270", "CVE-2021-2271", "CVE-2021-2272", "CVE-2021-2273", "CVE-2021-2274", "CVE-2021-2275", "CVE-2021-2276", "CVE-2021-2288", "CVE-2021-2289", "CVE-2021-2290", "CVE-2021-2292", "CVE-2021-2295", "CVE-2021-2314", "CVE-2021-2316"], "modified": "2023-04-20T00:00:00", "cpe": ["cpe:/a:oracle:e-business_suite"], "id": "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "href": "https://www.tenable.com/plugins/nessus/148952", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(148952);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/20\");\n\n script_cve_id(\n \"CVE-2017-14735\",\n \"CVE-2019-10086\",\n \"CVE-2020-1967\",\n \"CVE-2020-9488\",\n \"CVE-2021-2150\",\n \"CVE-2021-2153\",\n \"CVE-2021-2155\",\n \"CVE-2021-2156\",\n \"CVE-2021-2181\",\n \"CVE-2021-2182\",\n \"CVE-2021-2183\",\n \"CVE-2021-2184\",\n \"CVE-2021-2185\",\n \"CVE-2021-2186\",\n \"CVE-2021-2187\",\n \"CVE-2021-2188\",\n \"CVE-2021-2189\",\n \"CVE-2021-2190\",\n \"CVE-2021-2195\",\n \"CVE-2021-2197\",\n \"CVE-2021-2198\",\n \"CVE-2021-2199\",\n \"CVE-2021-2200\",\n \"CVE-2021-2205\",\n \"CVE-2021-2206\",\n \"CVE-2021-2209\",\n \"CVE-2021-2210\",\n \"CVE-2021-2222\",\n \"CVE-2021-2223\",\n \"CVE-2021-2224\",\n \"CVE-2021-2225\",\n \"CVE-2021-2227\",\n \"CVE-2021-2228\",\n \"CVE-2021-2229\",\n \"CVE-2021-2231\",\n \"CVE-2021-2233\",\n \"CVE-2021-2235\",\n \"CVE-2021-2236\",\n \"CVE-2021-2237\",\n \"CVE-2021-2238\",\n \"CVE-2021-2239\",\n \"CVE-2021-2241\",\n \"CVE-2021-2246\",\n \"CVE-2021-2247\",\n \"CVE-2021-2249\",\n \"CVE-2021-2251\",\n \"CVE-2021-2252\",\n \"CVE-2021-2254\",\n \"CVE-2021-2255\",\n \"CVE-2021-2258\",\n \"CVE-2021-2259\",\n \"CVE-2021-2260\",\n \"CVE-2021-2261\",\n \"CVE-2021-2262\",\n \"CVE-2021-2263\",\n \"CVE-2021-2267\",\n \"CVE-2021-2268\",\n \"CVE-2021-2269\",\n \"CVE-2021-2270\",\n \"CVE-2021-2271\",\n \"CVE-2021-2272\",\n \"CVE-2021-2273\",\n \"CVE-2021-2274\",\n \"CVE-2021-2275\",\n \"CVE-2021-2276\",\n \"CVE-2021-2288\",\n \"CVE-2021-2289\",\n \"CVE-2021-2290\",\n \"CVE-2021-2292\",\n \"CVE-2021-2295\",\n \"CVE-2021-2314\",\n \"CVE-2021-2316\"\n );\n script_bugtraq_id(105656);\n script_xref(name:\"IAVA\", value:\"2021-A-0199-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0004\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"Oracle E-Business Suite Multiple Vulnerabilities (April 2021 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Oracle E-Business Suite installed on the remote host is affected by multiple vulnerabilities as\nreferenced in the April 2021 CPU advisory.\n\n - A vulnerability exists in the Oracle Applications Framework product of Oracle E-Business Suite (component:\n Home page). The supported version that is affected is 12.2.10. Easily exploitable vulnerability allows\n unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework.\n Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Oracle Applications Framework accessible data as well as unauthorized\n access to critical data or complete access to all Oracle Applications Framework accessible data.\n (CVE-2021-2200)\n\n - A vulnerability exists in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing\n Administration). Supported versions that are affected are 12.2.7-12.2.10. Easily exploitable vulnerability\n allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful\n attacks of this vulnerability can result in unauthorized creation, deletion or modification access to\n critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or \n complete access to all Oracle Marketing accessible data. (CVE-2021-2205)\n\n - A vulnerability exists in the Oracle Email Center product of Oracle E-Business Suite (component: Message\n Display). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable\n vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Email\n Center. While the vulnerability is in Oracle Email Center, attacks may significantly impact additional\n products. Successful attacks of this vulnerability can result in unauthorized access to critical data or\n complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or\n delete access to some of Oracle Email Center accessible data. (CVE-2021-2209)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/a/tech/docs/cpuapr2021cvrf.xml\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpuapr2021.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate patch according to the April 2021 Oracle Critical Patch Update advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-10086\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-2205\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/04/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:e-business_suite\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"oracle_e-business_query_patch_info.nbin\");\n script_require_keys(\"Oracle/E-Business/Version\", \"Oracle/E-Business/patches/installed\");\n\n exit(0);\n}\n\ninclude('vcf_extras_oracle.inc');\n\nvar app_info = vcf::oracle_ebusiness::get_app_info();\n\nvar constraints = [\n { 'min_version' : '12.1.1', 'max_version' : '12.1.3', 'fix_patches' : '32438190' },\n { 'min_version' : '12.2.0', 'max_version' : '12.2.2', 'fix_patches' : '32438203', 'fixed_display' : '12.2.3' },\n { 'min_version' : '12.2.3', 'max_version' : '12.2.10', 'fix_patches' : '32438203' }\n];\n\nvar fix_date = '202104';\n\nvcf::oracle_ebusiness::check_version_and_report(\n app_info : app_info,\n severity : SECURITY_HOLE,\n constraints : constraints,\n fix_date : fix_date\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:27:21", "description": "Oracle reports :\n\nThis Critical Patch Update contains 49 new security patches for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle MySQL is 9.8.\n\nMariaDB is affected by CVE-2021-2166 and CVE-2021-2154 only", "cvss3": {}, "published": "2021-04-21T00:00:00", "type": "nessus", "title": "FreeBSD : MySQL -- Multiple vulnerabilities (56ba4513-a1be-11eb-9072-d4c9ef517024)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-1971", "CVE-2020-28196", "CVE-2020-8277", "CVE-2021-2144", "CVE-2021-2146", "CVE-2021-2154", "CVE-2021-2160", "CVE-2021-2162", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2174", "CVE-2021-2178", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2196", "CVE-2021-2201", "CVE-2021-2202", "CVE-2021-2203", "CVE-2021-2208", "CVE-2021-2212", "CVE-2021-2213", "CVE-2021-2215", "CVE-2021-2217", "CVE-2021-2226", "CVE-2021-2230", "CVE-2021-2232", "CVE-2021-2278", "CVE-2021-2293", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2307", "CVE-2021-2308", "CVE-2021-23841", "CVE-2021-3449"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:mariadb103-server", "p-cpe:/a:freebsd:freebsd:mariadb104-server", "p-cpe:/a:freebsd:freebsd:mariadb105-server", "p-cpe:/a:freebsd:freebsd:mysql56-server", "p-cpe:/a:freebsd:freebsd:mysql57-server", "p-cpe:/a:freebsd:freebsd:mysql80-server", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "href": "https://www.tenable.com/plugins/nessus/148869", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(148869);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-1971\",\n \"CVE-2020-28196\",\n \"CVE-2020-8277\",\n \"CVE-2021-2144\",\n \"CVE-2021-2146\",\n \"CVE-2021-2154\",\n \"CVE-2021-2160\",\n \"CVE-2021-2162\",\n \"CVE-2021-2164\",\n \"CVE-2021-2166\",\n \"CVE-2021-2169\",\n \"CVE-2021-2170\",\n \"CVE-2021-2171\",\n \"CVE-2021-2172\",\n \"CVE-2021-2174\",\n \"CVE-2021-2178\",\n \"CVE-2021-2179\",\n \"CVE-2021-2180\",\n \"CVE-2021-2193\",\n \"CVE-2021-2194\",\n \"CVE-2021-2196\",\n \"CVE-2021-2201\",\n \"CVE-2021-2202\",\n \"CVE-2021-2203\",\n \"CVE-2021-2208\",\n \"CVE-2021-2212\",\n \"CVE-2021-2213\",\n \"CVE-2021-2215\",\n \"CVE-2021-2217\",\n \"CVE-2021-2226\",\n \"CVE-2021-2230\",\n \"CVE-2021-2232\",\n \"CVE-2021-2278\",\n \"CVE-2021-2293\",\n \"CVE-2021-2298\",\n \"CVE-2021-2299\",\n \"CVE-2021-2300\",\n \"CVE-2021-2301\",\n \"CVE-2021-2304\",\n \"CVE-2021-2305\",\n \"CVE-2021-2307\",\n \"CVE-2021-2308\",\n \"CVE-2021-23841\",\n \"CVE-2021-3449\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0004\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"FreeBSD : MySQL -- Multiple vulnerabilities (56ba4513-a1be-11eb-9072-d4c9ef517024)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Oracle reports :\n\nThis Critical Patch Update contains 49 new security patches for Oracle\nMySQL. 10 of these vulnerabilities may be remotely exploitable without\nauthentication, i.e., may be exploited over a network without\nrequiring user credentials. The highest CVSS v3.1 Base Score of\nvulnerabilities affecting Oracle MySQL is 9.8.\n\nMariaDB is affected by CVE-2021-2166 and CVE-2021-2154 only\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpuapr2021.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://mariadb.com/kb/en/mariadb-10510-release-notes/\");\n # https://vuxml.freebsd.org/freebsd/56ba4513-a1be-11eb-9072-d4c9ef517024.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?749306cb\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2144\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/04/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb103-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb104-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb105-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql56-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql57-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql80-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"mariadb103-server<10.3.29\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mariadb104-server<10.4.19\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mariadb105-server<10.5.10\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql56-server<5.6.52\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql57-server<5.7.34\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql80-server<8.0.24\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:27:23", "description": "The version of MySQL running on the remote host is 8.0.x prior to 8.0.24. It is, therefore, affected by multiple vulnerabilities, including the following, as noted in the April 2021 Critical Patch Update advisory:\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (OpenSSL)).\n Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2021-3449)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption (OpenSSL)). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. (CVE-2021-23841)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.\n Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. (CVE-2020-28196)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-04-22T00:00:00", "type": "nessus", "title": "MySQL 8.0.x < 8.0.24 Multiple Vulnerabilities (Apr 2021 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-28196", "CVE-2021-2146", "CVE-2021-2162", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2174", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2196", "CVE-2021-2201", "CVE-2021-2203", "CVE-2021-2208", "CVE-2021-2212", "CVE-2021-2215", "CVE-2021-2217", "CVE-2021-2226", "CVE-2021-2230", "CVE-2021-2232", "CVE-2021-2278", "CVE-2021-2293", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2307", "CVE-2021-2308", "CVE-2021-23841", "CVE-2021-2444", "CVE-2021-3449"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:oracle:mysql"], "id": "MYSQL_8_0_24.NASL", "href": "https://www.tenable.com/plugins/nessus/148937", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(148937);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2020-28196\",\n \"CVE-2021-2146\",\n \"CVE-2021-2162\",\n \"CVE-2021-2164\",\n \"CVE-2021-2166\",\n \"CVE-2021-2169\",\n \"CVE-2021-2170\",\n \"CVE-2021-2171\",\n \"CVE-2021-2172\",\n \"CVE-2021-2174\",\n \"CVE-2021-2179\",\n \"CVE-2021-2180\",\n \"CVE-2021-2193\",\n \"CVE-2021-2194\",\n \"CVE-2021-2196\",\n \"CVE-2021-2201\",\n \"CVE-2021-2203\",\n \"CVE-2021-2208\",\n \"CVE-2021-2212\",\n \"CVE-2021-2215\",\n \"CVE-2021-2217\",\n \"CVE-2021-2226\",\n \"CVE-2021-2230\",\n \"CVE-2021-2232\",\n \"CVE-2021-2278\",\n \"CVE-2021-2293\",\n \"CVE-2021-2298\",\n \"CVE-2021-2299\",\n \"CVE-2021-2300\",\n \"CVE-2021-2301\",\n \"CVE-2021-2304\",\n \"CVE-2021-2305\",\n \"CVE-2021-2307\",\n \"CVE-2021-2308\",\n \"CVE-2021-2444\",\n \"CVE-2021-3449\",\n \"CVE-2021-23841\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0193\");\n script_xref(name:\"IAVA\", value:\"2021-A-0333\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"MySQL 8.0.x < 8.0.24 Multiple Vulnerabilities (Apr 2021 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL running on the remote host is 8.0.x prior to 8.0.24. It is, therefore, affected by multiple\nvulnerabilities, including the following, as noted in the April 2021 Critical Patch Update advisory:\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging (OpenSSL)).\n Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability\n allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash\n (complete DOS) of MySQL Server. (CVE-2021-3449)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption\n (OpenSSL)). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable\n vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently\n repeatable crash (complete DOS) of MySQL Server. (CVE-2021-23841)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions\n that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows\n unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.\n Successful attacks require human interaction from a person other than the attacker. Successful attacks of this\n vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server\n accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. (CVE-2020-28196)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpuapr2021.html#AppendixMSQL\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/a/tech/docs/cpuapr2021cvrf.xml\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to MySQL version 8.0.24 or later.\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2304\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-2307\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/04/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/04/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:mysql\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\", \"mysql_version_local.nasl\", \"mysql_win_installed.nbin\", \"macosx_mysql_installed.nbin\");\n script_require_keys(\"installed_sw/MySQL Server\");\n\n exit(0);\n}\n\ninclude('vcf_extras_mysql.inc');\n\nvar app_info = vcf::mysql::combined_get_app_info();\n\nvar constraints = [{ 'min_version' : '8.0.0', 'fixed_version' : '8.0.24'}];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:44", "description": "The remote Ubuntu 18.04 LTS / 20.04 LTS / 20.10 / 21.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-4952-1 advisory.\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2146)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2154)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). (CVE-2021-2162)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2164, CVE-2021-2170, CVE-2021-2193, CVE-2021-2203, CVE-2021-2212, CVE-2021-2230, CVE-2021-2278, CVE-2021-2299)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2166)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2169)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2171)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2172)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin).\n Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2179)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2180, CVE-2021-2194)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2196, CVE-2021-2300, CVE-2021-2305)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Partition). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2201, CVE-2021-2208)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2215, CVE-2021-2217, CVE-2021-2293)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).\n Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts).\n CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). (CVE-2021-2226)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin).\n Supported versions that are affected are 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 1.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). (CVE-2021-2232)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2298)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).\n Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). (CVE-2021-2301, CVE-2021-2308)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-2304)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N). (CVE-2021-2307)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-13T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS / 20.10 / 21.04 : MySQL vulnerabilities (USN-4952-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-2146", "CVE-2021-2154", "CVE-2021-2162", "CVE-2021-2164", "CVE-2021-2166", "CVE-2021-2169", "CVE-2021-2170", "CVE-2021-2171", "CVE-2021-2172", "CVE-2021-2179", "CVE-2021-2180", "CVE-2021-2193", "CVE-2021-2194", "CVE-2021-2196", "CVE-2021-2201", "CVE-2021-2203", "CVE-2021-2208", "CVE-2021-2212", "CVE-2021-2215", "CVE-2021-2217", "CVE-2021-2226", "CVE-2021-2230", "CVE-2021-2232", "CVE-2021-2278", "CVE-2021-2293", "CVE-2021-2298", "CVE-2021-2299", "CVE-2021-2300", "CVE-2021-2301", "CVE-2021-2304", "CVE-2021-2305", "CVE-2021-2307", "CVE-2021-2308"], "modified": &