Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [“Critical Patch Updates, Security Alerts and Bulletins”](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories.
**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**
This Critical Patch Update contains 342 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ July 2021 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2788740.1>).
Affected Software
CPE Name
Name
Version
big data spatial and graph
23.1
big data spatial and graph
2.0
essbase analytic provider services
11.1.2.4
essbase analytic provider services
21.2
hyperion essbase administration services
11.1.2.4
hyperion essbase administration services
21.2
essbase
21.2
oracle commerce platform
11.2.0
oracle commerce platform
11.0.0
oracle commerce platform
11.1.0
oracle commerce platform
11.3.0
oracle commerce guided search
11.3.2
oracle commerce guided search / oracle commerce experience manager
11.3.2
oracle commerce guided search / oracle commerce experience manager
11.3.1.5
oracle commerce merchandising
11.2.0
oracle commerce merchandising
11.1.0
oracle commerce merchandising
11.3.0
oracle commerce service center
11.2.0
oracle commerce service center
11.0.0
oracle commerce service center
11.1.0
oracle commerce service center
11.3.0
oracle communications brm - elastic charging engine
11.3.0.9.0
oracle communications brm - elastic charging engine
12.0.0.3.0
oracle communications unified inventory management
7.3.5
oracle communications unified inventory management
7.4.0
oracle communications unified inventory management
7.3.2
oracle communications unified inventory management
7.3.4
oracle communications unified inventory management
7.4.1
oracle communications offline mediation controller
12.0.0.3.0
oracle communications pricing design center
12.0.0.3.0
oracle communications instant messaging server
10.0.1.4.0
oracle communications billing and revenue management
7.5.0.23.0
oracle communications billing and revenue management
12.0.0.3.0
oracle communications convergent charging controller
12.0.4.0.0
oracle communications network charging and control
12.0.4.0.0
oracle communications network charging and control
6.0.1.0
oracle communications network charging and control
12.0.1.0
oracle communications design studio
7.4.2
oracle communications cloud native core security edge protection proxy
1.7.0
oracle communications cloud native core service communication proxy
1.5.2
oracle communications diameter signaling router (dsr)
8.0.0
oracle communications eagle software
46.6.0
oracle sd-wan aware
8.2
oracle sd-wan aware
9.0
oracle sd-wan edge
8.2
oracle sd-wan edge
9.1
oracle sd-wan edge
9.0
oracle communications services gatekeeper
7.0
oracle communications application session controller
3.9
oracle communications cloud native core network function cloud native environment
1.7.0
oracle communications cloud native core network function cloud native environment
1.4.0
oracle communications cloud native core policy
1.5.0
oracle communications cloud native core policy
1.9.0
oracle communications cloud native core unified data repository
1.4.0
oracle communications cloud native core unified data repository
1.6.0
oracle communications evolved communications application server
7.1
oracle communications cloud native core console
1.4.0
oracle communications cloud native core network slice selection function
1.2.1
primavera gateway
18.8.0
primavera gateway
20.12.0
primavera gateway
19.12.0
primavera gateway
17.12.0
instantis enterprisetrack
17.1
instantis enterprisetrack
17.3
instantis enterprisetrack
17.2
primavera p6 enterprise project portfolio management
17.12.0
primavera p6 enterprise project portfolio management
20.12.0
primavera p6 enterprise project portfolio management
19.12.0
primavera p6 enterprise project portfolio management
18.8.0
primavera unifier
17.7
primavera unifier
20.12
primavera unifier
19.12
primavera unifier
18.8
oracle marketing
12.1.1
oracle marketing
12.2.3
oracle common applications
12.1.1
oracle common applications
12.2.3
oracle advanced inbound telephony
12.1.1
oracle advanced inbound telephony
12.2.3
oracle advanced outbound telephony
12.1.1
oracle advanced outbound telephony
12.2.3
oracle approvals management
12.1.1
oracle collaborative planning
12.1.1
oracle e-records
12.1.1
oracle e-records
12.2.3
oracle engineering
12.2.3
oracle field service
12.1.1
oracle human resources
12.1.1
oracle isupplier portal
12.1.1
oracle isupplier portal
12.2.3
oracle public sector financials (international)
12.1.1
oracle time and labor
12.1.1
oracle time and labor
12.2.3
oracle web applications desktop integrator
12.2.3
oracle web applications desktop integrator
12.1.3
oracle applications framework
12.2.3
oracle applications framework
12.1.3
oracle workflow
12.2.3
oracle workflow
12.1.3
enterprise manager base platform
13.4.0.0
oracle configuration manager
12.1.2.0.8
oracle application testing suite
13.3.0.1
oracle banking enterprise default management
2.12.0
oracle banking enterprise default management
2.10.0
oracle banking platform
2.7.1
oracle banking platform
2.4.0
oracle banking platform
2.9.0
oracle banking platform
2.12.0
oracle banking liquidity management
14.2
oracle banking liquidity management
14.3
oracle banking liquidity management
14.5
oracle flexcube private banking
12.1.0
oracle flexcube private banking
12.0.0
oracle banking treasury management
14.4
oracle financial services analytical applications infrastructure
8.1.1
oracle financial services analytical applications infrastructure
8.1.0
oracle financial services analytical applications infrastructure
8.0.6
oracle financial services revenue management and billing analytics
2.7.0
oracle financial services revenue management and billing analytics
2.8.0
oracle financial services regulatory reporting with agilereporter
8.0.9.6.3
oracle banking party management
2.7.0
oracle flexcube universal banking
14.0
oracle flexcube universal banking
12.3
oracle flexcube universal banking
12.0
oracle flexcube universal banking
12.4
oracle flexcube universal banking
14.1.0
oracle financial services crime and compliance investigation hub
20.1.2
oracle hospitality reporting and analytics
9.1.0
micros compact workstation 3
310
micros es400 series
400
micros kitchen display system hardware
210
micros workstation 5a
5A
micros workstation 6
610
oracle bam (business activity monitoring)
12.2.1.4.0
oracle bam (business activity monitoring)
12.2.1.3.0
oracle bam (business activity monitoring)
11.1.1.9.0
oracle webcenter portal
12.2.1.4.0
oracle webcenter portal
12.2.1.3.0
oracle webcenter portal
11.1.1.9.0
oracle business intelligence enterprise edition
12.2.1.4.0
oracle data integrator
12.2.1.4.0
oracle data integrator
12.2.1.3.0
oracle jdeveloper
12.2.1.4.0
oracle weblogic server
12.2.1.4.0
oracle weblogic server
12.1.3.0.0
oracle weblogic server
10.3.6.0.0
oracle weblogic server
14.1.1.0.0
oracle weblogic server
12.2.1.3.0
oracle bi publisher
12.2.1.4.0
oracle bi publisher
12.2.1.3.0
oracle bi publisher
11.1.1.9.0
oracle bi publisher
5.5.0.0.0
oracle enterprise data quality
12.2.1.4.0
oracle enterprise data quality
12.2.1.3.0
oracle coherence
12.2.1.4.0
oracle coherence
3.7.1.0
oracle coherence
12.1.3.0.0
oracle coherence
14.1.1.0.0
oracle coherence
12.2.1.3.0
identity manager
11.1.2.3.0
identity manager
12.2.1.3.0
identity manager
12.2.1.4.0
identity manager
11.1.2.2.0
oracle goldengate application adapters
19.1.0.0.0
oracle managed file transfer
12.2.1.4.0
oracle managed file transfer
12.2.1.3.0
real-time decisions (rtd) solutions
3.2.0.0
oracle outside in technology
8.5.5
oracle enterprise repository
11.1.1.7.0
oracle fusion middleware mapviewer
12.2.1.4.0
oracle access manager
11.1.2.3.0
oracle hospitality suite8
8.13
oracle hospitality suite8
8.14
hyperion infrastructure technology
11.2.5.0
hyperion infrastructure technology
11.1.2.4
hyperion financial reporting
11.2.5.0
hyperion financial reporting
11.1.2.4
oracle hyperion bi+
11.2.5.0
oracle hyperion bi+
11.1.2.4
oracle insurance policy administration
11.2.0
oracle insurance policy administration
11.0.2
oracle insurance policy administration
11.1.0
oracle insurance policy administration
11.3.0
oracle insurance policy administration j2ee
11.0.2
oracle insurance rules palette
11.0.2
oracle insurance rules palette
11.1.0
oracle graalvm enterprise edition
20.3.2
oracle graalvm enterprise edition
21.1.0
java se, oracle graalvm enterprise edition
16.0.1
java se, oracle graalvm enterprise edition
11.0.11
java se, oracle graalvm enterprise edition
7u301
java se, oracle graalvm enterprise edition
8u291
java se, oracle graalvm enterprise edition
21.1.0
java se
7u301
jd edwards enterpriseone orchestrator
9.2.5.3
jd edwards enterpriseone tools
9.2.5.3
mysql cluster
8.0.25
mysql server
8.0.25
mysql server
8.0.23
mysql server
5.7.34
mysql server
8.0.21
mysql enterprise monitor
8.0.23
mysql connectors
8.0.23
peoplesoft enterprise peopletools
8.57
peoplesoft enterprise peopletools
8.58
peoplesoft enterprise peopletools
8.59
peoplesoft enterprise peopletools
8.58.
peoplesoft enterprise cs campus community
9.2
peoplesoft enterprise cs campus community
9.0
peoplesoft enterprise hcm candidate gateway
9.2
peoplesoft enterprise hcm shared components
9.2
peoplesoft enterprise pt peopletools
8.57
peoplesoft enterprise pt peopletools
8.59
peoplesoft enterprise pt peopletools
8.58
oracle policy automation
12.2.0
oracle retail xstore point of service
20.0.1
oracle retail xstore point of service
16.0.6
oracle retail xstore point of service
18.0.3
oracle retail xstore point of service
17.0.4
oracle retail xstore point of service
19.0.2
oracle retail customer management and segmentation foundation
16.0
oracle retail customer management and segmentation foundation
19.0
oracle retail merchandising system
14.1.3.2
oracle retail merchandising system
16.0.3
oracle retail merchandising system
15.0.3.1
oracle retail financial integration
16.0.3.0
oracle retail financial integration
14.1.3.2
oracle retail financial integration
15.0.3.1
oracle retail integration bus
16.0.3.0
oracle retail integration bus
14.1.3.2
oracle retail integration bus
15.0.3.1
oracle retail order broker
15.0
oracle retail order broker
16.0
oracle retail back office
14.1
oracle retail central office
14.1
oracle retail point-of-service
14.1
oracle retail returns management
14.1
oracle retail service backbone
16.0.3.0
oracle retail service backbone
14.1.3.2
oracle retail service backbone
15.0.3.1
oracle retail price management
15.0
oracle retail price management
14.1
oracle retail price management
16.0
oracle retail price management
14.0
oracle retail customer engagement
16.0
oracle retail order management system cloud service
19.5
siebel core - server framework
21.5
siebel core - automation
21.5
siebel apps - marketing
21.5
siebel crm
21.5
oracle agile engineering data management
6.2.1.0
oracle transportation management
6.4.3
oracle agile plm
9.3.3
oracle agile plm
9.3.6
oracle agile plm
9.3.5
oss support tools
2.12.41
fujitsu m10-1, m10-4, m10-4s, m12-1, m12-2, m12-2s servers
2400
fujitsu m10-1, m10-4, m10-4s, m12-1, m12-2, m12-2s servers
3100
oracle zfs storage appliance kit
8.8
storagetek tape analytics sw tool
2.3
oracle solaris cluster
4.4
oracle solaris
11
oracle secure global desktop
5.6
oracle vm virtualbox
6.1.24
Related
{"id": "ORACLE:CPUJUL2021", "vendorId": null, "type": "oracle", "bulletinFamily": "software", "title": "Oracle Critical Patch Update Advisory - July 2021", "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [\u201cCritical Patch Updates, Security Alerts and Bulletins\u201d](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories. \n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**\n\nThis Critical Patch Update contains 342 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ July 2021 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2788740.1>).\n", "published": "2021-07-20T00:00:00", "modified": "2021-09-03T00:00:00", "epss": [{"cve": "CVE-2012-0881", "epss": 0.00939, "percentile": 0.81079, "modified": "2023-08-13"}, {"cve": "CVE-2015-0254", "epss": 0.05434, "percentile": 0.92252, "modified": "2023-09-20"}, {"cve": "CVE-2016-0762", "epss": 0.00188, "percentile": 0.55942, "modified": "2023-09-20"}, {"cve": "CVE-2016-4429", "epss": 0.00545, "percentile": 0.74131, "modified": "2023-06-03"}, {"cve": "CVE-2017-14735", "epss": 0.00303, "percentile": 0.65327, "modified": "2023-06-23"}, {"cve": "CVE-2017-16931", "epss": 0.00601, "percentile": 0.75448, "modified": "2023-06-23"}, {"cve": "CVE-2017-3735", "epss": 0.0495, "percentile": 0.91647, "modified": "2023-06-23"}, {"cve": "CVE-2017-5461", "epss": 0.01326, "percentile": 0.84105, "modified": "2023-06-23"}, {"cve": "CVE-2017-5637", "epss": 0.06675, "percentile": 0.92789, "modified": "2023-06-23"}, {"cve": "CVE-2017-7656", "epss": 0.01836, "percentile": 0.86511, "modified": "2023-06-05"}, {"cve": "CVE-2017-7657", "epss": 0.00312, "percentile": 0.6574, "modified": "2023-06-05"}, {"cve": "CVE-2017-7658", "epss": 0.0029, "percentile": 0.64469, "modified": "2023-06-05"}, {"cve": "CVE-2017-9735", "epss": 0.00311, "percentile": 0.65668, "modified": "2023-06-05"}, {"cve": "CVE-2018-0737", "epss": 0.00676, "percentile": 0.77042, "modified": "2023-06-19"}, {"cve": "CVE-2018-0739", "epss": 0.01603, "percentile": 0.85562, "modified": "2023-06-19"}, {"cve": "CVE-2018-15686", "epss": 0.00173, "percentile": 0.53246, "modified": "2023-06-23"}, {"cve": "CVE-2018-21010", "epss": 0.00815, "percentile": 0.79425, "modified": "2023-06-23"}, {"cve": "CVE-2018-7160", "epss": 0.04381, "percentile": 0.91155, "modified": "2023-06-23"}, {"cve": "CVE-2018-7183", "epss": 0.88088, "percentile": 0.98168, "modified": "2023-06-23"}, {"cve": "CVE-2019-0190", "epss": 0.01265, "percentile": 0.8381, "modified": "2023-07-15"}, {"cve": "CVE-2019-0201", "epss": 0.00107, "percentile": 0.42594, "modified": "2023-07-15"}, {"cve": "CVE-2019-0205", "epss": 0.00301, "percentile": 0.65417, "modified": "2023-07-15"}, {"cve": "CVE-2019-0210", "epss": 0.00328, "percentile": 0.66949, "modified": "2023-07-15"}, {"cve": "CVE-2019-0219", "epss": 0.00323, "percentile": 0.66446, "modified": "2023-06-14"}, {"cve": "CVE-2019-0228", "epss": 0.00235, "percentile": 0.60366, "modified": "2023-06-14"}, {"cve": "CVE-2019-10086", "epss": 0.00311, "percentile": 0.65745, "modified": "2023-06-13"}, {"cve": "CVE-2019-10173", "epss": 0.94887, "percentile": 0.98906, "modified": "2023-06-13"}, {"cve": "CVE-2019-10746", "epss": 0.0027, "percentile": 0.63136, "modified": "2023-06-13"}, {"cve": "CVE-2019-11358", "epss": 0.02952, "percentile": 0.89598, "modified": "2023-09-07"}, {"cve": "CVE-2019-12260", "epss": 0.29158, "percentile": 0.96283, "modified": "2023-06-13"}, {"cve": "CVE-2019-12399", "epss": 0.001, "percentile": 0.40254, "modified": "2023-06-13"}, {"cve": "CVE-2019-12402", "epss": 0.00264, "percentile": 0.63305, "modified": "2023-08-26"}, {"cve": "CVE-2019-12415", "epss": 0.00069, "percentile": 0.28492, "modified": "2023-06-13"}, {"cve": "CVE-2019-12973", "epss": 0.00218, "percentile": 0.58488, "modified": "2023-06-13"}, {"cve": "CVE-2019-13990", "epss": 0.00314, "percentile": 0.65932, "modified": "2023-06-13"}, {"cve": "CVE-2019-15604", "epss": 0.00455, "percentile": 0.71677, "modified": "2023-06-13"}, {"cve": "CVE-2019-15605", "epss": 0.0037, "percentile": 0.68668, "modified": "2023-06-13"}, {"cve": "CVE-2019-15606", "epss": 0.00716, "percentile": 0.77781, "modified": "2023-06-13"}, {"cve": "CVE-2019-16942", "epss": 0.00292, "percentile": 0.6469, "modified": "2023-06-16"}, {"cve": "CVE-2019-16943", "epss": 0.00336, "percentile": 0.67783, "modified": "2023-09-20"}, {"cve": "CVE-2019-17195", "epss": 0.00581, "percentile": 0.75011, "modified": "2023-06-13"}, {"cve": "CVE-2019-17531", "epss": 0.01073, "percentile": 0.82527, "modified": "2023-09-20"}, {"cve": "CVE-2019-17543", "epss": 0.006, "percentile": 0.75421, "modified": "2023-06-13"}, {"cve": "CVE-2019-17545", "epss": 0.02307, "percentile": 0.88136, "modified": "2023-06-13"}, {"cve": "CVE-2019-17566", "epss": 0.00121, "percentile": 0.4518, "modified": "2023-06-13"}, {"cve": "CVE-2019-20330", "epss": 0.00463, "percentile": 0.72463, "modified": "2023-09-20"}, {"cve": "CVE-2019-2725", "epss": 0.97556, "percentile": 0.99992, "modified": "2023-06-13"}, {"cve": "CVE-2019-2729", "epss": 0.97159, "percentile": 0.99674, "modified": "2023-06-13"}, {"cve": "CVE-2019-2897", "epss": 0.00065, "percentile": 0.26742, "modified": "2023-06-13"}, {"cve": "CVE-2019-3738", "epss": 0.0026, "percentile": 0.62404, "modified": "2023-06-13"}, {"cve": "CVE-2019-3739", "epss": 0.0027, "percentile": 0.63112, "modified": "2023-06-13"}, {"cve": "CVE-2019-3740", "epss": 0.0027, "percentile": 0.63112, "modified": "2023-06-13"}, {"cve": "CVE-2019-5063", "epss": 0.14414, "percentile": 0.94928, "modified": "2023-06-13"}, {"cve": "CVE-2019-5064", "epss": 0.03184, "percentile": 0.89766, "modified": "2023-06-13"}, {"cve": "CVE-2020-10543", "epss": 0.00299, "percentile": 0.6503, "modified": "2023-06-06"}, {"cve": "CVE-2020-10683", "epss": 0.00261, "percentile": 0.62434, "modified": "2023-06-06"}, {"cve": "CVE-2020-10878", "epss": 0.00274, "percentile": 0.63366, "modified": "2023-06-06"}, {"cve": "CVE-2020-11022", "epss": 0.04523, "percentile": 0.91461, "modified": "2023-09-07"}, {"cve": "CVE-2020-11023", "epss": 0.00572, "percentile": 0.75158, "modified": "2023-09-07"}, {"cve": "CVE-2020-11612", "epss": 0.00623, "percentile": 0.75879, "modified": "2023-06-06"}, {"cve": "CVE-2020-11868", "epss": 0.02127, "percentile": 0.87604, "modified": "2023-06-06"}, {"cve": "CVE-2020-11973", "epss": 0.01072, "percentile": 0.82145, "modified": "2023-06-06"}, {"cve": "CVE-2020-11979", "epss": 0.00189, "percentile": 0.55104, "modified": "2023-06-06"}, {"cve": "CVE-2020-11987", "epss": 0.00075, "percentile": 0.30587, "modified": "2023-06-06"}, {"cve": "CVE-2020-11988", "epss": 0.00083, "percentile": 0.33815, "modified": "2023-06-06"}, {"cve": "CVE-2020-11998", "epss": 0.00271, "percentile": 0.63135, "modified": "2023-06-06"}, {"cve": "CVE-2020-12723", "epss": 0.00319, "percentile": 0.66188, "modified": "2023-06-06"}, {"cve": "CVE-2020-13934", "epss": 0.9514, "percentile": 0.98953, "modified": "2023-06-06"}, {"cve": "CVE-2020-13935", "epss": 0.39531, "percentile": 0.96705, "modified": "2023-06-06"}, {"cve": "CVE-2020-13949", "epss": 0.00379, "percentile": 0.6901, "modified": "2023-06-06"}, {"cve": "CVE-2020-13956", "epss": 0.00124, "percentile": 0.45606, "modified": "2023-06-06"}, {"cve": "CVE-2020-14060", "epss": 0.39335, "percentile": 0.96701, "modified": "2023-06-06"}, {"cve": "CVE-2020-14061", "epss": 0.02076, "percentile": 0.87446, "modified": "2023-06-06"}, {"cve": "CVE-2020-14062", "epss": 0.04035, "percentile": 0.90806, "modified": "2023-06-06"}, {"cve": "CVE-2020-14195", "epss": 0.02609, "percentile": 0.88788, "modified": "2023-06-06"}, {"cve": "CVE-2020-14756", "epss": 0.01796, "percentile": 0.86331, "modified": "2023-06-06"}, {"cve": "CVE-2020-15389", "epss": 0.00937, "percentile": 0.80823, "modified": "2023-06-06"}, {"cve": "CVE-2020-17521", "epss": 0.00051, "percentile": 0.1765, "modified": "2023-06-06"}, {"cve": "CVE-2020-17527", "epss": 0.00219, "percentile": 0.58524, "modified": "2023-06-06"}, {"cve": "CVE-2020-17530", "epss": 0.97014, "percentile": 0.99594, "modified": "2023-06-06"}, {"cve": "CVE-2020-1941", "epss": 0.00165, "percentile": 0.51922, "modified": "2023-06-06"}, {"cve": "CVE-2020-1945", "epss": 0.00062, "percentile": 0.24513, "modified": "2023-06-06"}, {"cve": "CVE-2020-1967", "epss": 0.33995, "percentile": 0.96458, "modified": "2023-06-06"}, {"cve": "CVE-2020-1968", "epss": 0.00422, "percentile": 0.70548, "modified": "2023-06-06"}, {"cve": "CVE-2020-1971", "epss": 0.00318, "percentile": 0.66102, "modified": "2023-06-06"}, {"cve": "CVE-2020-24553", "epss": 0.00362, "percentile": 0.68259, "modified": "2023-06-06"}, {"cve": "CVE-2020-24616", "epss": 0.00457, "percentile": 0.72303, "modified": "2023-09-20"}, {"cve": "CVE-2020-24750", "epss": 0.00535, "percentile": 0.74365, "modified": "2023-09-20"}, {"cve": "CVE-2020-2555", "epss": 0.95477, "percentile": 0.99042, "modified": "2023-06-06"}, {"cve": "CVE-2020-25638", "epss": 0.00137, "percentile": 0.4793, "modified": "2023-06-06"}, {"cve": "CVE-2020-25648", "epss": 0.00767, "percentile": 0.78686, "modified": "2023-06-06"}, {"cve": "CVE-2020-25649", "epss": 0.0014, "percentile": 0.48471, "modified": "2023-06-06"}, {"cve": "CVE-2020-2604", "epss": 0.00244, "percentile": 0.60897, "modified": "2023-06-06"}, {"cve": "CVE-2020-26217", "epss": 0.97456, "percentile": 0.99916, "modified": "2023-06-06"}, {"cve": "CVE-2020-26870", "epss": 0.00352, "percentile": 0.67822, "modified": "2023-06-06"}, {"cve": "CVE-2020-27193", "epss": 0.00214, "percentile": 0.58146, "modified": "2023-06-06"}, {"cve": "CVE-2020-27216", "epss": 0.00052, "percentile": 0.18335, "modified": "2023-06-06"}, {"cve": "CVE-2020-27218", "epss": 0.00302, "percentile": 0.65138, "modified": "2023-06-06"}, {"cve": "CVE-2020-27783", "epss": 0.00202, "percentile": 0.56782, "modified": "2023-06-06"}, {"cve": "CVE-2020-27814", "epss": 0.0021, "percentile": 0.5762, "modified": "2023-06-06"}, {"cve": "CVE-2020-27841", "epss": 0.00087, "percentile": 0.35453, "modified": "2023-06-06"}, {"cve": "CVE-2020-27842", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-27843", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-27844", "epss": 0.0009, "percentile": 0.37327, "modified": "2023-06-06"}, {"cve": "CVE-2020-27845", "epss": 0.00066, "percentile": 0.2704, "modified": "2023-06-06"}, {"cve": "CVE-2020-28052", "epss": 0.00224, "percentile": 0.59332, "modified": "2023-06-06"}, {"cve": "CVE-2020-28196", "epss": 0.00375, "percentile": 0.68812, "modified": "2023-06-06"}, {"cve": "CVE-2020-28928", "epss": 0.00051, "percentile": 0.17743, "modified": "2023-06-06"}, {"cve": "CVE-2020-29582", "epss": 0.00106, "percentile": 0.41963, "modified": "2023-06-06"}, {"cve": "CVE-2020-35490", "epss": 0.00184, "percentile": 0.54373, "modified": "2023-06-06"}, {"cve": "CVE-2020-35491", "epss": 0.00184, "percentile": 0.54373, "modified": "2023-06-06"}, {"cve": "CVE-2020-35728", "epss": 0.00367, "percentile": 0.68479, "modified": "2023-06-06"}, {"cve": "CVE-2020-36179", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36180", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36181", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36182", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36183", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36184", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36185", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36186", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36187", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36188", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-36189", "epss": 0.00184, "percentile": 0.55236, "modified": "2023-09-20"}, {"cve": "CVE-2020-5258", "epss": 0.00181, "percentile": 0.53945, "modified": "2023-06-06"}, {"cve": "CVE-2020-5397", "epss": 0.00128, "percentile": 0.46352, "modified": "2023-06-06"}, {"cve": "CVE-2020-5398", "epss": 0.97084, "percentile": 0.99632, "modified": "2023-06-06"}, {"cve": "CVE-2020-5413", "epss": 0.0029, "percentile": 0.64513, "modified": "2023-06-06"}, {"cve": "CVE-2020-5421", "epss": 0.92524, "percentile": 0.98494, "modified": "2023-06-06"}, {"cve": "CVE-2020-7016", "epss": 0.00083, "percentile": 0.33869, "modified": "2023-06-06"}, {"cve": "CVE-2020-7017", "epss": 0.00131, "percentile": 0.46848, "modified": "2023-06-06"}, {"cve": "CVE-2020-7712", "epss": 0.00555, "percentile": 0.74343, "modified": "2023-06-06"}, {"cve": "CVE-2020-7733", "epss": 0.00385, "percentile": 0.69212, "modified": "2023-06-06"}, {"cve": "CVE-2020-7760", "epss": 0.01368, "percentile": 0.84324, "modified": "2023-06-06"}, {"cve": "CVE-2020-8174", "epss": 0.01437, "percentile": 0.84662, "modified": "2023-06-06"}, {"cve": "CVE-2020-8203", "epss": 0.01036, "percentile": 0.81779, "modified": "2023-06-06"}, {"cve": "CVE-2020-8277", "epss": 0.00537, "percentile": 0.73929, "modified": "2023-06-06"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49635, "modified": "2023-06-06"}, {"cve": "CVE-2020-8285", "epss": 0.0045, "percentile": 0.71446, "modified": "2023-06-06"}, {"cve": "CVE-2020-8286", "epss": 0.0026, "percentile": 0.62359, "modified": "2023-06-06"}, {"cve": "CVE-2020-8554", "epss": 0.00131, "percentile": 0.46732, "modified": "2023-06-06"}, {"cve": "CVE-2020-8908", "epss": 0.0006, "percentile": 0.23333, "modified": "2023-08-06"}, {"cve": "CVE-2020-9484", "epss": 0.97336, "percentile": 0.99807, "modified": "2023-06-06"}, {"cve": "CVE-2020-9489", "epss": 0.00055, "percentile": 0.20866, "modified": "2023-06-06"}, {"cve": "CVE-2021-20190", "epss": 0.00267, "percentile": 0.63674, "modified": "2023-09-20"}, {"cve": "CVE-2021-20227", "epss": 0.00065, "percentile": 0.26894, "modified": "2023-05-27"}, {"cve": "CVE-2021-21275", "epss": 0.00062, "percentile": 0.24292, "modified": "2023-05-27"}, {"cve": "CVE-2021-21290", "epss": 0.00045, "percentile": 0.12546, "modified": "2023-05-27"}, {"cve": "CVE-2021-21341", "epss": 0.02369, "percentile": 0.88255, "modified": "2023-05-27"}, {"cve": "CVE-2021-21342", "epss": 0.01301, "percentile": 0.83874, "modified": "2023-05-27"}, {"cve": "CVE-2021-21343", "epss": 0.00328, "percentile": 0.66604, "modified": "2023-05-27"}, {"cve": "CVE-2021-21344", "epss": 0.01592, "percentile": 0.85461, "modified": "2023-05-27"}, {"cve": "CVE-2021-21345", "epss": 0.50925, "percentile": 0.97, "modified": "2023-05-27"}, {"cve": "CVE-2021-21346", "epss": 0.01592, "percentile": 0.85461, "modified": "2023-05-27"}, {"cve": "CVE-2021-21347", "epss": 0.00988, "percentile": 0.81333, "modified": "2023-05-27"}, {"cve": "CVE-2021-21348", "epss": 0.01076, "percentile": 0.82153, "modified": "2023-05-27"}, {"cve": "CVE-2021-21349", "epss": 0.00726, "percentile": 0.77946, "modified": "2023-05-27"}, {"cve": "CVE-2021-21350", "epss": 0.01592, "percentile": 0.85461, "modified": "2023-05-27"}, {"cve": "CVE-2021-21351", "epss": 0.95981, "percentile": 0.9917, "modified": "2023-05-27"}, {"cve": "CVE-2021-21409", "epss": 0.77039, "percentile": 0.97714, "modified": "2023-05-27"}, {"cve": "CVE-2021-22112", "epss": 0.00397, "percentile": 0.69665, "modified": "2023-05-27"}, {"cve": "CVE-2021-22118", "epss": 0.00046, "percentile": 0.14141, "modified": "2023-05-27"}, {"cve": "CVE-2021-2244", "epss": 0.02117, "percentile": 0.87562, "modified": "2023-05-27"}, {"cve": "CVE-2021-22876", "epss": 0.00333, "percentile": 0.66904, "modified": "2023-05-27"}, {"cve": "CVE-2021-22883", "epss": 0.00315, "percentile": 0.65881, "modified": "2023-05-27"}, {"cve": "CVE-2021-22884", "epss": 0.00222, "percentile": 0.59163, "modified": "2023-05-27"}, {"cve": "CVE-2021-22890", "epss": 0.00252, "percentile": 0.6163, "modified": "2023-05-27"}, {"cve": "CVE-2021-22897", "epss": 0.00168, "percentile": 0.52483, "modified": "2023-05-27"}, {"cve": "CVE-2021-22898", "epss": 0.00166, "percentile": 0.51913, "modified": "2023-05-27"}, {"cve": "CVE-2021-22901", "epss": 0.03177, "percentile": 0.89718, "modified": "2023-05-27"}, {"cve": "CVE-2021-2323", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2324", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2326", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2328", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2329", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2330", "epss": 0.00053, "percentile": 0.18982, "modified": "2023-05-27"}, {"cve": "CVE-2021-2333", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.50451, "modified": "2023-09-20"}, {"cve": "CVE-2021-2334", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2335", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2336", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2337", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2338", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2339", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2340", "epss": 0.00097, "percentile": 0.39371, "modified": "2023-05-27"}, {"cve": "CVE-2021-2341", "epss": 0.00116, "percentile": 0.44156, "modified": "2023-05-27"}, {"cve": "CVE-2021-2342", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2343", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2344", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2345", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2346", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2347", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2348", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2349", "epss": 0.00183, "percentile": 0.5425, "modified": "2023-05-27"}, {"cve": "CVE-2021-2350", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2351", "epss": 0.01165, "percentile": 0.82888, "modified": "2023-05-27"}, {"cve": "CVE-2021-2352", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2353", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2354", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2355", "epss": 0.00167, "percentile": 0.52131, "modified": "2023-05-27"}, {"cve": "CVE-2021-2356", "epss": 0.00135, "percentile": 0.47378, "modified": "2023-05-27"}, {"cve": "CVE-2021-2357", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2358", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2359", "epss": 0.00183, "percentile": 0.5425, "modified": "2023-05-27"}, {"cve": "CVE-2021-2360", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2361", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2362", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2363", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2364", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2365", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2366", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2367", "epss": 0.00081, "percentile": 0.33218, "modified": "2023-05-27"}, {"cve": "CVE-2021-2368", "epss": 0.00168, "percentile": 0.52189, "modified": "2023-05-27"}, {"cve": "CVE-2021-2369", "epss": 0.0007, "percentile": 0.28758, "modified": "2023-08-06"}, {"cve": "CVE-2021-2370", "epss": 0.00153, "percentile": 0.50254, "modified": "2023-05-27"}, {"cve": "CVE-2021-2371", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2372", "epss": 0.00171, "percentile": 0.52841, "modified": "2023-05-27"}, {"cve": "CVE-2021-2373", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2374", "epss": 0.00049, "percentile": 0.15387, "modified": "2023-05-27"}, {"cve": "CVE-2021-2375", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2376", "epss": 0.00129, "percentile": 0.46521, "modified": "2023-05-27"}, {"cve": "CVE-2021-2377", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2378", "epss": 0.00129, "percentile": 0.46521, "modified": "2023-05-27"}, {"cve": "CVE-2021-2380", "epss": 0.00073, "percentile": 0.29742, "modified": "2023-05-27"}, {"cve": "CVE-2021-2381", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2382", "epss": 0.07717, "percentile": 0.93206, "modified": "2023-05-27"}, {"cve": "CVE-2021-2383", "epss": 0.00153, "percentile": 0.50254, "modified": "2023-05-27"}, {"cve": "CVE-2021-23839", "epss": 0.00174, "percentile": 0.53114, "modified": "2023-05-27"}, {"cve": "CVE-2021-2384", "epss": 0.00153, "percentile": 0.50254, "modified": "2023-05-27"}, {"cve": "CVE-2021-23840", "epss": 0.00316, "percentile": 0.65984, "modified": "2023-05-27"}, {"cve": "CVE-2021-23841", "epss": 0.00299, "percentile": 0.64929, "modified": "2023-05-27"}, {"cve": "CVE-2021-2385", "epss": 0.00142, "percentile": 0.48676, "modified": "2023-05-27"}, {"cve": "CVE-2021-2386", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2387", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2388", "epss": 0.00098, "percentile": 0.39708, "modified": "2023-05-27"}, {"cve": "CVE-2021-2389", "epss": 0.11296, "percentile": 0.94326, "modified": "2023-05-27"}, {"cve": "CVE-2021-2390", "epss": 0.06851, "percentile": 0.92849, "modified": "2023-05-27"}, {"cve": "CVE-2021-2391", "epss": 0.04313, "percentile": 0.91055, "modified": "2023-05-27"}, {"cve": "CVE-2021-2392", "epss": 0.04313, "percentile": 0.91055, "modified": "2023-05-27"}, {"cve": "CVE-2021-2393", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2394", "epss": 0.07717, "percentile": 0.93206, "modified": "2023-05-27"}, {"cve": "CVE-2021-2395", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2396", "epss": 0.09533, "percentile": 0.93838, "modified": "2023-05-27"}, {"cve": "CVE-2021-2397", "epss": 0.07717, "percentile": 0.93206, "modified": "2023-05-27"}, {"cve": "CVE-2021-2398", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2399", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2400", "epss": 0.00286, "percentile": 0.64101, "modified": "2023-05-27"}, {"cve": "CVE-2021-2401", "epss": 0.01757, "percentile": 0.86138, "modified": "2023-05-27"}, {"cve": "CVE-2021-2402", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2403", "epss": 0.0014, "percentile": 0.48384, "modified": "2023-05-27"}, {"cve": "CVE-2021-2404", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2405", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2406", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2407", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2408", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2409", "epss": 0.00043, "percentile": 0.07824, "modified": "2023-05-27"}, {"cve": "CVE-2021-2410", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2411", "epss": 0.00071, "percentile": 0.2919, "modified": "2023-05-27"}, {"cve": "CVE-2021-2412", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-24122", "epss": 0.0016, "percentile": 0.51301, "modified": "2023-05-27"}, {"cve": "CVE-2021-2415", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2417", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2418", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2419", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2420", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2421", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2422", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2423", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2424", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2425", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2426", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2427", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2428", "epss": 0.00497, "percentile": 0.72836, "modified": "2023-05-27"}, {"cve": "CVE-2021-2429", "epss": 0.01258, "percentile": 0.83602, "modified": "2023-05-27"}, {"cve": "CVE-2021-2430", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2431", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2432", "epss": 0.00135, "percentile": 0.4763, "modified": "2023-05-27"}, {"cve": "CVE-2021-2433", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2434", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2435", "epss": 0.00167, "percentile": 0.52131, "modified": "2023-05-27"}, {"cve": "CVE-2021-2436", "epss": 0.00213, "percentile": 0.57858, "modified": "2023-05-27"}, {"cve": "CVE-2021-2437", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2438", "epss": 0.00053, "percentile": 0.18982, "modified": "2023-05-27"}, {"cve": "CVE-2021-2439", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2440", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2441", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2442", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2443", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2444", "epss": 0.00059, "percentile": 0.23147, "modified": "2023-05-27"}, {"cve": "CVE-2021-2445", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2446", "epss": 0.00351, "percentile": 0.67707, "modified": "2023-05-27"}, {"cve": "CVE-2021-2447", "epss": 0.00164, "percentile": 0.51716, "modified": "2023-05-27"}, {"cve": "CVE-2021-2448", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2449", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2450", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2451", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2452", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2453", "epss": 0.0008, "percentile": 0.32977, "modified": "2023-05-27"}, {"cve": "CVE-2021-2454", "epss": 0.00045, "percentile": 0.12399, "modified": "2023-05-27"}, {"cve": "CVE-2021-2455", "epss": 0.00063, "percentile": 0.24821, "modified": "2023-05-27"}, {"cve": "CVE-2021-2456", "epss": 0.04938, "percentile": 0.91579, "modified": "2023-05-27"}, {"cve": "CVE-2021-2457", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2458", "epss": 0.00073, "percentile": 0.29742, "modified": "2023-05-27"}, {"cve": "CVE-2021-2460", "epss": 0.00054, "percentile": 0.20549, "modified": "2023-05-27"}, {"cve": "CVE-2021-2462", "epss": 0.00077, "percentile": 0.31561, "modified": "2023-05-27"}, {"cve": "CVE-2021-2463", "epss": 0.00705, "percentile": 0.77544, "modified": "2023-05-27"}, {"cve": "CVE-2021-25122", "epss": 0.00335, "percentile": 0.66998, "modified": "2023-05-27"}, {"cve": "CVE-2021-25329", "epss": 0.00045, "percentile": 0.12518, "modified": "2023-05-27"}, {"cve": "CVE-2021-26117", "epss": 0.00163, "percentile": 0.51633, "modified": "2023-05-27"}, {"cve": "CVE-2021-26271", "epss": 0.0013, "percentile": 0.46643, "modified": "2023-05-27"}, {"cve": "CVE-2021-26272", "epss": 0.00144, "percentile": 0.49071, "modified": "2023-05-27"}, {"cve": "CVE-2021-27568", "epss": 0.00312, "percentile": 0.65686, "modified": "2023-05-27"}, {"cve": "CVE-2021-27807", "epss": 0.00069, "percentile": 0.28234, "modified": "2023-05-27"}, {"cve": "CVE-2021-27906", "epss": 0.00069, "percentile": 0.28234, "modified": "2023-05-27"}, {"cve": "CVE-2021-28041", "epss": 0.00167, "percentile": 0.52052, "modified": "2023-05-27"}, {"cve": "CVE-2021-29921", "epss": 0.00609, "percentile": 0.75541, "modified": "2023-05-27"}, {"cve": "CVE-2021-30640", "epss": 0.00205, "percentile": 0.57056, "modified": "2023-05-27"}, {"cve": "CVE-2021-3156", "epss": 0.94196, "percentile": 0.98741, "modified": "2023-05-27"}, {"cve": "CVE-2021-3177", "epss": 0.01985, "percentile": 0.87106, "modified": "2023-05-31"}, {"cve": "CVE-2021-31811", "epss": 0.00074, "percentile": 0.30256, "modified": "2023-05-27"}, {"cve": "CVE-2021-33037", "epss": 0.93907, "percentile": 0.98699, "modified": "2023-05-27"}, {"cve": "CVE-2021-3345", "epss": 0.00054, "percentile": 0.19752, "modified": "2023-05-23"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64564, "modified": "2023-05-23"}, {"cve": "CVE-2021-3450", "epss": 0.00192, "percentile": 0.5586, "modified": "2023-08-06"}, {"cve": "CVE-2021-3520", "epss": 0.00122, "percentile": 0.45178, "modified": "2023-05-23"}, {"cve": "CVE-2021-3560", "epss": 0.01177, "percentile": 0.83044, "modified": "2023-06-19"}], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 6.0}, "href": "https://www.oracle.com/security-alerts/cpujul2021.html", "reporter": "Oracle", "references": [], "cvelist": ["CVE-2012-0881", "CVE-2015-0254", "CVE-2016-0762", "CVE-2016-4429", "CVE-2017-14735", "CVE-2017-16931", "CVE-2017-3735", "CVE-2017-5461", "CVE-2017-5637", "CVE-2017-7656", "CVE-2017-7657", "CVE-2017-7658", "CVE-2017-9735", "CVE-2018-0737", "CVE-2018-0739", "CVE-2018-15686", "CVE-2018-21010", "CVE-2018-7160", "CVE-2018-7183", "CVE-2019-0190", "CVE-2019-0201", "CVE-2019-0205", "CVE-2019-0210", "CVE-2019-0219", "CVE-2019-0228", "CVE-2019-10086", "CVE-2019-10173", "CVE-2019-10746", "CVE-2019-11358", "CVE-2019-12260", "CVE-2019-12399", "CVE-2019-12402", "CVE-2019-12415", "CVE-2019-12973", "CVE-2019-13990", "CVE-2019-15604", "CVE-2019-15605", "CVE-2019-15606", "CVE-2019-16942", "CVE-2019-16943", "CVE-2019-17195", "CVE-2019-17531", "CVE-2019-17543", "CVE-2019-17545", "CVE-2019-17566", "CVE-2019-20330", "CVE-2019-2725", "CVE-2019-2729", "CVE-2019-2897", "CVE-2019-3738", "CVE-2019-3739", "CVE-2019-3740", "CVE-2019-5063", "CVE-2019-5064", "CVE-2020-10543", "CVE-2020-10683", "CVE-2020-10878", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11612", "CVE-2020-11868", "CVE-2020-11973", "CVE-2020-11979", "CVE-2020-11987", "CVE-2020-11988", "CVE-2020-11998", "CVE-2020-12723", "CVE-2020-13934", "CVE-2020-13935", "CVE-2020-13949", "CVE-2020-13956", "CVE-2020-14060", "CVE-2020-14061", "CVE-2020-14062", "CVE-2020-14195", "CVE-2020-14756", "CVE-2020-15389", "CVE-2020-17521", "CVE-2020-17527", "CVE-2020-17530", "CVE-2020-1941", "CVE-2020-1945", "CVE-2020-1967", "CVE-2020-1968", "CVE-2020-1971", "CVE-2020-24553", "CVE-2020-24616", "CVE-2020-24750", "CVE-2020-2555", "CVE-2020-25638", "CVE-2020-25648", "CVE-2020-25649", "CVE-2020-2604", "CVE-2020-26217", "CVE-2020-26870", "CVE-2020-27193", "CVE-2020-27216", "CVE-2020-27218", "CVE-2020-27783", "CVE-2020-27814", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28052", "CVE-2020-28196", "CVE-2020-28928", "CVE-2020-29582", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5258", "CVE-2020-5397", "CVE-2020-5398", "CVE-2020-5413", "CVE-2020-5421", "CVE-2020-7016", "CVE-2020-7017", "CVE-2020-7712", "CVE-2020-7733", "CVE-2020-7760", "CVE-2020-8174", "CVE-2020-8203", "CVE-2020-8277", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8554", "CVE-2020-8908", "CVE-2020-9484", "CVE-2020-9489", "CVE-2021-20190", "CVE-2021-20227", "CVE-2021-21275", "CVE-2021-21290", "CVE-2021-21341", "CVE-2021-21342", "CVE-2021-21343", "CVE-2021-21344", "CVE-2021-21345", "CVE-2021-21346", "CVE-2021-21347", "CVE-2021-21348", "CVE-2021-21349", "CVE-2021-21350", "CVE-2021-21351", "CVE-2021-21409", "CVE-2021-22112", "CVE-2021-22118", "CVE-2021-2244", "CVE-2021-22876", "CVE-2021-22883", "CVE-2021-22884", "CVE-2021-22890", "CVE-2021-22897", "CVE-2021-22898", "CVE-2021-22901", "CVE-2021-2323", "CVE-2021-2324", "CVE-2021-2326", "CVE-2021-2328", "CVE-2021-2329", "CVE-2021-2330", "CVE-2021-2333", "CVE-2021-23336", "CVE-2021-2334", "CVE-2021-2335", "CVE-2021-2336", "CVE-2021-2337", "CVE-2021-2338", "CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2341", "CVE-2021-2342", "CVE-2021-2343", "CVE-2021-2344", "CVE-2021-2345", "CVE-2021-2346", "CVE-2021-2347", "CVE-2021-2348", "CVE-2021-2349", "CVE-2021-2350", "CVE-2021-2351", "CVE-2021-2352", "CVE-2021-2353", "CVE-2021-2354", "CVE-2021-2355", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2358", "CVE-2021-2359", "CVE-2021-2360", "CVE-2021-2361", "CVE-2021-2362", "CVE-2021-2363", "CVE-2021-2364", "CVE-2021-2365", "CVE-2021-2366", "CVE-2021-2367", "CVE-2021-2368", "CVE-2021-2369", "CVE-2021-2370", "CVE-2021-2371", "CVE-2021-2372", "CVE-2021-2373", "CVE-2021-2374", "CVE-2021-2375", "CVE-2021-2376", "CVE-2021-2377", "CVE-2021-2378", "CVE-2021-2380", "CVE-2021-2381", "CVE-2021-2382", "CVE-2021-2383", "CVE-2021-23839", "CVE-2021-2384", "CVE-2021-23840", "CVE-2021-23841", "CVE-2021-2385", "CVE-2021-2386", "CVE-2021-2387", "CVE-2021-2388", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2391", "CVE-2021-2392", "CVE-2021-2393", "CVE-2021-2394", "CVE-2021-2395", "CVE-2021-2396", "CVE-2021-2397", "CVE-2021-2398", "CVE-2021-2399", "CVE-2021-2400", "CVE-2021-2401", "CVE-2021-2402", "CVE-2021-2403", "CVE-2021-2404", "CVE-2021-2405", "CVE-2021-2406", "CVE-2021-2407", "CVE-2021-2408", "CVE-2021-2409", "CVE-2021-2410", "CVE-2021-2411", "CVE-2021-2412", "CVE-2021-24122", "CVE-2021-2415", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2419", "CVE-2021-2420", "CVE-2021-2421", "CVE-2021-2422", "CVE-2021-2423", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2428", "CVE-2021-2429", "CVE-2021-2430", "CVE-2021-2431", "CVE-2021-2432", "CVE-2021-2433", "CVE-2021-2434", "CVE-2021-2435", "CVE-2021-2436", "CVE-2021-2437", "CVE-2021-2438", "CVE-2021-2439", "CVE-2021-2440", "CVE-2021-2441", "CVE-2021-2442", "CVE-2021-2443", "CVE-2021-2444", "CVE-2021-2445", "CVE-2021-2446", "CVE-2021-2447", "CVE-2021-2448", "CVE-2021-2449", "CVE-2021-2450", "CVE-2021-2451", "CVE-2021-2452", "CVE-2021-2453", "CVE-2021-2454", "CVE-2021-2455", "CVE-2021-2456", "CVE-2021-2457", "CVE-2021-2458", "CVE-2021-2460", "CVE-2021-2462", "CVE-2021-2463", "CVE-2021-25122", "CVE-2021-25329", "CVE-2021-26117", "CVE-2021-26271", "CVE-2021-26272", "CVE-2021-27568", "CVE-2021-27807", "CVE-2021-27906", "CVE-2021-28041", "CVE-2021-29921", "CVE-2021-30369", "CVE-2021-30640", "CVE-2021-3156", "CVE-2021-3177", "CVE-2021-31811", "CVE-2021-33037", "CVE-2021-3345", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3520", "CVE-2021-3560"], "immutableFields": [], "lastseen": "2023-09-21T02:56:24", "viewCount": 715, "enchantments": {"dependencies": {"references": [{"type": "0daydb", "idList": ["0DAYDB:7673EE0281A214ED87D52BA25B8C65BA", "0DAYDB:AF426AEE507511B61499B493AB5C0D11", "0DAYDB:C05243B3F6EF6FD2D281FAA1565DB0D6"]}, {"type": "adobe", "idList": ["APSB19-38"]}, {"type": "aix", "idList": ["JAVA_FEB2022_ADVISORY.ASC", "JAVA_JAN2020_ADVISORY.ASC", "JAVA_SEP2021_ADVISORY.ASC", "NTP_ADVISORY10.ASC", "NTP_ADVISORY13.ASC", "OPENSSL_ADVISORY24.ASC", "OPENSSL_ADVISORY26.ASC", "OPENSSL_ADVISORY27.ASC", "OPENSSL_ADVISORY32.ASC", "OPENSSL_ADVISORY33.ASC", "PERL_ADVISORY5.ASC"]}, {"type": "almalinux", "idList": ["ALSA-2020:0579", "ALSA-2020:0598", "ALSA-2020:1644", "ALSA-2020:2848", "ALSA-2020:2852", "ALSA-2020:4670", "ALSA-2020:4847", "ALSA-2020:5476", "ALSA-2020:5493", "ALSA-2020:5499", "ALSA-2021:0218", "ALSA-2021:0549", "ALSA-2021:0551", "ALSA-2021:0557", "ALSA-2021:0734", "ALSA-2021:0735", "ALSA-2021:0744", "ALSA-2021:1024", "ALSA-2021:1593", "ALSA-2021:1610", "ALSA-2021:1633", "ALSA-2021:1678", "ALSA-2021:1761", "ALSA-2021:1846", "ALSA-2021:1879", "ALSA-2021:2238", "ALSA-2021:2575", "ALSA-2021:2776", "ALSA-2021:2781", "ALSA-2021:3572", "ALSA-2021:3590", "ALSA-2021:4142", "ALSA-2021:4151", "ALSA-2021:4160", "ALSA-2021:4162", "ALSA-2021:4198", "ALSA-2021:4251", "ALSA-2021:4424", "ALSA-2021:4511", "ALSA-2022:1556", "ALSA-2022:1557", "ALSA-2022:1860", "ALSA-2022:1861"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2017-16931", "ALPINE:CVE-2017-3735", "ALPINE:CVE-2017-5461", "ALPINE:CVE-2018-0737", "ALPINE:CVE-2018-0739", "ALPINE:CVE-2018-21010", "ALPINE:CVE-2018-7160", "ALPINE:CVE-2019-0190", "ALPINE:CVE-2019-11358", "ALPINE:CVE-2019-12973", "ALPINE:CVE-2019-15604", "ALPINE:CVE-2019-15605", "ALPINE:CVE-2019-15606", "ALPINE:CVE-2019-17543", "ALPINE:CVE-2020-10543", "ALPINE:CVE-2020-10878", "ALPINE:CVE-2020-11022", "ALPINE:CVE-2020-11023", "ALPINE:CVE-2020-11979", "ALPINE:CVE-2020-12723", "ALPINE:CVE-2020-13949", "ALPINE:CVE-2020-15389", "ALPINE:CVE-2020-1945", "ALPINE:CVE-2020-1967", "ALPINE:CVE-2020-1971", "ALPINE:CVE-2020-24553", "ALPINE:CVE-2020-25648", "ALPINE:CVE-2020-2604", "ALPINE:CVE-2020-27783", "ALPINE:CVE-2020-27814", "ALPINE:CVE-2020-27844", "ALPINE:CVE-2020-28196", "ALPINE:CVE-2020-28928", "ALPINE:CVE-2020-8174", "ALPINE:CVE-2020-8277", "ALPINE:CVE-2020-8284", "ALPINE:CVE-2020-8285", "ALPINE:CVE-2020-8286", "ALPINE:CVE-2020-8554", "ALPINE:CVE-2021-20227", "ALPINE:CVE-2021-22876", "ALPINE:CVE-2021-22883", "ALPINE:CVE-2021-22884", "ALPINE:CVE-2021-22890", "ALPINE:CVE-2021-22897", "ALPINE:CVE-2021-22898", "ALPINE:CVE-2021-22901", "ALPINE:CVE-2021-23336", "ALPINE:CVE-2021-2341", "ALPINE:CVE-2021-2369", "ALPINE:CVE-2021-2372", "ALPINE:CVE-2021-23839", "ALPINE:CVE-2021-23840", "ALPINE:CVE-2021-23841", "ALPINE:CVE-2021-2388", "ALPINE:CVE-2021-2389", "ALPINE:CVE-2021-2432", "ALPINE:CVE-2021-28041", "ALPINE:CVE-2021-29921", "ALPINE:CVE-2021-3156", "ALPINE:CVE-2021-3177", "ALPINE:CVE-2021-3449", "ALPINE:CVE-2021-3450", "ALPINE:CVE-2021-3520", "ALPINE:CVE-2021-3560"]}, {"type": "altlinux", "idList": ["0666BB8481B59C8FF60D851348A7369C", "19D9D4CF9E621238B64E7009C574A2B2", "1E1894CCC7195BF40E6FE3F3E3556D61", "20E4799578C8B6D235C1302B8C9545CB", "29D4C5F20DB0E4617B1920DAE92BDBB9", "2B7F66B7EDFFFB603CAF2759F37F687C", "2D2EA5319FAC96ACD8F8A32B0BE9BBF5", "3C9931BBB629F08341BED24F1E7EF91D", "43FC5C59347F790C2A18D6709398549E", "51F7325D48ECB8B79553E6BE38B000B4", "53E51B80DE41BF755177393C83AFB2A6", "544851A681AF60F27FCB3D95133B59EE", "609E2F64A6553F3DAF121482357648AF", "61DFA798756D99B65F1D96CC4A334918", "67DB13054420D2049658A6FD91B57020", "69FCC7D3741E27576F8891899E5C3887", "7304FA6A92BBC9DC45DFC1846E5141EC", "7386C69A4A551C491C79DF433DF0C82F", "7AD4DF30046D3CE85DA1DA87CB55B438", "7ED13B0CE1AD3A3422B37EA0518E72AF", "844CFEA54D7AB080B526EAEA183794EA", "84E182F815D8B2BF9E0EC8289197A69D", "8907B92479FC3D90FF62A4920C4D6940", "8FE218324E5B4E872D02C220B1A59D5A", "9010C82E1F47A1ADFFAA739AF4943069", "9B8FBA6662B95E41A8BCCB5F346C028E", "A075EE4F94FB22A5FFB0548A74632DD9", "A8010CB05EEA6E8B728C75063CB3AFD9", "B0DA0CE217A75449EFDF514507A4B5A7", "B3637B4143317F3EF89506F8A87A1616", "BB4D1799FBE24740129C13FC888EEA13", "C259351860BCFBD26787D316DF3231D2", "C915BFBEBD631A1584760587E7896E2C", "CC09CEC2CAA41D552A6878897862D9FF", "CD0B4E9387FD2F4B8783E6AB53BB5A26", "D65FC29364E1C777293EC3010F155721", "DFB3531007B1DED7ABA1D6D9F40A6504", "DFBA4EF54C79890FFE224A6EF14372C8", "E9F0CE39E5832D21CEED86C00BC5027E", "EA9DB8CE40B75F621DF8E06F1127D0E8", "ED500CC3CFDD8B8F102D05C7A7E5CBF7", "EF98134BF35516822BE2F1B57E3DC142", "F60761B898DC69A381B52FE1247B1814", "FB997A95475F3587DB1521DCA42F2E08", "FBC7F2CADB9237FF732BB459B020F421", "FE7D96613C2B0DC69E473C69FB37B5A9", "FFCD9E207A1C842797CF9F17E8B46010"]}, {"type": "amazon", "idList": ["ALAS-2015-595", "ALAS-2016-764", "ALAS-2017-825", "ALAS-2018-1000", "ALAS-2018-1009", "ALAS-2018-1065", "ALAS-2018-1069", "ALAS-2018-1070", "ALAS-2018-1102", "ALAS-2019-1166", "ALAS-2020-1345", "ALAS-2020-1354", "ALAS-2020-1359", "ALAS-2020-1389", "ALAS-2020-1390", "ALAS-2020-1409", "ALAS-2020-1445", "ALAS-2020-1456", "ALAS-2020-1473", "ALAS-2021-1473", "ALAS-2021-1478", "ALAS-2021-1482", "ALAS-2021-1484", "ALAS-2021-1491", "ALAS-2021-1493", "ALAS-2021-1498", "ALAS-2021-1500", "ALAS-2021-1504", "ALAS-2021-1509", "ALAS-2021-1518", "ALAS-2021-1528", "ALAS-2021-1534", "ALAS-2021-1535", "ALAS-2021-1544", "ALAS-2021-1612", "ALAS-2022-1572", "ALAS-2022-1593", "ALAS-2023-1695", "ALAS-2023-1709", "ALAS-2023-1743", "ALAS2-2018-1004", "ALAS2-2018-1009", "ALAS2-2018-1102", "ALAS2-2019-1301", "ALAS2-2020-1387", "ALAS2-2020-1395", "ALAS2-2020-1396", "ALAS2-2020-1403", "ALAS2-2020-1417", "ALAS2-2020-1449", "ALAS2-2020-1455", "ALAS2-2020-1519", "ALAS2-2020-1554", "ALAS2-2020-1573", "ALAS2-2021-1590", "ALAS2-2021-1593", "ALAS2-2021-1608", "ALAS2-2021-1610", "ALAS2-2021-1611", "ALAS2-2021-1612", "ALAS2-2021-1622", "ALAS2-2021-1626", "ALAS2-2021-1640", "ALAS2-2021-1643", "ALAS2-2021-1645", "ALAS2-2021-1647", "ALAS2-2021-1653", "ALAS2-2021-1664", "ALAS2-2021-1666", "ALAS2-2021-1692", "ALAS2-2021-1693", "ALAS2-2021-1695", "ALAS2-2021-1700", "ALAS2-2022-1741", "ALAS2-2022-1802", "ALAS2-2022-1845", "ALAS2-2023-1905", "ALAS2-2023-1946", "ALAS2-2023-1966", "ALAS2-2023-2030", "ALAS2-2023-2047"]}, {"type": "android", "idList": ["ANDROID:CVE-2016-4429"]}, {"type": "androidsecurity", "idList": ["ANDROID:2017-12-01"]}, {"type": "apple", "idList": ["APPLE:2A32C0762786DF36357D645066CDC600", "APPLE:3D7765FAAA5588336144E1B60D0B775E", "APPLE:8592A5882F33472850FF959BB2667129", "APPLE:87ECB5906FD123665AEE056A2BC685F6", "APPLE:B08BBADEFC88806E12CB234F1EB6C4C6", "APPLE:B7AA5B9368DE4BD135A602B017EB0259", "APPLE:BEC13883FC65A6FD008F312DB93C0A36", "APPLE:CABE34499864F4FA47751E5A9FCC58AC", "APPLE:F7DADB3E958148A6B63512580383CEA2", "APPLE:HT208331", "APPLE:HT212177"]}, {"type": "archlinux", "idList": ["ASA-201606-16", "ASA-201606-17", "ASA-201704-4", "ASA-201704-6", "ASA-201705-21", "ASA-201711-14", "ASA-201711-15", "ASA-201712-11", "ASA-201712-9", "ASA-201803-11", "ASA-201804-2", "ASA-201811-11", "ASA-201901-14", "ASA-201906-2", "ASA-202004-18", "ASA-202004-19", "ASA-202005-15", "ASA-202006-5", "ASA-202006-6", "ASA-202006-7", "ASA-202009-3", "ASA-202011-18", "ASA-202011-29", "ASA-202012-1", "ASA-202012-21", "ASA-202012-24", "ASA-202012-3", "ASA-202012-4", "ASA-202012-5", "ASA-202101-25", "ASA-202101-45", "ASA-202102-28", "ASA-202102-37", "ASA-202102-42", "ASA-202102-43", "ASA-202103-10", "ASA-202103-14", "ASA-202103-19", "ASA-202103-27", "ASA-202103-6", "ASA-202105-27", "ASA-202106-24", "ASA-202106-4", "ASA-202106-5", "ASA-202106-6", "ASA-202106-7", "ASA-202106-8", "ASA-202106-9", "ASA-202107-52", "ASA-202107-53", "ASA-202107-54", "ASA-202107-59", "ASA-202107-60", "ASA-202107-61", "ASA-202107-62", "ASA-202107-63", "ASA-202107-64", "ASA-202107-65", "ASA-202107-66"]}, {"type": "atlassian", "idList": ["ATLASSIAN:BSERV-11753", "ATLASSIAN:BSERV-12196", "ATLASSIAN:CONFSERVER-60004", "ATLASSIAN:CONFSERVER-62837", "ATLASSIAN:CRUC-8408", "ATLASSIAN:CRUC-8410", "ATLASSIAN:CWD-5683", "ATLASSIAN:CWD-5688", "ATLASSIAN:FE-7196", "ATLASSIAN:FE-7202", "ATLASSIAN:FE-7344", "ATLASSIAN:FE-7345", "ATLASSIAN:FE-7346", "ATLASSIAN:JRASERVER-69725", "ATLASSIAN:JRASERVER-70929", "ATLASSIAN:JRASERVER-70971", "ATLASSIAN:JRASERVER-71221", "ATLASSIAN:JRASERVER-71321", "ATLASSIAN:JRASERVER-72052", "ATLASSIAN:JRASERVER-72211", "ATLASSIAN:JRASERVER-72310", "ATLASSIAN:JRASERVER-72346", "ATLASSIAN:JRASERVER-72609", "ATLASSIAN:JRASERVER-72880", "BAM-21603", "BSERV-11753", "BSERV-12196", "BSERV-13449", "CONFSERVER-60004", "CONFSERVER-62837", "CRUC-8408", "CRUC-8410", "CWD-5683", "CWD-5688", "CWD-5787", "FE-7196", "FE-7202", "FE-7344", "FE-7345", "FE-7346", "JRASERVER-69725", "JRASERVER-70971", "JRASERVER-70993", "JRASERVER-71221", "JRASERVER-71321", "JRASERVER-72052", "JRASERVER-72211", "JRASERVER-72310", "JRASERVER-72346", "JRASERVER-72609", "JRASERVER-72880", "JRASERVER-73171", "JRASERVER-73223", "JRASERVER-73739"]}, {"type": "attackerkb", "idList": ["AKB:10791C9D-4C05-4C36-8F8D-BAA2EE6DC9B7", "AKB:22C3A43F-3CEE-464A-9C77-FEE26DBE757A", "AKB:255908B4-BA2B-4575-84E5-63690A0110AE", "AKB:2941EA77-EC87-4EFE-8B5C-AD997AEB5502", "AKB:38F76C83-56D0-4112-A583-4513CC15B1B3", "AKB:4FB5980F-4609-4797-AA8F-8D2A84DE18A5", "AKB:5C46E63B-643E-4656-B654-4FBA061ECF66", "AKB:67AA97AC-E920-4D0C-9B50-6B1C42E683D1", "AKB:7651D6FA-BDFA-4A6E-81F2-E5CF545CD088", "AKB:93D7F9FF-1F51-45C7-8172-B3E45415E966", "AKB:98773293-D092-495A-AD61-3E5439225950", "AKB:9B4E2AEC-697D-42F0-9FED-B010FB1F82ED", "AKB:A4BDBFB9-4493-4EF5-8C05-276721F6549F", "AKB:CB02764B-566F-4540-ACA2-C9DDEE8D1496", "AKB:CF76EF1F-CB59-4A29-ADB1-DA37C695142B"]}, {"type": "avleonov", "idList": ["AVLEONOV:101A90D5F21CD7ACE01781C2913D1B6D", "AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987", "AVLEONOV:8378A14587C08A1636BEE66608020687"]}, {"type": "broadcom", "idList": ["BSA-2022-1839", "BSNSA22242", "BSNSA22347", "BSNSA22458"]}, {"type": "centos", "idList": ["CESA-2015:1695", "CESA-2017:1100", "CESA-2017:2247", "CESA-2018:3090", "CESA-2018:3221", "CESA-2019:2091", "CESA-2020:0122", "CESA-2020:0157", "CESA-2020:0194", "CESA-2020:0196", "CESA-2020:0541", "CESA-2020:0632", "CESA-2020:0703", "CESA-2020:2530", "CESA-2020:2663", "CESA-2020:3936", "CESA-2020:4004", "CESA-2020:5566", "CESA-2021:0162", "CESA-2021:0221", "CESA-2021:0343", "CESA-2021:1354", "CESA-2021:2784", "CESA-2021:2845", "CESA-2021:3798", "CESA-2022:5235"]}, {"type": "cert", "idList": ["VU:794544"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2017-0740", "CPAI-2019-0038", "CPAI-2019-0268", "CPAI-2019-0546", "CPAI-2019-0561", "CPAI-2019-0786", "CPAI-2019-1870", "CPAI-2020-0179", "CPAI-2020-0407", "CPAI-2020-0416", "CPAI-2020-1183", "CPAI-2020-1284", "CPAI-2020-1285", "CPAI-2020-1331", "CPAI-2020-1346", "CPAI-2020-3205", "CPAI-2020-3297", "CPAI-2020-3581", "CPAI-2021-0533", "CPAI-2021-1329"]}, {"type": "checkpoint_security", "idList": ["CPS:SK171751", "CPS:SK172983"]}, {"type": "chrome", "idList": ["GCSA-3803715665928870837"]}, {"type": "cisa", "idList": ["CISA:458CA29A7DFCD2DEAB1DE7A9587A5EE6", "CISA:6D325600F427E8426F81E5829305E20F", "CISA:727AB64FBBEAE210BE92EA5DFD66647C", "CISA:765265E5BF9328E9BAF09F93A1684580", "CISA:7E752ED3C4545FF8F72629B02D303E84", "CISA:99DAB57F9B8063F8619B1A418B014DF1", "CISA:C17258C519A149D638B0BCF35898ABEE", "CISA:C9947C1FC01968B9804A8F58DCC22154", "CISA:D18A1F7A4028BFC8CA059218F16ECBFD"]}, {"type": "cisa_kev", "idList": ["CISA-KEV-CVE-2019-2725", "CISA-KEV-CVE-2020-17530", "CISA-KEV-CVE-2020-2555", "CISA-KEV-CVE-2021-3156", "CISA-KEV-CVE-2021-3560"]}, {"type": "cisco", "idList": ["CISCO-SA-OPENSSL-2021-GHY28DJD", "CISCO-SA-SUDO-PRIVESC-JAN2021-QNYQFCM"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:1533C58179E68B612C25829F82E72D7A", "CFOUNDRY:177BD11FEDF3F89426E99286BC7DC46B", "CFOUNDRY:21B35C0D976E5B0E31872BF9E79110BB", "CFOUNDRY:25D4348A5078BC5D2BCF243A2AC614E0", "CFOUNDRY:30A00C196E388762A2434A745BE1363E", "CFOUNDRY:347F3F22DB54950A90415A97C351F3D1", "CFOUNDRY:395B2EFFF922C38DE193A0DDFFA06D6E", "CFOUNDRY:431A5FEB07A8E937BEDFD31D7F1BE817", "CFOUNDRY:5EA35272975027EBFB62DFE2535B7B4B", "CFOUNDRY:64D4C15163392A9C4210B029935460D1", "CFOUNDRY:6AAA637C3916EA2A44D93B95BEA9728B", "CFOUNDRY:78350CC978808A6C42CDCB2451BF30F4", "CFOUNDRY:89587F3ED65C323B89E14DDACE9BA27F", "CFOUNDRY:9243E8457D02CBA7A3505CB1E0E03739", "CFOUNDRY:A516F32ABFB2AE83A8782E47D67A09A0", "CFOUNDRY:B1BFB1BD3BA9A90D6CA66F05AB2DCBAE", "CFOUNDRY:B6C923F29B1B64BF5EF7657B86EC5A6A", "CFOUNDRY:BCFE0333C3F2E89FFDF11615D117C9AF", "CFOUNDRY:BDB6F8275A06CC11A9EB2C43CBB82E42", "CFOUNDRY:CF99469AEE85FAA4A2723DEF330B8E4B", "CFOUNDRY:D09A12445CD6214C067F9255280BC24D", "CFOUNDRY:D1800B931E71999DC3B721FFDBB42636", "CFOUNDRY:DBBC716FD85510861511BDE10DD24963", "CFOUNDRY:DC7BE5C08671B54CC5F39351987D8CA3", "CFOUNDRY:DC88CEA06ECA856893E7D089D36ADB07", "CFOUNDRY:DE67AB97C8D098F880FF74AA583C70A4", "CFOUNDRY:E2EC45D69AA3550DE981BAC4E63015D3", "CFOUNDRY:E3CB99856FEF50D3858ADDE2DA7543D5"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1608724009", "CLSA-2020:1608724134", "CLSA-2021:1611743864", "CLSA-2021:1614885634", "CLSA-2021:1617285762", "CLSA-2021:1632261785", "CLSA-2021:1632261872", "CLSA-2021:1632262184", "CLSA-2021:1632262317", "CLSA-2021:1632328234", "CLSA-2021:1632328264", "CLSA-2021:1633018356", "CLSA-2021:1633442934", "CLSA-2022:1657561005", "CLSA-2022:1661176564"]}, {"type": "cnvd", "idList": ["CNVD-2021-54025", "CNVD-2021-54026", "CNVD-2021-54027", "CNVD-2021-54368", "CNVD-2021-54369", "CNVD-2021-54370", "CNVD-2021-54371", "CNVD-2021-54372", "CNVD-2021-54373", "CNVD-2021-54374", "CNVD-2021-54375", "CNVD-2021-54376", "CNVD-2021-54377", "CNVD-2021-54378", "CNVD-2021-54379", "CNVD-2021-54386", "CNVD-2021-54387", "CNVD-2021-54388", "CNVD-2021-54389", "CNVD-2021-54390", "CNVD-2021-54391", "CNVD-2021-54392", "CNVD-2021-54399", "CNVD-2021-54672", "CNVD-2021-54673", "CNVD-2021-54674", "CNVD-2021-54675", "CNVD-2021-54676", "CNVD-2021-54677", "CNVD-2021-54678", "CNVD-2021-54679", "CNVD-2021-54680", "CNVD-2021-54681", "CNVD-2021-54682", "CNVD-2021-54683", "CNVD-2021-54685", "CNVD-2021-54686", "CNVD-2021-54687", "CNVD-2021-54688", "CNVD-2021-54689", "CNVD-2021-54690", "CNVD-2021-54691", "CNVD-2021-54692", "CNVD-2021-54693", "CNVD-2021-54711", "CNVD-2021-54712", "CNVD-2021-54713", "CNVD-2021-54714", "CNVD-2021-54715", "CNVD-2021-54716", "CNVD-2021-54717", "CNVD-2021-54718", "CNVD-2021-54719", "CNVD-2021-54721", "CNVD-2021-54722", "CNVD-2021-54723", "CNVD-2021-54724", "CNVD-2021-54725", "CNVD-2021-54726", "CNVD-2021-54727", "CNVD-2021-54728", "CNVD-2021-54729", "CNVD-2021-54730", "CNVD-2021-54731", "CNVD-2021-54732", "CNVD-2021-54733", "CNVD-2021-54734", "CNVD-2021-54736", "CNVD-2021-54737", "CNVD-2021-54738", "CNVD-2021-56430", "CNVD-2021-56432", "CNVD-2021-56433", "CNVD-2021-56434", "CNVD-2021-56435", "CNVD-2021-56436", "CNVD-2021-56437", "CNVD-2021-56438", "CNVD-2021-56439", "CNVD-2021-56440", "CNVD-2021-56441", "CNVD-2021-57180", "CNVD-2021-57181", "CNVD-2021-57439", "CNVD-2021-57440", "CNVD-2021-57441", "CNVD-2021-57442", "CNVD-2021-57443", "CNVD-2021-57444", "CNVD-2021-57445", "CNVD-2021-57446", "CNVD-2021-57454", "CNVD-2021-57455", "CNVD-2021-59237", "CNVD-2021-59238", "CNVD-2021-59239", "CNVD-2021-59240", "CNVD-2021-59241", "CNVD-2022-06519", "CNVD-2022-06520", "CNVD-2022-06521", "CNVD-2022-09807", "CNVD-2022-09808", "CNVD-2022-09809", "CNVD-2022-09810", "CNVD-2022-71401", "CNVD-2023-07750"]}, {"type": "cve", "idList": ["CVE-2012-0881", "CVE-2015-0254", "CVE-2016-0762", "CVE-2016-4429", "CVE-2017-14735", "CVE-2017-16931", "CVE-2017-3735", "CVE-2017-5461", "CVE-2017-5637", "CVE-2017-7656", "CVE-2017-7657", "CVE-2017-7658", "CVE-2017-9735", "CVE-2018-0737", "CVE-2018-0739", "CVE-2018-15686", "CVE-2018-21010", "CVE-2018-7160", "CVE-2018-7183", "CVE-2019-0190", "CVE-2019-0201", "CVE-2019-0205", "CVE-2019-0210", "CVE-2019-0219", "CVE-2019-0228", "CVE-2019-10086", "CVE-2019-10173", "CVE-2019-10746", "CVE-2019-11358", "CVE-2019-12260", "CVE-2019-12399", "CVE-2019-12402", "CVE-2019-12415", "CVE-2019-12973", "CVE-2019-13990", "CVE-2019-15604", "CVE-2019-15605", "CVE-2019-15606", "CVE-2019-16942", "CVE-2019-16943", "CVE-2019-17195", "CVE-2019-17531", "CVE-2019-17543", "CVE-2019-17545", "CVE-2019-17566", "CVE-2019-20330", "CVE-2019-2725", "CVE-2019-2729", "CVE-2019-2897", "CVE-2019-3738", "CVE-2019-3739", "CVE-2019-3740", "CVE-2019-5063", "CVE-2019-5064", "CVE-2019-5428", "CVE-2020-10543", "CVE-2020-10683", "CVE-2020-10707", "CVE-2020-10878", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11612", "CVE-2020-11868", "CVE-2020-11973", "CVE-2020-11979", "CVE-2020-11987", "CVE-2020-11988", "CVE-2020-11998", "CVE-2020-12723", "CVE-2020-13934", "CVE-2020-13935", "CVE-2020-13949", "CVE-2020-13956", "CVE-2020-14060", "CVE-2020-14061", "CVE-2020-14062", "CVE-2020-14195", "CVE-2020-14384", "CVE-2020-14756", "CVE-2020-15389", "CVE-2020-17521", "CVE-2020-17527", "CVE-2020-17530", "CVE-2020-1941", "CVE-2020-1945", "CVE-2020-1967", "CVE-2020-1968", "CVE-2020-1971", "CVE-2020-24553", "CVE-2020-24616", "CVE-2020-24750", "CVE-2020-2555", "CVE-2020-25638", "CVE-2020-25648", "CVE-2020-25649", "CVE-2020-2604", "CVE-2020-26217", "CVE-2020-26870", "CVE-2020-27176", "CVE-2020-27193", "CVE-2020-27216", "CVE-2020-27218", "CVE-2020-27783", "CVE-2020-27814", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28052", "CVE-2020-28196", "CVE-2020-28476", "CVE-2020-28928", "CVE-2020-29582", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5258", "CVE-2020-5397", "CVE-2020-5398", "CVE-2020-5413", "CVE-2020-5421", "CVE-2020-7016", "CVE-2020-7017", "CVE-2020-7712", "CVE-2020-7733", "CVE-2020-7760", "CVE-2020-8174", "CVE-2020-8203", "CVE-2020-8277", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8554", "CVE-2020-8908", "CVE-2020-9484", "CVE-2020-9489", "CVE-2021-20190", "CVE-2021-20227", "CVE-2021-21275", "CVE-2021-21290", "CVE-2021-21341", "CVE-2021-21342", "CVE-2021-21343", "CVE-2021-21344", "CVE-2021-21345", "CVE-2021-21346", "CVE-2021-21347", "CVE-2021-21348", "CVE-2021-21349", "CVE-2021-21350", "CVE-2021-21351", "CVE-2021-21409", "CVE-2021-22112", "CVE-2021-22118", "CVE-2021-2244", "CVE-2021-22876", "CVE-2021-22883", "CVE-2021-22884", "CVE-2021-22890", "CVE-2021-22897", "CVE-2021-22898", "CVE-2021-22901", "CVE-2021-2323", "CVE-2021-2324", "CVE-2021-2326", "CVE-2021-2328", "CVE-2021-2329", "CVE-2021-2330", "CVE-2021-2333", "CVE-2021-23336", "CVE-2021-2334", "CVE-2021-2335", "CVE-2021-2336", "CVE-2021-2337", "CVE-2021-2338", "CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2341", "CVE-2021-2342", "CVE-2021-2343", "CVE-2021-2344", "CVE-2021-2345", "CVE-2021-2346", "CVE-2021-2347", "CVE-2021-2348", "CVE-2021-2349", "CVE-2021-2350", "CVE-2021-2351", "CVE-2021-2352", "CVE-2021-2353", "CVE-2021-2354", "CVE-2021-2355", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2358", "CVE-2021-2359", "CVE-2021-2360", "CVE-2021-2361", "CVE-2021-2362", "CVE-2021-2363", "CVE-2021-2364", "CVE-2021-2365", "CVE-2021-2366", "CVE-2021-2367", "CVE-2021-2368", "CVE-2021-2369", "CVE-2021-2370", "CVE-2021-2371", "CVE-2021-2372", "CVE-2021-2373", "CVE-2021-2374", "CVE-2021-2375", "CVE-2021-2376", "CVE-2021-2377", "CVE-2021-2378", "CVE-2021-2380", "CVE-2021-2381", "CVE-2021-2382", "CVE-2021-2383", "CVE-2021-23839", "CVE-2021-2384", "CVE-2021-23840", "CVE-2021-23841", "CVE-2021-2385", "CVE-2021-2386", "CVE-2021-2387", "CVE-2021-2388", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2391", "CVE-2021-2392", "CVE-2021-2393", "CVE-2021-2394", "CVE-2021-2395", "CVE-2021-2396", "CVE-2021-2397", "CVE-2021-2398", "CVE-2021-2399", "CVE-2021-2400", "CVE-2021-2401", "CVE-2021-2402", "CVE-2021-2403", "CVE-2021-2404", "CVE-2021-2405", "CVE-2021-2406", "CVE-2021-2407", "CVE-2021-2408", "CVE-2021-2409", "CVE-2021-2410", "CVE-2021-2411", "CVE-2021-2412", "CVE-2021-24122", "CVE-2021-2415", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2419", "CVE-2021-2420", "CVE-2021-2421", "CVE-2021-2422", "CVE-2021-2423", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2428", "CVE-2021-2429", "CVE-2021-2430", "CVE-2021-2431", "CVE-2021-2432", "CVE-2021-2433", "CVE-2021-2434", "CVE-2021-2435", "CVE-2021-2436", "CVE-2021-2437", "CVE-2021-2438", "CVE-2021-2439", "CVE-2021-2440", "CVE-2021-2441", "CVE-2021-2442", "CVE-2021-2443", "CVE-2021-2444", "CVE-2021-2445", "CVE-2021-2446", "CVE-2021-2447", "CVE-2021-2448", "CVE-2021-2449", "CVE-2021-2450", "CVE-2021-2451", "CVE-2021-2452", "CVE-2021-2453", "CVE-2021-2454", "CVE-2021-2455", "CVE-2021-2456", "CVE-2021-2457", "CVE-2021-2458", "CVE-2021-2460", "CVE-2021-2462", "CVE-2021-2463", "CVE-2021-25122", "CVE-2021-25329", "CVE-2021-26117", "CVE-2021-26271", "CVE-2021-26272", "CVE-2021-27568", "CVE-2021-27807", "CVE-2021-27906", "CVE-2021-28041", "CVE-2021-28359", "CVE-2021-29921", "CVE-2021-30369", "CVE-2021-30640", "CVE-2021-3156", "CVE-2021-3177", "CVE-2021-31805", "CVE-2021-31811", "CVE-2021-33037", "CVE-2021-3345", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3520", "CVE-2021-3560", "CVE-2021-38193", "CVE-2021-40491", "CVE-2022-0552", "CVE-2022-23181", "CVE-2022-24823"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1020-1:153AB", "DEBIAN:DLA-1020-1:D77C3", "DEBIAN:DLA-1021-1:3F138", "DEBIAN:DLA-1021-1:8BAEA", "DEBIAN:DLA-1157-1:16CF2", "DEBIAN:DLA-1157-1:FA549", "DEBIAN:DLA-1194-1:E9867", "DEBIAN:DLA-1330-1:A6756", "DEBIAN:DLA-1449-1:6B9AF", "DEBIAN:DLA-1449-1:EF247", "DEBIAN:DLA-1580-1:96660", "DEBIAN:DLA-1777-1:55799", "DEBIAN:DLA-1797-1:1A7B8", "DEBIAN:DLA-1797-1:A2877", "DEBIAN:DLA-1801-1:60303", "DEBIAN:DLA-1801-1:C744B", "DEBIAN:DLA-1896-1:572E2", "DEBIAN:DLA-1896-1:853E6", "DEBIAN:DLA-1943-1:5F5AB", "DEBIAN:DLA-1943-1:9AD98", "DEBIAN:DLA-1950-1:F990F", "DEBIAN:DLA-1984-1:5FA59", "DEBIAN:DLA-1984-1:DC1E9", "DEBIAN:DLA-2030-1:DE561", "DEBIAN:DLA-2030-1:F7B6F", "DEBIAN:DLA-2111-1:8FC8D", "DEBIAN:DLA-2111-1:E5D8F", "DEBIAN:DLA-2118-1:5E0A4", "DEBIAN:DLA-2128-1:493E1", "DEBIAN:DLA-2128-1:E0A22", "DEBIAN:DLA-2139-1:B7645", "DEBIAN:DLA-2139-1:BE12E", "DEBIAN:DLA-2191-1:6C344", "DEBIAN:DLA-2191-1:AF8DE", "DEBIAN:DLA-2201-1:04D06", "DEBIAN:DLA-2201-1:2AD7B", "DEBIAN:DLA-2209-1:84C77", "DEBIAN:DLA-2209-1:D154F", "DEBIAN:DLA-2217-1:0ED90", "DEBIAN:DLA-2256-1:A4385", "DEBIAN:DLA-2270-1:4546C", "DEBIAN:DLA-2270-1:A2D41", "DEBIAN:DLA-2277-1:171D7", "DEBIAN:DLA-2277-1:CD763", "DEBIAN:DLA-2279-1:771F3", "DEBIAN:DLA-2279-1:AB3FB", "DEBIAN:DLA-2286-1:A2783", "DEBIAN:DLA-2286-1:F04B8", "DEBIAN:DLA-2364-1:39666", "DEBIAN:DLA-2378-1:1D903", "DEBIAN:DLA-2405-1:2470B", "DEBIAN:DLA-2405-1:33C7A", "DEBIAN:DLA-2406-1:00733", "DEBIAN:DLA-2406-1:5CA04", "DEBIAN:DLA-2419-1:9948C", "DEBIAN:DLA-2437-1:334D0", "DEBIAN:DLA-2437-1:9852C", "DEBIAN:DLA-2467-1:7F045", "DEBIAN:DLA-2467-1:C258D", "DEBIAN:DLA-2467-2:C303D", "DEBIAN:DLA-2471-1:AFC93", "DEBIAN:DLA-2474-1:CB226", "DEBIAN:DLA-2492-1:77952", "DEBIAN:DLA-2493-1:D2596", "DEBIAN:DLA-2495-1:A5479", "DEBIAN:DLA-2500-1:61422", "DEBIAN:DLA-2512-1:EDD15", "DEBIAN:DLA-2534-1:1EFB7", "DEBIAN:DLA-2534-1:AA5E2", "DEBIAN:DLA-2550-1:E200A", "DEBIAN:DLA-2555-1:64862", "DEBIAN:DLA-2555-1:DBD69", "DEBIAN:DLA-2563-1:7D5FC", "DEBIAN:DLA-2563-1:B363B", "DEBIAN:DLA-2565-1:2FCB7", "DEBIAN:DLA-2565-1:CC1A3", "DEBIAN:DLA-2569-1:11737", "DEBIAN:DLA-2569-1:E3354", "DEBIAN:DLA-2583-1:724F6", "DEBIAN:DLA-2596-1:25D69", "DEBIAN:DLA-2608-1:50303", "DEBIAN:DLA-2616-1:FAA87", "DEBIAN:DLA-2619-1:8192B", "DEBIAN:DLA-2628-1:6F808", "DEBIAN:DLA-2638-1:5B442", "DEBIAN:DLA-2638-1:AB692", "DEBIAN:DLA-2657-1:654CC", "DEBIAN:DLA-2657-1:9B21E", "DEBIAN:DLA-2661-1:5DE5A", "DEBIAN:DLA-2664-1:7F2B8", "DEBIAN:DLA-2733-1:8A1F0", "DEBIAN:DLA-2734-1:488E8", "DEBIAN:DLA-2737-1:0513E", "DEBIAN:DLA-2751-1:5F8DA", "DEBIAN:DLA-2877-1:2E87E", "DEBIAN:DLA-2919-1:698BE", "DEBIAN:DLA-2975-1:76BFD", "DEBIAN:DLA-3085-1:091D8", "DEBIAN:DLA-3129-1:8AA1A", "DEBIAN:DLA-3160-1:77FDA", "DEBIAN:DLA-3164-1:A25EA", "DEBIAN:DLA-3205-1:40C3E", "DEBIAN:DLA-728-1:A9D65", "DEBIAN:DLA-728-1:ECD0E", "DEBIAN:DLA-729-1:1B0B9", "DEBIAN:DLA-729-1:E931B", "DEBIAN:DLA-906-1:3F80D", "DEBIAN:DLA-906-1:D16E9", "DEBIAN:DLA-946-1:9FF89", "DEBIAN:DLA-986-1:199D0", "DEBIAN:DLA-986-1:5A238", "DEBIAN:DSA-3720-1:0F2C1", "DEBIAN:DSA-3720-1:B5B38", "DEBIAN:DSA-3721-1:2B54A", "DEBIAN:DSA-3721-1:8336F", "DEBIAN:DSA-3831-1:EE460", "DEBIAN:DSA-3871-1:11373", "DEBIAN:DSA-3872-1:C19C1", "DEBIAN:DSA-4017-1:88D36", "DEBIAN:DSA-4017-1:AEF53", "DEBIAN:DSA-4018-1:01441", "DEBIAN:DSA-4018-1:DD3DF", "DEBIAN:DSA-4157-1:5A16B", "DEBIAN:DSA-4157-1:D7BEA", "DEBIAN:DSA-4158-1:43C61", "DEBIAN:DSA-4158-1:561AF", "DEBIAN:DSA-4278-1:4CF44", "DEBIAN:DSA-4348-1:05673", "DEBIAN:DSA-4355-1:1415E", "DEBIAN:DSA-4434-1:82FB6", "DEBIAN:DSA-4434-1:D2F07", "DEBIAN:DSA-4460-1:50632", "DEBIAN:DSA-4461-1:C87EB", "DEBIAN:DSA-4542-1:03F2D", "DEBIAN:DSA-4542-1:432E5", "DEBIAN:DSA-4605-1:EA4B2", "DEBIAN:DSA-4621-1:E16D0", "DEBIAN:DSA-4627-1:1B266", "DEBIAN:DSA-4661-1:70270", "DEBIAN:DSA-4669-1:2AD2E", "DEBIAN:DSA-4693-1:F5786", "DEBIAN:DSA-4696-1:9504E", "DEBIAN:DSA-4772-1:DCCA8", "DEBIAN:DSA-4789-1:72A9C", "DEBIAN:DSA-4789-1:817CC", "DEBIAN:DSA-4795-1:5CD54", "DEBIAN:DSA-4807-1:1C1CB", "DEBIAN:DSA-4807-1:B0537", "DEBIAN:DSA-4810-1:6AA44", "DEBIAN:DSA-4811-1:BEA23", "DEBIAN:DSA-4835-1:22674", "DEBIAN:DSA-4839-1:0839A", "DEBIAN:DSA-4839-1:3997C", "DEBIAN:DSA-4855-1:4A0C0", "DEBIAN:DSA-4855-1:B091B", "DEBIAN:DSA-4863-1:331E6", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4875-1:AE1B0", "DEBIAN:DSA-4881-1:5FAC1", "DEBIAN:DSA-4882-1:5EC6A", "DEBIAN:DSA-4885-1:31BC0", "DEBIAN:DSA-4891-1:1A529", "DEBIAN:DSA-4908-1:0437F", "DEBIAN:DSA-4908-1:07D7B", "DEBIAN:DSA-4919-1:44828", "DEBIAN:DSA-4919-1:5433F", "DEBIAN:DSA-4946-1:45300", "DEBIAN:DSA-4949-1:1212B", "DEBIAN:DSA-4952-1:E9E24", "DEBIAN:DSA-4984-1:EDA98", "DEBIAN:DSA-5004-1:7D2F1", "DEBIAN:DSA-5004-1:912EF", "DEBIAN:DSA-5004-1:999C3", "DEBIAN:DSA-5197-1:EFC47", "DEBIAN:DSA-5265-1:55805"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2012-0881", "DEBIANCVE:CVE-2016-0762", "DEBIANCVE:CVE-2016-4429", "DEBIANCVE:CVE-2017-14735", "DEBIANCVE:CVE-2017-16931", "DEBIANCVE:CVE-2017-3735", "DEBIANCVE:CVE-2017-5461", "DEBIANCVE:CVE-2017-5637", "DEBIANCVE:CVE-2017-7656", "DEBIANCVE:CVE-2017-7657", "DEBIANCVE:CVE-2017-7658", "DEBIANCVE:CVE-2017-9735", "DEBIANCVE:CVE-2018-0737", "DEBIANCVE:CVE-2018-0739", "DEBIANCVE:CVE-2018-15686", "DEBIANCVE:CVE-2018-21010", "DEBIANCVE:CVE-2018-7160", "DEBIANCVE:CVE-2018-7183", "DEBIANCVE:CVE-2019-0190", "DEBIANCVE:CVE-2019-0201", "DEBIANCVE:CVE-2019-0205", "DEBIANCVE:CVE-2019-0210", "DEBIANCVE:CVE-2019-0228", "DEBIANCVE:CVE-2019-10086", "DEBIANCVE:CVE-2019-10173", "DEBIANCVE:CVE-2019-10746", "DEBIANCVE:CVE-2019-11358", "DEBIANCVE:CVE-2019-12402", "DEBIANCVE:CVE-2019-12415", "DEBIANCVE:CVE-2019-12973", "DEBIANCVE:CVE-2019-13990", "DEBIANCVE:CVE-2019-15604", "DEBIANCVE:CVE-2019-15605", "DEBIANCVE:CVE-2019-15606", "DEBIANCVE:CVE-2019-16942", "DEBIANCVE:CVE-2019-16943", "DEBIANCVE:CVE-2019-17531", "DEBIANCVE:CVE-2019-17543", "DEBIANCVE:CVE-2019-17545", "DEBIANCVE:CVE-2019-17566", "DEBIANCVE:CVE-2019-20330", "DEBIANCVE:CVE-2019-5063", "DEBIANCVE:CVE-2019-5064", "DEBIANCVE:CVE-2020-10543", "DEBIANCVE:CVE-2020-10683", "DEBIANCVE:CVE-2020-10878", "DEBIANCVE:CVE-2020-11022", "DEBIANCVE:CVE-2020-11023", "DEBIANCVE:CVE-2020-11612", "DEBIANCVE:CVE-2020-11868", "DEBIANCVE:CVE-2020-11979", "DEBIANCVE:CVE-2020-11987", "DEBIANCVE:CVE-2020-11988", "DEBIANCVE:CVE-2020-11998", "DEBIANCVE:CVE-2020-12723", "DEBIANCVE:CVE-2020-13934", "DEBIANCVE:CVE-2020-13935", "DEBIANCVE:CVE-2020-13949", "DEBIANCVE:CVE-2020-13956", "DEBIANCVE:CVE-2020-14060", "DEBIANCVE:CVE-2020-14061", "DEBIANCVE:CVE-2020-14062", "DEBIANCVE:CVE-2020-14195", "DEBIANCVE:CVE-2020-15389", "DEBIANCVE:CVE-2020-17521", "DEBIANCVE:CVE-2020-17527", "DEBIANCVE:CVE-2020-1941", "DEBIANCVE:CVE-2020-1945", "DEBIANCVE:CVE-2020-1967", "DEBIANCVE:CVE-2020-1968", "DEBIANCVE:CVE-2020-1971", "DEBIANCVE:CVE-2020-24553", "DEBIANCVE:CVE-2020-24616", "DEBIANCVE:CVE-2020-24750", "DEBIANCVE:CVE-2020-25638", "DEBIANCVE:CVE-2020-25648", "DEBIANCVE:CVE-2020-25649", "DEBIANCVE:CVE-2020-2604", "DEBIANCVE:CVE-2020-26217", "DEBIANCVE:CVE-2020-26870", "DEBIANCVE:CVE-2020-27216", "DEBIANCVE:CVE-2020-27218", "DEBIANCVE:CVE-2020-27783", "DEBIANCVE:CVE-2020-27814", "DEBIANCVE:CVE-2020-27841", "DEBIANCVE:CVE-2020-27842", "DEBIANCVE:CVE-2020-27843", "DEBIANCVE:CVE-2020-27844", "DEBIANCVE:CVE-2020-27845", "DEBIANCVE:CVE-2020-28052", "DEBIANCVE:CVE-2020-28196", "DEBIANCVE:CVE-2020-28928", "DEBIANCVE:CVE-2020-29582", "DEBIANCVE:CVE-2020-35490", "DEBIANCVE:CVE-2020-35491", "DEBIANCVE:CVE-2020-35728", "DEBIANCVE:CVE-2020-36179", "DEBIANCVE:CVE-2020-36180", "DEBIANCVE:CVE-2020-36181", "DEBIANCVE:CVE-2020-36182", "DEBIANCVE:CVE-2020-36183", "DEBIANCVE:CVE-2020-36184", "DEBIANCVE:CVE-2020-36185", "DEBIANCVE:CVE-2020-36186", "DEBIANCVE:CVE-2020-36187", "DEBIANCVE:CVE-2020-36188", "DEBIANCVE:CVE-2020-36189", "DEBIANCVE:CVE-2020-5258", "DEBIANCVE:CVE-2020-5397", "DEBIANCVE:CVE-2020-5398", "DEBIANCVE:CVE-2020-5421", "DEBIANCVE:CVE-2020-7733", "DEBIANCVE:CVE-2020-7760", "DEBIANCVE:CVE-2020-8174", "DEBIANCVE:CVE-2020-8203", "DEBIANCVE:CVE-2020-8277", "DEBIANCVE:CVE-2020-8284", "DEBIANCVE:CVE-2020-8285", "DEBIANCVE:CVE-2020-8286", "DEBIANCVE:CVE-2020-8554", "DEBIANCVE:CVE-2020-8908", "DEBIANCVE:CVE-2020-9484", "DEBIANCVE:CVE-2020-9489", "DEBIANCVE:CVE-2021-20190", "DEBIANCVE:CVE-2021-20227", "DEBIANCVE:CVE-2021-21290", "DEBIANCVE:CVE-2021-21341", "DEBIANCVE:CVE-2021-21342", "DEBIANCVE:CVE-2021-21343", "DEBIANCVE:CVE-2021-21344", "DEBIANCVE:CVE-2021-21345", "DEBIANCVE:CVE-2021-21346", "DEBIANCVE:CVE-2021-21347", "DEBIANCVE:CVE-2021-21348", "DEBIANCVE:CVE-2021-21349", "DEBIANCVE:CVE-2021-21350", "DEBIANCVE:CVE-2021-21351", "DEBIANCVE:CVE-2021-21409", "DEBIANCVE:CVE-2021-22118", "DEBIANCVE:CVE-2021-22876", "DEBIANCVE:CVE-2021-22883", "DEBIANCVE:CVE-2021-22884", "DEBIANCVE:CVE-2021-22890", "DEBIANCVE:CVE-2021-22897", "DEBIANCVE:CVE-2021-22898", "DEBIANCVE:CVE-2021-22901", "DEBIANCVE:CVE-2021-23336", "DEBIANCVE:CVE-2021-2339", "DEBIANCVE:CVE-2021-2340", "DEBIANCVE:CVE-2021-2341", "DEBIANCVE:CVE-2021-2342", "DEBIANCVE:CVE-2021-2352", "DEBIANCVE:CVE-2021-2354", "DEBIANCVE:CVE-2021-2356", "DEBIANCVE:CVE-2021-2357", "DEBIANCVE:CVE-2021-2367", "DEBIANCVE:CVE-2021-2369", "DEBIANCVE:CVE-2021-2370", "DEBIANCVE:CVE-2021-2372", "DEBIANCVE:CVE-2021-2374", "DEBIANCVE:CVE-2021-2383", "DEBIANCVE:CVE-2021-23839", "DEBIANCVE:CVE-2021-2384", "DEBIANCVE:CVE-2021-23840", "DEBIANCVE:CVE-2021-23841", "DEBIANCVE:CVE-2021-2385", "DEBIANCVE:CVE-2021-2387", "DEBIANCVE:CVE-2021-2388", "DEBIANCVE:CVE-2021-2389", "DEBIANCVE:CVE-2021-2390", "DEBIANCVE:CVE-2021-2399", "DEBIANCVE:CVE-2021-2402", "DEBIANCVE:CVE-2021-2409", "DEBIANCVE:CVE-2021-2410", "DEBIANCVE:CVE-2021-2412", "DEBIANCVE:CVE-2021-24122", "DEBIANCVE:CVE-2021-2417", "DEBIANCVE:CVE-2021-2418", "DEBIANCVE:CVE-2021-2422", "DEBIANCVE:CVE-2021-2424", "DEBIANCVE:CVE-2021-2425", "DEBIANCVE:CVE-2021-2426", "DEBIANCVE:CVE-2021-2427", "DEBIANCVE:CVE-2021-2429", "DEBIANCVE:CVE-2021-2432", "DEBIANCVE:CVE-2021-2437", "DEBIANCVE:CVE-2021-2440", "DEBIANCVE:CVE-2021-2441", "DEBIANCVE:CVE-2021-2442", "DEBIANCVE:CVE-2021-2443", "DEBIANCVE:CVE-2021-2444", "DEBIANCVE:CVE-2021-2454", "DEBIANCVE:CVE-2021-25122", "DEBIANCVE:CVE-2021-25329", "DEBIANCVE:CVE-2021-26117", "DEBIANCVE:CVE-2021-26271", "DEBIANCVE:CVE-2021-26272", "DEBIANCVE:CVE-2021-27807", "DEBIANCVE:CVE-2021-27906", "DEBIANCVE:CVE-2021-28041", "DEBIANCVE:CVE-2021-29921", "DEBIANCVE:CVE-2021-30640", "DEBIANCVE:CVE-2021-3156", "DEBIANCVE:CVE-2021-3177", "DEBIANCVE:CVE-2021-31811", "DEBIANCVE:CVE-2021-33037", "DEBIANCVE:CVE-2021-3345", "DEBIANCVE:CVE-2021-3449", "DEBIANCVE:CVE-2021-3450", "DEBIANCVE:CVE-2021-3520", "DEBIANCVE:CVE-2021-3560", "DEBIANCVE:CVE-2021-38193", "DEBIANCVE:CVE-2021-40491", "DEBIANCVE:CVE-2022-23181", "DEBIANCVE:CVE-2022-24823"]}, {"type": "drupal", "idList": ["DRUPAL-SA-CORE-2019-006", "DRUPAL-SA-CORE-2020-002"]}, {"type": "dsquare", "idList": ["E-701"]}, {"type": "exploitdb", "idList": ["EDB-ID:46780", "EDB-ID:46814", "EDB-ID:47895", "EDB-ID:48320", "EDB-ID:48508", "EDB-ID:49521", "EDB-ID:49522", "EDB-ID:49766", "EDB-ID:49767", "EDB-ID:50011"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:58B106E51A80290DC1E08B730B3B0DCC", "EXPLOITPACK:CB918002171E00C4EB94DA4B5828BA58"]}, {"type": "f5", "idList": ["F5:K00174195", "F5:K00498403", "F5:K01251345", "F5:K02349370", "F5:K02453220", "F5:K03121171", "F5:K07944249", "F5:K08044291", "F5:K10002140", "F5:K12109859", "F5:K14756743", "F5:K15402727", "F5:K17075474", "F5:K18484125", "F5:K19380843", "F5:K20455158", "F5:K21054458", "F5:K21462542", "F5:K22415133", "F5:K22893952", "F5:K24608264", "F5:K24624116", "F5:K28409053", "F5:K32469285", "F5:K32562850", "F5:K35033051", "F5:K36784855", "F5:K38573130", "F5:K40356136", "F5:K40508224", "F5:K41190253", "F5:K41410307", "F5:K42910051", "F5:K43429502", "F5:K44305703", "F5:K44415301", "F5:K45026834", "F5:K46604804", "F5:K51743312", "F5:K52171694", "F5:K55354030", "F5:K61186963", "F5:K61903372", "F5:K63025104", "F5:K63525058", "F5:K65078159", "F5:K66544153", "F5:K73648110", "F5:K86488846", "F5:K90059138", "F5:K92451315", "F5:K94504224", "F5:K95453343", "SOL17075474", "SOL36784855"]}, {"type": "fedora", "idList": ["FEDORA:000423094DC3", "FEDORA:0105430CE303", "FEDORA:017273129EBB", "FEDORA:0240B604B381", "FEDORA:049CA30B267A", "FEDORA:05AFB3091421", "FEDORA:08AC0606CFA2", "FEDORA:096673094224", "FEDORA:0A8AA34B5326", "FEDORA:0C9B630E4D25", "FEDORA:0D7F230979AB", "FEDORA:0E6FD60E1861", "FEDORA:0FDC630A5C68", "FEDORA:10ED96049C48", "FEDORA:11C9F606DF50", "FEDORA:1364530979AB", "FEDORA:146FE30DD5E7", "FEDORA:1472760748FE", "FEDORA:180E930E766E", "FEDORA:18A7960877B3", "FEDORA:1D42330957E7", "FEDORA:1F076314BE6F", "FEDORA:21C3E309DE29", "FEDORA:26A3B606353E", "FEDORA:2703C614C115", "FEDORA:277F560476FA", "FEDORA:27A3A30520EC", "FEDORA:2B920607600F", "FEDORA:2BD533098BA0", "FEDORA:2C5E66075D89", "FEDORA:2C8BA30B7889", "FEDORA:2D51F60C28B2", "FEDORA:3097E609077F", "FEDORA:320386075B54", "FEDORA:3230260BA78B", "FEDORA:3245830C47E2", "FEDORA:336A5601C68D", "FEDORA:353CF60468D9", "FEDORA:353D73154ABE", "FEDORA:36BF9305D418", "FEDORA:371D8608F499", "FEDORA:3787360525AF", "FEDORA:38A0630A1F03", "FEDORA:3ADCC618DE6A", "FEDORA:3AEB830B2656", "FEDORA:3CA1930493B5", "FEDORA:3CD8830CF284", "FEDORA:3ED26601CEE3", "FEDORA:3F234602D69C", "FEDORA:433C2304C446", "FEDORA:438D16045644", "FEDORA:455E83148598", "FEDORA:46E1E6087BCB", "FEDORA:4788E309FF20", "FEDORA:481D1608F47B", "FEDORA:4840930CA036", "FEDORA:49205309799A", "FEDORA:4A1276046F94", "FEDORA:4BBBA6067EC9", "FEDORA:4D359608778C", "FEDORA:4EE84305D41F", "FEDORA:4F5D560BF24D", "FEDORA:5188060D12AE", "FEDORA:52396606732B", "FEDORA:54575302587A", "FEDORA:54C15615CE59", "FEDORA:589CF30BDEBA", "FEDORA:59A883072F03", "FEDORA:5A27030A7064", "FEDORA:5D3AA60DDB80", "FEDORA:5F36E6079A0D", "FEDORA:60E3A30D1484", "FEDORA:61A713098ED5", "FEDORA:61ED7309CECD", "FEDORA:6431E305A8AE", "FEDORA:662DB3076C1C", "FEDORA:6869030D3139", "FEDORA:68D44601BD0C", "FEDORA:69B8A30B8B4D", "FEDORA:69F08305D42D", "FEDORA:6B2B530F962D", "FEDORA:6E524310A486", "FEDORA:6E66C608B5D9", "FEDORA:6EC9D33D7FE1", "FEDORA:6ED3730946F6", "FEDORA:6EEE330609B8", "FEDORA:6F712609154B", "FEDORA:71D65309D32B", "FEDORA:7307C30AD43B", "FEDORA:764EE30C99A3", "FEDORA:772A7605712B", "FEDORA:77A873096A19", "FEDORA:78798312B68E", "FEDORA:7A1EA3098BA2", "FEDORA:7B564604AACC", "FEDORA:7C08A30758FC", "FEDORA:7C20C304C264", "FEDORA:7CE8B6016150", "FEDORA:7CFF660874FE", "FEDORA:7EA4A615D50A", "FEDORA:7F23B6061573", "FEDORA:822D960BF257", "FEDORA:8514B6312F21", "FEDORA:85B0430979AB", "FEDORA:8657A309BA6B", "FEDORA:86D5D3097097", "FEDORA:8746560A764C", "FEDORA:88EAA30905CF", "FEDORA:8C9CB30BDABD", "FEDORA:8D7CB30BB4E7", "FEDORA:8D89730AB4B5", "FEDORA:8D9BA60468B9", "FEDORA:9084B6049CB5", "FEDORA:9228F60BF265", "FEDORA:929076060E6D", "FEDORA:938863096E48", "FEDORA:93A083094AEF", "FEDORA:9408B30E7B01", "FEDORA:94A8C309799A", "FEDORA:98315602F10D", "FEDORA:9BFED31347B3", "FEDORA:9F2FE3098B94", "FEDORA:9F6B6309CB9F", "FEDORA:9F9DD606E5E1", "FEDORA:A09EE6087595", "FEDORA:A0E7D606D492", "FEDORA:A1A2C305A886", "FEDORA:A387A3072636", "FEDORA:A8BE83094DF0", "FEDORA:A94C730ECAFD", "FEDORA:A9F00305D406", "FEDORA:AA46430A6A34", "FEDORA:AAF643072F13", "FEDORA:AB5346014BB3", "FEDORA:AC1C6304E3A3", "FEDORA:ACC466324C7C", "FEDORA:AE16260D235E", "FEDORA:AE6D630AA059", "FEDORA:AE8886060E81", "FEDORA:AEECE6075DBF", "FEDORA:AF19730979AB", "FEDORA:AF45530AA447", "FEDORA:AFDBD60E76E0", "FEDORA:B0BBE6085FBF", "FEDORA:B0FEC30C5629", "FEDORA:B2561309E0E7", "FEDORA:B42DC304E39B", "FEDORA:B459630CC2D1", "FEDORA:B4E3C6062CB4", "FEDORA:B56AC605DCD2", "FEDORA:B5C736087A8D", "FEDORA:B7EBC30957D8", "FEDORA:B803860875BB", "FEDORA:B80B9607548F", "FEDORA:B87A730E900E", "FEDORA:B98866076020", "FEDORA:BACE03098BA0", "FEDORA:BB3096070A55", "FEDORA:BDC9D3090DB1", "FEDORA:BEC8530B267D", "FEDORA:BFACF60A35B3", "FEDORA:BFF95608779F", "FEDORA:C0A2E30B00AE", "FEDORA:C1819309C5A0", "FEDORA:C337330A46EA", "FEDORA:C3D293095AFD", "FEDORA:C5613607A3CF", "FEDORA:C6AD93098B94", "FEDORA:C6B3F60776BE", "FEDORA:C798F309DE1C", "FEDORA:C7A34627CF63", "FEDORA:C7AFE309727E", "FEDORA:C8F726082DB8", "FEDORA:C91E46060E8C", "FEDORA:C92EE30BAE72", "FEDORA:CB91560BFDF4", "FEDORA:CD864304939A", "FEDORA:CFC09309E7A4", "FEDORA:D013361742CE", "FEDORA:D02A2309CDA4", "FEDORA:D126131F01F8", "FEDORA:D208C60874AA", "FEDORA:D24F26076D26", "FEDORA:D343F309D6A7", "FEDORA:D47CC30C448C", "FEDORA:D4B143098BA2", "FEDORA:D4F2130BAB3C", "FEDORA:D529B625B834", "FEDORA:D7C6D30E4D22", "FEDORA:D8E3E608F496", "FEDORA:D948D608771F", "FEDORA:DAEDE3052074", "FEDORA:DB7B1314E1E1", "FEDORA:DBF7C3092516", "FEDORA:DC31630C8352", "FEDORA:DC7DF3111B2E", "FEDORA:DD55E6047337", "FEDORA:DEA206060997", "FEDORA:E0E2C3098BA0", "FEDORA:E1DB3601E80E", "FEDORA:E31D830DFF2D", "FEDORA:E5B6E30BA77A", "FEDORA:E66CE6076F5E", "FEDORA:E700F3072E21", "FEDORA:E9B1430CC2C0", "FEDORA:EA4F2309E0EF", "FEDORA:ECB8530BC708", "FEDORA:EDF1E309799A", "FEDORA:EF5B36120D8F", "FEDORA:F015D61278C8", "FEDORA:F113230AA459", "FEDORA:F12FB31404B0"]}, {"type": "fortinet", "idList": ["FG-IR-19-222", "FG-IR-22-008"]}, {"type": "freebsd", "idList": ["0032400F-624F-11EA-B495-000D3AB229D6", "012809CE-83F3-11EA-92AB-00163E433440", "08B553ED-537A-11EB-BE6E-0022489AD614", "10E3ED8A-DB7F-11EA-8BDF-643150D3111D", "11FCFA8F-AC64-11EA-9DAB-000D3AB229D6", "1D56CFC5-3970-11EB-929D-D4C9EF517024", "1FB13175-ED52-11EA-8B93-001B217B3468", "20006B5F-A0BC-11EB-8AE6-FC4DD43E2B6A", "2F3CD69E-7DEE-11EB-B92E-0022489AD614", "36A35D83-C560-11EB-84AB-E0D55E2A8BF9", "38A4A043-E937-11EB-9B84-D4C9EF517024", "3AE106E2-D521-11E6-AE1B-002590263BF5", "3C5A4FE0-9EBB-11E9-9169-FCAA147E860E", "3C77F139-3A09-11EB-929D-D4C9EF517024", "4CB165F0-6E48-423E-8147-92255D35C0F7", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "5A668AB3-8D86-11EB-B8D6-D4C9EF517024", "5A9BBB6E-32D3-11E8-A769-6DAABA161086", "5E0A038A-CA30-416D-A2F5-38CBF5E7DF33", "676CA486-9C1E-11EA-8B5E-B42E99A1B9C3", "67B050AE-EC82-11EA-9071-10C37B4AC2EA", "6A72EFF7-CCD6-11EA-9172-4C72B94353B5", "6D5F1B0B-B865-48D5-935B-3FB6EBB425FC", "70E71A24-0151-11EC-BF0C-080027EEDC6A", "76B5068C-8436-11EB-9469-080027F515EA", "8B571FB2-F311-11EB-B12B-FC4DD43E2B6A", "8F353420-4197-11E8-8777-B499BAEBFEAF", "909BE51B-9B3B-11E8-ADD2-B499BAEBFEAF", "9442A811-DAB3-11E7-B5AF-A4BADB2F4699", "96A21236-707B-11EB-96D8-D4C9EF517024", "A45D945A-CC2C-4CD7-A941-FB58FDB1B01E", "AD792169-2AA4-11EB-AB71-0022489AD614", "AF485EF4-1C58-11E8-8477-D05099C0AE8C", "AF61B271-9E47-4DB0-A0F6-29FB032236A3", "B1194286-958E-11EB-9C34-080027F515EA", "B7CFF5A9-31CC-11E8-8F07-B499BAEBFEAF", "B9210706-FEB0-11EC-81FA-1C697A616631", "C0C1834C-9761-11EB-ACFD-0022489AD614", "CD2DC126-CFE4-11EA-9172-4C72B94353B5", "D10FC771-958F-11EB-9C34-080027F515EA", "D34BEF0B-F312-11EB-B12B-FC4DD43E2B6A", "E8483115-8B8E-11EA-BDCF-001B217B3468", "EB888CE5-1F19-11E9-BE05-4C72B94353B5", "F00B65D8-7CCB-11EB-B3BE-E09467587C17", "F3CF4B33-6013-11EB-9A0E-206A8A720317", "F40F07AA-C00F-11E7-AC58-B499BAEBFEAF", "FFC73E87-87F0-11E9-AD56-FCAA147E860E"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-17:11.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-18:02.NTP", "FREEBSD_ADVISORY:FREEBSD-SA-20:11.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-20:33.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-21:07.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-21:17.OPENSSL"]}, {"type": "gentoo", "idList": ["GLSA-201705-04", "GLSA-201712-03", "GLSA-201802-03", "GLSA-201805-12", "GLSA-201810-10", "GLSA-201811-21", "GLSA-201903-21", "GLSA-202003-48", "GLSA-202004-10", "GLSA-202006-03", "GLSA-202006-21", "GLSA-202007-03", "GLSA-202007-12", "GLSA-202007-34", "GLSA-202007-53", "GLSA-202011-17", "GLSA-202011-18", "GLSA-202012-11", "GLSA-202012-13", "GLSA-202012-14", "GLSA-202012-21", "GLSA-202012-23", "GLSA-202101-07", "GLSA-202101-18", "GLSA-202101-19", "GLSA-202101-29", "GLSA-202101-33", "GLSA-202103-03", "GLSA-202103-04", "GLSA-202104-04", "GLSA-202105-35", "GLSA-202105-36", "GLSA-202107-31", "GLSA-202107-32", "GLSA-202208-34", "GLSA-202208-36", "GLSA-202209-05", "GLSA-202210-02", "GLSA-202210-40", "GLSA-202305-02"]}, {"type": "github", "idList": ["GHSA-269G-PWP5-87PP", "GHSA-269Q-HMXG-M83Q", "GHSA-288C-CQ4H-88GQ", "GHSA-2H3J-M7GR-25XJ", "GHSA-2H63-QP69-FWVW", "GHSA-2HW2-62CP-P9P7", "GHSA-2P3X-QW9C-25HH", "GHSA-2RVV-W9R2-RG7M", "GHSA-3244-8MFF-W398", "GHSA-344F-F5VG-2JFJ", "GHSA-36QH-35CM-5W2W", "GHSA-3C6G-PVG8-GQW2", "GHSA-3XXV-P78R-4FC6", "GHSA-43GC-MJXG-GVRQ", "GHSA-4GW3-8F77-F72C", "GHSA-4HRM-M67V-5CXR", "GHSA-4M44-5J2G-XF64", "GHSA-4P6W-M9WC-C9C9", "GHSA-4PV3-63JW-4JW2", "GHSA-4VWW-MC66-62M6", "GHSA-5325-XW5M-PHM3", "GHSA-53X6-4X5P-RRVV", "GHSA-562R-VG33-8X8H", "GHSA-56P8-3FH9-4CVQ", "GHSA-5949-RW7G-WX7W", "GHSA-59JW-JQF4-3WQ3", "GHSA-5MCR-GQ6C-3HQ2", "GHSA-5MG8-W23W-74H3", "GHSA-5R5R-6HPJ-8GG9", "GHSA-63Q7-H895-M982", "GHSA-662X-FHQG-9P8V", "GHSA-6C3J-C64M-QHGQ", "GHSA-6JMF-MXWF-R3JC", "GHSA-6PHF-73Q6-GH87", "GHSA-6VQP-H455-42MR", "GHSA-6X4W-8W53-XRVV", "GHSA-6X9X-8QW9-9PP6", "GHSA-73XV-W5GP-FRXH", "GHSA-74CV-F58X-F9WF", "GHSA-7CWJ-J333-X7F7", "GHSA-7PM4-G2QJ-J85X", "GHSA-7R82-7XV7-XCPJ", "GHSA-83MX-573X-5RW9", "GHSA-84Q7-P226-4X5W", "GHSA-84RM-QF37-FGC2", "GHSA-86QR-9VQC-PGC6", "GHSA-86WM-RRJM-8WH8", "GHSA-89QR-369F-5M5X", "GHSA-8C4J-34R4-XR8G", "GHSA-8HFJ-XRJ2-PM22", "GHSA-8HXH-R6F7-JF45", "GHSA-8W26-6F25-CM9X", "GHSA-8WX2-9Q48-VM9R", "GHSA-9F3J-PM6F-9FM5", "GHSA-9GPH-22XH-8X98", "GHSA-9JWC-Q6J3-8G9G", "GHSA-9M6F-7XCQ-8VF8", "GHSA-9MGM-GCQ8-86WQ", "GHSA-9Q5J-JM53-V7VR", "GHSA-9QCF-C26R-X5RF", "GHSA-C265-37VJ-CWCC", "GHSA-C2Q3-4QRH-FM48", "GHSA-C43Q-5HPJ-4CRV", "GHSA-C6PW-Q7F2-97HV", "GHSA-C9JJ-3WVG-Q65H", "GHSA-CC94-3V9C-7RM8", "GHSA-CMX4-P4V5-HMR5", "GHSA-CQCC-MM6X-VMVW", "GHSA-CQJ8-47CH-RVVQ", "GHSA-CVM9-FJM9-3572", "GHSA-F256-J965-7F32", "GHSA-F62V-XPXF-3V68", "GHSA-F6HM-88X3-MFJV", "GHSA-F6VF-PQ8C-69M4", "GHSA-F9XH-2QGP-CQ57", "GHSA-FG3J-Q579-V8X4", "GHSA-FHJF-83WG-R2J9", "GHSA-FMJ2-7WX8-QJ4V", "GHSA-FMMC-742Q-JG75", "GHSA-G2FG-MR77-6VRM", "GHSA-G3WG-6MCF-8JJ6", "GHSA-GFWJ-FWQJ-FP3V", "GHSA-GJMW-VF9H-G25V", "GHSA-GQ28-H5VG-8PRX", "GHSA-GWW7-P5W4-WRFV", "GHSA-GXR4-XJJ5-5PX2", "GHSA-H3CW-G4MQ-C5X2", "GHSA-H79P-32MX-FJJ9", "GHSA-HF23-9PF7-388P", "GHSA-HRCP-8F3Q-4W2C", "GHSA-HVV8-336G-RX3M", "GHSA-HWJ3-M3P6-HJ38", "GHSA-HWPC-8XQV-JVJ4", "GHSA-HWVM-VFW8-93MW", "GHSA-J39C-C8HJ-X4J3", "GHSA-J823-4QCH-3RGM", "GHSA-J8JW-G6FQ-MP7H", "GHSA-J9WF-VVM6-4R9W", "GHSA-JC35-Q369-45PV", "GHSA-JGWR-3QM3-26F3", "GHSA-JPCQ-CGW6-V4J6", "GHSA-JQ65-29V4-4X35", "GHSA-JQ7P-26H5-W78R", "GHSA-JXFH-8WGV-VFR2", "GHSA-M6VM-8G8V-XFJH", "GHSA-M6X4-97WX-4Q27", "GHSA-M7JV-HQ7H-MQ7C", "GHSA-MC6H-4QGP-37QH", "GHSA-MGC4-WQV7-4PXM", "GHSA-MM9X-G8PC-W292", "GHSA-MW36-7C6C-Q4Q2", "GHSA-MX7P-6679-8G3Q", "GHSA-P6MC-M468-83GW", "GHSA-PGWW-XF46-H92R", "GHSA-Q44V-XC3G-V7JQ", "GHSA-Q799-Q27X-VP7W", "GHSA-QGM6-9472-PWQ7", "GHSA-QJW2-HR98-QGFH", "GHSA-QPFQ-PH7R-QV6F", "GHSA-QRMM-W75W-3WPX", "GHSA-R3GR-CXRF-HG25", "GHSA-R695-7VR9-JGC2", "GHSA-RCJJ-H6GH-JF3R", "GHSA-RJ7P-RFGP-852X", "GHSA-RV39-3QH7-9V7W", "GHSA-V528-7HRM-FRQP", "GHSA-V585-23HC-C647", "GHSA-V73W-R9XG-7CR9", "GHSA-V8J6-6C2R-R27C", "GHSA-VF77-8H7G-GGHP", "GHSA-VFQX-33QM-G869", "GHSA-VGG8-72F2-QM23", "GHSA-VMQM-G3VH-847M", "GHSA-VVW4-RFWF-P6HX", "GHSA-WFCC-PFF6-RGC5", "GHSA-WH8G-3J2C-RQJ5", "GHSA-WPVM-WQR4-P7CW", "GHSA-WQ4C-WM6X-JW44", "GHSA-WQFH-9M4G-7X6X", "GHSA-WXCP-F2C8-X6XV", "GITHUB:0519EA92487B44F364A1B35C85049455", "GITHUB:D8A86B15D051270840BFEF47E7434ED2"]}, {"type": "githubexploit", "idList": ["0150448C-5C49-5917-A32B-56B1154BC517", "03BFA6A9-100F-5BAA-9493-6A9C3461A37B", "050B5540-E4D4-523F-A821-852F4E2CCDD8", "05A9BE7D-0317-5F20-87C1-D63BA3A06BE4", "076B6736-32D3-5F37-8570-7C8B87A7A5D0", "08927CE5-F79F-53B1-A28A-35CF6EB8F941", "090B9267-05A2-54BE-B7F4-C0F49CDE011D", "0DA1AFFF-82A5-565A-BFA6-8F6A6E52268B", "106B0836-A998-5B63-9B7B-F2F8BBD8BE02", "10F73C81-91F0-5199-9C8E-432BF228C96A", "13878B3B-FB04-5CE3-9B74-E27EB76E916B", "14CD7401-C309-52B2-B4EE-AD54900F0455", "18F5237C-DCAC-5831-AED6-F0880A11DFF2", "1BB45592-4635-524E-8858-560611C42BC7", "20E0E007-A9C4-58EA-917F-E225D8785B3F", "213BCA43-1160-5637-AA17-A4F7DFA29967", "24A6D0CC-8F53-539E-8FBC-D5222C4BC565", "25B0D3BA-0039-5AAB-97E1-07A88FE23CC1", "2622835C-6D71-5CE4-975D-7E6B9E55E50E", "2691C74B-4ECB-5E22-8BDF-7784E321BE55", "2747307D-D8C7-5045-A017-AA9E18552C41", "2987A23B-5EFD-5B4A-A951-6D72B13B71A4", "2A668D83-7F03-5870-A265-BE4B1ABB4F1F", "2B8C7714-D2D7-50C4-BEB8-B616BD51A554", "2E148A24-696B-55C2-8FB2-F74B47F8DD25", "305FA0E2-CE78-57B6-87B3-EC7BEFDBE2B0", "30C55741-9CBF-523B-B78C-E933DDBAC0A2", "32FB08A0-ACB0-5E2F-8691-570E7B806086", "3392AC7A-43B9-5F64-9B90-F5C13D25FEC1", "3640EAF9-330F-508E-A488-D3A51649AD96", "37DBE88A-3249-51AF-8021-8619CFD56A4B", "39C90135-C62D-5BC8-B5D5-E979C89C96E0", "3CC19BC0-B7EC-52D5-805B-9A1077EAA419", "3F0D2FBE-2CDB-5783-906F-F7B71218723E", "41247B1B-2EEF-5EF8-967A-47EBDAA78CA4", "4278B435-D22E-57E8-ABC4-639BAAFA6FC9", "458891C6-0BE7-5AC1-8119-7DD6B0884A9A", "4754A596-7C59-5BF6-9A77-A9D8982CB695", "49F291AB-38E4-506D-A185-70178D091F27", "4A0B6F24-4FEF-56AE-909F-602D0623246C", "4A3FAE75-F285-5A77-9040-F767B1856A17", "4C45914B-E23C-51F5-AC39-A11AF3084185", "4C6E5FA8-A6FA-5A3D-9277-6417A1361407", "4C7FE64B-11CD-5DA3-9F7A-F5ED394FC01B", "4DC0E03F-8753-543D-A4E9-1244313FCC06", "4E834790-A0F9-5830-88FE-F520B8FE3CBB", "4F4AF4AC-0953-5098-98D6-592B918B0836", "504A0052-A0EB-53EA-AFC3-4E5EEC236795", "504D019A-423C-50A0-9677-93192F0ECDFC", "5602A60A-886A-598C-99B3-EE2E820506AD", "58CD2EEE-5826-5136-84D4-BCAC28741415", "5AAFA05E-ABBB-5EB6-968D-71E9154832F0", "5BCFB44C-A4FD-5890-AE9A-A60CC135A2F1", "5E86A164-FA62-5822-A034-A558F2C68082", "62E1CDF6-537F-52B5-8ACE-87CDDFB3544D", "6404B816-013C-5D30-96E3-EA233A91E9E4", "64FD9C52-1048-5BCE-9134-9228A5B5D896", "65B35104-9A63-5777-B8CD-117BFD564064", "6C4460D8-B721-5912-A303-D746BE6AE918", "6D615941-1400-5F6E-8B84-68AB306EAAD4", "6DB4BE3A-051F-58C6-9266-A278C41A707E", "6E1579B5-B91F-5348-A0B2-8218964434CA", "6FE4C3C0-D500-5202-A7DB-D2A17693D071", "7247E67F-6DD7-5526-8312-91D0D99FED26", "72ACBBC1-E9FB-5A12-8614-06BEF5F96394", "72D36AF5-1D4B-53BF-8A5F-28BFD556A52E", "73755D06-C18A-5153-8397-77FD839D02FF", "743F51FB-8BF4-5425-AEFA-10B2A14C8F3B", "77013337-4BEA-5530-BC92-0C0BCA2BA0CD", "79C2EF2E-59E5-57EE-B75C-2A757F840418", "79FADEDE-9F29-583A-908E-676A91E2F562", "7A9A11EA-FF06-5AD3-A559-CA9EF02D443F", "7AB13657-1E3A-536C-87B2-C058EBBA92A7", "7BA07704-21CC-5BFC-A0F9-8FDA2BC84402", "80CE8226-21F0-5511-969C-AFDE06BF7C2F", "8355CDEF-4353-5AEE-915E-3AF0E2AF9409", "860137A6-8A6A-5B9E-8DA2-9D56B4F7F3BB", "874146AC-B29D-5508-82A6-F689D0A8937E", "87656530-D6BF-59DF-AEAA-94EA936D15DC", "8864D179-08CB-51B7-8B06-0D64118BD6B9", "8A038044-FF93-55CF-A4E2-E5AF05A46130", "8DA5EFBC-B7B3-53DD-9EA5-CE5BF1C786F2", "8E313950-A935-50E7-B3A1-0B42A0403763", "8EF43C83-EFAA-5B36-ADB4-69AC40B5DFEA", "9003FB61-0943-567C-B4D5-674ADC3206E9", "92652D10-0053-5EC5-BEE7-CDD2141C7525", "92CE6110-40F8-5FE5-909B-BE6B59186578", "94095106-8E25-54E1-924C-2C3B4E99610F", "94A16899-4218-55D1-B5CF-2480CDF5331C", "968DBE0A-CC05-5F47-B348-E8E33AA33F6C", "96B2FD46-0F7E-5581-BBA6-E4A48966E225", "9D09C8C3-35C2-51CD-B6E1-6542183770EF", "9D1AE9EC-AAED-5991-9F41-9458ABC7EFC3", "9E63B0B5-5583-5FC0-85B1-048296D9FC6A", "A36243CA-7BAA-5CA7-82CB-A7C4B24456B6", "A46721A6-23E8-5E16-B9CA-0C887A66551D", "A64B2D10-93F9-5DEB-8FF5-EDD62BD2F346", "A7D8D274-4FE7-5BFB-B3A3-7EDB427ED94E", "A906B17D-A78F-5755-8763-7D1AA7E65750", "A96AA4B1-C8BB-579A-8D24-BC5F3628A0A4", "A98AE857-3243-58DB-B11E-BF7F9CBDA573", "AB7F01A0-08AE-56CA-A116-D36B8B48FE8F", "ABABEF31-ECFE-5251-B330-876990C2D1AD", "AD0AD709-77EA-5215-BC4E-82EF1BE97938", "B0BA17F5-F171-5C97-9F6C-D5F38B5B64F5", "B21658F5-5752-5A2C-89E3-68378412AA6F", "B2E1F725-D74D-5E81-88CC-6530BC9BAB30", "B38C8387-765B-587E-BBED-9336E586B3E2", "B663ED8E-3FC8-597C-94C8-F7D1BA5DAF2B", "B9510646-2BAA-56FD-ABAC-FEAE65C9F78D", "B9EB8E0F-C53A-5795-92FA-1994F120A1CF", "BA454336-99D5-5669-9586-DE4761C4D7E2", "BA9D322B-4694-5B07-BD2F-83E700A62DE8", "BC46DAAE-9274-500B-A6A2-DB7DA8EAF068", "BC98F6B9-CA75-554C-ACA1-30325FC62B0E", "BCD79315-7A3F-5041-9459-7CF1BEB5C6BC", "BD98107A-1F5C-5E0E-BB2B-51DFBAC1D4BA", "BF2EF6C1-6CDB-598E-B8F0-B6803DE02CCE", "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "C3C9928F-AC84-5B3E-980E-F594CABE8EA3", "C4EDB405-454C-5160-9A99-21A930740C3F", "C7E2EC97-A49D-5063-BC43-995A0E058FCF", "C7EFCE12-F44C-5E4A-8D51-D4F6CE4A377D", "C878132C-FB46-5C51-9D3B-B87DB3578112", "CA263D10-7886-5A7A-AC16-94EA3B11396F", "CACC713E-498A-52BA-B12E-23D4C11929E7", "CD4FD272-6D04-59AF-9539-2E222F04BD16", "CF8077FD-4A28-511E-B1DA-F4F5476C36E6", "CFE3102D-90DC-50DB-8D7D-CFED76AAE825", "D1B13DF4-3B67-5E28-B67E-5CBE9B8C3D1A", "D2931851-B196-5CD6-AF75-B24EA22F6115", "D2A327FF-6F42-51F0-85B3-C36F8A1DB33E", "D3DACBE8-D7F0-53E7-BBA2-40B044FDB5CE", "D4B13E09-5713-5A3F-9BD4-6FF6836D56B6", "D5CBA0E2-A4B0-52CE-B93B-F433CE8662DA", "DC2FB701-98C0-58E1-9CBB-F9E17BA3A8A0", "DC83CAA2-80A2-5618-A8BB-64F21B1308CA", "DDDD3D70-3C6C-5957-B39C-BC7FF579239A", "E0649464-438C-5420-8A33-0542A884B4BA", "E089A8D5-F5B9-5354-8F98-7A6A5AD25E95", "E56192E7-FC31-58F7-A982-BEA41F95D172", "E5C9B17F-EC84-52B1-8901-335B1815C813", "E83D6606-6F89-5700-B703-B87CF90D6565", "E95D9A0E-E9DE-5D95-9879-E07C0257318C", "EC2AFCFD-F205-5519-AC35-727179A57315", "EEB220AD-2CB0-50FB-A3B9-A87BBC32BA19", "EF08F582-5E5C-506D-B223-26A7028B4A16", "EF22B1BD-85C3-525C-B7D6-94014939E96B", "F0C27A65-B942-5D87-B7D9-08451A15456C", "F0ED6FE9-BC03-5953-BF24-995A28292C17", "F1CDC6B3-63A4-5931-9CAD-8E40F7450674", "F2076B48-44ED-5B15-9B08-53183DC5B9EF", "F4C155BB-D279-51C9-A988-FF65F4CE76EF", "F60737C1-A24B-51C1-AE8D-73A65C778FFF", "F8906E65-8ADB-59DB-8A3A-AEEB8FD45719", "FC96322B-C3D8-5037-9C04-217A27794418", "FEA13486-D1C3-5F54-9DB3-54F8FC08811A"]}, {"type": "gitlab", "idList": ["GITLAB-3ABBDB911ADD0E0B84EE2B79B6A00304", "GITLAB-3ECC83531EB5CA0669D073E0645286D7", "GITLAB-5C34077F656744ADA65A57371F332F9A", "GITLAB-6E83EBC47DBC6934632B7FCFD2D48637", "GITLAB-8430650BBD839B53E88B3F57D2EB5758", "GITLAB-E1D4710E2B05EB8D583F4EBD1405CD04", "GITLAB-F1EB915BDF0E1D2E76026B2823906D1D", "GITLAB-F66DCF5D466CEC7E38E0C4381DADC55C"]}, {"type": "hackerone", "idList": ["H1:1033107", "H1:1040166", "H1:1043360", "H1:1045844", "H1:1048457", "H1:1069487", "H1:1084342", "H1:1101882", "H1:1113025", "H1:1129529", "H1:1145454", "H1:1172857", "H1:1176461", "H1:1180380", "H1:1223882", "H1:1632921", "H1:1714979", "H1:1812768", "H1:293126", "H1:454365", "H1:648434", "H1:712065", "H1:730779", "H1:735748", "H1:746733", "H1:764986", "H1:784186", "H1:874427", "H1:888986"]}, {"type": "hivepro", "idList": ["HIVEPRO:C72A6CAC86F253C92A64FF6B8FCDA675"]}, {"type": "hp", "idList": ["HP:C06911998"]}, {"type": "httpd", "idList": ["HTTPD:AAC1059FE0E9684FAF0639E105E0C314"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20180613-01-OPENSSL", "HUAWEI-SA-20181212-01-CACHE", "HUAWEI-SA-20200715-01-OPENSSL", "HUAWEI-SA-20210310-01-ESCALATION"]}, {"type": "huntr", "idList": ["3CE480DC-1B1C-4230-9287-0DC3B31C2F87"]}, {"type": "ibm", "idList": ["0014B28ACA7F9997C72146507BEEC1742A1789CC46F9FF03799C7B89A0B39408", "0015CEA0533AEAC06D2E659A979FA4046017D69A6092E5BED7A65FF358596DFF", "0029ABBB141B6B352048BA2F9DF7D2CCCF9E41BEDC2A8E7CA69432B1B68A991E", "003E808C317FB1CEF04F5EDBEB16A13E730C2707CF8E2423D4945D325E93E40E", "0066C9EC375123E63AE360D74EC62586671E78442045839C341498FBEEC24A1E", "007E1AC1E4228B8135E45C63FCEF82799BD02C157157F082CD8D3E0F0D61C361", "009100EA9BF7232267A1DEB0AC3E42D22B2B7270764DB060EC15B06458CAC065", "00DD5060E6124BE4F25A4AF7DA83D15A52360F89A1F6A84F1ED9C6E28CD62833", "00FF2D4125D985DFF24D0BD03BD81094E6A3A89F73437BEC1CF7B1209D25EBC4", "010EC971C8137CA217EFCF666EC9014A85C2FF0721F787178F2DAC34FF7F5576", "016248796F0D60834A9AE6D8C8659223A06C7DCF5A1BFEB093E2C71A7B706F76", "017704F263DE498C81E38DCD35C1B649CAC8F2B6DA67887C1DC1F132F6BB1B85", "01C2BD6F6CDCD525791E097D5709AFBC3F4837B426F67AE0350485110A1D9824", "021D73BA7F81AE9ECA981B8E5BCD2B83F967D63970C29E0AD98D46119BE5A6A3", "02208B95DC0377482AA2F9D9C05755BE90534C1B3F7475FC805AC14769FE9106", "023AF7CE811F35CB9EA5BD22171F66AA17D83D1B9FF44FF925D320814BAE40E2", "0251DBCB96D0ED10DA628D06B0978F8DE5AB5BDFE82E017184802BFCC0709826", "026861C8F37CB442AEB06F08CB67784AB6226E1C2C5830E2D4227D71E9453C5B", "02740F7656140577EDC311D3FA53C782BE9C2AFA138D94E3B0583A50F28424DA", "02AC3D75FB5E9A395164B03D2835B59279C245C81FF95300ED74B35ADE723D5F", "0303FE3DB6883C126F5416C10E374A324E85ADEDF43FC6D681B3D909D291CD2F", "0307FB788EC450B953F9418B6F98AA9C07CA589604E81399E29EEA192C59ACAA", "0319E4F01D8C2BB1E1D9CA642942762AB6D0486EE87445E505B6585BF79E6E34", "0336508687FC75709AB1D96C0DF14CA61FD81A95284DDA31533A99A1CBFC2A81", "03691F1EE0B131D78EA0BD89002CC0B602DB37A603D015DF70107A778260C592", "037DC92C3964B9BE83FE00549FB0CE6C44ACB2D76406400ED57CA4D310EF3538", "03BD9C6A634D56977256D0EB02550574DC21A677D8E08EEB57FD8C5F206D469F", "044F7989584F991F828675FDC5CB000CED22E22110189CFA68906C629165FB92", "045B3221FB3BBC39DD70A158CACD0ACC0885A17A6B16F3CCA24E243D79A3DFB4", "05996CA3681F693A59525A2CFB7913B00FD3EC80FA9669C448A3B527653DAB6F", "059A77E3EFE81C2EA2227B88299B87D315EDC11B87459F13C3B094AEEFE691F9", "05C711ADE626E71EEF208B57EB92611FB65BACFAC2E002E5DCF15BB16E425278", "05EBC3EA4B66B19728BB66D5DC71F429C8B7233EC5AC3CB0DA401B57D74514F3", "05F3B2BCBA66E63FF50CAB9D4E4610B2EAE6CD3DA38047220611B10B02307DE3", "066BB00C2B6A6242C6FBF8A6F5AC1894BD92A88AB25B612792EBE4868C909F3C", "066CC30FF07EA70663C1053750F35662E071CE8F2ADB63927D6FD5956CB157A7", "0681FE433B8BCB85261721415D3F794D3807E9F448C06FB726FADF1A29A35A9C", "06852EEA8CD7CA7F8840D2FC93096A4DD156B248C6D17CEEEBA4095B19D215B6", "06E45448DD54AD77E13A3A6CDF85E9A5C15F5881E8F05C1E5D3E72BA73F31BE8", "06FE50BE40FEE3497F0E530101C2633637A1990675C077F16FF2FB5E0F90CCF4", "077CACE3330807DB9A0479410A548456194DEE66D2F89956CE566945832802D8", "07988475CE9095B9471700FFB4FFB199A58AB32837E3178BE094D53E97B8461A", "08139CE06A8A5B4E6DECA1C19593AB1C2B019BD2AB5CC530089313FD991614D7", "08382CF5553CB60BBAC21C338E155F745267EB1822043DBC4403188C9FB0BBB6", "084CAF98E751BF0D497F265C2E3424D6CE5AC5A2499792902621ABCEDD468189", "088792238BCB34F9D5245E5C573991A7BE90A307DD73648043580882E02AB80B", "08B8F7A5BD2A4C807B593B79793086AE818A4C18A2CA1A3A38E171A0EA5BD485", "092A5FFF63DF2D24AE105A3D4A7EFA1386A4FF9DBF7D2F354A30991E0CB4C671", "09859535BBD73886942005381F7140B37F4079C86A8279AC944AB83F5FC012DB", "098A0B0BBDA18721083717F103FE7FB2B2BBE2394E33149D968FE7B59A7B2AD4", "09980414FC21E35456F246C1A989060D1BBC358CD8F9700E87A97861B49C6E7A", "099DD49202775CBB1F4948F66DB50FAE41385719EDE85DEF5171C85DA36B727F", "09AFD47197484EAB25D41C7EF19F2E409044695DAB7464B95754C7EC085D2517", "09B2AB76F2BDB96C1D80882C003F4EB4F06924E6DBF0BF3818CF83A2F0AF4B47", "09C0C603EECE682CFFD6D5C27B3EAA66D128B79E9D89A33E4AF2314E9BF9995F", "09CA380459763EF94B351758E7FF0F92BBB9AFC80865460EEA911B8F50DF4855", "0A251B57941452CDFD64C031582A8D13D6719AEDB99EBF965740CC5E04A717D6", "0A2CC076E697047BEB801920E37078BA16894DE0A4DAB7A64E209E04A52ED4A7", "0A3CB536625237AF6E1A39B78799B41B9AF062894DA038E4F769071D72640FDB", "0A425AE154320282FF38ABB3C8BA8D3AD10793B88A3CFCA031B295F986453B12", "0A5B13C8983BE4491518367535A0427B2CBE5B0B75C8384C4657D2E9D8B12509", "0AC735C19116A7FB66D9921F93B7D9FF1E6BB4F1F2A9AF8B4AA371BC3E7211BE", "0ACDC7CDDEE06F34F2256DD048A556D53156ACF793ADBE3C9ED53FEEE712EF49", "0B000A0891A3DD2B6FEEDDE868C5765ECFB2CF839563136900F2FFB29F7ED71C", "0B09741FE06E2E625FB963A5453D96B370F6DAD3A083406E8DC077D44E61E93F", "0B32FE452355B1C3468364CEE7BB901540B1401AA499444B7D5418E694FA963A", "0B92A8A6EAFCAA0FBD48FD39AD1A57A0B615646AC7DFBDCDE03F38315CFF19C7", "0BA222617EB3DC2727D0CEAED8B811D134403862EBC711C290FC44BB958A527E", "0BB6CE91CC84EDD567AA8146DD77BC430E89FD588D5FEB94C2A498F4C06A0D09", "0BC017C730A770E349E300089D6DB71D200CA299BDBFA58821787583FA3F9DB1", "0BC76EEB65523D395F4DA742FB52689780638A43870F5C4EC44A6261A2CCA67B", "0BDDBA484F3367829DBE683BE155B8F63CE6E7CF5747401F154DB308D91D8FD4", "0C4F91C9AA7E146EDA1AA877B92C4C590E445AC7D2AC0E60ECCE4BA77A47F0EB", "0C5B125E08A54287DA08EEE993BA378517E3897B2D04ACD4EA01FAC561AC33AE", "0C779E30A41077563FA5AF76F75E9EC214F8A1B1EFC21AA9E8EA78A7B4833570", "0CAD9B5F1A6613661D52E522A6B15A04801FB7B31F20DEE4D7CA8F62526D5982", "0CF53D8325D40C289570C1D6045A9FD8D6F3B995F616EDA6A153D65D26FA8716", "0D15D47821CE302EE87F64871F16E8FAED0DF6B97568D7FF28129A9D318E1F27", "0D1CD2F0F6466904E8614A55941F9674CA10DEEEC78000ED7F7FCCDB2BDCF1F8", "0D3AC1653A7CFC61981BECC263BCD833E5441240DF62D2E529CB279D31CBD069", "0D59FFD51231ECF98C5893B5461BCF88799C6AD8EFE951E0CF9EF593048FEC1A", "0DA372315D9C9CE495D2D8AED74F69FEB6E2DA01B2A69C7B4F02788E611CCB66", "0DB781AA08EB5BF3514B03091A0400B8238C108F721C116A9739CB261ED78D7F", "0DDFB99CB8C38EE3AD681E1DDB584ED5008E60962834E9D1EA19DCDBB6940E62", "0E324E8411FA0FF87CE996537D7103990A22F58C661FC29BD35F8349272DF38C", "0E90BE57477FF48A1B6656796E64B27DD2F0FD10BE811D20B98E904E94B3762E", "0E9CB2FF4881771F372D07171695D0F9F9EC65784DB65C62AE83724CACDC1D27", "0EC3EB1A4765F9C940914A7C89057639E72383731BE6502A92F0F01A42D0CB76", "0ECBCAAF17194C060682E1B26E2EF9F8F8DA5EA1DAFDB2E39C320FF040DEBF75", "0EEEF8DEA83112CA8F05980CF97966A805C275EB2074F4D594FEC682F79F9571", "0EF2B3BEA4403B998499114AE5D3693C840E985B7ECCF95FA6F6834A4F819197", "0F0A825C07A03880DD39EA5C5014BCE8191E8BEC536CC2446F889DF92FF626E7", "0F297F5F87FAC22F33127BF32110D0C0B158B6859BCE9E0ED4EB35484AD06F6A", "0F94D25D257920B59E8541E40266908C5242591765186625C9D9426A6B0ED4BC", "0FF78AF1C487DE3B1A92548681C12BB71F6CB2B0B453E94F828CDEF3248FE0FD", "10133ED41E7996603598BE958B25E473B502094237506616CFD35BF178C04ABD", "101D9839DC4D3A67F5CA5070D8255AEF01378A1F2F94126A2F00868A71C2B71A", "1022F1A8652F556CC61338952DE52ECA055F8D74B75EE7AF0120EF547C2DEB6E", "10301FF6336C952B90C3BF7CBE84C410CA8A9F2722C29F538BA2BF6C7FFD1A3C", "104BE807C8577FF816DF414B5A588FABB581711BB54758F6F49C7CAC17CD68BE", "10EC4CC708DE59DAE77B2D171EC3B3FD738677969A070AD0A4A5589CE116A160", "10FBEBB14A30BC73B75E0DF3E1AC14E07BC218A2AAE122217F23444AA2EEB55D", "11418E60E1822B830D82A048693283E95E67F4E9FDA0F50B96E87F6BD33A1B1A", "1152C3DC4441A8BE1A8A1E09415BEE121EE8187BAC6A6BD6EE4C9970FB3CAB3B", "1184F34A8BB7F52562A68801DE6ABC021E03D5BBF810D28882A9FB9E51F1A74B", "11AF1EBF11801C3B0AC27DD2420D4EFC6BECF3D238C0BCFAE0F7B3EFE88FB0A1", "11D50567E527C1FAA2CC7E5BFC7E0A144943437DED5DC6E20F8744DBB47E7648", "1216BEFCC877765223CE187EEB457AD44E77DE77B9A00DFE2C29DBD67EE87D6C", "124495DD455D7F5D1C3DB0D3404B8054E94AC8A5A5D620E6E377E96048271229", "126E1024546918D07264839DD88F2FF75D58789A0F611D0689966886112B533B", "12EA4D1A7BE64A30DA191B1C8D55A39020AC6D8C6A17857A31C0FE68549E3AE2", "12EFB707E056F27AA11980D2F9CC90B6739FAC22EC63709581DBBBA13033E1C9", "12F717244FEBE2E574C4797C485B84D93877100AB65740AE0F0E7EE891C8C624", "1360BEF97E01B87A4E58CA581A1F32ECD385845F24783D4980B6E64F68F389FB", "13DC6C947B6413CFE7F34A801E2D453C1CE59E88BD9CD0784822D61AA18153A5", "13F00230B493C3686E89942E64907F497BD16EC400D563B1E916EC82CF0C2ECE", "1409CD05A45669BF88F7CEAB610D65B1F84FD0522659550C3AD802B5214CCF7A", "142B1BA6B62A94740D651FE3E4D0F0F6D477022D6F17F392FBFC30D1D4D904E2", "147EB4D07985CB7587528D1FBFB02A47595F2094BB3705844F8CDEA4FBC9E359", "14A887E26BDEB476941873D8603CE7056CDC1B2DDE8715BEE33CDC5E12E4CB69", "14C753A9841FC063FE9AB269465731F7364886E6ECA1E243C8EF2133E76FCCD2", "152DBBBD89777F049F222CCBB92B4558AF83750C87593C90CA6D85B18A25D750", "153E6A7F45307CFCCB059FF4B2B47706B9B7537249313FCA40E45F238F62CC08", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "1581A32F1B584B51FF02BECA01D9BDEF635D6686BA710EA3BB5BFE756956948A", "15B7946476C14969EFBB158D48A2E631603F1323E17E2D4BDC13FB3B86B3B63B", "1615871DB6D900C69F1E3E99183BE8581ED1CED870E2C3B0E3B990E1C56F30E0", "161E93A17C210873A930616B7AA642E8DECB548C126F51ACBF476947F04F5F46", "164E392393C2A0CFC65E632DE69312BBDAA573FFFD3C7AB306B8346D00B27CBB", "167951D4CB6682B161C7C63B81A840E45EF18CAE83E9A3ED32C423308A35D68F", "1684DEC3DF3BB9E78C84E76D9D7057965A40ADC07F69C113F4E928D34BF0D671", "1695654077F888DBA5D74372BE319A101D1D52DECCCA129B96319385DBC072A0", "16BD53FF8D4AF4008A6B9480C8D62C5AECEF46E4F486EC150D2D9BBC2C7349FC", "16D624AEDCB96C9EC26AE68133433747B25D91D72094E91140AFEE6E957A69D1", "17179127276D2C8BCC739D66B23A070D5DCF232A120A9E4EF31DA0C49E8077B9", "17D62DC0F30A960DF01D26D277DC85881571449133E027068700A2AE91F203A5", "17E2A2234B8EB1A1FD88875B4639DD7977B1A0F62BC6D5F9D6C40BAFB9288E47", "1816205804EFBBBBB94018144A008A33799E226A9B559AA545872E5FBE25A885", "181D953C82435728483F73C6AE6076BA466F7C07699F87E064E95E0D8F6DD0F3", "1884864549E9954D0DBBE2AC224F348D2E593A0CB7BB89635A0316AA5AAFB22E", "188E2EFC9960F668714D843E317115DF913F18A2FDCE258D3CD5B68DC806D78A", "18CF8F0579774C83A0D6E6D4B5456431AD2CF024AF0BD0A465437DE7A74A73F9", "18F70AA47E2E43F4DA8767A4A95C24F6E49AC9CA2DA52A0DD0B10595AB37B715", "190680E40A17D3CD839AD41A35BAAEA69C358A05CD874B5D0B4DBA1097C68C1E", "19E7CCA2109CC5A3B3DA0F4448A131CA12DB092BA0296A6E61E4E3FBDF15126E", "1A058CDBF068B93BE796D90012FA3CBC288A7ABC6E0BDCF3CF31BDE0C188694F", "1A13E6CC79FCC83DDA9CC9D0EEC387490EEA3CB0B10BA19B2339B66E13D368F8", "1A226F41CCEE49F182D2CE6E2913B939C921267EC05F27A8773B9DAF87654A6F", "1A2AB48E22FE16F31D30089C8D756BFAEB568ED74A41666E5D9099AF6266C2BA", "1A35248CBBA17AE981ED0B52B133E7CA1678042C1A9C93C2EC8BED2EF8994420", "1A3F78C4B58EC961C9D7A89CD0901CC9CF806191B200270551CE78B084198965", "1A4FA3B5469D18137712BF7AC1D07484A80FF90FF9C73C0DAEB585280189A01B", "1A7668E81452E83AB00678328095567DA17543F8BDE6DB1EE678E96C5B064FD6", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1AD1D443A812E31635C257C107A94874F8B4C76399451E955FF84E25916790A9", "1AE3C39E2B04171FD23F21949F6202B367042F6DC07FB81BDC1E886F25C20936", "1B0ED4A3526A4957AFA5966EC1D954AC93826AA8F95F1EF2E8A3A6657E73F691", "1B2DE47B81158CF422EABD8FB36A0F9AD86742705A475707E3B7F9D5759F187F", "1B6A0A88205D737925BF33B2E66917090C254BD3D5E955FE74F10FC31B331AFB", "1B99BE15EF0865EC7D6CAAD98E1510DF110D3FC32411F14658640A57804FCBB5", "1BC1BBD2406B2A6EF54915D3A9F7303447F1E9A74BFAA21C16496E625A76B261", "1BF7C13C6BA15A6BD297836C5ABBD65ADD120927A9AB5EC2DD0D2C820A678FB9", "1C1678518312F18585D48228E2C4D89CBF458CAF1277708839EA38E32D0F11E3", "1C79629B0EA849594AAB96F4B2BD5BDBEFE873FB9963CC88E55D7E138431F67B", "1D03021C0C99FDB0C90FB4C082F7027A61FE15185AEDAC44AF34A46925A0A642", "1D13437A0B331D4D1B8BFF883ED28D7EB87DFC486BA0F0119C88846D6C495F28", "1D527A951F660BFCA1836671A2A328C87E8B448B01A672269419352520CFA6F1", "1D58139EE8E4B7EBF966E04A3481F7E3158581B7050B64797149C45F8E953D84", "1DAFFF28AC34C8DA1A937E9644BE4D8E8B813CF125F13D52F12ED92015236660", "1DF12FB692783635DE10020C233543F032F1D4FF83BE360C8CD94064DBF6CB64", "1E236D9F26350B681A529BCA89C1DD7A00E417E70E5D0AE5428703E999445FCD", "1E239D8C4813C8FA705CBB86F01F323B29B73D1086FDF65021C9CB4B0146A272", "1E32A0DCA7A6C898B2418C86335A2125319791BC25C7F3C562AAB70E65FD676E", "1E526EF1AF9493D4DFD68A54DE20164B19C56298C4825803A217A2A0D1ABCCD7", "1E65403338C4160C6671F6E9BE4C657DE48E1EA2770DD6A8FFF5C5BD5F4ED166", "1EB9F8573A9E928E14652E6C4EA6633663E35B33C744263304C0A5C14EC87569", "1EBC77DA43FD0C2AC1B3FBFCD06096623AB926F98B7AC6367589E5222F2115BC", "1F0E769E02EDA03664C1D0694AF70B26BFB7E4DBC4D96E353B0F8FCBDA767545", "1FEA014B0C2FDFA9CD279E4CFD9E200E38418FF00A5DAAACDABABCEF7837D1FC", "1FF8E68E83BF3DB2672591959122E4AFEF74C0664CD23BFF44CDC08E383E49EC", "20209226CF708BF44C7840FD584A6E597BB42A22FD1DED4CB30C9CB82F0400F6", "20372756D0D4D41E4530AE121905256C2AF155E987D21A7B2CC7D85274A6AE1D", "204ADCCC258487D6D5F8C848C95DAB38413055F4AFD05DFCF56FD7435CBF7C69", "205D8E291F00D69928AE2777BC3A52CC5094D59B30AB5BF479F77703C17C0EBE", "20763F2B27C66C722124CBB23FF4ECBE76431735E0AC6E1F94E8999CB3A2CB25", "20DB55115960B166A4368D0140211E11623630048D91ABDD3772ABF1FE01EF6D", "20E0B1B1DC6034FC35329433D466647C673F2AFB3543C7816DA076CF5AE5E952", "2111955F2AA016CDE9E98C0F42BF600D3DD2BEA5694E99735DD169E4E8ADD920", "21142DF71EAD09193DDED15561CD1A43227AFDD0E8979F78556DC466663B350D", "2176F924F3A8E257F0FD41D938132696ED2E98CF0AE18699EC2F7D4DD9F60A01", "217BB6C17A6FD504F278CE0259F71540873D9ACBEC02EC2F580CED3F0A79FB4A", "21D7C0247A0BBC5EE46940059607E6E4E7C539F59CBD4932FE8F9C3AB550F95A", "21F9791E24CDB0086C2569FA0A63417AD5C9A6CA13D33D246ED6E10B78FE7DC5", "226FFFCDF94FA8471AA279C7EA3B887FAA510E3463B5ABDBC303B7D6583EE6BE", "23258712AF0C6FF3D199FB0C84691351D550E3A4E86DEF3F1A107BF53AC16647", "233226C0332001C81596C237819F64BB35F4B49297346F216B4DC90C72D26485", "237D215C02E500720739F18EB080076657509B9AEE004A6CDE0BCC8122B2387C", "2386F1AB0413EEF3A8C299A357E7BB8AB76A40C4C355F7A3F8BB00B41DA6A965", "23FB85E4A4524EAF001F53197F29C0F104443FA007C725351B59D636C5772DBB", "2404E42A6AEF9D8505CDF5F29071088D46DB039426A35293F5767A7820D62316", "240EC331B4740D6B70360359CAB6A8BD3720C206F1640F720CD7C8DDE996ABD3", "248E8BB6A18F83F9DED9680822437892CD73F01EF570AB5A4C9784F07ABB0BFD", "24998913BBA24560DF90F23DACB1EE1AF91DAA3212C9A03EEBBD3A5EFE2155E0", "24C0E8E0827CB2EBE6605DAAFD5EE0194B719538B16C6998A82844CB71B50C7E", "2537F49BC389A32095FFD04DD90ABD8C245F9F959B3040D4B3B584792F460CCA", "25397404A49A13F607BAB2C3AB213E098E878D383B3AD1E6FA8C841C89EA04A7", "254CA19F01B91229AD797075EBFDE4E2F31B0E186E1F90FFE7EEA7B96C5576AF", "257282661EC40294AA6CD7D16D142C7D834B7703E989C3E4C143A5B9AF27C918", "25ACBC37BF847C07DB268F19D48DBF40D18FA806E20FFFCA0C1E2BFEA5CC5FA1", "263C5D7B9C563798EF6F16FB48B508474CF7C5D6DC733506446F9C3E6FC9103A", "266D5248BE3D0719F8DB6BB0B2B0AAD869FCA9EDB418954C219627D7E135C477", "2694AA73D362C44211F7B5F683DFD553297424954F09C3B91396E15F975BA3AA", "26D5235D488CE1B4FF683176D66F75B4D6D0D1D2F64BBDA6EC8C9EAB70196A18", "26D8B9BA25346A1142EC41EC455309415D14076E05E1C0FE94BCF3C77CFC130B", "26EF104246EE173B8FE798F20C9B0F499B3C95857BDCBB8E535C30A87C5C61AB", "2728A54A733C1334AD5FF98B90433841FD176869AA41A20F157E87B17EAD4D49", "276311EA26EA41FBAE81DFB3042788416A0F2799192780CD6BCD5F7081C47F5C", "277AB899B314D74186E754815AF566FB51BD4C4F002CE06840E502A7867F360E", "278B33580333ED28E55DD7063E392BB225BBFB1BB954C108D12E110FCDE077BE", "27B11849CE393237ADE7F7AFB1B4BECD78159FDF9951E5E30FB407F9DFA93273", "27BC70E2EA08EE1D00F1DC696806FF0E8D5E261D13D8DFE4629529B49DBE187D", "2845AD6FAC4EA95B559A4E380E9C11A324976019B59ABF05F3BD5C0D71A9860E", "2855FD6623107C6F3EB666BE34C29500ADAAA089EB1F2952BCB85291FBAF8D13", "286B2C18D2C4928D071A32D3FE680B804C7CAECBC18006DDFBC33B4EE78234CD", "28E1A34D8B7AACAE238760E03EC7DC2D0E6A35DCA936AE45B1D6CE580679D06C", "2955FD677307C59BC4E381D8CA0275D629803259C2176CE4E845D6B42BA2E178", "295AADC2BDA75DE708729FC2E48FF012F497BCA3F20C0D83AFE9E96E09FA035F", "29816DC5DEAFD9DD7EEDE78288B861CE30DA2C416CAA710FF5725EDE67736A9B", "298BF6456F25FB0FA4ABCC44697A8A09539C09F07FD2D12D662783F870D20656", "298D694E8B6EFBF03FA97A7FCDBF327EA4FEEDD97CA520790177E2DF3923F9E1", "29A04E28DC01A835A2A8458E3625C31130AEA1B27B0498C7914E37FCE5F272AD", "29FEB4BC243AF3979A9988871B7F5C155C9D2A35DC7B74A7FF221E6D9E7BEA57", "2A1E47DBD233FE789FE30CE03EB01C4E46A020DBEF4F312E3EE04541FD0B1866", "2A203D8BF52DCAFF8B5E95996A1B55C43D9BF20BC5F58B0B4D388698819D6CF7", "2A3BE29C61AB5C206E51A18D7963A9C32350407C526C2B7F696349BA022B924F", "2ACC158CE3CE197B4443F431F01ECF226909DEB789D6BA03739779A643C7E983", "2AFC5A8E16BC71AFE3703E0DDD6A01C2DEC758FA5CF41D9AFF831AA67E5A2468", "2B35B37900EFDAB5FF5715D1747C8B469E3DF0010E88891A4315899C60BB7C5A", "2B4BFF0D4D521D5012752D32EC9AED8D7B42C9CCDA58A0989CACAC0FE91E3799", "2B78E0AEF1C0166D7F3570A979BD6CA8D73323D413CD2D5293F410AAE87CFC28", "2B8ED03AFB64688F7C236312BC8155AB0C092B0BB10F225899EEE28BFC95B925", "2BE1B762E9F077419A696E0C1B88E2D3F236BE3549BFC2182468480E071BF032", "2BEBB38964CEA4B62F9F2515093252761533127501B62DEFAAC8D801CC37ED8F", "2C070ACA838DF756EF2C6663B3A4CC8D6546936B4E9067A8CC8F4E89004415FB", "2C667B664D1138B9E26FEEA57AC8A2DC296113D6B6825F553961186FF3571959", "2C7412E482349885BC031D8092C58A0522256DA1A334A7F460ABFBD30F40BDE0", "2CEF62C50CDD94A991768F05F02F6E909CA28C3D65E1DDC9FE44EB80961223F7", "2D1C0AA1418FBF47302662148F950E7C026FF064EF3B9F6614CBF0F8FA30BD0A", "2DD5C6727E4EED0ED960C2D5700AB7EDDF488FF993374321E14841F44202416A", "2E58B569B4DB4763709C8CD7E2753A53378BB27D938664EE87B306305B546DAA", "2E99FBB731310229E5D67CCF834D84A3C63F588068BE4D2601929B95EFC9AA89", "2EA22845FF3D8BBF084A2FF32D38A9A12818125B3E719731850E3FDBC9961A9E", "2EAC4450763B71AF0083E418641A92A7E2E6BBCFE232EABDB6D4A9B98BDB7EEA", "2ECE3B786054F61CA595AAF0F84D1E826CED90F49FBAEFF05CE55C1F8F413D29", "2F02D28C25233B93F7A210909C1900EBA5D1D863E9F6B565571F72CBA1281D0A", "2F04ECFAA998A1546F1869C5B12B60478AD49E765F4F5D22896BEBB4FDAB1DB4", "2F2115F5724B651AC6B9F0B28265F93BC7C9AB2AC6ADC0181AFF86004B79A417", "2F6DCE2C99CCDBE682ED08A9421CED8979F6A988BEE9A17025F9CD412547C8CE", "2FBA4A0FB6AAAC5B96D5638614DE0F0DD6C37754E93BCB6DD5A92FF9E1771D92", "2FBDB647A432042A10EC78183C73C0F6FB59930DA021F42ACDA90C79715CDA31", "2FCC7DC0304D890BD89CDF69CBC2061713764ECE208DAC4D9921CB090F26DD53", "2FE1744F98154D972959A5B3C1ADD859354AF637B8F1F4F9A05859DF014332A6", "2FE62C1E3A24A2A73592656FDD830196398708E9C059617692732BA9EA6EE79C", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "30A5CA62F6580AAFA852738DF5325C812D685A3292E94F7A9E759C1125E79A0A", "30A96461C7097D736CA35E03B3ED3E622A8B32468020C992B5219C31544F9E36", "30DC450AABD11109A70A2AFC8BA5DC8E8DEFDC385B32C17C4EE2BE3BF55721AB", "3180B65135ED076EBC40E84457FBD56F4194E10FBC96990E6A5A4C6C76779DE8", "3198DEC4E9D947362AF3768731656BD9FBF79E754C34F560CE23FD3D14F37BC8", "31C0D6F0198B5B32668729F457051BC27E8C565F391B61E6339D7B6015170602", "31C3A45580C426AC577E1452281165B422421BD123090029E75698AABD3CDF2B", "31D774CF733E3311087AF9DBF776C5768E99CD088E058FFAFD8CB6ADDEE91194", "31D7DCC8D683A82E44671DA5A38CDC1A58877727926C937FE8D9FD9EE9FD2370", "322B7BB496E764F1B85DD25B946F26F5FF0AF85A4FAC3A7BC95B8C5E4E7B08C5", "3282DBAF074AFA6C97A473357736E8D5E80D6E12F0EAC7051F513FBF50E6124E", "329954F801ACFEDDDB7B41015C6222E792A3D6CA56B25E2074EEFEC3AF0BEBE0", "32A552C9D601D5556D9E77A4710C33359E9E59554828DF5DF32E88FA7D8B12FD", "32B20434710D4CE2D9F48A3DF5BB5D8CEAA637E619A2F59A623867C3064BC74E", "32C7366BF60AD0A0414388FADDC398AE2C222E692560B44546E29585DCB69B7E", "32EB80235F63631068A875B3706EBE57E1F30F49ABBD86F94E0D61C950097183", "3321BE5F35DE64654BDC1D5E9969E4021A6DF87C4FFFBE9992DB789C33FDE231", "333C119D3A0437BF92826DA551039CEEC4C96ACBE2B033BC949AB1809D25154B", "335243CD3E153CE71F83C1E35358A1A6961917FF347D3F9AE3F81167F8B8996A", "33F2BE5B3163CCE6F404E0E0DC6BB6A2C755D0AF8F3D67F6910CECAD65EA3623", "3410A57294243E5BBAFB4C69F17AC837FB02B049396A85D095AF16279272DED9", "3410E09FDCBC57E565C72083D3A630854D64B8490C9907FC7A07113F787F18CE", "345E18824B2D52AC690EC1671AC686DBE3FAFA93EBB7C3F153996741410FF314", "345F51EBDC4B614107E623B2D5435B6EE46DAFBE316CB6F79143A9BB38DCD9B2", "3495F9B812339D5B1BD78637C1F420145AAD93AFB44B6E35782DE0160CF7211B", "349AB443AFC0F9A0DCBBC79503DAD80FA9D227155C9781FACDB7620738CF7EA8", "34BD53EB31AD88FE6BCD0318A3283205983F8374B4E36C18A2AB87E881443510", "34CBAE11E64F8719EC4823028BE575923FD5D2B5F72BE9BF1FD8EE300AACF85E", "350AAD2689BD8D51867044299A4DE1EF4D4026FF797C56E941A05A20C7B464E9", "3532D1A44D96D72071A71D86948AAF6D54AA7BCA26247549D5104DA55DDACB6E", "353C8048EB40D7C11CD60ABB9D7F5DFD666EDB60B698E9932FC1A04919041609", "354F5CCF9C02C32A81D20FAC6EAAF1D180FEADECB61A006AADC88A2E3A104D8F", "3576FEB4DAFB79E3EF7C0C201D47295310F8BB7F0CC0C20D7FD3E8EE3350C5A0", "35774A12657731256610BEB1ACB2AE99C105060354AA560F82DED28AE65A8B24", "35775CB7BE8C2C4A9037236531F036665ED2A456F3687EBA615EC6B0B0407E48", "359D81A32B636B6B41B26FA1EB195DCDD898364CBE4C284C377BC53F3B665B24", "35BCD86D8DB1903754E8FC7D36AFC356E7567826BEAF12494F91D28A6919000C", "36006A3CBC2B6ED4FC8763C3659F749848C9FDC3A7A23F5C510E43FC3EADFED4", "3617E5DB629BF3E4966913C6CBFB7FB0D83FD9726DE73DD22305E09D36598E97", "362CA001FD00553BE7174C03BCCCBF89F5AB1348C42B438F71C6E4CFB81D7E56", "3669E45D7FE2AA83192FF44FAA60FB349B5D39469F2B30F7D69463B2868B4908", "36A705DC8B6AC07E5E1B5A8DC14844EA4E83EADB8FEAFAB5BF02844C75250EE3", "3751D59918B26EEDBAC0FEE1886D1A118A9D2105E993222B09C299A55F5D8424", "376BF79A42FDC2B79EA0ACE3299D7D2BC084C5F6732575256A96FE46F43D836F", "37D40AF5C1E171865606A87A24F599BB8B447851746C4748C75436BB1043A00F", "3806864362596B8F499C9B331631D79EC751CD68B24068ED9B36CFB553A6D005", "380C1A37A1BA94E78F036870EF5F52FE1B2AC3AC284C2DACCA777068A7394036", "382BA49B00CFBFCD3523D31968C57DB65C23CA38C3F8BBEB694B1F37AE70DAA1", "384C2E2A2A7CE0D7C1ED343860F7A8372BBF28CD038D1B9802B3A13C761159CF", "38673841651CC84F9C5F463EBAA4FCB1CD8DB260C4DB4DE5C5EB13515B8DE043", "386787210638336CC8A4D4477798C39C1093AF9F1749D0FFC4352CD55B67EECC", "38CCAB39CAFB6C2CE3724A92B67DF0EB31883A90C9A3CCC11561802DAE51A944", "38CE21C8E36E0D8E13CFDB6726BF7297A06F5BEE727FDC02819987C18B1360E6", "38FAB199DF9F4E39A65615F1E108853EF74C41252303325B3AE91FF543CD105A", "390281289B3F4343A1E1F6452AD13173E9D0CC35AEA58C89794C77A0CF60DD5B", "39104B54F5C4237FB05664C0CDAA7B85966DC25744CB7F77796A970C5B19D7A7", "39427C69BCDFE8C0B02333381F4C6BC6D4CADF9B5F4D8EDC7C60BFB08C08E1F5", "39C354245E58DEA5508935346917841B7B505E810D13B316B0E6615AD25C04D2", "39DCADFA5630A8B5DD97C6DDC00C4AD388F97C14FFE5DC824AE5D1BC2530A7EC", "3A0EC58D68A9FF044EFDD59A19016C7F96E811E1FC47D2E23F42FDF074B43F35", "3A2C45FC089B97738B4142A731D273066B0798A0C173D7D7F17A05990695F735", "3A3862BB2F5CF16B0EC3A6E37BC6259A114093A112447E385C778F568E3A19E7", "3A934AE5E3EF3AFC43B24AF0991F5D43670265E33F7583480D6AD5CFEC251C77", "3AB9E06E0036C8F4205D0B9C799D43CE7751D6227E9C183F98AF145F9DCCCE6B", "3AE8B7045D3F6049DF983F14126D0E4FAAF567E5AEA283E61BDCAB7EE7E255EF", "3B456375FBA8F9576ECFA26B90D220A038E69342D34BD0A526291E4B82A5ADE7", "3BA65632D2C38CB6B2155205BEF7E978F1A0061EDF59190756A9E0B8A31E73D6", "3BBC35C5643FFD317D4A62B5798A483EBE56001A5385E266B4CE69127D6565DF", "3BF2E5B5DC96CFF6560CACA72BDEFBC18C7F886DCC73DD4BC3A493BD7B4647F1", "3C50E88D9CFDDC34C62AC2D294E34DB10B2E8CA0FB292CC2F6415273B71D2654", "3C65676BB318E7F626C40886AE1DA0CDBF3A57C601ABE8A15883EA7D4C7A0F96", "3C693BF47D2367F3C1CF6B98F168404F18252E17EC96EACA6324028EDD5B52B5", "3C732FE7415FBA3DE391A641FEEFD9EF355B5481A82CB22A125F154F83F4488A", "3C757E6C207C325B90893148C70649850957A2F8AB27DE4E6D68D3EA4F71D013", "3CA36AEB3D947A832F54CEAB5DBA2CCA793FE74B9BF64AE12F316C148D2EC473", "3D3C4FB3DC4BEAFAD73308AFB9445F4931AF1CAA76C3F7953545A147535F56AC", "3D495863CA9052A253553495AD9BF5657CD32718E02FC42A34798DA66AAB223D", "3D6FBFBC369AC87AFDC7A238763B9878A6A5A8883DAAD80409B753C2C6E4D4B5", "3D80D3D5637052324AE469A23FF1235B9DCB271897EC1731A6209B86FD702442", "3D9AAEB2ACB3350759E75E6E77EE66B3F76A15FD2917B88DF9C42E0A45117905", "3E676CEE741F035B426AAE7DF3EC83BF7941667EB382805D029B2A95E65A0352", "3E6B657C015C16954B98859793FD033350A73E948A9B34DC9CE852E2232B7B0D", "3E7141042BE5B9E1A55ADA05F6035C03E394EF7DC2BDEDF57AEB4C33DF04D003", "3E90D8B117724A689CF205EB148C972A5AC679705260655DC0A260183EE9C99E", "3EBB045E0C6CBB4DBD65314AE92231C7C08D4E6FF07827902487061E2F3B01BA", "3EFA60BD710C6B4A11A5019EFB5EDFB39DBB8C2B14BF8A0CEF3706BED64762E9", "3F165D58EE48A0720F7D463AA93C65D50F9A941DCC6D565F609CE31843B0FDAD", "3F1E93CED935A8B73DF4F559D8444A47F42A24D3C4458A3E6BDE3B7C2F9CF9D0", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "3F43444F946B02BFDB903A1AAF3D8C43D59EF40358F854CDC9829F77FF6F461E", "3F517C6EB3F580D15A8688927C2FEDE369F340156A939E9A19A6F6469765380E", "3F62FF7BCA470B2753A8C7ACE1E94B0359E450C5B2C2C9EFB3CE8BC574F7E77C", "3F66B118E3B6B7E1EBE2EC99A71451F7516A3E38666F1982D3A6D9CCCDD07FA2", "3F709EA726EB2BD99A9BF0A52B5FBF758B042727BAB188CBB7DC446E3FE28E4C", "3F7BC56A1EE56FBC05AFCAA58E192701847D074F84491EA17BBE64F5C9B050D5", "3F8BFA161D8ACAADC208317BA26AAC30EE1793F948D454DB7BC13F5155B44393", "3FA2879FBADE8540F6B4D5091DA5772A30EB11207B58722F47A672ABFF7C289C", "3FFCB8C857007F3C79B27E410D1A065BE955D22321B8DC1B4F06D58DF3CACFFC", "4084935986C852F33CAE5E0C10EC1E67A016C9E964B3DE71ECA876D7AEB0B93E", "40AB54AD406F2338CEDC99E69986ECDC190917A9D711E806EACC78563FDDE00D", "40E849000289F14BA4EAA8A0BFBD0324AC59A18BA17D9C7411EF7F2C82E2F403", "40E960C4B69B3BC0992DCA14B0685310C0D6431B403E0338B65A7084D0D82E69", "40F7CBCFB58A3B19B3D79CA6DAD7B6DC2BDC641FF8B170D51B354FDEBE613E4B", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "413C7F666DB792F7C18F6A376B53AD1A68EF82F215AA8CB2B3A644B5CC14929D", "418A4C8D1E8F2E8A923DFE2C36570B4A5EF7B515E050C0F19513AF3DAE7D2628", "41BB6A57FAD3A6133AC798B9A434DFE0BA0E9AC64CD3258AAECCEAD5451AF287", "41CB9666A88AE67D4A0558674B8CFDA62F160B6DDCBA3C10576515447887CF12", "41DDC82A157023E312F96344BBA7783A54EA393826891156E038C3C2F4900D76", "41DF23CE2735413DAB9CB5FEC88B4F08F99AD02C93EA5246E5E57959ACBB4A3D", "41E5114A4BDDC5721ED193477AF4D7766B975DA049CA337ACB35DD35514BD892", "422537CB7DA0B51EC03742C69732BF7E841E49D8E76EB1282D4AADCB1A08526A", "426992CE827E314CA0A328404EAF4745BEFBC0708D6113651F89174E439EE015", "43354655A73B799F71F60AEA52DAD1D75E6E63CDBD03EA7A4682B6B8C07D3615", "437063148C0599A3C3F1CECB075FB83EAFC46606410F01E39088624674767E08", "43ABDDEF8A51FB28FC8C4825BAD26A0A25F5F21805BFC87561A0AEABFD065F37", "43BBB2862D7B1199D4C2C8A86EDAC6F339ED22482E792A5F1460A630A77A12E4", "43D6C2F69BACC643553BCB8943CE09506B5D513BE314B3093934E9025893C9BF", "441A6459C1CBE843EDD7F5C4D862AA7C6F90584EA901F82EF1B6D31B418078EB", "4423BE4E284DB650A0676AFDAF1D1B6AFC17995BF28A6157404E07A4FB153B2A", "443E59BD3E379FB80131CF48832E591C736EC385E8608E398529BDD9BE2C95BA", "444F37A66B1439774408C55A7653314698A2FD83CFE39018661304845BACFC46", "44589493FF1F7E61781AB0D49A88F15240A845DD679EBEADE857A5A1CBFB0148", "448D8F7A10C8011486C5D85D70C3471DFB15CA561C67B60B7E1CB2BA83B724FA", "44A5CAFDB867941EE110B77C8089601F774A644DD491F4E99B3D966F51D2163E", "44AFDEAFD41860F69D32A81AF82FFCC07CB70BCD09283311989298641C60901F", "44CD3AEFDF5FFF68A09F6EBDA434179DD5E83DBFFEDD0F62CC5D5B1F7E9127F8", "44D4BE9C6B3A5CA2D7E393A0C6B1DE6752C9B6BDF8F6BC23CA690D4063D3152B", "44ECC6376BE6908ED72D0D1C4854E08448004B7DFFD837E0DA6D246EAB8D5151", "4528C1A282A390ACA5FEC2B60AF3BC04387B861825F886E634BAEC0E8C529CC8", "455154920DE8D522768F261EB002F05967DC05CAF2E118E71AD533B91AD05C74", "456A44C73802C0210EF9039DDC2F2011CE64D16EE318CB2485594AB6312D17CA", "456B2EB80A04726EA1ABA567940D381A0E2976991206F33CA962674055ED3FD9", "45B6B8918A8181B5A49A84FAA6E92F7A2E7BD43FCDEF0ECCDE18648925EDF627", "45EE862A886525741A09CA53CB36F782AC0F17020C63C71E3DF1B5FD95DE8F34", "462CCAEFE39DE4B8C89C00328CBC9CA234F0066E30424E0C8AE6BA1EF9AA8903", "46408A14D896F2590474D3B129B44EA3EC035B71D283468445233579BDC6BEE8", "46CE56C60CF59C2CE96E832E3949D9036A709BD9A0B3F2E5A02B11F84C34294E", "46F19B07C11D71E357D28FD4B0BFDE347B5C2272A359685427860584D313AC3E", "46FAA835435B75C9ACF0355A61E51FB1D066AB3F9C5269FB30BFFF04C2C7D336", "4726D58587EE8412D67A331D82BD496807214AF416DF9A71BAB9B7D943A8F674", "4730A92424B05CAFC1B68EB259D5884D93B34BB1DB03FA545F363A0D43CAC55A", "4740D31DDDB60D6591786B0C7BECFA2FC57E0C921AAEB32D15BD10AC2E70469A", "474744D330770576DD29A9794C15499E2C8F1C8AC7570B97A1249B67DCD5443A", "476B017015C7BC4F8F39C2B41A3D687C1FD9E58B44A524C0A4CF05B7ED875145", "478179A4FF7D7F88209674CCCA14AA5E28599D1CB2F8DECF2A69F98F78B27118", "47A9526430C9C366FECCD6852CFBC71095166B7357B960378A8A4EBF55B1FBCC", "47AC8E33365C040A01C5CD6B775EE90932188BE66F1604397C6FBA4BF247B44B", "47B8DD30E1DAA082C05A1D60F4C6C018A4FE6741AFA0C39A3672352DDBEBEC9F", "47E4120B9285789AC2F5A2D577CA4BE3452EDD04208DFB9AE539ADF65FAE5391", "4829928E4C7715561CB19AF103394931A0114E34E269A614FDFFC77D2F61D9C7", "4831008AAD7ECEB15BCC2AF6CA0B235A90580284A36262D069AC3AB661CBEA80", "48478BA5BF51629D45FAE9220538ED95DEA4B48A5153EF85A2E4E8D4DEB4F9BF", "488FCEF71EF7DA59C44B85E01B61C9E6F64222BB3CB2279E3106224EAB4D58C5", "4896EEF1CAFED615B0AF81AE94FC495A15A2C6E04EEB7706D39250D72F162E2D", "491394DDEE034747D7811D1973C25BFF278CF244B77553F19F191E2CAC5CF3CB", "4979AE00A6ED0C539B1400C19C9582B63BBE318402F26C5329EFDF836AF802D1", "49FF683DB9DE64C6256ACDA7B1DA2BEED8115341B65A7EE02D410EAE93EEF9D5", "4A13A3496FCF6B846B2A1DE1CDC0810F64A5ABAB123B9000E74EC8183260175D", "4B368485BFA6ADA7A8F198258CDD04752B4DE77DE562AA584131224F23C92F1E", "4B8535AD588B9592C207C97AB565BD2B53447CF0B0759B7968856FD560EA7D42", "4BB64F82620533514180FBBD22D98224D4AD27139725A0E485662BE0A8761B58", "4BD0A578AC85BE4A404D10EC419136C4CE32988E7B285336E8F81B41BC84892B", "4BEC8E9463E4B27C09D4E3ECF5C98A9E0D6D193C06E6EFC3DEDB9F41368D7DC0", "4BF7A5E750431865636D92E71393396C252B3F778FB89C0C3E599627DCB87306", "4BF900E7E2F6B6A654468BA6C4292E2893929C6480A0BB4AD514E7E08B2817A9", "4C098F2F4DD25A03B6FD67587B106604BA4957943FBB7B66868AD8F6F9AEAA0C", "4C149E6F2A02DE48EF008D908A63161BF93C07DD6B16401AC765C3B64D274497", "4C29716DFAF2F94028196CDA699F5D37E499BD0F8473507DD5764A5100BA3D10", "4C3B655997B1B90D55D74A5668CC31D928F2F462E891BF5BEB27CAD7295489D4", "4C62280F93124FD0C7C5C20CA30CD4D137F1D0A9E1E35780DCDE98EDBCFD8B1B", "4CA0C5A39CDF0A6C145F40C0D734FEA846B14FA988249228B6F0344FB0D8ED97", "4CB5AEEB4566C85CB97CB5F4470481A16D1ECBA93395EFF72D6B83CAA77AD1F6", "4CDA0752752F5CEFF9D7F907619F4506346E3C776281AA3B019807FFC64B315E", "4CE1B2F6454C1BD94457E47D668B97B231076132166B23B18741F946099CC719", "4D1E458B98BF60900F9A3740ED6C159561584781B6E9CD058D547A2D459767CD", "4D266A154A3DA31DCA059F3C44F85045C1027D42EEAD68DA8098C2A3E0994AF2", "4DFE5A6ED234327248E8451B57200F8C7A68429EC3CCCB0DFECC6728217B38C9", "4E39FDB5C241C26D4DD2BD5D0D87CEBA03C22671C2E86D53C726034AAB37EFD2", "4E6353F1062DDEE2F859DA9376A59A0A02E58324E8A0BB460968024ADB369792", "4E7FE0F1E30AF3FEDE3E69121DBC9B8ED2C0931A5F59643DDC7CCF633D093C6D", "4EB2CBEB6EFDCE33B72A1C52E3D612F0A7D794A848AF0B29F041265587238420", "4EC468925EC1B01AC3E2235FC9136746880477512CE0A8130EE536AD1AADBEA0", "4F2F1CEC21593E14CFA5185766BAB1A3ACE3CE7606D9506EA35A0E0677085BC7", "4F441F1EC2D2D7EA1D9033E689E8C62FE264F17CF627C618EF574955EF8C49D0", "4F83742D4D9E3F03A6481F27A21969D4333962D309ACFDC2D174BF09D63F0F8A", "4F83B26494F5C02A937F66487471A788F350B0FE1D9EABC80254DB502CA97A51", "4F8D39F3F464E5E9FD3000C317BC69CF4FEEE9F0605C69E62D810607C6BB87CD", "4F9B97366DEEBEF2DEE9D041B3982BB1DF67BB173569B8AD40A84B319E78729B", "4FCC1DD5163EE346E1A9F93B8E75FAA23D12DFF359A57876FBDDCD952ADB13ED", "4FD6558CB9A80538F78AE6DD5C078F6C7A28CACA8FA5FE27C5744C1328FD1254", "4FD968142D565415C56FBFCE7828888BA009D4EA45B430D32ED1CED4313992C2", "50125E27447170BE98036399FE253A8FC89AB90C88039855C5EB3DF65F56614B", "5032F5D8F23CCDF7B1D1B61ECDBB7D86070F015EF979BF92355474F77B29D4C9", "5041F3D5141A619380512BA58DDE4E2250632BFCFF26D7B947F0A03A7FFC021B", "5068E580B2716B61E0BDE3052C7FEF5E5362490263DE0124D897EF42BD96435A", "508080EC2619947743811C2CDFEC88743E56A6A7B5472534F08845B6126E5BEA", "50D6AB8BFC4B38B3B5A2A79B2815AA71FB82CF937CA979BCACDDD58A775A78E4", "50EF63F8A7A4035F8A17F7DF087E72CCF9AE9915225E2BBCF1DEF908B23D844E", "50F054E398D9C2FEC6804DE8873031657002656851BE150871B2800BAA7C2644", "5102E26F5F9D162F10D7A53504320571C340046D1DC087AD20DBEB386B11F545", "511182968CEDB172B8730661A03A2F4C78BA383091EEAD7D8936E457AE6A6443", "516E060FEEF277A36D6526C4E424F4FB4783A65B1BFD619BAE759477F50DF1B7", "51AB1F7F50AE2546674F97D246115890E30F6672B86D6D523810D29C5BAE0D62", "51B18D37F54E0E13CB87112E0323518D15B4E3A206BB32632FE2181BBF89BDC8", "51ED8EF86AC075C84B5BED5CBA3B714C6F6D9491A369900A6371ADC37EE2C3CD", "5211C36AA0148B9ADF5D9940C02B22BA5A5A5905E1BCFFAF96AEE933332F0DC2", "521FBC3140A9184ACD54DB259B5C982B7555628E6C09A54B0ED31625D877719A", "52541493FAECB45A60282AB7C6CEFA45D066989DBE628A9D1670DDDA63EB5D94", "52C55E3F117BEC5A4C81BD07F073C455C3A77B620B813ED54D4AAF265197A27D", "53225ED171748DA6921F770A3958A41B21BADCDE197EE42BAF16F914E9B4CE5D", "534BE42CCFEBF334619AFF9C2FB1955CE0C058A0559E49A3D0C26AB6F743C73E", "53514A62D7D9E2E178325FAF1EFBB4FF93020BF2D45F01788543FEAA40036C15", "53B532B87CEA78B57E2ED69FBCEA8B269DE8F2659CD1185FAB9174B1B7BD0971", "53F32964A2275244A5F7A1D6BE61A50BA12236B3F5CF9F259D3080CEA722858F", "543F6F77E4608300B404990CF610F4B8172E607499AFA70FB0C0A21F4DE155D4", "545AC965386CBD88C15F17713DFA5989FAD35C50D3ECB83F0F38BDF6E6AF857A", "54C108178FEFCC2E097FAAE5C25ED91CFC0811D8F54A2518390833D0DCC7402A", "5504B497EFCB1ADA00D2DCB964F88F57F9AA5DE185DBCDADE66329A2AB66948D", "55642C3815B3D4E270BF79F60E3EE4741DBBE7C0EC94AD5B93E9F051BCA44D7E", "55B312F2DF953395E8F31E665185E8F229A2FB4AA7956F73AA21C6BE4D286CF0", "55DC0E3C026178E5F61BF57A45946FCB60AE3F058FC5FB886D807736D5B573D2", "55F965177D0FDBAFC93D2D5192178D55E13ED48EC0BAA93F60AB1C52EDA0DB76", "5627FF7B843DD3506C71D634BF3D9A84A7A4505185E28F6288298EC59DAA7BC5", "56556DC3F311515B25FF2D5351265C6E4E1386C59F4D8C0B1CE6331B086BCB46", "5661271458AF486CAF91C4347299A68A4928C9708FB2076BC7CD30C98EC4DC20", "567625FF8DF333D5C563E40EDFFF9516FF13EA40EAFE9A2E68635850284A1A44", "56906754275E685B1DC1D6D105C9D9CB42A11896378207F65958D5E80BC24EB5", "56AA25058B49601CC436FB99CDCA8B0EFA02E1CE410A9EC2373C5FE7CBDAE326", "56CC78C35775BE01C4C9BADAFDF799B350E98CF75CB5957993A02F3027111383", "570AF6CDC4F7E864E6852EBD03923041C13A884B424AC254820AD0EEB73694DF", "573F294E16A1C9B7682B48604209232E9D20CDAD4F9D09F633AA855F804E24CD", "57402651F5E5FE2084CACC020F262959511E3B578F1CD6FCA7EECFEACB2E76EE", "57AE760DFB50538BE1F8A0AE6498718A547B70C0FEC4480282AF8A01140729ED", "57B156541F8A4B8D4EAAC9421CBB54CFBEB8B1EE8A7DDF707129CEEE4D361DA4", "57D600CD2AA47C0B8ED95337C0FAC5BB49FA1D0A06E1B389ADB391978858A509", "57F776FF55271032943DDA94EDAE416CC0AC456F5B793EAFAE5C9E1DC182575D", "5817362CFEBEC3D97C56F71F58F7BAD39B11D1FC1BE175D82D99141AA79FD8BD", "5834E81AF46691B1D89090AAA05DF8D5F3F6ABF00015A6CCFC60814EADDADCF6", "585CCC2B164ED70872FA701909D0AF43DF766881E7B777E942C77DB55AC69FF5", "594454EFA3E9D7FC46D98FD80F976AEBA0747FB84090F8155C070264B55C92E8", "5963E86102C13FAE4339A2BBD9EE6063D58E6EB52BC2AFE8F3A78D413258C3D1", "597C2145694DF5A917E3F9F9BD43AEC462B29FC711E770CD5D9D878B4692E6CD", "599FD7C04A9861E581A0889B84F743CE6345EDB3A38453CDF55B29FBE0F03491", "59CB8A0BF6BEF140AF7CB7FF6669CD4D24E00C1E6ACF32AAA2AD267EDCDD44CC", "5A059C8C765B3BD7663468604398174B5ED506196CEFCE6A8AC2239051C813B4", "5A23BE34322F36780B2821378B1628B3331997E99E3A9C4B3B0067399EEBC3F5", "5A2425933E89E2C50FE1F3B1903983FFF1089EEE55483682712FA0DB9D6A700B", "5ABDB8E8FF34B80C89910A575CC3A19BCB906094A7EAF6B0B05A2411E4E3E5FE", "5B47275B66495017EC8BCD458FF8949B7FBE30E96158522A3DA6B3FED9F36A9E", "5B55DE775FD627D53A5307BC1C2CCF710D57AAAAE0C4F339A2BFE244B91BF012", "5B63337BED8D1831437D9E9CDA230341D96CD4E72BF44B64671DD96E2E83D164", "5B64BCE3EE0E68F7C1E61B0134954FDB115D5AD76AD549C8F967018D7BA777A6", "5B9FE3466C6709549936B7AF9F0C0D4DCFCB7C692D0EEFEE7E0A64D8C6798193", "5BC4A5FEEA0C738AAD077B1B33491400EBDE64B649B6E48142D5D0209905E5FB", "5C2AA669FC4216D735AA72EC2C962FA6293CCE722B37D72F1BC2F78867DC8F7F", "5C3100D70ADB390CF29EE321F5267DF9F7C52BC43BD74C50D3B3B555F7F88599", "5C6210B244865AED0583849E307937C7D3736F6B8F4DFBCB59E1A09B5A7E0C80", "5C7F4FA69211291876224CC5E5EF38063BA255404681592C01B44130CDCF968B", "5CAD5D32258B6EBB72263ED99B6DE586C3A3347FA7743140740A1F7CC94CC9A8", "5CFA2CCBFE05295C7186239383AF12E6EC68C33A3ED0A1976150849CCB589A37", "5D0D851514C0C3C99F18D8EB7D02D9E2C288CF6E8767FA29C32026F9B35E5C5F", "5D3C362CC49CD254788A7B4ADB1B7F0711ADD82B00BFB7F2310E356BE3EC4D13", "5D567CAC8B1B91B66CC85A1C9A61736F3CBA22497515DD3F0D18247FA0662627", "5DC1D4450F2C10180A54188407BC570F1264B8BCF3369F25AFDDF5EC5E93DA09", "5DFB309EEACC06B61D408A7963D4B9522D38B36040304E118E4A9237BCD1B461", "5E02F35DE80ECC15B70D12ED4DF7A3FF92E8DF3ADBAF829B84A2668AB541ED5E", "5E0E32B39EEDE0FD2DF597014A313B4760C8CCD85774132829C4BB7B6A2ECEEF", "5E45EC28AB6AD23D419A8280863950276566C33D9820293A020A777E8A4CEEA2", "5E5C3542432C244148D8B1FE3AB5BF8C0F5F43AB9B9058BF91D5D4BFEA40DA5C", "5E6AC096D5F35D524923422195E5F8BE5ABD6E307943C5F7A48830343C060E96", "5EA911A52931619D9DAB8C1664C2291A4B990D6687B3AD2CCCDF6E3868563D11", "5EB2EF02E634D1E359DD6A4601AEC530DE4DEB31B9F3BBEF88114B9BCCFA1DAC", "5ED23A58B9EF0214388D0D1416080CB3CDF0BDC6B03D9DAF932A53179FACCB2D", "5EE17E6FA7B2E867293769D2B457CC1C902CEA1D9C6F97B78C2166BEB5DBD8E2", "5F0469017E936297F6853A39B26FB54C2D62A7A59EC15BFC45787D2EB0637C32", "5F0A459E7C55630FE8B65EAE2894E2115CDC425C3D1639EDACE33CFA2D3E5E1F", "5F12C1AE477898835792369095749C194B6192FCC8D6F145CFFE8A4822387E8C", "5F1A8E5DEF8C5B0BD8A337785BC9EC92521E4E1FC191BC80CFB2E92B4BEB7686", "5F4AB78601CF0EC021CBED088FC812AB45F53776509B32A0835740972E17B307", "5F792F8D340FF2EE83DE40316936CA0AA1272904A4423A4CAF9FA698D9FD6BE0", "5F9F98B63CFA9F3BAFF7D46D1027876C47FA88574428F66B0F6A8E0196B8F39D", "5F9FF950BD4052B80DD8CE85E852AD2D2F86399AB0C334135E03BCE5C240B153", "60534107EEBE1FC28BA7B5968A9A0C51CA6E5FDA395D6771A575BA502A8E6DD8", "605824B0F1E7904F0006D6BD8CDA916656441929779A4D4014D64A516FC9936F", "60B88A74EDF5773B6DFF4D61BE3BD53CE790844711A892BEDDB88D4F8B67B612", "60DB7F5346C5B9A16FA72AD40E93F7504EC85787EA9E05A8A2B66219C25CEE88", "61149F4D97B791E1883A77C4470485C913931119045329BCC44F6A65E2B0A9A4", "6128B5AE5452C7BD3526A0291C5532CAAC76205B0D7013AB92115F62F8222BB2", "61BA13177C24363956897FB06D67A0E6B8D5FD0AB0DFB16606219C3BB1AFDCD5", "61FF6F10F0D76277F85A8A525D2C9989283AB04F3D830BEC0894CE78DF0624A3", "620AAAA8D7D0FE3187CDBB17E96CCB75AD90A06BB0CEC0A6F43E8E2CA7E9893F", "6227E56DAD73769F0362D834B90EB9B1D9A60C3227B1A4516F314052662E33C8", "625315C5B17A981889C68C1DC913A985ECDEF73FFF0E3E9E715287F8B8890C6A", "6263612F623854B1816D51762475FAFCD97ADE651BE7280B16CBA8CD17414AF3", "62DB70FCF6301104005FF9FB20C71886DC177ADAE354920858B0940C223989CD", "62E23437974E48A449C2EB8CE3148CD724E7039E419C0CE0AE579DF2B11560EA", "62E7A719C331FCAB47075BA0B9A2AFE666ABEF25DA19EDB1572CD3B9D2B9095E", "62FA205C8A7497F952DB90EC6E965D05B25B30B2F21A34DE73B96B829A2FA09C", "63491DD97F4B72DF4482AA5603DAEAA0D11ECBD12741689992C14929BBC91CB7", "635E714DA56A0FFA8A22BFDD7DFA750905703B4E553FE2435190846F7AB29ABA", "63C0560C61FE9A9777F6402C4988E794A31F66C8118AFA944D2596065F5D0454", "63E97EE79A6570DBA544550FC5DF8BE2C8A41E24FA160EBF78E0A0A573148655", "643278CE1BB636D8764FFFB99832A74E1EB43BC79E059A2AF6DA2A9DF4BB4FCB", "643BAFA6F73911E05A64A08F733FCCBEB533FE9394332940B7739828783149AB", "643E846D7944EB8AF4DC6AA049F3D7CEA565A47905FF0E8DC5627CB212EA131D", "6440B3CEEF4AA572EDBCEC6666974E017AFAAA0983E4E7486BF1811FD9CBC173", "647A7AB345F655E164F4C0AB87C5729F0821EA62A0208C6067C65D31362414A2", "64936DB1043AFFB68ACA6293C18288E8B3D8252A6898115168646F4A5B00CE7B", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "65479F953E54C21851BBC62A028F16F0946CF81404CEF80DF223E3A777553349", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "654EC4741C192A4D4B8ACB967C8C2D31BEFC1442C9B7DCC262604FE1AE69DF3B", "654F3603785F612FCB89C4655C367EC60F72994A083FCDAAF1A7F63C68137F21", "655FA693F075B15B02ED5F3550E038AEB5F311F84F9BBF05F07D4EF8A2E7A57A", "656937FA945DE5E58B9B5C0431A830AA521D479596EA01ACED0A20A166C4E3B3", "656B7B6A212C96902F7D8B743A5E824353F6D2B81D84F05905CE35269CB6FD8F", "65BD85EEA82480E1B72752A89B63F7195DADE7DA278B8231BA598F7B6F47D289", "65EC64A753CE4A7F6C9FBB3047D29A2833F1E56F4AB452D779D8436BA19B01F0", "660F79D7F9C6524A14DF2940CF8DA166E39FBB028D628CAF3FD232455DB9F4DC", "661EF6C7BBF8AD251228707DD8EDA4B08D9235BFBAA6C9BCAC49A5F4CECDE3DD", "662D2612392C122C804D26AEC201E3811C98DB9211142384D96CC125BAB4048F", "66693B23AEF92EC66457A5737C0ACF10DB393A26320B0202871EC9028B92FC1C", "66886B86D22AD162D05F9B987C32085ED4A1AA2754E87D356E718DE087B7313A", "67F53171528755569279EF5B92D7D35678BD01A795048FD56D012B452F481787", "68016A8DB4106D592EEF0B68F99DCC1753587E6A6CD5F38B754B1EC7912C735D", "68762F9B97244228D4FDC0C6A3CB0C7CA39273D7387B7DC7A403747ED465EA59", "687EF3D9E4C66E2EC0DD556D7C5488A09AD8CF69EA1010A9456E63DF45C0B64F", "68F0C3AC29EEC11A1B3683CC670DBB84880DD11F8968A7B69BF67C664E520FCE", "6922C90D32E66570378B8441C546DC68BBE0CFE06896E9F2C63163B94E9E2292", "69B7C0620CADC704D7AD182503FC0F94251EA42B617ABA4F86BB06A1DFE4EEF7", "69C147CB642B39AA3250947FC1868ED542CC9C2C3BED4BA821CAD9BA0F178E84", "69C4BA7EBA2FBED8F26777795FD33E6380CFCB2F86DF70D928F147B0F1622932", "69C79DB7169CF870F6B1FDFFBCCD8DCEFED293B79862611C9A5D39778668A20A", "69FB72CCB8D5FCC39004FA966C700C2C3FAC030FB41B36D5BE112D01469B6B39", "6A3CA94088468F0733CB5F9BB441DA1BFDE8F996763A235F65A4322A3CE1BD0A", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6A8FB2890AF2EBFB497D7D6CCC198FF3FF0E22BD184AAB460E05F9B5E0B6A4DF", "6AAFA181BE485B87085EB7EA6C01841FB961D1E3A5440BF48D881B002739BDBB", "6AB7EE25CEFEC99E5658BEFE4D594FAAA375C1558F00A1900E6FF8619C6CA80A", "6ABEA86F95DECD03C32F5BD7AF2042BF07A1C544724C672F6BFA6EC88894C596", "6AFE0225FF449F7A6AD90F9665790E82664E148663D54920693EFD869839FCE0", "6B0A5599577E8CC081B38DC85FFC053A3E597118CD8108314778BA17EC91A265", "6B6F13479A05023E8BD2B97E73C4B7C00B578E9CADB70B9A72B008E52DFDECB7", "6B9D154BCE10DADDC28B259A53CDE7ADF906DBCB05E8EF0696407EACF7A37CB7", "6BA70D78F086D07D5D04D35657C565B766597C9DE86C3B8D586D271713B4D89A", "6BA96613CB9284A12C5C7BA5B1AF346C52C407C3784639F8A63CA5F6E90563C2", "6BC18DA0ECB7EC1BBF6CFDBFCB26FD36EDE6917B38150DBE26B84EC367F24B00", "6BC9040B51F3B0282E132873A0D807E58D8450D20237A38329B62B37AB7F1BD6", "6BFF2F7D47BEB5AAD519E86E0FF790AFC72EDB0265341A03D475E407CEF9931B", "6C8567DF72CA8A25F4328377A9D305D3ACCAE181160B03E595CB767274D3C083", "6CE7D70853B5BA8A7DC514288FCB381FD331F076A7273FC4FAEBCA19251B77B1", "6D4BC30FC7D54719CC8531DD40CAEF904411E8A769D791119C3658B78C353F56", "6D72F5E2F90CAC5A4D151DD3483103FAB60A4A6FCD9FF4EB47E5E45ACF7A4129", "6DAC6EEB805151FF0072109D2D98136A384E05F33006B9BA3A7F387BA115999C", "6DFE02E47206439339CF69003DED7C6A339BE8A9FDA6611EA300ACF64BDB9DD1", "6E31A8C1AFBD4E4787BA087679C17E5D58D404DE1F2C658616BE5ACD914617EA", "6E3F293E02D3B6D0238E0282D8FD8862A73192FD2C71B007C3D3B943147AF8A5", "6E4638CBC2FA4AA003B9E4D2F0C796E29CFED5F20C586928EC3F63005D53A85F", "6E4D6E5B1FFCC563C5BF5B03929947F97646238BB25DF5CC04AC779FD340532C", "6EE71D5B8CC229B17D346C2973483FC9B94D57474DA00268794EAB3444B084E0", "6EEFD78C32039D143093C070708359E95C31F3BF23015C363D56EE26592CC014", "6F1207317470AA234882D78F1F399A5A16C9D25ADD86B6DBB1C594BB387484C4", "6F167E97EE5A7BECA69F98379362FF1A9B5B3037295BC2B9A9574DDE46E947A0", "6F3F6DADD552091B6F3667F9BAEA0214E2DEEEB84B68778DC8F4F03FD4DEF664", "6F607AF63C8C989A61CF1A0B9CF9799D18AB1642D794D93AB154FE52AB789CE5", "6F6768C352D35E635941DEB363A246932AED6F313203D35ADA25B85FA350C55A", "6F77F80EE3AB09F7D1E3FF7C55920CDAC0C2065B8D946835C616112F8BE43DEE", "6F8D80B13301448C85C74C8A2C427E27F46F87CB1E489395B73A87EFC4FF7160", "6FC3A70E69693A6A15050339D9B2368FE0F69A247562F6FDA33037FBACD59417", "6FEE67038ED295324647308F3C611846F29F9073DA5F2D94C9C0754CE87A2A60", "6FF75962CB7DDD7579E6FD1A7074307D64F2739B039FDA656F0F483D64BA1F23", "70427712BA5BC5CC0FCAD9F41BE90E49714240938954BF076BBFB058FA595319", "704A27B09B6FB5098F652786D364B644E9882F4EE04CDB06E5460ABBA2D2037C", "70549CC4BB1FA3369F5BC1EF01770F5CF2D9642AA2B34DE63805694D06A895CC", "705D1AA8DC1EFC5A25852EAE8F70114AEDB618E07145B676E2B502DEDBEBA92D", "70627666C31162C53BD5D03CF6016D0A8D8680FFF735FF221AFD4462F55D9E39", "707D0535349C6228CC3A3E443561059AB988446A68CAE79F07DD58840F3DAAC7", "70A9E006601471831C111535E5AEE0524C324100C2852ADCCA9ECFE67BDDCA0D", "70B67C27D11C914662D2A0819F63604D4F6B869B0849263773FD48E942D1344E", "70D8566E5246B3550B562DC69BD9E44914B7C5D0DCD3C21264DA9CD5683C56E6", "70F94E7024BF4E7B555C60DDD026FCC92D78CF8920C09B5EE7632E5C85B0C2EC", "71775F8B80AF3BBF0CF10F0859E199AE222B899F2C8DF45901295ABF96EB12C8", "71992C293C68F803D971C4A6799C4C00887FE01C90A51BBA1EF2ECC47DF8D10F", "71B2E5A93BAD65EDC8828AD648152A6133B0A6F1A9CD3EC0D973BAFD3EE16900", "71FF34DEA30E5EC74405EC816589CBAB2E2166AEE79DBC2DA5C40DAB9AD5D973", "720AB7A09908240527CE5793C6A8CE128B9EE732A9F5F4D0B35800CAE7DA3DCE", "72BB3BC198E5CF30445046A5030AABD63EFFF869220C6D292F71B3308B547D14", "72F1807DE4890F3BB43A992E28DF563B4DE911006515812F38C4124C9545D838", "732500E18BE7C9ED830D9D2C86A1F758E95A1A12A09BE8FE102B75F50E6A1E5B", "73901AE70B6C377C8A6E35CB1F4CD13408DBEEA02C1F87132068FAC4355F22F5", "73C56B324A2080FA9C0CB45D26C0A4523AA2C160E0E404D5B47EF65512D83AFF", "7463232BD9391B70113F6779133DEEDF82C2F9FB5E2F9C9C4D0363B332E72184", "7465D22CF329E0DBCA0DA76BA2AC2A00A5620B5C064C09EE8982984333E2EAF1", "74D0E5AD4F657233552369F17E052268A86658331A40E0F3BB6D4070311F727D", "74F2A94336E51B0E3062906A1A2B7FB8CDE35DFD901789C840E3CE1DA62E9EF6", "7515461187DFB015988713DF2DBDEA4817C1389377BFCF2A0E37795D61EB76DF", "75172376975CFC491DFBE3507EBF17A98678B53D9C0BA45EC17BE0841880DF1D", "751740DF28FFBD1398BAB1CCB7840AA26198399CFF5B4BB6AF39E177AA85089D", "751CB6A9BF687409CFB218778DB37C20DA4DA2EC6316F9E59110746F3B88B073", "757696CF6B25D861147516A0233F27AA8ED63CE44EC3D079E6265FF809DBCB35", "7577BCAD9072181E579BF3A80532F420C8424F287BE8B450E9A58DF0F61C21A9", "759B56FD4AA17873CFEF240471D53E2CE3CC4A7775D72A8FF17D44E868820C96", "75A547F3BA75C8FD5BF5185CE11155B9F37CBC820B9102C0531E0C7785BA8B78", "75EECDFC779DA9FD1966C5DAD1AE11A16457B1CE376CB9360156AA150266966E", "75F163F24472BDD458A7F5DECF8D9273AFCBB87F993AD4A2EE15004737D2770E", "762B934E108817D7EC500735D49B8383A3D66B67FECEE7DB94420501348B7A66", "7646169157CFCA2EE9B0ECDADC0C273667191C1F53D4AC6C5880ED444A68F873", "765EE754DDB2AFC25A4F81B453619E8DE782835F4B2ACED4DF8CE43B5D4C10B8", "766578EB2C7BE8A81F504B4989C22C31CF802D03B94649D36D4712AB13F788F0", "7673ECA7C26C82F326589C66582D68F7F87357B4FB250AD73DE7E7F5EC924344", "76FA12A14D94277858DB1075CD6A9F1E4AAF161AEC3B71FC67679D638C279BD5", "7712F0249FC574F5E6BB742100BF0E53D089C499325D28D0E2739DFD47B4CADA", "77A5CD46FD3C6940EFC34DE8C8AA831927106A12E0E3EAC862A5D46723F4092E", "77C9C6375B124FB74B41D2803B9D15B70F1BFFAB59760B5E3B62D8B85AD60B47", "77CE729955C639856E4B82368F1A80123E289EE9ADBA4B2D00CD85052FAB5820", "77D1D444B20370DE0EDFF23D9E385D851AC796623E4D85D114F6A8AA31FAB59A", "77E3B133711A229EE6F6FD193085A960ED9886D3E5BC54FAB473CB3C4E40D0AF", "77E3C17864071E6772CDF6C8E252ACF8E77FD5D30AB4631D569A5A980B8C27A1", "7870029A339DFDD9B0C5265A8E49D260B250124D59FDD019BF4F6D1B6F19F6F4", "78A23A47DB00C0627D9DF05F678C808426D04DD0A8CCAE5E98BA35B0CF4A99EF", "78D9C4BA0AC6C939F05FFA65988885F5B6562735B96655E51EE309206C6220A9", "790AEE8158E5072311EE0B1D8C1CACC2CAE27CA8C7B75F39AD990B40790CFB8C", "7919E76DC5CE31A56A0E93B591BD3CB39E66143F03461956DE710B67CE8915A2", "792B85A8DB94781D66D2F4C4B62AF0AB0D8345DE0EDC163D9DF3146450CB58F8", "7953C97B0B3FD289B52A4661DACD83E4D1965A9A77B680B17D60E3604DDFB0FB", "797C010D7F91BFD9A4AED687662A3AD4BBC6C570591ECDE2F84EA7CAFC728939", "79A57DCA9547EB7144EF1FD539121D0ABCED0FDC7C53893D2995C5C2A1DAAA8A", "79B141AAF1C51913A9CB5960F462DFAB85217C7BAD6F6CB8BCD729FACEEEBD51", "7A150D300EAF951027B5658B77CFFFE80D0F69EFCB3AA3F0D27F874804ADB297", "7A6627FB30537F67774301CE66136CB8471DD887C6FDF4BC9824732D94F56B3F", "7A722689696066F0764723099958DD60A4C2A6E1D3EC8E91FE513D5405BC1FC9", "7AABFFD7EDE8A56FF3E63014903A8533BF0F07389F0D81F452A4D9AFF5CEB90B", "7AC008565964BB5E37B83E3A95B7A5C1DA4A265761E2491BD98651B93221F678", "7B359356CD081C300B6ED54BB2BAD9F9EC8844DB36B849EAB8AF90AC4CDD5E55", "7BE11F93427DE2496C264310F6C3E92E19016A048F64608DB74BA4A182CBE343", "7BE38BC9D9063F34BE9B8AEC73F5518E1D7B0EC8F35109DB2E64EBA48061A6DB", "7C01AFE6E64B43031575F0102FF010954F3B02AB92048869BDE2D0610503F56C", "7C3075DC61709575BE339C93B34A28129B878401D16A6C0C6F9E1D821614817B", "7C5451969551322B10C02D39A8205047791F77289C2CE11B04A515BC58230E66", "7C6822723C8DED69D9FBC4D1DC69A54DC5A848CD239869AB0C90FC327D194CAA", "7C6868DF7570F67513CD79FFFE949C20A91FB069E0BF035BB536049992C5168D", "7C687A5C4DA5F147CCB651C24229AA31D311EBB13BB2DF3508D7A6085EF3DD7D", "7CF53FE09C7D25161BFAD59060E2F4269BC90C0B892337805721A0FE0A9BDA22", "7CFB9BE2DA6D94FEBCA1C4AA8CF9F47ECB13D1F735997F5255B4A85A3E13B4E7", "7D158CE8DF0EAA9F8D32E562C6E3311BC04075EC6BE07466A648F40065F0CEAD", "7D67D80D4B93C266A649B84CAFDD0C7C0525E4EF25DE3D86F84615A02E71F9A3", "7DA75544CD7E6CCA1494BB08A8E2D9F2F758BCF509575402D1295584D5993961", "7DAA1079EC80CD5A34A54CC4F091B8B38553BE4A9A89DC95810848A4E4B45568", "7E0744D5936EDC5F018B0850D801B665D388060D6A81B986BC7AD81C9A78C0EE", "7E120392C6B27EF023444674C7B2E2BB0AF1032844B5941C3D340385D2344B0E", "7E18B438D1C420D8FB4F0763D89974D25E4342FB6DD3A5ED861C0784B3F46C2C", "7E1CB2FDA212C7A8FC0CCD8803720285F00C1F62F3E2628C7217A85BFA5FFBC8", "7E466DB7C3E6D0FD95B6290D6AABCA2CA5965052B0CC5CB552473151BFA7576F", "7EDC7E4A607AC78AB259E545462224179BA0B894DBBE1C19D52406785B960D30", "7F074E985E9433293F83AAA7F6DAA1B51640BE0E9CE150599D1BBD7718BDB08F", "7F1C012CC641EF0CCDD9BC749B665F263D22200F5DA78D27932DB5F6F0D9433E", "7F25E9A23C5EE82F1111DA9405100152F1AB05B2B872A82C20350EB7CC95BA44", "7F26D3B80FE11849EF97380B8F447B4B85426D57FF47B8A6B525B7B6AB52D9C6", "7FC1F320EFC1907483261EB76C43191A3C45F5D07F0AC7CB20EF8B4AA9797433", "7FC5F5C8B99EF48BADCB33AFBD61D3D7F58680BACE18DF827944240D66A8BEEB", "7FD9F7FFE1C0EF8F68DFE234A094535CE5CD56211AA4CA79732A71BF6B3C0262", "8038ED8E32AD1F774FFC8B2962215FB84FA742D436B85DE275C6BE03AEE3C00F", "8039FB04A2531EB7A8A10709ABE8AF69FCBD24923ADB1607D3008C4B1F055832", "80737D4B4CE626670083B16CA387FEFAC8045ECB16DACD55AD56FFAC544F21A4", "8074E36BA6CCBB82DDD34401CDDE6095CC85FDC1D6E55869D25037592E0F14DF", "807F02BF5D04D1D709B1D383A56D073A3E2ABB5E058B819FF145C9C80E083AF4", "817AF808ECFB2DB89B8957CB7948F2576360D0AD07783BA6C641C17BF4EC867B", "818B433278D5E2420F4213C71C6036E7BA5EA3C87CB6A3BC405627E0A3B9E898", "81CD97D40B599EE218115B7807E3684EEE7BAACF8D6358073A555F025CD33346", "81D5F6F41E5617EDA7FF694BBE43496FC48B7577BB4C9C238127ECCCB1D40118", "8204B6AAEB9CA480B2BABF218A0BA53A2F6756B72A886187C55CC06DAD85DF7A", "824ADAF8E5DE88375EFC5412C86554019A1D20AE993BF46D6E6A634FA7987D24", "8275C3B123771E721297381D0F66E5CCB99C5D5EA14F12413C6DF109D950665B", "82A9F24907A9B5CA433EF30634767972B95813695A7590E7216F059F1BAF1D8D", "82D54F3A8851AB67E2CBD454D01F29A2AC56F14C46626123CC454C01A9D5983A", "82D897D235CFB70936ACD9CA3E6034885E56EBCC4A41A67CD33F1077B9C80885", "841ABF9ADD122315E9FF98182FCCE868E8819519D3577D87A3CBDF6FFE75C0B5", "84BB486A16164E9E9FFD8E6D5DA45CDDD2999475349031D618B321E598A27C51", "8536D8B63174615B39C6AF8F68F74A50B7964CDD4E6D798DA69521E1FA81F86C", "85A203AE5F731A8A23D151364A5CA4469848689E5B34009D9D63DA579273DAD0", "85B7C56E128E085728B9A6C1907216332D70311005E46352CCC818BD2B282D3E", "85CD5F954685303BF20294F2A2187789849718F8908996F4C20CF92F11753C77", "8677F08636676A812666D9173BE281822A35EA2589B586A211824F7B588BD018", "867F57E644CA0B9EBAE8F6B4AF3E43E47039153C5F0CFE46A8DE2A9C5715A892", "868BCF589AE48EA963535B60103C986C989EA814CF21EE80F882A9F14F2D0010", "86BC382413D13FEC49BBCF5FC0129F8B83C058E0C0CDD0CFC599911E284C4FA7", "86C605E3543D3B83BA0A25B4F9686B938438FDAB955B33BD0721D21AA9B6A946", "86FDA29703FF35A4305664C83850C30892B9B61C669F608409B4DD6B42852AE2", "87080652FFA8C2DEE3311F586A003938E50130A6E44D8B6827D7A32AB3C18132", "8789F1A6D596C8A6BC66585DCB6E13DB24951FC43243FD3D7B803A8FF2BEFC44", "879386F682CC1455246FD7C829CF91A2F25AB2793DBAA6F53BDE7DB2B8771BF9", "87B4000A01C23B6231C463A8E1B3BEC371361C202F46354684899DC113F12BC8", "87DCB77CF764C7235B6473B289E603F21A1588D5812BC1D3022468CF1C8EF03A", "87F784817DF6050E97DE8698F7CB349CD170961AC5E808DCAD56A3653680C140", "888B18D627FBDF7183E9A5A773EC125FB2EBEF80DF319F6CAD751E006641978C", "88982C3BC765C275837ADC018CDBF4C480BAB80750C3DC007054B3AED0A5724E", "88CA564F4DDB0802DF0DABBB1B2D9B63B5E7F65C00DE5112D86A906BD37EFFFF", "8918FD495FF9392365BDBD9D6D26790E8AC7651001B0CB48F49B246A9DCEA911", "891E5F0424A107621BE648D5F1576C607F7834B3BC114E0F945E5010BA70A9F3", "89780D4585A20488FEED7686A5CA76A1831A95DB741EA06511648ED27850EC1B", "897D97A15F67334E04B720BD5B5FD67F1EF556B7646A0D5CE46424288C102782", "89BE9EE6717FD5FE5CAC882E73D515D8E83F7EB08EF93BE1CF98227C2B6807B1", "89EDB053A13178ECCE22E53127E4E3457976D1CD3AF94B502528C97684F15BB8", "89FA8C3D609DA37A07A9176E3D62CD317A632452E0252F1F53DB21BDB9518B31", "8A242C548ADF3E615FE6BA32C7E6F5B2DB8B1FA250ABF2329DC20A0FB32D3700", "8A25414E8FED9B3A34B56F03DDCF0BE180EB8F7764BA550EFFBCC83D0E7E8154", "8A3B4149E7EAB3A7478E92C55ED495F70AD25B6A33537799F9CFBD490835D8BD", "8A4B8F016E20BE062D275D1D7DA531E398846FA5F653F9077E943F8758AD58E1", "8A65F637B267CC03477D8AD35E745DB910F4F59345E9C265E6A8241596E3AA90", "8A9DA62ACD0528EEF6577A7929613A497D58F78FF0E64379975CCC381DD42953", "8AD3371B44D7ADBB4D07C11C71F4D7936BA847B275560A957AE1E42342ED2618", "8AEB61826548DDA949641863F93129FEE91E02DC3B949C9D6D3A111A2DF9A0BE", "8AF2F21E4EC6E964221A7BB6BA60DA28EA5F34CAC726038BF454FF47753E6F55", "8B0A6A21BA2668C6FF8B23BDBA894A0A5CF4333B21213D8B0B25FCFC976379D7", "8B5D67E084AE4982DB3515893C2C62FE1E1A1BE11B1A02560CF7554F9DA413A3", "8B65AD0B262281BCB3C1B71984593938FD704EF9F6CCED6BFB6939C6D2117DAB", "8BC573C8FBFDC3FE1293A99FB38EFC468AABA4FF41FB2D0FBF491836C839D5DA", "8BF9E951D2952E5BFD9190BD6EED01A626E5267E6C5A41ABE0F6BDA10ED75439", "8C0129814949D722F2963CAFBD1856188A64AE8EEC7A15813CEE888467B6FB34", "8C5BD629FA7D39B5BD451BABDDCAC49CF0450777D25DB8D47EA1E7BB29AEC988", "8C5F81E1994499DBB0DE67BE5FE7D15F748FAEF0DB15BBA4651F5D23252455DB", "8C84F9F6803F7B599727F54AFEA8E6241BA3FD1510B15AE2524E912A02E9BC46", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8CD12EF78572A4084B09F1DEB451D5D52F854099E5B1A1A30714B96E6F38483F", "8CF6A6FE2F39323B5977B7A87F227610F8DCFED21A1A2E55F1C1160FF28EB52E", "8D64F104C14AF2A33552E861AE403F451EDADB214820F820DA429C523DB6D464", "8DD827D74AF85708EA2C9099D87AA731E017BAE733F136194953C1481A380280", "8DF333F79E75C38BAF5D10978D2A5980C7BCD16722EBEF4A77847AA9601A851D", "8E0AAF010EBF37D1F163FC08D65BD399EDDBF518CA20FD163ECA87BBC1970535", "8E1256F4D760B64395430790B1FFF7F6484E9B08EA17FCB3BA65F907AAD17C88", "8EFB8A654D3536DD4481500A7680D75E0B2A04D2F63C829CAE130B12A35D7ED3", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "8F6CC64B7C1D182ABC7251BFF8924BA1D8B73224511670C7FF24148A5021A89B", "8FA99E4D26249E130318CABB55E8B0BFE88E1B434E83757A8F7D6000543E393A", "8FB323EC50EB5CCD3380176BF2571DDA8C7739DBF4BC558C9B57458B912FEEF7", "8FBFE3954A9345184C9C56BA71D87B643BE400E22551A9B009EAFD7D82E9BD57", "8FC34A0E6146DFD832B9B42867CB12205D41BFE933E8EDE61DFDAE06C5339ABC", "9015B3024053E33993F6C31216DAD607F6216CD5AC759977FCFEA2292D1A3F6D", "9018EBBB2B02EE47F1D399A0C2BDB34D3337938CEAB3DDDABC830CFAB6427187", "90246D34A2A9EC4005A1B788C09D0DF4366E66BC9D5DC5A39EEF5286DE79E161", "90292D88D6F3FB64F49163CE1097952FAB347C6209064E8EFDFA3E73CD335199", "9072A3949DB0B993381872192C7569F7FEDF9F246EED53AB13878188F80B929C", "90CBED615DB7C688B24C2E1BF7575469D0E56742C9143BA899A9886568AA95BB", "90CF485116A952ADEC5B5A85E722DF33D1556D18AE9C7D1F5699712F4EB9F66A", "90D59D207E240BE5AC750765C539B8ED7F5604D85518190296B85710EF6190ED", "90E3248C0EB13CBFBEB131158F80607B38E28F5677D6CE735DD80BD8F809A0E3", "91276D3C2731F3DA4DD452E951C9FDEE291112FDC8F824C89A17FB705CD2BB08", "914B3D8A3C96750F83A07447B8B437FD19FA6D91185D7E4959ABEC5B8EC2CC0B", "915C40C3847839BAFC1ADC3A4E386F48D7716C2F3DA53EC6BE7228D7003DDC0D", "918FB350C4A2F364438A8B06FF35E252681953DAD2994DB37F9DAC5309B3D9D7", "91A9B18852162EE80E07B99961CE7BF20C614CDE35615AB901D272C23FCD6B45", "91AAE5641DDA79DB6E7F45E0A34DBB1221E2752ABA3104E41D558D0A095FA937", "91ACCACCF51183B22B704C13615BFD4650511CBD23CDA3DFFC59F6EA4243161F", "92627E627D103D4038024BCFD810986107E14AF89DB4426C430D1DE63EBADE27", "92C7FE6CF964CFF7663A2F30257F2374522889DA6BB31D37E2BBB96D799F67DE", "92CB3843138A52E09E1E53A7B1F44996ABBC10BE478421F26B6289555D2F2CAE", "92F2A9B7C4EEEC292BB19AAFE8AFF26AD8870C022D98AD670334DBE43D053D61", "9304092E63FBA16253D493D2E1E4C422EF1498D05C9ADDCBBA838C3C29B1EF87", "9308099D073B8B4A5B875ABF63A2A8BA4F4ABCB691E71E14B89B4833B4ED12AD", "93A2C56B0AB96E65E4360EC6548816D3C33DE282AFCF4BF7B723C6CAF3370854", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "93FB43619692E9A4D81819FDEE2EC14BE9B5E62B4E287FD49E3F7D0FE31D653A", "940BE4870816428E160144CDB6AC238F35669EA66C9749E3D3F7C7A0BC8EC5A0", "941A5FB04B6C4DF5F07E2FBC7A84EADD1A839385EC770AAC6BDFEF5BC82847D9", "94283DE0584ABF5D790E0534ED68F70746D7978ACD04057D9A9DAD20D45397A9", "946A8008E621A534B114051DCF15BA10AD0B8C9422B1C68D2C38A61E797C5FE9", "9490239463AA8755758AA1245B0033899114DB40909D2DEB69635B7339926071", "94B2D11D8B2A3C1556D68D2A82651D2B407EFDC4765439D01B02E9690918B657", "94B3EC63956148268E5D16E07FE76E71DA01EB7625BA7498384CCAD5794DE007", "9520C5555BE4C60D30FFBC59D136CE7C4AE83160E37552A2E3759BBA7351262C", "9539D349760C436C7C7DD837261536EA548010DD2305304375696FA545C8BF09", "954B901FB199DE0B672BB799941A63760A9851C6EF21D1CDD9356E28D85DFB83", "9568E59FBC9F48E0CA633A74AB406265AC01F813ACFBBF2AC3F70CCAF62213C1", "956982A3E052293F0151836446E11BFC653A802D63CD0248D1D89A3EE15C0636", "95D8A687FB6698AB935F605A18A6534132FB012F636376A917BEF6191ACC4930", "95EA56D6055115B49AA8D0630FEC4CFD34FF4271A5FA42CFC289248EA2AEBEDC", "95F72A00E1A8D6C6435D5EA582DBD8F295F4C86F1D6773A4DD617BAD40C3247F", "96080ECFBE42CEF2D63B1341838131BE1CCC2B5F08130E2F678CCDCE13FAE376", "9639F84E85C1FD3D4C5A89655B415BE95E955B63B48D2B85EF64F81DAC429A11", "9689CC781FFB77A68D0808F73F4652707DF84089948BC46748A94D94E9B86E90", "96B34DECBD5111CA099BBF02896DC500AFE9357A8C64E783BBC560AB34F745F2", "96EE6315C930B95B287C2205A71B8460E379C41B0AB5C1A99697010FB2D913E7", "96F1BC33B1A4123DC01F7D62CECDF0FF996C1FCB5D658FC2CD55CF7974D3C4FA", "96FC3F533D118E062E30E53A157F7A204032411F860DCDB42F224E9AD76B50AE", "972701C7DC1452FBCF01B7BFE4A7289076C9DC38C28E80665321248205EAAF12", "9770323F532BB10EA2CF6AA35FD83A103279F223480B36A5D157CEB2FDA4B9D8", "979C1C302656B100A9230D67DC5FDA9D31E695FEDE62BEA27566840475B31B1B", "97CB5FD0F3BB3AF082E0B56AA597F0FEE9AB4FCCC4A843AC07A07F85226B802E", "97D5F772EC68BDCD260FBB9DFB7A322AAAC657E9360305DF11F9C6A6A40D1B85", "97D67741319318E81054E38AD279FB564C39D7BF2F071B94561D66348CDD350B", "97DAF9DC379788A0256F1282C0BACE119D9E6A9486647915DB7396CD37EB5480", "97DBA1E30952A387E9FFBBCBC4073EB22E406C0722006EEFFCFE53B1712D7E07", "981346B4F2948F216BED89C4CD8BE79AD6F63DE1FBA4E88FB16B5600DC4A27C5", "98B323422CA792F32B2EA7482D9D79B9F9D15C3830E9ED03453DF7CC38205557", "99084FFA789D95BADF692928B0618A889A000D098F055B05388851B9A57D3682", "99D5BD5F492C43306AC665CE8845EEAA0A8C93363753B863FA91C95A4AB0494F", "9A04620999F6A5C33EA2D706818867EC5FDA6193AE9CFACF3632E54A7A590B2D", "9A20509E1E544EB20A59DA9FC7AF82F400FE5F811F4BF6223A61E0E7FD269C22", "9A4B42181E5D8A9CEA3178AD3E0CFEA6672BA250DEBDA4E822FCC8B9D4F87CF1", "9ADF75B47365B276A546C6258E198C5D4136BB408380D7D9D5885BD656029DB5", "9AE75CB1A1D3DD100D9064B9CD05456A761753026F2FA396034E23E18AE154DF", "9B7484C34C9F34F0426B6E8110F51B91DBBF139DD14849DC744E1B348D2F480F", "9B8AC5723736784F74E2C089770660E3789D8E0AD4E81866BBD47FBA076FC423", "9B9D4DB8D308A54698E7B910C6E16622F6488912436BCD41BCF8F2EE256D66C8", "9BBB794BF1DCF8660F8460268754D1A7E827EF26EEF07D631316C9EF5FC3CBDD", "9C2F629D74A0CEB50295825F06E9E3F031D43FAA69C3940ECFB41EE6607361C2", "9C966ACDF99A357E1DAA39E27D6BF0E69B16DFDADA3024268912F65D17578301", "9CC47C37A5CC093943921CDECE4CF9F41C86981FD1C6230EAA9DD109B2974C86", "9CCBD4EB0143B71631C1E82E0870EE2D6F309B261DD6B3D203F2B5E3D1FFE257", "9D10729AB8873D23F2244363D8A1DDDC6F4683B3420052FC513112D30B8E6FC8", "9D3CD143FF2C518F58CDEB7E9E9407A26148F95C781FB654F5EBDEB1730D450F", "9D474CFA28D8B0313A49C799D05622C172F9872EA0EAE8F12773DAC4E1DEF768", "9D4EC30B388B671B00F0D192ACD964A17D2BA337E5388809BC8935D15D6F2731", "9D6E689B86BDBCDFA0DB5F9240222191FC4016B876A0DD8016610AFA69FAFE0C", "9D70765425B02FB4212DD4D5C134270A48CF65000E4A833405DF290005C5A2AB", "9D892AD714895E9B8DA3E59547784D03B32EADD3AC421AB0003E3191C1AE27AD", "9D9A01E02514803E9E0E5DD88830752E1595E1F1CC50F35B26CA6DC44AE2E184", "9DB895C4F270F43F8C3560CBAF624FA9E5871EFCEAC3EDCFEBBD1FDDC90D847E", "9DD07998DE4D99334E19E37C90BA70194DAE5050543195DCC1A8406A61742109", "9E109A6BB9F7B4156E37ADD5D2F420029F689DB4BCBBD2A818D0F9CE1A58F0E5", "9E113648EBE5AB8A487BF4CB8374FA774657243D8C2194E0CED619D7E5512265", "9E1A73B7CEF0622B38C9FDA7811140992B55ACE9017230D1055BDC0453ED72C8", "9ED959A552F1F1135D021720BFEF601A33E4FF298A735DCF0648EF0558E731A9", "9EEC74E1EC207186773220E571632DCF6F20758444091E3EE385A94617A14E90", "9EF486C9C9D0C1B7D7A37461936D8B7F511055EC2CF996EA374F4025B5C759D0", "9F95AEBD8EC232C9A5958CB17E5C9C4116B02F62221BC66A39487A0F95F36A9F", "A0036DBF564FC801A80402265A168507AE957132B4CFA8F0A86B9B91DFFA2C33", "A035AE97CD06EDEEDD26E3B16F28667251E6EE6D05850170A52909DB31B3CADB", "A07C9B7C7D5952E2BBD4C0874BEC859D77892E662D993098C91BDFD5CD4FF6ED", "A0C17B7FA23DBF1DC4FACFA7A00FFB9DEE0554664F67073C8C966AAD62F6C865", "A0EF1B53F76A87117F5A8C9A4208296020E4E538E12E58B3F85BF4F0ADDB481A", "A0FBAB03D41CB0F62FC1E23584429EBB0B2AD3672F9407975B3130249FEC32CA", "A104F357C85C98F8863EC17E0968EE2F520A9E4DA3A10DBF1287F2CDE17AFD04", "A1EDB9F080D136915C41FC93DD601226B7CED464E5D5D90AA293CF2531D2E05F", "A1EF9298714E6ED876FC447E879AE4AEF24B3BAE418A5BF1CCD587D6F1B0DF70", "A21450CA46A13FB7D14123F07EF140C38F3E8D99CAA98E59F1BF8D289483212C", "A21BF0250D22FF67553A0FE46177EB2596E905C5C3BD6BC6EB2854832E5BDC18", "A2B7B3BF6FCA39AA75ECAA4E73CA474375D79E4943FB0AA53D4AF9C31A37E9B5", "A2C8E2CF672AC451E5F568D88ED15C956CC420B68B1A498D23EF4F2087430CE6", "A2D06FB3017FCE651EA8255C84E9C676D1204865B3375BA8E8B8F438AA9B7256", "A2E923A551C0F36BAC84848E053A3A93F2AC1141EB9D1739FE1D48A6684F5352", "A32C6DF76505CE1438834C46A179D3BAF5C4C941E7A4CCE13657E37ADAA6DA21", "A34D0E048A73C5A65337D15C81E91BD27C5B42EDF1544B7EF1B8E9568A6466A3", "A380C4CD3FFEF0D1AD28C9019320AF0085267A1FC55FD33D40E61A6A71DFDFF1", "A39A2E00B5BABE0243F9671D1FBE1DA3F18A76F8A4B8F40C5F0A37733F567181", "A3AA1EABC04F772D5CDA8853B864F229765DC4A3D9C4B8F0FBF97542821DB5E9", "A40F23B63CFEF05D80F4B3F376F4A9491B04FA48B034AED0BC9B75C18400E35C", "A4789370408F9C24E02B7205DCFC6E8366E926811626A119FB3EA4676EE27F0E", "A4829964562D4DA75AC835389538AF91BE820F503BFE614BB74E402BC80BACA1", "A49FC03081B73A65E6CCF013015154811700EB0AF3A788F88F0A2DD80E7DDB14", "A4D9B7A7CD9FAC0F57CCD7375312F6EEFD14A4BBC52B3F6047942E98CFF6339E", "A4F4ED08429B5D47DD29B88E1F05943B726DF1810969F88CDB4A5626D3881137", "A545514A590978F7AF9CA9D006B18D07ACC7FF8C9947C3C2640D8031863C1DD4", "A545DB1C220C2CED88336E81FF848EF91603811394EF649FEC94F4D2653CBD45", "A575794F0C356D695CBCDBD7EF6EDCE45426BD5B6E3A33BD084AB41B7337280E", "A5DABD1C1B1C58D900A9518CCA7EC1C03488CC2DF1750F65600D7F0C8E0E4763", "A5F102AA90B5BFDB2EE4442DF51659EE282A3C06887BA2EE4F4B5E779799F22B", "A5F646FF4C83A4B1D2C8B47FCAC3D208DF17454D859B9AB5DD63F0E74300162C", "A658826ACEFD8281700AA4C5F1D1D4C5E783F73C590631B873055789D4BF0CFD", "A67E3A7D088C9805748212563A7F413FB4500AFEC69F2D7F55C967A91BDB4EE6", "A6A9A07D99C84521BB0A6826C8CDC21D48B70CAA55D6736F7C324D01BE1D372B", "A6D737ADE03B032A42291D50B5DFC8276AA6AB0C24E9163A9958098D0E9747B6", "A701AFC8C238BDFFC275CACF75BFA2343212CCA8077B0C43D13D17FB1392C9ED", "A732768396D3457C046680097E6471B9E0199C0B42AE8FA920595C4B7BD45203", "A73494402770EB01D4B4F67482C0CA74EEC59B3AAFFAEE1108B790C771B329F6", "A770E87B78A1CE76903B4B233716D0607AFD01AE39801385CB61B30131C7ACC5", "A7F880520D7D57E141F957C15DCEB27D975486019FD1AAC120BF28C04A7072AD", "A87D3B01BEB3628C5A4865D02456C6AE700642AF49B89B34D8697869591CCEC7", "A90DD52456233257713133653B224B6D7EF3C02BAF11AB1DD040C49EB074BDAB", "A975355C6C98AF138FF9356F7F5CE174598E1020951A9A9022AE858ADC98F74C", "A9C254F86614D2334E5A1624EEBD7497A5FA74BEC3159FA2530927B6C4A89585", "A9E0B5E0C2B94467DBD6C43577ACB0610626C0F92D443122DF592D1607912E10", "AA6F08F01A079565B77B09647282DFF85E99CF9A1905EAF67DAE8F9CCF81DB85", "AA89ECF2E6C94C7BD34D85E5F9E8613D73F7FAA172BD70EA6519616FECF7A88F", "AAD1C61D86824F7D5F888BBB8715B562EC57F24BF75C9015000650BCDA26084E", "AAE68AA2EFC385FF3EBD4382FB866664D480CC7F1DD4B169227644E77ADC4B20", "AAFF9E87667B35D62A52D77B8E5C3A000AE2419974F7C14545C23704BDDC171B", "AB1AC7E7CE95316265077790DC2D6CE23068401552650F2CE08BCFDA4CE41AA9", "AB595BAD745ACCEB2CA1F5A7FC0DC9717FFDD74D2EEC460390003F7C91DD4FFD", "AB8332BB49251697A40C4A181070CC821286458CE2114BD526688971705EBC0B", "AB9E1F618E295ED2016F2311EDD2F8570371E9C7D690FD62D71D7428FD71F423", "AC57ED7E8E6A2776A2311D09BAAB8A7D23ABFAAF23C1682A32C396658E3ABB2C", "AC5DE01326AFA37CBA7F799502684F57AF3D9271EC49734648DB7797522AF2E8", "AC6BB375CBDD4E608C8EACDAC98598DBE5AD172D610D0C2D8B39CC50F9580599", "ACAA55025C09DA144288A5D0A5158AF597D978C292D71EF5E2D01DFB8E56A818", "ACBA42A9F266755DB30CE35DBA1907FB61B1687AAD3415499AF5573BC67595AA", "ACDFCA5E93908C1CC35E54B4EF854ED57BCD6CD2641A3590CD2418E8BCA917EA", "AD86702782A27B125C52925B01186F115FDFFD74D9D5E408D9B6FF77D740FAF6", "AD93426B49228B04BDAB79161DCBCCF882ED48D9F34985BDEF0F8736255A81ED", "AD9D0F1B219EF1414A1CFE4F9B1CA78EEF4B4C701B90380ABE4C1CDC35D33584", "ADBB2DE655A33A904B7E8B7ECF3F9EAFAC0866161D56E6F99E6CCD88E2DB4C7F", "ADF0635C8C226573B68B90CCCD3BBEE5D58D01FA40BFFCEB1F024C6F94610012", "AE04C563BFD8D158A34D941FC591BA2027AA9CDF2814A2468DA20F6AF67AFEDE", "AE3208EEE597DADD8531B516A96ADB9FF4C1017F9E86C776CEC09336A409AEEF", "AE33D31A0FB7255EF28BE79BC12503CDC31DB9273944374F35C9752D138DD964", "AE395445C7C7240CD17B06CE58A20D98731AA33DE1AAF047F3A02C424CBD3F87", "AE3C056A0F712996CFFA92467F764A8B5A5F9B6B3C97656DFDFFB034B3DDEDE1", "AEC0722767EA21CDE0F10129C001F976425E48E7F302D7C24108AFF251D12D6D", "AECDD98774A5980E703AFFC833E5B5E98A8AE7DAE415D42A7FA66AFA8E72DA18", "AED0F240DF3C88F319E3FB42ACD61D16097A82B46ED80B7D90B6C196F011838C", "AEF558661D61747788060A4D7B8651A0E2EF19AB960C3A25BBFA7952BCE5F4C9", "AF6ABB14A6D607E15C5B5E8D5407EEF7D810349AC6111648229782BB7B5A95B8", "AF755D0AFFE03556C8B9305D8915C03A01FE89F8467352FDCE443EF53F8AF11B", "AF7602FA31D6499CCEA0B90364F0341F1379DF87CD2AD96A05C2831AEA8BB671", "AFA0CC2FC2C055F26F871E9C21EE0AA3306230ACECF1CBD6D9CD834A07E53935", "AFF280B78615CE8DE30ABB9D56D6E9B807A4646603CE034B8B2F39DFFCF6575D", "B006784EA20C5B83706E01591C31896994C7AFBC0643DDE72CA039B30E9C6F8F", "B027DFC024CBD40F2534AE4539CCFFB0ABE0EF1CA15CE560145DBF49087450D9", "B0528F9B036E05AC9A10262631DAF76C50D058E8380B936E9BB1177907389047", "B05329785ED4441E67419C72F4E8D5EFB095312F0129B7DAC17DB1F2F0780EEC", "B07BD39DB6ED988F94DCA3EC6732BC232F86A4BF8A5079780CB4F9286CE2A8CB", "B096767FD8521DD5F479C920E6BE7B0BE0EB6EDE5A4C1EAA614531B15A09AED4", "B0A45CB551A212004F67CB37E137C4F8BDE8F8943B137919DC68C8ADB0B15896", "B0BB2EA7A319BAF5A56BA29C1BB3AB5E703F5A5F8559CC217AF2FBEB02F8A32D", "B0BBC00C8CB691226CA012955ACC5DF18F87A448E1024EA4FF2C9176A206BFCE", "B0DF32322CE6A2B6D1EC5D029C9322141A4F0B90F6393DD9417AE692DA63CE98", "B0FB4CCA6C2AAF4AE7DFA7516AE94640B71BE0BE346F669F7A4393C673251F3D", "B0FF85DCDE8644B3484BD6CF258480DD40154E7BDFEEDF7A128BF747F3AC618F", "B15718AA4B8105564F039DDD186FC17074EAEE24D837EA5B1A7E296502934D28", "B17F6EA32217517527CEC9840D03393C5EFC22D03E15D5F135A129A339DB07A0", "B190E5B0BB37B1C734730EA04CFC81775C0731EBE560623FAFA931E5A8A8CE4D", "B192A38BFCB65C485CB834810BC072C9ED521B788476FAD8E67C2FE9EE26ACC2", "B1D2840F9FDC959A0DA3F1F2AB7051C8B49645F0749D8F8A4902685F7EE6ABEA", "B1E750F05DC2133E8D51F675D3CBD67E8448BB183D36DC9052B6E9550A7CC5B5", "B236D3400A0C6106EC62C77931DC3654EEBAB6EEA563B3344ECFF477FD634E81", "B256C15E99202EA347E2A029A2996E0D747C26A51F8F4A110F2D6D74B8EA1B6A", "B2590CF029015F3ACF8EACCFFB1C6CF769AC7AC3F75C0590F4F3B80A71BCDB3C", "B26820DB27A2FAA1ACA38AC50789692CF5EFEEBC3CBAF202DB49324399109A51", "B296DE2C978240783DE76901DE1418342BE45C62777C42A3956DA1B0B1716126", "B29949757A6CDAE523547B0D31687449E15B0D5C20F9A32E9F098368496FA7CE", "B2D693BB18CE109CF216F85F763EB9523EF5ECDFEA1F49C5593D63CBD75E0FFF", "B2EA2FBA4D280351FEA7F9EC1921C448D44F4D9EC613590A87A15467F7D34153", "B301E3BA36CF8897185EB51E86542B39D3D05EDE0AA3B1DAADFE9F809DDA0C1F", "B3078CC20AA0193DE0BA1F24BF600DB307BF3971A7F9CDE1170DAADE21278824", "B34195110077034574536A55FA352B5BF90728605D4A2BB88F8E3C60A9F0BAC4", "B36D4D104A4F6AABE76B2FD840B292FAFEABCFA232BB38EEB768F68D12E9D548", "B39DAF1ADE45460BFC3A7B0E96F390A612617CAEE41E7E0899BD2988FB8F6A94", "B3A541644FEA43E48D36CA5E9D16B0C96C2D2EDDC66F78E397A1A660286F7C94", "B3DD0049FD7B99420B4A63E0C41797B3151DBE19CEAF6FF15A08AD1D83EE117F", "B40404A886F3CA472D4FE9EBB08CCA1886EFFF4B748EE570A84BB961AD23B609", "B43C19A7C3830FE0BD2A0DC67EEA1A869FB4BCDC9E39048C7D25BAD77DC3AA41", "B461564439D4658BADF79A98487AAE120C0F7D7F784CD83A6C875E93D4CBEE04", "B5602F26DC4051D2B7FBBC59B479568A8211EC5FB27EDA9A06EBDB0E88FC8F9A", "B5810DD31544DECD338CCD71F5C05C78B267068FE3FD01928B5545B05BEE5FA0", "B5AA883A7ECBB98CC082171970FB0FD2158AEB520B2B654518056D674E2939C5", "B5B6C4769983441433B811EF3AAED6CFC993849D42BC924ECF1CCA5E34838148", "B5F498C2528C0E625760D72F802C203FB63AC6B3CBD1D27268D5F386CC4385CE", "B609D685D630C87BB458CB89A66B87A64831A7617912F7856869B7F1B264C40C", "B61430FF02D2BBFFC51F443C00CA0AEE8270C012141BA15B5D5AABD29C436091", "B63E6539A425EB5AF33E03949CFE0D4340525E6C4EDC7F84EBBBB8743E8CB569", "B673694C2888EE95A6BAB04A5C155DEAA18A41E4DF0C4AE45D1C5C2E3FD7151D", "B693869304B3898004917BBA4CC32F5193537104F723C6C8ECD4C01D991F38D0", "B7074E3767BE7204533488BE44152DE584C4DB3226649CD8A632D11D49BCBF7A", "B71DBB5A8F7BD5AC86F2A784871250C0CD636ED31A030553D5D9A0B4D39CED79", "B73E2AC64919358B53CBFE9E0576F144ECF05CB1E42E5E59DCDDEF0BD5FEF485", "B74A3B00A34D8FDB4B8EEF99280CED566B09656A926E55692D07C56A91D80E06", "B7B1A8DAB1A897FBFE8F37F46B5A9BAA67F914F715D69E265E2F4E7D8FBB16AF", "B7BA5F69F24A628309DDEB4E2D3F14EFFC76E85846D015C3C74B090A1ADCD851", "B7D409E9A403BA9F7B31027D06EA38DD15E5D87F56D21161B5BA8A2053445315", "B7F356915A28B9170C4F7E7052ACCF6150441808722D8591A7AE82035D391CBA", "B8AFBDF45AEF0460886E5F93AC90DAE8F281918FBE5E510F9AEB0E2A09E65A0A", "B8C124EE4E419DE7F41A9CB0246E9FF21300C4C9A2734EF999830B9906B65133", "B8DC16D7984D0BBBA4C1AF32274D163BB6450605EB784C1C3FB1AA833F622DDD", "B931906157019C8376AB5AF866AAFB8EB9C1B87D65CD05FB164C4FBA0ECCF4F6", "B9609A42BFED86C36189258C748597C29F9D824D3DD52ECECFEEA902FDA884B1", "B9AB86AEE61CF04F76A80CDD8EE0B44FE9A81E116E3529C7E44E567056EB3D80", "BA115DC647AD58068A81D5DEF13A4806EBC639858B1743428BF24FE678B87926", "BA224C929D509ADDCB0F46007C0E0FACD292F79987D47E9F02DEFD7F67D0990C", "BA2D0D9B1C88AA8F13B870348943574E037A169844D44BBF01DF458E3C5B564F", "BA385C300E1AB69708D8E5042F5220F275493E2AE45A5E3A1DD992DE1DAB492E", "BA623255812F5894326A7A04E7565E7B402C3E556C22462052D019D08EA0871E", "BAC4A0EF506FBA1550E36DC7FA682771C605D25E76077FCF4E98738F5080AF85", "BAC58F310A73AC5E5FAD84D6ECE65ABCF89CB378E0F1092F4F7D09F826B5874A", "BB600B119BB0BCBE0C1A441D96B93496AC1319A4F50379AB81C6EC6E8A6222AF", "BBD0BB9278125E79B44348E7A6E2FDFBBE0FF4AC9E9184823B714AE94FCDD740", "BC2283C42C5754BA56D4B137D9299A766BC1E54917CDB4BD5C57BE600AAD1E60", "BC4AD41BBC5C4EC5A5CA4863C7BA4A6119A58DC36BA86476A2CB677AFA4570F8", "BCCAA86BCC3B16C9C58E1F4717449CC03D19E983B5D795C29B0F4F2B70C2296D", "BCFE59AECDDB67845A4B618BFD6E41A20C550D57DD097AC67063BDCE4F60B5F5", "BD254A15BAD5E287C6B2C82F2D724824C0DAE3774F51EFD21CA2855E0233A70B", "BD707B9A2C920399BE57A503E0CC1633CB723C90A936D7A2E92891D912259987", "BDE8BE68E1590C003729E6B7E48474573011A6E3169F881D9B61B466D3E5D5DB", "BDF8F6272DDC9AFF34CC149E66EE100802632EF6ECBB6A1F85ED4C5AAC63B956", "BDFA432EA62E6EFDD1DA5F84B4EE926C27FCF1125443F9D0EC5005B0FEE74C89", "BDFFEC82B2EDD09B2B9BBF108A0FF2E0545F478096EDDC6BB9309619F66D585B", "BE23CCBB027299F5D6152C60817D8399C609A6BB1D60FF90FCA0621F6C586767", "BE28B80282A36EB5AE12EA4346DFDEB6572CBBFD3F23A4A31E09F4406B8F71BD", "BE38ED822E7AF0C00178B9F33546DB67627005E6481750CB7374811E7F5674AE", "BE6E59EC7174BAE5328A109B3746360DD0DA9EEC148E843FA99652922A32EE77", "BE82F07FED1BEFB3F4DF7EBB0BCE97E5DC59077685EFFE1755143A8613828BA4", "BEBF8A07906A8F35FF3BC068026B3463B248B5C923B7DB769559C4DC6A31E015", "BEDDF83BFE5CB7C6AA85BC0895FF3C91C926CCD01CABDC3ED76F84A9A2B21CFA", "C025789FA2A8DDB6C9C68DA1D0F68F1683F34A89FD9ABF7064BABF56DBCCD67E", "C034166F025A208123BFC4890C89C5D61B6F439BA6D549A7E9AAE0C5F2A4D0D0", "C0349AAABFD1576263D75DDFC8EBEDBDBF9CBE04C997B8F00EF826B9D7C1793B", "C034F4A93C7986F86B5276634B82B774DA1796B9A2CC2371DA4859670D82233E", "C06037486063080DAF0903578E651F281F08105507F07A61B0292AD4FC96B7DB", "C08849A00434A559EE1C5504DAE1CDDB28E9D46EDC400E95B2136AC317DFE7A3", "C09C5C1FD3C60B48E6AFE6C609BF568B8A996E541FEDA06CAD3678833B7435CF", "C0BDB67449527274F6BF935813A76F827DBFB1EAD61444E49DD24177F6B0ABE0", "C1043F35FF1F630A47D32A8195A08331316B4A0E682E22CCC64ED3A8793D1A86", "C10B851D2EABB86A3DA0968EAEAC1B5EA951FF1F25CF8B2C4C827231197FA641", "C1E2FB0E4C0095EEF95FDF6DD252D9C64C585A32D103F2FFC45F43EEFE58A58A", "C22253825FA485019FC06565D7E7D6C4103E0C10B6510212859354833FAEB242", "C240DF09D934E998A5A6E9F16EE5D00606D3852B389FD502ED34EB411645C177", "C247CDADCEBD86F6926A5A03AD862F20EC878D5E1054BCF2C6B70778E3741BB7", "C2D71D807A4B9066DE44E8DD310AD2942F5A1D7D92F61F0A2D47BF03792F6072", "C3037503770A1CACC9F579498514AB027E6EF7B6DADEF690AC4B8100F16B3509", "C31436DA6C1FDD78E2ECB68688AFD20C432119CDF718A53729D0F429AE0174AA", "C33A3EA0A894FC142F79013DE2B47A32ABDD698A23D88250CBA254A8EE181DAC", "C38AFDD82BC77228F8D7DDBD5DE927E97F8C97D1E6B1F76B6C890149323EE9E7", "C3F986C5657444C29A48436542134E0055674EB49757C1D60B5F2ACB7A539D7C", "C41C171EEB146759A981B49D19F8E7426E3EFEA2C625BADD731547E106C888DB", "C41E53CBBD90D74C9FFD31BB1986376D547D186B6F0DBEFE861EB130C0755F32", "C43D2CB156B7BD39FC113EAD22568306F95463D3E29CC3A697EB085F142533BB", "C48B8A24BEA3D79BEA32D69CB925440D9078E9C37A37DBDEB8805808860199D3", "C493462547813E2D896F759039078514A13F0934C26044CBC7F658187CF3E4C0", "C4CFE7F52773212E28404A230CF4140269A0828FBCB8D5BA45FA335D89CD6733", "C52982F1CBC3E4323F68996832E9E7414D129881222F4EB7CB29D0AD053B65A8", "C53D3C47BD4A155045F99C1E4CBF677182A1008DEB57811C876885F82676C572", "C584062FF02196D3513361FBB98104F5FA7514B1ABD5ECCA55D19C8B859E090E", "C596338966F1610A28DC01FBB21502CC71651B70DBC8B96D9603EBE432E4D5E6", "C5C3A875E50DB700220E26BE110391D11F736F71096D75C525AE9DDA14ABD8F7", "C60127BFAAE1D4A880639F74CBD9F532CC003FF936369962BC8C4ADE4D744ED6", "C6324A3EF45791634807F1A3E649F45DC0E3697C2CBC966F21AF4D4D9E99531F", "C633E3F919C9BCD1EAFB625FB054DC01CA44ECB316E9D13E7A22A44BF1FFF391", "C65722F809C01B5483BEFD48484EDC46960C65030D132C9D08F70EDB8A00D231", "C7427A81D9DD7AD5AC2726D04522E9D23D04C6FA6E7C666EEFE2DFB8BA61CD0C", "C7BF9E3DE547E76D7B7B89B7E31D72468FCCCF0D24D3580B01C6BA30FC2F324D", "C7D5275CE22EF1E77C2DE0FC048F002DC6C6C43730D8E85E12B6D4635562E537", "C7FEEF6F968DC83A4BE4F17CE29290349CA7B22F9E4BB9EEACD6E47F47E1BE3B", "C814907AC047F6AC7BFC9D7D921AD233E59D7E7C19ECC519806B31C4B365D6A4", "C826F1176449BFF5FE343AA4934EC17535CEB1F851490DC6C1AF590BE9A199A5", "C866990195B4D879E4B8D03F9A0ECDF9AD76DBE9446F7B9A199F9F4CDD42A5C4", "C8805CB7A9877952E3B667A528AE49619053A2D7DB5F1F65CA2C84C382A15EAE", "C88FD4D469A35327F18A441E0F6F16137E5E2FA23925AE0EC11E2F76B3D0967E", "C8B10EBB1C04E885A0F46598D7359140F659737A3C1249FEE363B6A29D7355AA", "C8E3076BF00DD8380618AD02C4DDA7DF7604CC6B6A724449CCB6A06853CAED2A", "C91C4E43132696FEC4880710887B3C0280455B0F29B0B1FDDFC3F98D4048B4E8", "C936C0289F6D1ECF2F7B1179FC0DBCBE1DBDAE4E68A5D3CDEF9291869F5779CC", "C95C9771121CCE6842ACFEDC26BFC21B9739D3FC215633C459D55FD458440B00", "C9755EA07FA4C3DAAF1AF3B34FF0FC1694AE744BC0D6BAFA63E93BC7B50B63EF", "C9A06C4BC1ACE55A17C7DD2D9DD98AA6FDEE59C9586CAFC2375754D88139C6F2", "C9A62458FFCDA7D13068BA51A14F3364875030AD9E3379B54C1EB8EAA4DD8D49", "C9DF9C64EA1901A4A73100734E733E276B2C17AF4A3093D142E5F13C918BC741", "CA1E3EFC07D22B2DA86595362931D640F30F757529856481F669DB4619DAD922", "CA22EB6E856EBA35EEBB4E26E9399464F4765FC62AB8D4A61DDCD6F4EFCCCD56", "CA6E62CB32AA91296638D9DAB5072711CB69A35615F7FC69D8B55BD25BE71F67", "CA8663505F60F5243982B35614A0AA7CCDE991BD5E9C175202F625C2979040E4", "CA981B58A5E97CE429C00373F26C546F845A09834BC4BA2EA642FA32E67EE613", "CAAED4B9D717A8660FB48F1966B7523F78E0ED961F92395D260A9CE3B3CBFFC1", "CAB1378A8CEEED705C58A6EE2D61AEDCC6FEBDB041163B53189B4E53A393FA4A", "CB6124223B6F8216BA9E92EAD6DAFC187E51AC4BEC28594EAEF38B28FCD5792F", "CB765B8720A2E211CEA709C71E6C4409A9A1FE0813B5C8FA4AE6417BE059E68A", "CBAD9A5D72D7476363185541BD693344F4EEB28C6708F8A48B2849B3FD618351", "CBB581AC5D80B638C7627B6A6973FE321320C79B550AC39125687D95CDB8F7BE", "CBCC379563323EBE1812461205257622C05A3C7EB51AEE2176BCFB46533D2159", "CBD8847E98393D15AF7D2691A1958B4AAF9058B018D5E477DFB037CCB9D75D3F", "CC1A4751363BAF070355299EF4837A7E17D105E504AC93B43A4CACBE41426035", "CC3CA2E6A057BD0C432A1C280BCDA473EAA13F9A6EA2532C58C5E8FD129BF2B1", "CC5089F9744A6B5AF776C8A1234A9BCA32E0798D396B5C631C8D215B02EA08AB", "CC6DB3505939453FB542901C62C95B2A03B3815D8482DF559005310A267A606D", "CC955D63C5A677B05E118A898E1FA6F660887714CEC0064650D28CE42265F548", "CCA2C68EF569C58F2CD1B5927035CEFEACBB9429A63AB8C973E5D68208E4AD02", "CCE2284A1DEFC26817EC9BCCD38DA7A3854365480FF9426304A46C0C98F30195", "CCFBBF17D9A696428033DD621D20DBA44A61CCB92DE126AC9B8A8CA1DDE1D0EB", "CCFD0AA6FE0B04D655CB682E840C88D56CFE6066B6B9B349560AFB2C6DFBCB00", "CD07568ED0ED0755A81F0FAAB2708FA8AAC3BA618A3434B98C44AA7ECD3EE952", "CD37E1966FF0AD31CC549AE4D8B4C30AC60E58680C87B2D5879CECA31AE4816F", "CD89E62E061E2DB346452CB6F3ADA1C2F77A9A0CAF6EDE19D5644E0E19870A46", "CD8ECA477B472E220ABA29FB5C44E5E90FEA01ECE1DF9C4117266D72CB75EE6E", "CDE6875133587A5E5E6ED5F01AB9C60FC14D6A03BA892EF38B70353468007DF8", "CE7D5A1D0996FFAC3B1D8B653E0D11581F2B40F4522A074649FEF0017143DE02", "CE88EF5FA52F7C45C7237870ADB3FB7CCE5436E5AE3ED58C08CAF3501C651AE8", "CE9B7DAE68B959C5E4A5F965424DF5CB00879B1AB1296B115DB9CB1B8ACD054F", "CEB6532C05E2A4AD727C681E618A7A4D2D8F107B9C3AFE4DAE44C9D446EB795E", "CEE16EDAFB404DDF033F95C90CAC7DC93AC2A4F7F086C619B9F25A120A2D62C1", "CEFB2CDD169330DA5EC688A529952C2E9694D94C3E8E4A50C9011E9A9F7FD71F", "CF1C387E16CABF8D81AAB4B6A53874DE0D663EE059046460B3A0D1EEB8D2E762", "CF2A2B73D233DF26C11999E43E720842632F36DA449C73A40F5A357527666DD8", "CFCC0798CDF713DF824D5A326207194D6B958FDE4555B27C773AACA218FEDFBF", "CFD032C6816AA09BC4BFE927259D2C7496159BC447A779769DEB0DECC4952A56", "D02A0AE2121D8B9AB906A297465551FCFDE7C31DBB34EBD52FA33528398DBCBC", "D054D1FB915BA204B059103047AE248EE28845425BAC252BCE0F9CFD4D129929", "D0934964E9B56702CBED525517F4EA576FF2F33A8BA6C800C34ECA9B7FE90236", "D0A5B555EDACB41BD2BEDD13B3049376A92A8FA6B3CD3CD4DD45A15DE1037171", "D0B36475A4B658E0814531AA499810EB812EB1431F68943B8310DF7002931DBE", "D100FE73D9D51084CF84863256EAC820874202BB86B4D4732AD5BA6FAC9B67D3", "D10B18EC28A032EFEE6049343ECB3633CC65AE8BDF915EC68181989AB9170F54", "D119D49C63D565CF5FF1DB2A9639F03B8A262F13941341F6EE7F4F012125086C", "D11AB976F85F6CB2A151F18E4C7DCD45359DDB99578FE739D459AA7C71585CEB", "D1521F697384AE68624F938E7199B69FD04C3C927F4E48E039FD236DC2F71A72", "D16BB3B63F820806338161CA1080F3C27550FA2CD017A11E0C7250AB6C05CD77", "D1C70BE32DEEA561F5BD20121B6CE6B04522C3B0A34D7DF273B2AA52F0E58277", "D1CB08D31563D582A14B8BAD469844B07F189418B4E4BFBAD4EA8BAA6B327659", "D1CB85104D6425EADABAF28CF6CF9EB9A90389B1D6AFFC5FE976A773A70523CD", "D1EE65B724C053B8C531DB8F905A57DF1D402D875E50E3E22DD86A5856E65A9D", "D1F42AA8CB20DBF23F25294AF1D5952B14F11D54D59A127F5802F150505DD446", "D2104DCF6D54F521E7CB0EE6FF8345E3D8D09F16610E41A8AFC827D663F63D7C", "D21E913C6ADECF8EF09DE3D9AEE7C0E5E9B0753FDE5C8D754FBFEF41B5821AD7", "D24E7AB0F60B1B89E72AF726F97BE1534513D20EFEC259552CF1839A9D85FD25", "D272B1ACFC08FB00F71DAECEAF120EF8F47B4AA0F575849F81F09FF6E35CBFB5", "D27D7A3FAB54F4252945DE24C1BCEB0239D87CB0DB7641EF3375DE0B604D151D", "D28059E3586B0D388C9730F39F465209B85837647BDD3C8A062B83B83D85440D", "D288D5ADF67DE9C3743BE8316D7F496F7CA64A396C1E8E9019178232D17AF15D", "D2A8C45D22C5E13178B6FB7AC0806A276070B9610D455DB9839CFF431430E0CF", "D2E48469AB3A6F2B1FEAEFDF00F68B8BC2F210C7E3BBABA5556DFDE4C6DB7ECD", "D314D6F41721859E8D5FEDC60383AB6653E884E8AE9E086A0258F5AA222A6F25", "D320768EDA0A256974922526FBD9B0D787A99E5EB5A51830D413ECE091D3B830", "D39F97275EC2B41842D64D43A382D291565500E4943347BBD6046D3D96E0BD41", "D45A76AF2A98F7B4236A9669709EBFE4DF22816ED2157AADB7F5CD85E86E3625", "D4710F6A6EB0137969736C9167FDBE7A89392EB02E9E63C18FB1343780A146C3", "D49890C607ACB9D53254E7368BD850B1ECB329F7EF84BC4E1EC64C940CD59FA0", "D4C1C0E6A5170ECC8C7B3DFFE304FF401A904E8D9E1A70A203081EBBCDBE568F", "D4D59CFE21484F96852DB1D04961FBD5D11A6439B4EFDD7D5412D5A9FFAD9732", "D4DE68FE501751823A417AA7296DF55CDDF16A865C2E69A69A383DC4C7E151A4", "D4F9AE28EA501CF2A176391E0E920E7B7FC3A2D7D8CE5319FAE6CA44DF5B1E04", "D51F886DF649B193D2BF4BFCA1F548FB3C4B30713C8B0376CBF061D3C52C1959", "D5EE91437C61DB828864546A9877E1F863FE9DDA2D0B0BA7C35A8B9BDD774A7D", "D5F8AAD330ACF39440DE13B4EB6D7FA5FFBF91818E99D022E49C689812A35E4A", "D5FAA4D531F2C77FCA796CDBE24E353B88AF07EF4901D113FCF9A8A7AA86B84A", "D5FC186AFDC475BF1011609D51599D9F4054E10263C52218648C49E2D757DF13", "D5FC516E557685CDE38A1C2C470F73080C33F28187E749A00C04F0812AFB9842", "D6050A553FFD2D037DB095AF2382D282BC981366990B25B9F1677964EC78EE74", "D63678498B94CE4636F5CEB8FAB7C8F6F571F578E6D0EF1B23F011C3A5778E9E", "D68C800775F3FF091EBBA6CDD9876B557C32AE8057306E8C377C8D67C60953EB", "D6A278AD53F24F8C2A141B0CE86714271C028E265EA5E488D59254EE85EA8F0B", "D70732F34B118191D39BB0A8B3F01D9E0CFAEED3DBAE17E06CA2D69D35B66B29", "D71F64EF3CA19E81649D69D0B649C455FFE5A10FEFC432274AC6F6714F44E5AD", "D737A8C94C930B47803CAEB6FC01A6B08302D409FE64A0E40960433AFCACF7A4", "D73D3EC11078FBD322287FA1CD4D278DC6757E7F27EB2AF32CBA897EE086EB0D", "D76879E8E9C0967E4A6B7FF8216C0847B633BB1DAC32CEE31E4544A60A45BA68", "D783A7F4DFFB9905E79E357ACA80CE9623FFC55147AEC4BAF71DFFC0CC45C9F3", "D794EA27CA7E3FF8825CDCEFF3439F08F1C4C2B94C2E54C22629BF94087D371F", "D7F42748501798B46C92E5DDE65168A07A34CDC17FA2997DA4B2703CB1DEE689", "D7F5135F5917DEC79A3EC5F40696F566955841FB3632FC8C822946EC528790B3", "D82E9A8E624D2D7ED091F72D21B86BD1E1D17D89E3AEC4046D4D7622DEFAD2DC", "D860B85F49895E0D8CF0AC6A066F6902558B044E03F0320678E24399C41C6135", "D8A776D3B0AC34F7E1A0CD9930DE0D129047F912F17BAA37C912C1C104FBA268", "D9172969D61CF2C2B1320CAD15CAF5A2806FCA9580D5A6E5A2E2C98FF12E2386", "D92ADA90B46EC7B09898EB31D2D008827097E27BEC48AE4B2D1B9121A6F37C05", "D9698EB2CF81825958A16C40C281E4200E50280EC0B7C07E689F7539BB227DB6", "D9933DC2F45243B1EECAAC88FFE4749460DD4954EC12DA4342D5EE3BE7459FB0", "D9A4CBFE50B20DD1BAADD5A7F190C318057A4B3EC76A8D86A7667E7E0DB05F24", "DA78D22BE98AAE3FAE7595498C22303F728B4F1A787F6AA2950D1A2B51579024", "DAFB6976639A3A0CD92E6E7C328A7D79DE7ABB5427325AE9867BF17CA6FD2D68", "DB21F6160E03B6122C498B14479D8591179C3DBE218BCD893BF4F64F3154AC0A", "DB2C130ED664EF84FEA3890AA61C559D746402DC22D50E0603B7AF440CD83DD7", "DB77FA682E1C424D5DC75EF1D7E867B818764A3DCA318FD78F7BB076B3F08B21", "DB866DC8DC23646847AE5E9E25C02B2DF2A195A414B2734DCAA102E637957BAF", "DC05F94C20E54530B22A0F7C5D47B16BEB79F796391043B6D8D2F3934DA6C247", "DC103410561C74F2BE482D1DC9D39673C4CA0201FA7430A6DA0052ED558DCC5F", "DC1E3E2C447E8C34410E5BFCF98F1BF0BA115FC736AA77AB7956DD329EB71F5D", "DC7C4253F916EDED09A9719F885BD071B017505EFFB5F33BCAF27CAB375A5173", "DC8B783B9EAA31C03B1E404FC721223E232D2BB78FAD1F0FF5BCC2915BC8629E", "DCE0106A659E699F4DA07533B77646EC0B7E48A052BFB6EFD979F81F848E6509", "DD2FD38C824383094219AFC52E800E6DAAEFA089106F0FF01E075CA72913222D", "DD34B9BC3B107A1DC572E91FE164C11C4D3B050CFD5A53884C66DA680566DEB4", "DD3DD96D8064D65093AA9C7A9CFD186B2731F20C9C4F12C15232298160BDD6CD", "DD464CE379B2EA45DB8FD5C1271CBEF5EA4164AAAFA4FB13859BABF4DFF16C6B", "DDB6BECDB2F6AD03325FC289A06D647AF83BD3A8B6A5886DB4466FD926B7E25D", "DDE11A6EB73BE3F98B37D85D58288FC1BB387A976FF07E231F2FC766E2B956AB", "DE610DDFE9494156D25DDA58CDDC5C5009E3BBAAB1D9C6FC73CE6056DFE0DCFA", "DE6FC785FAEA5CDC22FA3DD95C1113BD7CE8E4668A2B0686DFF968822706AA72", "DE915924CF7F2670B1FFCDF6498DBB124F4087216A8B4D38EBCEE133912CE5E2", "DED899C681C4F01F658F5349E77058BDF8C51E88FADBC17AC63AAD856B4CADE5", "DEFDCD26C45B3B0682E2C6442165C4FAD4F22E5706D69FE7837EA5D52ADE831B", "DF1EB52EA69D8320E09DAF21C37F501638D6093E8564945D05F8B2647308BC24", "DF63783429087B5486C3BD74B359536E1A11AE36CCFF2E12974830FE3C214C0A", "DF6798DC595DB50582D62FD9231127709C111844AB78D8AA36C238FEB0C2F1C0", "DFB2B8A17991C21AA572BC3D0FE7E4D2908FC84F553760CE8368AAFCE6C462AE", "DFB4A89370117A0C76AEBA610891449C199F7498B60521F9612F1A48A7736A6B", "DFB4A9585ACCD058A33E7C0B787D6C7AD3CF5F7FAE137EEC5A2BC75C501CD55E", "DFEB027D63B2C15191EC1FDE8836EE3B8F24CFA4B42FE77E7E1820B6BBD77AC9", "DFF1640DBEB48B8BDF07B3856E1B96CFEE191A513A8879122CB35B6ECF091230", "E04F9DE1174EFB4A26CD756DF59E4C46606A4BD4063992B465E76804515C6833", "E07C0C4D82739BCF3EC12790499FE045BA8E517D49D7B04601CDBB95AF91DA23", "E0CAD87D2D58A2FEE5B2191470CEB1BAD189DB6A091A60BC28E6B8904753BA45", "E11D1831D193AEF5FF2EB9D7788E4B69929BB9B8080F134F95019007DD6ACC7C", "E13F75F869D571A85240331EB120F83974D98D63498ADF9BE18416B8ADD741BD", "E19B380C2BF0F26DFDCBADD37C1B7D4A13ED463E7B4B4ECE7EEEC8895D5690CB", "E1FCC005B9B4F10E866821B7041A82A13C2A3FF7E8C96FE58654CD435743D4A8", "E21F340DABF184020C5A840EB8711C476D889C801FCE844EC58DC7085FC2D37F", "E23B2B70071C87B4B30F175BDFB816A59FF7F9127F0905729A27B7EF44524CBC", "E24DA558C6C58E4DA05950B06D7C9C1BFB980CB0462AF1D70A81036D55BCE675", "E298AFAE6C10545EEFE2EDCB1E58ACEB81769C82FC173BB89206A046496B5501", "E2CA1E7AD2646F35FD854E930E6AF030E58817DBF599A59E49719694B3B46D1F", "E310185BE54E51CFF10493C7633774F32119E4171818C194880F59739AAA4089", "E31519D348570E13DE06D25841BA7BC7594CA5BDE694E6A45E50426352D26932", "E3347BCB529A35601F044748C20F62BDDA272E18F4F99AF1DC1EC2079BD36858", "E35B88F38BFC9B7234027F68365182DFF12D96CE36C3F0A802C8E4998FA2F0FD", "E3E29938D5D0031514AFE0A7E80C2513F25C4DCE6D5E26A93BE99C9CA93B0FEA", "E440BB041ED6E708A034C8A54F6AE3020468A449ED6AA8A4467710E6C681D881", "E44CE2F0F86B1196280412E970030BEB796B7DF73A4580865992E9A728429474", "E472DE505C96419516AEFE62313E85E4E907BADF9E49C6E7E7D5A4719C5D4565", "E4A28F8F68186CEA27D3FEB20460BE3334CBCA58BC4385BFB2DAC3333FEF6C4B", "E4B907FE5279D8C6CE8330CC79305C67649550BA06CF29D70ABB593E6074803D", "E4CE7479089E915C4B370974E3FF482D5EE842E39F0AB529ACA744F7ED4A4FCC", "E4F82B1EF36905183E848EAEFF844914F58061E9D484E205B7784B8B5BE99E13", "E5138E231899A09B05DC534B4777976B17A0246B1FA15B8342DBF280F6CFD669", "E51AD2501331015E7E19A3AC49A96E1AC1A7C291EEE9E468031B3BA17AE28285", "E51DDF73E3F5CD96B12560329D18889F698C09D96494E43FCCF428FEC32A1F2E", "E568EF1AEDF71160C521687EEF39BAD4E7E38A89F906FA2D8B03A2FB9255CCC7", "E593E12AB7D6E26E07598ADF3963FAD201BAABDA173B0C2AE81C1AAB831FBC26", "E5BBCEF719E615994F1B258C759E10E101CC12EE74BBCBA1AFE726D5AFF29509", "E5C9021CFF3428F4B3B0F66CCD3134EB51552CD8CB2E83DF36DD8403ADFA8179", "E5E882E54AFBD27E45C030839DACD6485753D5EE22D50022E3F5DC9AB418F901", "E5F6CA4E9846520FFBE611036320AF23A481268C0C6F8DE632C6CEE7B97E65F5", "E60642C240D9037B533752978E174EB572F0BE59C7AAFB7A1B4B4EF362ABE4E3", "E607FED51AA57660B71B9B9ABC1A6F95054F0056936082A7116161B455C07598", "E619F0B12EAE67CCCEC5CE0326BC6EB363C3E94F87723AB21878B776DD8B0317", "E61FF499B7EFFD92A0884B1108A602A50283CF6842D88D47BD14A9C1F5EC2065", "E652AD074D4537242E4F6F6865F5497FE3BCB4D68389AAE0D3EB706D9D1DD1ED", "E677723D81339CA25FE5CB670D8786FB1ABB44D538C8C5D7C05E9A9FAE453FF7", "E6E8C028058300DBE5EFDBBDADFFCDE1DFD4C3AB66AFF1B302E082DEC504FF78", "E73B069C22847DCB042A534F76F473BEF350E9CFB3DC356BB864C5308AA99F79", "E74C53C459F7FE1C89AE67FEC29B42B1B0BF95AA1A5FE3D3CA36BD71ABE75230", "E775C68CA18D51E91E688F1880BD5AF1955B5F4DF7397FA28CC721E37DAFB99A", "E79BC6C34DAD829FAB4182BB79212B7400A2BCB673A1FFCDE7E446FA6EFAF11B", "E7B26F1EAEFB4260D24EE36CC6F4BF7A433546C3ED0AB3E0C2C3FEF44B61DA61", "E7B4E1607446FED2E1EA3DED4F35354BBD746B762279FBE37A746CB69873BBAB", "E7CD7DB0F968EEE7B8FE20C80C08018385BAE3E1AD7510C813DD097869B900D5", "E7CE2EA6AB2C632B7F613B9D475D4B193944DA0AB55A9BE076C1CA0BE60EF512", "E7E3551B3BD388636A37375B3F6439FA5E8D471B186B7E9F88305EC0A265E5D7", "E7F636A27638AC94395F093FEC504E57FEDAADB77E04FEB152B79FE3736BBB84", "E86571E167E5A4975D9779F360E0EF176043EDDE63B9A63DC8E057A6622B1210", "E865BAEC142E55284C8F942A6FED3A4F1258913AF74DA6D04A4F969F1FDEE827", "E888E5EBE83D27A538FE4C5957DF731881D9808C40870DA1BFEB861547852D38", "E8E3D041384B3A1C50DFC8E8DD6B7415911290515C88A2C292DAF367F018B0E7", "E8F76D937447220B7029E798B0EB262E5709AABE065EAA8B29BBA9D0C1C07EF1", "E8FB04B96E4922EE98A4E39A82665391B5E33FFBD84BF83FC189E8E9D5922FC8", "E97DB2C954E513038435D86F5C3DF2F3BC5F825BBBAEE200529899293BB6EC72", "E985F7DD50D9D8A298856E2C1DDC013C56A405C6DA86C2ECE58AB850F0AC19BE", "E9B094875CD2B5848F6A36165BCA28995E5211182785709CC0C6718B4D22F6A8", "E9CDD69A151880279AA5C5E27039A10306BBC1E05EF41BEE24FB52ADDD64851C", "E9F3A90DA9806F4EB921B9D3B1386D06CBF6A6FC448F63739B13ABCC86AF0725", "EA52924E34BCC16950981552A3FA767720FFB0ABD2C4348121C16E9BA6BD4C80", "EAAB3057567AB6F8526CB95E1A63C65959A6EB76CB5C61A5E8F66111A2539F55", "EAE3626D697DD9AA184F2FB8430E9808A349261E042A2F475F1558DE0474E3B5", "EB1B7991970BC557C564AB01263AD5A909B1D2A0C731464B7E2301EA1DE33653", "EB600CE5395CD89BA24F74E48B91CAA92CF18E64A90B1514E5930A42BF80F58A", "EB9C97E1767E99DB5972AA6DB53446FFC1D2256CC95E283AD514F18189053A41", "EBBA69401956060B98C4FDDE1CDAAA10D09B28A527F8C5C2F8D2998B16B675C4", "EBCAE79C78E25C53F68D6476B1A365416013A82CC75BAFBA0C65816EA47B537E", "EBCC12197854D7C444B518B80A223576FCB219A088A0CC929C19FF2993DC431A", "EBD6110D65EB41702B40A5795DBF9BE4F150B84442976771BAD2D5EE26847349", "EBF1AB9B1789962995A00F3A98AA22490BA3274A2E69C3AB4CFE371E9416F6AB", "EC583EC959A2A069B275113A4307EA1C258F0306C4E67508A1300BE5A8431AC2", "ED1E746B4A444761DF86B7BD074E2911879CE51C4CFBB278424F2A23E63071FA", "ED796DA12F35B849EC739966324C81FE11BDCC6E2DCB25F912D4D4A08B754359", "EDBB640D9C964C319A40ED15C23232FA8D49C6B495D6EF19F248B4A314B7651D", "EDD093484D30137351819CC679BCE37DF189A386F2BF2055FD557CA44A4384A5", "EDFA9D5968081EDE399774767050C178F730BD070533CFA73DE5F24F7E8E7A52", "EE3562F2436AE977B19689784E345CCDE7552541F8EFE79A721ED9EAEAFB7B04", "EEB2361CC674CA5958E10BC3152430D3B5AE7AEE5701640829F56F8548E53B31", "EF3E1BF0DE5F016F1A98A8949DD7F8CAEA643BD1CE65EBCFA855B994473DB3F0", "EF6DDDE67CC12C367CCDE00775111E8D298AFCD89C1584B532293E6AAEF36962", "EF8BCCAA9DAA84FFDF67B2B605E8F5219EBA4E7EDAA69B40EA2B0BCFC1D1C708", "EFC1B556A22098087C19B5342F262C1D63356C91A618DD58A453DF339E10D8AD", "EFD4687D2DC8ADFBEC960932263D6DA222DDFA92899BC72A9B9D62B4331178A6", "F000446708B91A19B1F61CA99B1AF67BFEB9C3B680087EEAA89007C8D02D6447", "F009B229BA58179FC3CB8F633C40E30BDC72B91C95C8FC1634F3C8FD8DBB7689", "F04464E7DB4FD4328624BFF3373CD456256ED939904587DF26664C07E0FBFECB", "F094735617DF6D91E1005B48EFE756F8123F399A8FB01EFDC087D8C653FDA1EE", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "F0C6BC6B6E0BCD2F79CA2CF94A9D9909AF0E9117B13EA219F0B9C650CC1C6C47", "F10F8D3E795F8FC960C9DE67D3C8A350C036905B85F3908BFE6956BF772DB36B", "F1A3DFA7EB79FE51E9EE40DE7EE818B3181F7D6FFEBD16C7E5DC5676556369E6", "F26EE38CBA6B93A0B0967DD4DF0B628E7EDCBF41134B0358C7BD18C0EBEC7F60", "F2C6F73567D1EF939E0A7A3BEABA49374976591C6C10FEBC5058CCA1937D64FE", "F382416AD54979EC84E0F146ECBFE7758A26F9ECAD763AA284B054EE90ACB877", "F3E9AF17DCD2EBC47BC32D0E05B6ACDCBFDDAF3EB47FFAC93CFD0FEBBBC04F7E", "F464CD623938E5ED5C85F50E078DBCBF19517CD5B7572A8280ED5A806C4AB47B", "F479B1D4D6CE6F94562BE83AEBC7D30E6633A6727AB24138B99039D7EB3AB70F", "F479ED9A8ECDFA2B5CCFF34D9B19F1AF511DF153068E2232B40DE0943441A404", "F4ACF6A7E5D7DE1275D32AC83A2605BD1EBE8A601F49D9C5C4F88B34B70CD57C", "F52078C3CD6350F062D64B5C88176DBF009214F5DCC83CE7CB6761C3791B8AA3", "F5AE5E21C0A9E6B0B1649A6E7B87CB8EE2192944FCF61E38E2C0AD35BE61EB2A", "F5CDE8C22C4BBC6BB7CBF97A440438D883CD649212412738F8629A2D4E07BCFD", "F5FE69C711C352F19B25282CC284084A78FE3478FA6E88CE4A5FADA3AE8C466F", "F62105F81141CDEB3DFFD1F9477D41B2397FCACB19F1417F54D9BA82EB281648", "F65CCCFAB16BAD847BA677C36DE613EC73CA7786F8DF7AD1ACFB80028B238ADD", "F65F1D96E364841337F0770420AA39E180E57CF181628F15C7259D9D9A9E8BDD", "F6890A0BB30FC9732307E597730D53D536A20EAEFE164094FE4FEB652AE43D3E", "F713D909A314116D26B3223AC74DB2A12F255E8CD10396BE95E0FAE7DEBD27FB", "F75806AF51F262CD91F3E2017F6775AF7816B8E15289C5596B33856B18979E5B", "F7835A9B3A0A4567D8238FC71DC3B44D992967A2D8C61210A4401B29EC8643C1", "F7AFF1859AA5354EFC59AA27C83C98140C15E10EC1325FDB78188D6EBCA2C0BA", "F7C19A7605675E9987440B6BF7B68981E4BF3E0D66DA301FB2606050CEF205B2", "F7CC6998F480257DB938E307B684CDDC8C5CFEC9E4C1124CC941F5C89197DD62", "F84FB8B0773598F78827E1ADB3A6A9D22608CC8C5ED5056206B7967240EF65A8", "F8C05127E36E824556F51F75FC0BD7B8C9BAFBF8B9EDFDFD5570D29673E4DEA1", "F8EA17B1BCCA9756F301132C0BD388AE2420FACC8A6047822E2FBAAB4E555F67", "F91E2B2658608F130E5AD8F0BF31E48ABB8BA0F7026A5974F12BA75F39A54364", "F944E42936BEE81B66172D157D2B804FBBF81109EC1A47047BA36FF00C643A56", "F94E2FD93352C1316CE6430308206EAFBBC673CE41B3E1052A98C80E2798D9B0", "F968064DF1D870E093FB1CBB6C9BC42A2AAB61D61095B3E288687BFC31A52BFD", "F976E6D48149579C30755509014967F1B6A7163FEAAB9453EBE9572696C3DDDD", "F9AD06C50230E8ABAA815E45C597EF41D173AE23406424AB72607082C827072B", "F9ED99C3F4B2D868A3826BA34135EFCC7EF1978329C535488F23E6CF98DA913D", "FA28CB50714C2E033435E17981D021316797914289ED09AB906E1A7CBA22C8A3", "FA83FA96638ECCC5FE0B2EBECF79AB927D4E143A6B5A6C196A3C14EDCF9E66C3", "FA8947935D7353A8494BB4E9213036F88B784759F33BB661330A2FD4F6E4F874", "FA90A7911C85ADEB12B865581B20CE95E3F9ECDBBEA139C43CB0A41CA0544B89", "FA92E5E95E82235799A737D3E6B40E874586F24ED8ECB218C8E8C5936994C79F", "FB37F0F7CF6522CCB3B684C95B5F64BEC8DDF83F29BF1BF109AD27B6810731D6", "FB461B8C9ADB1C603244A48769C1093934CEEACD9657516CFA0EDB341ACAA317", "FBFEA5EF43BC9C309ACAF565179869AA0039FDAA3ACC80FA73069A002E54D0EB", "FC367D3847B3B18A075985BFC8A2A8898C7B9AFE3FE16A6F84968131CD5047B4", "FCA9BE0821887F3F374B9CF492FB6D478D04FE55A202493BFA6C0D4087F6BB62", "FCD1F2B6A6EBCC0ED4071B26367C683978C01FF7E8287DA4D600E165CED45E15", "FCEDD547799AE384A4D749F6F180AE8594D14E825F787E185F25A3AC75A35F08", "FCFE0AB2B6EAE32C9E9D80D47D0141D9A34B3EB69A6AC6DFCBD309E802D58E11", "FD0E85A6790A7A5E9E4ED07F7E069BEFCDF351251124844206CB202EC5DE5168", "FD2209B7CB15638992B681C2106BFB54C56CAD087AEDD9B4249C0F8E7ADCB3D2", "FD3B6DACCDF2917EDE59BC97EFBE6A2BE91294E55463A289E02F5106FB9C2596", "FD3F38061E939E51B76E759F40381107A494E622DFB87A85205D469E0F708131", "FD3F7FDFA4DAAB71D175F1E137285D1F69A465922921368206BF33D36AB43D22", "FD48BA74DC3A1C3984E282E9336A9AAC5D63A6863D7227C72593B2FEC3CC6C79", "FD49F69A2433C54698143251927A4D0BFEC67AB881AEDC9C3EAC9D5E7CE41075", "FD54ED57D0984C8885C877F9181732A5619A1E525F7855FB4A72EC63053B7375", "FD78E00A34CDC9D7D8091CAA57CDC14B83E54362C87FEC9329E3CF442952770F", "FD89F92B8829CE7392B47C0ED84C6AFC3595DB7DDA24639A8AB325F2C83DE0D3", "FD98647DA723C33CDEC38C52B57AE83B49EBDE217212120E05428E998223B712", "FDA97DD243269D8176D4598B89F04D28DF3C51AA39B222AF75B2387650313DA7", "FDE1BF635D60EE0CA8051E326BCA1EFB7C7E659B969B5B079432E17D2860391E", "FDF6E8F7CD2218245453540A985C40ED7D9C20F3F61D50E98DA8EC923B1A387A", "FDFD56489C38E2165A00AD30ED35D882A27918341DF721F166495E9FBAA37BF3", "FE1F7929A5246356FBE2342F084D581EB70488749FF87514742F19541C0EDDB8", "FE54CFE937F2DA5795DDD68480E564629351A0806639F2A5F33EDAE216E03FD1", "FE682ECFC10CBB3EA19CC98A95397F776F34168220DD72550FAE4CF5E216A9CC", "FE6A60EA653FEE6F655EBB8429BCB70E7D54726EC0055ECB440856BF66B419CA", "FE6D95CEEFE9596CD6D6134F8326AB13E3C97D550B3E62F57DECDBDBC51C329A", "FE89F8E2C667D09C2C5C2208AC1E6F9525947B9E4A96A92CFD5C9D80113D73FB", "FEA72A089D1755DA76737B39FD3BC90F9FC3011626C35A4FAFB48AD0A4D10189", "FEAF0BB5153532B94D01FECEB863D6B2ED416A8AF5E46EF4D99B555860C882EC", "FED8F524B9C595CB0D81C78AF8662D74D0C7960F6749FC6424484CB55637033C", "FEDCA267965BBB9468CAE56A08FFCE9E72E44378F7136A8300FF61E129DBD9CE", "FEDE4F7915CF8E683DBC7AB56D68872D5740EF9C5D19FED52B140130771052A2", "FEE45A44E8C46E13896C20C8C9B2A275C16E5652E4DF723FE4A044838B932DB1", "FF04A79FD2255A76DC6D215AC88E8DD2FDC5B49C0E66788E7485B6EC0B97B85D", "FF45E3ABF690F8389ABC4179D09EC26AE04AAE4360E4A0DC8ED625EC0F918D5D", "FF4840FA7F2317CBB6130A281376F7290C3227EB77D653FDB8C95433F1FE2137", "FFEEC184B6E70C6210AE293D53A3A1B1504EA119812486B8160ACE05A643D9DD"]}, {"type": "ics", "idList": ["AA20-275A", "AA22-011A", "AA22-117A", "ICSA-19-024-02", "ICSA-19-211-01", "ICSA-19-274-01", "ICSA-20-133-02", "ICSA-21-119-03", "ICSA-21-133-02", "ICSA-21-147-02", "ICSA-21-159-10", "ICSA-21-245-01", "ICSA-21-306-01", "ICSA-21-334-04", "ICSA-21-336-06", "ICSA-21-336-08", "ICSA-22-055-02", "ICSA-22-069-09", "ICSA-22-090-02", "ICSA-22-097-01", "ICSA-22-104-05", "ICSA-22-111-03", "ICSA-22-116-01", "ICSA-22-130-06", "ICSA-22-132-13", "ICSA-22-242-01", "ICSA-22-242-02", "ICSA-22-256-01", "ICSA-22-258-05", "ICSA-22-342-02", "ICSA-22-349-21", "ICSA-23-234-01", "ICSMA-19-274-01"]}, {"type": "intothesymmetry", "idList": ["INTOTHESYMMETRY:03170E09A2C6F4BE8A3B9D5EF113B293"]}, {"type": "jetbrains", "idList": ["JETBRAINS:JETBRAINS-SECURITY-BULLETIN-Q4-2020"]}, {"type": "joomla", "idList": ["JOOMLA-779", "JOOMLA-816"]}, {"type": "jvn", "idList": ["JVN:43969166", "JVN:90729322"]}, {"type": "kaspersky", "idList": ["KLA10483", "KLA11004", "KLA11007", "KLA11231", "KLA11236", "KLA11646", "KLA11784", "KLA11785", "KLA12040", "KLA12083", "KLA12084", "KLA12086", "KLA12087", "KLA12104", "KLA12105", "KLA12107", "KLA12217", "KLA12218", "KLA12237", "KLA12238", "KLA12311", "KLA12364"]}, {"type": "kitploit", "idList": ["KITPLOIT:1751489026679880812", "KITPLOIT:5420210148456420402", "KITPLOIT:7323577050718865961", "KITPLOIT:8656177976839178440"]}, {"type": "lenovo", "idList": ["LENOVO:PS500190-INTEL-PROSETWIRELESS-WIFI-SOFTWARE-VULNERABILITIES-NOSID", "LENOVO:PS500190-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2015-0140", "MGASA-2016-0270", "MGASA-2016-0367", "MGASA-2017-0118", "MGASA-2017-0277", "MGASA-2017-0405", "MGASA-2018-0018", "MGASA-2018-0190", "MGASA-2018-0195", "MGASA-2018-0257", "MGASA-2018-0339", "MGASA-2018-0365", "MGASA-2019-0277", "MGASA-2019-0279", "MGASA-2019-0365", "MGASA-2019-0375", "MGASA-2019-0399", "MGASA-2020-0001", "MGASA-2020-0068", "MGASA-2020-0069", "MGASA-2020-0131", "MGASA-2020-0212", "MGASA-2020-0232", "MGASA-2020-0237", "MGASA-2020-0255", "MGASA-2020-0277", "MGASA-2020-0307", "MGASA-2020-0331", "MGASA-2020-0372", "MGASA-2020-0395", "MGASA-2020-0424", "MGASA-2020-0464", "MGASA-2020-0465", "MGASA-2020-0467", "MGASA-2020-0478", "MGASA-2020-0482", "MGASA-2021-0020", "MGASA-2021-0021", "MGASA-2021-0022", "MGASA-2021-0034", "MGASA-2021-0038", "MGASA-2021-0056", "MGASA-2021-0064", "MGASA-2021-0072", "MGASA-2021-0092", "MGASA-2021-0093", "MGASA-2021-0108", "MGASA-2021-0133", "MGASA-2021-0135", "MGASA-2021-0136", "MGASA-2021-0139", "MGASA-2021-0142", "MGASA-2021-0144", "MGASA-2021-0153", "MGASA-2021-0165", "MGASA-2021-0168", "MGASA-2021-0173", "MGASA-2021-0176", "MGASA-2021-0184", "MGASA-2021-0186", "MGASA-2021-0229", "MGASA-2021-0243", "MGASA-2021-0244", "MGASA-2021-0261", "MGASA-2021-0314", "MGASA-2021-0357", "MGASA-2021-0370", "MGASA-2021-0374", "MGASA-2021-0378", "MGASA-2021-0385", "MGASA-2021-0386", "MGASA-2021-0402", "MGASA-2021-0485", "MGASA-2021-0578", "MGASA-2023-0138"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:0FEB0AF7A8D15834DA7D1882395A9D7C"]}, {"type": "mariadbunix", "idList": ["MARIA:CVE-2021-2372", "MARIA:CVE-2021-2389"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT-LINUX-LOCAL-SUDO_BARON_SAMEDIT-", "MSF:EXPLOIT-MULTI-HTTP-STRUTS2_MULTI_EVAL_OGNL-", "MSF:EXPLOIT-MULTI-MISC-WEBLOGIC_DESERIALIZE_ASYNCRESPONSESERVICE-", "MSF:EXPLOIT-MULTI-MISC-WEBLOGIC_DESERIALIZE_BADATTRVAL-"]}, {"type": "mozilla", "idList": ["MFSA2017-10", "MFSA2017-11", "MFSA2017-12", "MFSA2017-13"]}, {"type": "mscve", "idList": ["MS:ADV200007", "MS:CVE-2020-1971", "MS:CVE-2020-26870", "MS:CVE-2020-27844", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "myhack58", "idList": ["MYHACK58:62201994562", "MYHACK58:62201994593", "MYHACK58:62201995222", "MYHACK58:62201995317", "MYHACK58:62201995369"]}, {"type": "nessus", "idList": ["700065.PRM", "700066.PRM", "700244.PRM", "701083.PRM", "9721.PASL", "ACTIVEMQ_5_15_12.NASL", "ACTIVEMQ_5_15_5.NASL", "ACTIVEMQ_5_16_1.NASL", "AIX_IJ26985.NASL", "AIX_IJ26986.NASL", "AIX_OPENSSL_ADVISORY24.NASL", "AIX_OPENSSL_ADVISORY26.NASL", "AIX_OPENSSL_ADVISORY27.NASL", "AL2022_ALAS2022-2022-044.NASL", "AL2022_ALAS2022-2022-169.NASL", "AL2022_ALAS2022-2022-182.NASL", "AL2022_ALAS2022-2022-233.NASL", "AL2023_ALAS2023-2023-015.NASL", "AL2023_ALAS2023-2023-037.NASL", "AL2023_ALAS2023-2023-059.NASL", "AL2_ALAS-2018-1004.NASL", "AL2_ALAS-2018-1009.NASL", "AL2_ALAS-2018-1102.NASL", "AL2_ALAS-2019-1301.NASL", "AL2_ALAS-2020-1387.NASL", "AL2_ALAS-2020-1395.NASL", "AL2_ALAS-2020-1396.NASL", "AL2_ALAS-2020-1403.NASL", "AL2_ALAS-2020-1417.NASL", "AL2_ALAS-2020-1449.NASL", "AL2_ALAS-2020-1455.NASL", "AL2_ALAS-2020-1519.NASL", "AL2_ALAS-2020-1554.NASL", "AL2_ALAS-2020-1573.NASL", "AL2_ALAS-2021-1590.NASL", "AL2_ALAS-2021-1593.NASL", "AL2_ALAS-2021-1608.NASL", "AL2_ALAS-2021-1610.NASL", "AL2_ALAS-2021-1611.NASL", "AL2_ALAS-2021-1612.NASL", "AL2_ALAS-2021-1622.NASL", "AL2_ALAS-2021-1626.NASL", "AL2_ALAS-2021-1640.NASL", "AL2_ALAS-2021-1643.NASL", "AL2_ALAS-2021-1645.NASL", "AL2_ALAS-2021-1647.NASL", "AL2_ALAS-2021-1653.NASL", "AL2_ALAS-2021-1664.NASL", "AL2_ALAS-2021-1666.NASL", "AL2_ALAS-2021-1692.NASL", "AL2_ALAS-2021-1693.NASL", "AL2_ALAS-2021-1695.NASL", "AL2_ALAS-2021-1700.NASL", "AL2_ALAS-2022-1802.NASL", "AL2_ALAS-2022-1845.NASL", "AL2_ALAS-2023-1905.NASL", "AL2_ALAS-2023-1946.NASL", "AL2_ALAS-2023-1966.NASL", "AL2_ALAS-2023-2030.NASL", "AL2_ALAS-2023-2047.NASL", "ALA_ALAS-2015-595.NASL", "ALA_ALAS-2016-764.NASL", "ALA_ALAS-2017-825.NASL", "ALA_ALAS-2018-1000.NASL", "ALA_ALAS-2018-1009.NASL", "ALA_ALAS-2018-1065.NASL", "ALA_ALAS-2018-1069.NASL", "ALA_ALAS-2018-1070.NASL", "ALA_ALAS-2018-1102.NASL", "ALA_ALAS-2019-1166.NASL", "ALA_ALAS-2020-1345.NASL", "ALA_ALAS-2020-1354.NASL", "ALA_ALAS-2020-1359.NASL", "ALA_ALAS-2020-1389.NASL", "ALA_ALAS-2020-1390.NASL", "ALA_ALAS-2020-1409.NASL", "ALA_ALAS-2020-1445.NASL", "ALA_ALAS-2020-1456.NASL", "ALA_ALAS-2020-1473.NASL", "ALA_ALAS-2021-1473.NASL", "ALA_ALAS-2021-1478.NASL", "ALA_ALAS-2021-1482.NASL", "ALA_ALAS-2021-1484.NASL", "ALA_ALAS-2021-1491.NASL", "ALA_ALAS-2021-1493.NASL", "ALA_ALAS-2021-1498.NASL", "ALA_ALAS-2021-1500.NASL", "ALA_ALAS-2021-1504.NASL", "ALA_ALAS-2021-1509.NASL", "ALA_ALAS-2021-1518.NASL", "ALA_ALAS-2021-1528.NASL", "ALA_ALAS-2021-1534.NASL", "ALA_ALAS-2021-1535.NASL", "ALA_ALAS-2021-1544.NASL", "ALA_ALAS-2022-1572.NASL", "ALA_ALAS-2022-1593.NASL", "ALA_ALAS-2023-1695.NASL", "ALA_ALAS-2023-1709.NASL", "ALA_ALAS-2023-1743.NASL", "ALMA_LINUX_ALSA-2020-5476.NASL", "ALMA_LINUX_ALSA-2021-0218.NASL", "ALMA_LINUX_ALSA-2021-0557.NASL", "ALMA_LINUX_ALSA-2021-1024.NASL", "ALMA_LINUX_ALSA-2021-1593.NASL", "ALMA_LINUX_ALSA-2021-1610.NASL", "ALMA_LINUX_ALSA-2021-1633.NASL", "ALMA_LINUX_ALSA-2021-1678.NASL", "ALMA_LINUX_ALSA-2021-2238.NASL", "ALMA_LINUX_ALSA-2021-2575.NASL", "ALMA_LINUX_ALSA-2021-2776.NASL", "ALMA_LINUX_ALSA-2021-2781.NASL", "ALMA_LINUX_ALSA-2021-3572.NASL", "ALMA_LINUX_ALSA-2021-4142.NASL", "ALMA_LINUX_ALSA-2021-4198.NASL", "ALMA_LINUX_ALSA-2021-4251.NASL", "ALMA_LINUX_ALSA-2021-4424.NASL", "ALMA_LINUX_ALSA-2021-4511.NASL", "ALMA_LINUX_ALSA-2022-1860.NASL", "ALMA_LINUX_ALSA-2022-1861.NASL", "AMAZON_CORRETTO_11_0_12_7_1.NASL", "AMAZON_CORRETTO_11_0_6_10_1.NASL", "AMAZON_CORRETTO_16_0_2_7_1.NASL", "AMAZON_CORRETTO_8_242_07_1.NASL", "AMAZON_CORRETTO_8_302_08_1.NASL", "APACHE_2_4_38.NASL", "APACHE_ZOOKEEPER_3_5_3.NASL", "APACHE_ZOOKEEPER_3_5_5.NASL", "AZUL_ZULU_16_32_16.NASL", "CENTOS8_RHSA-2020-0128.NASL", "CENTOS8_RHSA-2020-0202.NASL", "CENTOS8_RHSA-2020-0579.NASL", "CENTOS8_RHSA-2020-0598.NASL", "CENTOS8_RHSA-2020-0708.NASL", "CENTOS8_RHSA-2020-1644.NASL", "CENTOS8_RHSA-2020-2848.NASL", "CENTOS8_RHSA-2020-2852.NASL", "CENTOS8_RHSA-2020-4670.NASL", "CENTOS8_RHSA-2020-4847.NASL", "CENTOS8_RHSA-2020-5476.NASL", "CENTOS8_RHSA-2020-5493.NASL", "CENTOS8_RHSA-2020-5499.NASL", "CENTOS8_RHSA-2021-0218.NASL", "CENTOS8_RHSA-2021-0549.NASL", "CENTOS8_RHSA-2021-0551.NASL", "CENTOS8_RHSA-2021-0734.NASL", "CENTOS8_RHSA-2021-0735.NASL", "CENTOS8_RHSA-2021-0744.NASL", "CENTOS8_RHSA-2021-1024.NASL", "CENTOS8_RHSA-2021-1593.NASL", "CENTOS8_RHSA-2021-1610.NASL", "CENTOS8_RHSA-2021-1633.NASL", "CENTOS8_RHSA-2021-1678.NASL", "CENTOS8_RHSA-2021-1761.NASL", "CENTOS8_RHSA-2021-1846.NASL", "CENTOS8_RHSA-2021-1879.NASL", "CENTOS8_RHSA-2021-1898.NASL", "CENTOS8_RHSA-2021-2238.NASL", "CENTOS8_RHSA-2021-2575.NASL", "CENTOS8_RHSA-2021-2776.NASL", "CENTOS8_RHSA-2021-2781.NASL", "CENTOS8_RHSA-2021-3572.NASL", "CENTOS8_RHSA-2021-3590.NASL", "CENTOS8_RHSA-2021-4142.NASL", "CENTOS8_RHSA-2021-4151.NASL", "CENTOS8_RHSA-2021-4160.NASL", "CENTOS8_RHSA-2021-4162.NASL", "CENTOS8_RHSA-2021-4198.NASL", "CENTOS8_RHSA-2021-4251.NASL", "CENTOS8_RHSA-2021-4424.NASL", "CENTOS8_RHSA-2021-4511.NASL", "CENTOS8_RHSA-2022-1557.NASL", "CENTOS8_RHSA-2022-1860.NASL", "CENTOS8_RHSA-2022-1861.NASL", "CENTOS_RHSA-2015-1695.NASL", "CENTOS_RHSA-2017-1100.NASL", "CENTOS_RHSA-2017-2247.NASL", "CENTOS_RHSA-2018-3090.NASL", "CENTOS_RHSA-2018-3221.NASL", "CENTOS_RHSA-2019-2091.NASL", "CENTOS_RHSA-2020-0122.NASL", "CENTOS_RHSA-2020-0157.NASL", "CENTOS_RHSA-2020-0194.NASL", "CENTOS_RHSA-2020-0196.NASL", "CENTOS_RHSA-2020-0541.NASL", "CENTOS_RHSA-2020-0632.NASL", "CENTOS_RHSA-2020-0703.NASL", "CENTOS_RHSA-2020-2530.NASL", "CENTOS_RHSA-2020-2663.NASL", "CENTOS_RHSA-2020-3936.NASL", "CENTOS_RHSA-2020-4004.NASL", "CENTOS_RHSA-2020-5566.NASL", "CENTOS_RHSA-2021-0162.NASL", "CENTOS_RHSA-2021-0221.NASL", "CENTOS_RHSA-2021-0343.NASL", "CENTOS_RHSA-2021-1354.NASL", "CENTOS_RHSA-2021-2784.NASL", "CENTOS_RHSA-2021-2845.NASL", "CENTOS_RHSA-2021-3798.NASL", "CENTOS_RHSA-2022-5235.NASL", "DEBIAN_DLA-1020.NASL", "DEBIAN_DLA-1021.NASL", "DEBIAN_DLA-1157.NASL", "DEBIAN_DLA-1194.NASL", "DEBIAN_DLA-1330.NASL", "DEBIAN_DLA-1449.NASL", "DEBIAN_DLA-1580.NASL", "DEBIAN_DLA-1797.NASL", "DEBIAN_DLA-1801.NASL", "DEBIAN_DLA-1896.NASL", "DEBIAN_DLA-1943.NASL", "DEBIAN_DLA-1950.NASL", "DEBIAN_DLA-1984.NASL", "DEBIAN_DLA-2030.NASL", "DEBIAN_DLA-2111.NASL", "DEBIAN_DLA-2118.NASL", "DEBIAN_DLA-2128.NASL", "DEBIAN_DLA-2139.NASL", "DEBIAN_DLA-2191.NASL", "DEBIAN_DLA-2201.NASL", "DEBIAN_DLA-2209.NASL", "DEBIAN_DLA-2217.NASL", "DEBIAN_DLA-2256.NASL", "DEBIAN_DLA-2270.NASL", "DEBIAN_DLA-2277.NASL", "DEBIAN_DLA-2279.NASL", "DEBIAN_DLA-2286.NASL", "DEBIAN_DLA-2364.NASL", "DEBIAN_DLA-2378.NASL", "DEBIAN_DLA-2405.NASL", "DEBIAN_DLA-2406.NASL", "DEBIAN_DLA-2419.NASL", "DEBIAN_DLA-2437.NASL", "DEBIAN_DLA-2467.NASL", "DEBIAN_DLA-2471.NASL", "DEBIAN_DLA-2474.NASL", "DEBIAN_DLA-2492.NASL", "DEBIAN_DLA-2493.NASL", "DEBIAN_DLA-2495.NASL", "DEBIAN_DLA-2500.NASL", "DEBIAN_DLA-2512.NASL", "DEBIAN_DLA-2534.NASL", "DEBIAN_DLA-2550.NASL", "DEBIAN_DLA-2555.NASL", "DEBIAN_DLA-2563.NASL", "DEBIAN_DLA-2565.NASL", "DEBIAN_DLA-2569.NASL", "DEBIAN_DLA-2583.NASL", "DEBIAN_DLA-2608.NASL", "DEBIAN_DLA-2616.NASL", "DEBIAN_DLA-2619.NASL", "DEBIAN_DLA-2628.NASL", "DEBIAN_DLA-2638.NASL", "DEBIAN_DLA-2657.NASL", "DEBIAN_DLA-2661.NASL", "DEBIAN_DLA-2664.NASL", "DEBIAN_DLA-2733.NASL", "DEBIAN_DLA-2734.NASL", "DEBIAN_DLA-2737.NASL", "DEBIAN_DLA-2751.NASL", "DEBIAN_DLA-2877.NASL", "DEBIAN_DLA-2919.NASL", "DEBIAN_DLA-2975.NASL", "DEBIAN_DLA-3085.NASL", "DEBIAN_DLA-3129.NASL", "DEBIAN_DLA-3160.NASL", "DEBIAN_DLA-3164.NASL", "DEBIAN_DLA-3205.NASL", "DEBIAN_DLA-3432.NASL", "DEBIAN_DLA-3551.NASL", "DEBIAN_DLA-728.NASL", "DEBIAN_DLA-729.NASL", "DEBIAN_DLA-906.NASL", "DEBIAN_DLA-946.NASL", "DEBIAN_DLA-986.NASL", "DEBIAN_DSA-3720.NASL", "DEBIAN_DSA-3721.NASL", "DEBIAN_DSA-3831.NASL", "DEBIAN_DSA-3871.NASL", "DEBIAN_DSA-3872.NASL", "DEBIAN_DSA-4017.NASL", "DEBIAN_DSA-4018.NASL", "DEBIAN_DSA-4157.NASL", "DEBIAN_DSA-4158.NASL", "DEBIAN_DSA-4278.NASL", "DEBIAN_DSA-4348.NASL", "DEBIAN_DSA-4355.NASL", "DEBIAN_DSA-4434.NASL", "DEBIAN_DSA-4460.NASL", "DEBIAN_DSA-4461.NASL", "DEBIAN_DSA-4542.NASL", "DEBIAN_DSA-4605.NASL", "DEBIAN_DSA-4621.NASL", "DEBIAN_DSA-4661.NASL", "DEBIAN_DSA-4669.NASL", "DEBIAN_DSA-4693.NASL", "DEBIAN_DSA-4696.NASL", "DEBIAN_DSA-4727.NASL", "DEBIAN_DSA-4772.NASL", "DEBIAN_DSA-4789.NASL", "DEBIAN_DSA-4795.NASL", "DEBIAN_DSA-4807.NASL", "DEBIAN_DSA-4810.NASL", "DEBIAN_DSA-4811.NASL", "DEBIAN_DSA-4835.NASL", "DEBIAN_DSA-4839.NASL", "DEBIAN_DSA-4855.NASL", "DEBIAN_DSA-4863.NASL", "DEBIAN_DSA-4875.NASL", "DEBIAN_DSA-4881.NASL", "DEBIAN_DSA-4882.NASL", "DEBIAN_DSA-4885.NASL", "DEBIAN_DSA-4891.NASL", "DEBIAN_DSA-4908.NASL", "DEBIAN_DSA-4919.NASL", "DEBIAN_DSA-4946.NASL", "DEBIAN_DSA-4949.NASL", "DEBIAN_DSA-4952.NASL", "DEBIAN_DSA-4986.NASL", "DEBIAN_DSA-5004.NASL", "DEBIAN_DSA-5197.NASL", "DEBIAN_DSA-5265.NASL", "DELL_WYSE_MANAGEMENT_SUITE_DSA-2022-329_4_0.NASL", "DRUPAL_8_8_6.NASL", "EULEROS_SA-2017-1075.NASL", "EULEROS_SA-2017-1076.NASL", "EULEROS_SA-2017-1191.NASL", "EULEROS_SA-2017-1192.NASL", "EULEROS_SA-2018-1088.NASL", "EULEROS_SA-2018-1089.NASL", "EULEROS_SA-2018-1156.NASL", "EULEROS_SA-2018-1214.NASL", "EULEROS_SA-2018-1257.NASL", "EULEROS_SA-2018-1258.NASL", "EULEROS_SA-2018-1306.NASL", "EULEROS_SA-2018-1383.NASL", "EULEROS_SA-2018-1392.NASL", "EULEROS_SA-2018-1420.NASL", "EULEROS_SA-2019-1009.NASL", "EULEROS_SA-2019-1084.NASL", "EULEROS_SA-2019-1164.NASL", "EULEROS_SA-2019-1185.NASL", "EULEROS_SA-2019-1201.NASL", "EULEROS_SA-2019-1400.NASL", "EULEROS_SA-2019-1546.NASL", "EULEROS_SA-2019-1643.NASL", "EULEROS_SA-2019-1667.NASL", "EULEROS_SA-2019-1721.NASL", "EULEROS_SA-2019-1998.NASL", "EULEROS_SA-2019-2030.NASL", "EULEROS_SA-2019-2215.NASL", "EULEROS_SA-2019-2232.NASL", "EULEROS_SA-2019-2291.NASL", "EULEROS_SA-2019-2360.NASL", "EULEROS_SA-2019-2364.NASL", "EULEROS_SA-2019-2509.NASL", "EULEROS_SA-2019-2542.NASL", "EULEROS_SA-2019-2630.NASL", "EULEROS_SA-2020-1057.NASL", "EULEROS_SA-2020-1111.NASL", "EULEROS_SA-2020-1210.NASL", "EULEROS_SA-2020-1216.NASL", "EULEROS_SA-2020-1262.NASL", "EULEROS_SA-2020-1395.NASL", "EULEROS_SA-2020-1451.NASL", "EULEROS_SA-2020-1457.NASL", "EULEROS_SA-2020-1581.NASL", "EULEROS_SA-2020-1596.NASL", "EULEROS_SA-2020-1613.NASL", "EULEROS_SA-2020-1645.NASL", "EULEROS_SA-2020-1677.NASL", "EULEROS_SA-2020-1684.NASL", "EULEROS_SA-2020-1771.NASL", "EULEROS_SA-2020-1794.NASL", "EULEROS_SA-2020-1799.NASL", "EULEROS_SA-2020-1817.NASL", "EULEROS_SA-2020-1820.NASL", "EULEROS_SA-2020-1829.NASL", "EULEROS_SA-2020-1889.NASL", "EULEROS_SA-2020-1893.NASL", "EULEROS_SA-2020-1894.NASL", "EULEROS_SA-2020-1915.NASL", "EULEROS_SA-2020-1927.NASL", "EULEROS_SA-2020-1932.NASL", "EULEROS_SA-2020-1943.NASL", "EULEROS_SA-2020-1967.NASL", "EULEROS_SA-2020-1968.NASL", "EULEROS_SA-2020-2068.NASL", "EULEROS_SA-2020-2085.NASL", "EULEROS_SA-2020-2093.NASL", "EULEROS_SA-2020-2102.NASL", "EULEROS_SA-2020-2132.NASL", "EULEROS_SA-2020-2191.NASL", "EULEROS_SA-2020-2274.NASL", "EULEROS_SA-2020-2277.NASL", "EULEROS_SA-2020-2327.NASL", "EULEROS_SA-2020-2374.NASL", "EULEROS_SA-2020-2380.NASL", "EULEROS_SA-2020-2401.NASL", "EULEROS_SA-2020-2405.NASL", "EULEROS_SA-2020-2450.NASL", "EULEROS_SA-2020-2459.NASL", "EULEROS_SA-2020-2478.NASL", "EULEROS_SA-2020-2487.NASL", "EULEROS_SA-2020-2500.NASL", "EULEROS_SA-2020-2512.NASL", "EULEROS_SA-2020-2548.NASL", "EULEROS_SA-2020-2560.NASL", "EULEROS_SA-2020-2572.NASL", "EULEROS_SA-2021-1003.NASL", "EULEROS_SA-2021-1010.NASL", "EULEROS_SA-2021-1014.NASL", "EULEROS_SA-2021-1016.NASL", "EULEROS_SA-2021-1022.NASL", "EULEROS_SA-2021-1029.NASL", "EULEROS_SA-2021-1033.NASL", "EULEROS_SA-2021-1035.NASL", "EULEROS_SA-2021-1063.NASL", "EULEROS_SA-2021-1073.NASL", "EULEROS_SA-2021-1080.NASL", "EULEROS_SA-2021-1102.NASL", "EULEROS_SA-2021-1104.NASL", "EULEROS_SA-2021-1133.NASL", "EULEROS_SA-2021-1137.NASL", "EULEROS_SA-2021-1149.NASL", "EULEROS_SA-2021-1156.NASL", "EULEROS_SA-2021-1160.NASL", "EULEROS_SA-2021-1166.NASL", "EULEROS_SA-2021-1173.NASL", "EULEROS_SA-2021-1175.NASL", "EULEROS_SA-2021-1221.NASL", "EULEROS_SA-2021-1257.NASL", "EULEROS_SA-2021-1276.NASL", "EULEROS_SA-2021-1287.NASL", "EULEROS_SA-2021-1310.NASL", "EULEROS_SA-2021-1312.NASL", "EULEROS_SA-2021-1333.NASL", "EULEROS_SA-2021-1338.NASL", "EULEROS_SA-2021-1339.NASL", "EULEROS_SA-2021-1346.NASL", "EULEROS_SA-2021-1366.NASL", "EULEROS_SA-2021-1375.NASL", "EULEROS_SA-2021-1376.NASL", "EULEROS_SA-2021-1390.NASL", "EULEROS_SA-2021-1399.NASL", "EULEROS_SA-2021-1402.NASL", "EULEROS_SA-2021-1403.NASL", "EULEROS_SA-2021-1410.NASL", "EULEROS_SA-2021-1414.NASL", "EULEROS_SA-2021-1416.NASL", "EULEROS_SA-2021-1418.NASL", "EULEROS_SA-2021-1420.NASL", "EULEROS_SA-2021-1424.NASL", "EULEROS_SA-2021-1457.NASL", "EULEROS_SA-2021-1466.NASL", "EULEROS_SA-2021-1487.NASL", "EULEROS_SA-2021-1502.NASL", "EULEROS_SA-2021-1505.NASL", "EULEROS_SA-2021-1506.NASL", "EULEROS_SA-2021-1514.NASL", "EULEROS_SA-2021-1520.NASL", "EULEROS_SA-2021-1538.NASL", "EULEROS_SA-2021-1544.NASL", "EULEROS_SA-2021-1548.NASL", "EULEROS_SA-2021-1549.NASL", "EULEROS_SA-2021-1554.NASL", "EULEROS_SA-2021-1562.NASL", "EULEROS_SA-2021-1575.NASL", "EULEROS_SA-2021-1587.NASL", "EULEROS_SA-2021-1596.NASL", "EULEROS_SA-2021-1605.NASL", "EULEROS_SA-2021-1615.NASL", "EULEROS_SA-2021-1619.NASL", "EULEROS_SA-2021-1621.NASL", "EULEROS_SA-2021-1630.NASL", "EULEROS_SA-2021-1637.NASL", "EULEROS_SA-2021-1640.NASL", "EULEROS_SA-2021-1641.NASL", "EULEROS_SA-2021-1645.NASL", "EULEROS_SA-2021-1669.NASL", "EULEROS_SA-2021-1672.NASL", "EULEROS_SA-2021-1685.NASL", "EULEROS_SA-2021-1695.NASL", "EULEROS_SA-2021-1696.NASL", "EULEROS_SA-2021-1701.NASL", "EULEROS_SA-2021-1707.NASL", "EULEROS_SA-2021-1710.NASL", "EULEROS_SA-2021-1711.NASL", "EULEROS_SA-2021-1720.NASL", "EULEROS_SA-2021-1721.NASL", "EULEROS_SA-2021-1722.NASL", "EULEROS_SA-2021-1737.NASL", "EULEROS_SA-2021-1740.NASL", "EULEROS_SA-2021-1746.NASL", "EULEROS_SA-2021-1747.NASL", "EULEROS_SA-2021-1756.NASL", "EULEROS_SA-2021-1825.NASL", "EULEROS_SA-2021-1826.NASL", "EULEROS_SA-2021-1831.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1839.NASL", "EULEROS_SA-2021-1856.NASL", "EULEROS_SA-2021-1868.NASL", "EULEROS_SA-2021-1882.NASL", "EULEROS_SA-2021-1886.NASL", "EULEROS_SA-2021-1891.NASL", "EULEROS_SA-2021-1907.NASL", "EULEROS_SA-2021-1908.NASL", "EULEROS_SA-2021-1909.NASL", "EULEROS_SA-2021-1911.NASL", "EULEROS_SA-2021-1915.NASL", "EULEROS_SA-2021-1920.NASL", "EULEROS_SA-2021-1921.NASL", "EULEROS_SA-2021-1928.NASL", "EULEROS_SA-2021-1934.NASL", "EULEROS_SA-2021-1935.NASL", "EULEROS_SA-2021-1936.NASL", "EULEROS_SA-2021-1941.NASL", "EULEROS_SA-2021-1942.NASL", "EULEROS_SA-2021-1949.NASL", "EULEROS_SA-2021-1955.NASL", "EULEROS_SA-2021-1956.NASL", "EULEROS_SA-2021-1957.NASL", "EULEROS_SA-2021-1960.NASL", "EULEROS_SA-2021-1962.NASL", "EULEROS_SA-2021-1965.NASL", "EULEROS_SA-2021-1969.NASL", "EULEROS_SA-2021-1970.NASL", "EULEROS_SA-2021-1973.NASL", "EULEROS_SA-2021-1985.NASL", "EULEROS_SA-2021-1997.NASL", "EULEROS_SA-2021-2005.NASL", "EULEROS_SA-2021-2007.NASL", "EULEROS_SA-2021-2020.NASL", "EULEROS_SA-2021-2022.NASL", "EULEROS_SA-2021-2028.NASL", "EULEROS_SA-2021-2032.NASL", "EULEROS_SA-2021-2044.NASL", "EULEROS_SA-2021-2049.NASL", "EULEROS_SA-2021-2052.NASL", "EULEROS_SA-2021-2056.NASL", "EULEROS_SA-2021-2060.NASL", "EULEROS_SA-2021-2063.NASL", "EULEROS_SA-2021-2067.NASL", "EULEROS_SA-2021-2091.NASL", "EULEROS_SA-2021-2096.NASL", "EULEROS_SA-2021-2101.NASL", "EULEROS_SA-2021-2132.NASL", "EULEROS_SA-2021-2141.NASL", "EULEROS_SA-2021-2150.NASL", "EULEROS_SA-2021-2151.NASL", "EULEROS_SA-2021-2154.NASL", "EULEROS_SA-2021-2157.NASL", "EULEROS_SA-2021-2159.NASL", "EULEROS_SA-2021-2162.NASL", "EULEROS_SA-2021-2170.NASL", "EULEROS_SA-2021-2174.NASL", "EULEROS_SA-2021-2176.NASL", "EULEROS_SA-2021-2198.NASL", "EULEROS_SA-2021-2206.NASL", "EULEROS_SA-2021-2225.NASL", "EULEROS_SA-2021-2239.NASL", "EULEROS_SA-2021-2250.NASL", "EULEROS_SA-2021-2265.NASL", "EULEROS_SA-2021-2276.NASL", "EULEROS_SA-2021-2290.NASL", "EULEROS_SA-2021-2309.NASL", "EULEROS_SA-2021-2311.NASL", "EULEROS_SA-2021-2325.NASL", "EULEROS_SA-2021-2364.NASL", "EULEROS_SA-2021-2407.NASL", "EULEROS_SA-2021-2416.NASL", "EULEROS_SA-2021-2417.NASL", "EULEROS_SA-2021-2418.NASL", "EULEROS_SA-2021-2427.NASL", "EULEROS_SA-2021-2431.NASL", "EULEROS_SA-2021-2435.NASL", "EULEROS_SA-2021-2456.NASL", "EULEROS_SA-2021-2457.NASL", "EULEROS_SA-2021-2464.NASL", "EULEROS_SA-2021-2474.NASL", "EULEROS_SA-2021-2489.NASL", "EULEROS_SA-2021-2501.NASL", "EULEROS_SA-2021-2510.NASL", "EULEROS_SA-2021-2520.NASL", "EULEROS_SA-2021-2535.NASL", "EULEROS_SA-2021-2537.NASL", "EULEROS_SA-2021-2542.NASL", "EULEROS_SA-2021-2559.NASL", "EULEROS_SA-2021-2561.NASL", "EULEROS_SA-2021-2566.NASL", "EULEROS_SA-2021-2577.NASL", "EULEROS_SA-2021-2587.NASL", "EULEROS_SA-2021-2619.NASL", "EULEROS_SA-2021-2738.NASL", "EULEROS_SA-2021-2747.NASL", "EULEROS_SA-2021-2758.NASL", "EULEROS_SA-2021-2765.NASL", "EULEROS_SA-2021-2783.NASL", "EULEROS_SA-2021-2785.NASL", "EULEROS_SA-2021-2808.NASL", "EULEROS_SA-2021-2831.NASL", "EULEROS_SA-2021-2872.NASL", "EULEROS_SA-2021-2874.NASL", "EULEROS_SA-2021-2875.NASL", "EULEROS_SA-2021-2892.NASL", "EULEROS_SA-2021-2894.NASL", "EULEROS_SA-2022-1048.NASL", "EULEROS_SA-2022-1059.NASL", "EULEROS_SA-2022-1062.NASL", "EULEROS_SA-2022-1083.NASL", "EULEROS_SA-2022-1086.NASL", "EULEROS_SA-2022-1090.NASL", "EULEROS_SA-2022-1116.NASL", "EULEROS_SA-2022-1132.NASL", "EULEROS_SA-2022-1265.NASL", "EULEROS_SA-2022-1433.NASL", "EULEROS_SA-2022-1454.NASL", "EULEROS_SA-2022-1492.NASL", "EULEROS_SA-2022-1511.NASL", "EULEROS_SA-2022-1577.NASL", "EULEROS_SA-2022-1611.NASL", "EULEROS_SA-2022-1634.NASL", "EULEROS_SA-2022-1688.NASL", "EULEROS_SA-2022-1711.NASL", "EULEROS_SA-2022-1751.NASL", "EULEROS_SA-2022-1794.NASL", "EULEROS_SA-2022-1811.NASL", "EULEROS_SA-2022-1848.NASL", "EULEROS_SA-2022-1872.NASL", "EULEROS_SA-2022-1907.NASL", "EULEROS_SA-2022-2031.NASL", "EULEROS_SA-2022-2059.NASL", "EULEROS_SA-2022-2185.NASL", "EULEROS_SA-2022-2204.NASL", "EULEROS_SA-2022-2491.NASL", "EULEROS_SA-2022-2576.NASL", "EULEROS_SA-2022-2616.NASL", "EULEROS_SA-2022-2627.NASL", "EULEROS_SA-2022-2740.NASL", "EULEROS_SA-2022-2775.NASL", "EULEROS_SA-2022-2828.NASL", "EULEROS_SA-2022-2854.NASL", "EULEROS_SA-2023-1055.NASL", "EULEROS_SA-2023-1152.NASL", "EULEROS_SA-2023-1173.NASL", "EULEROS_SA-2023-1201.NASL", "EULEROS_SA-2023-1231.NASL", "EULEROS_SA-2023-1273.NASL", "EULEROS_SA-2023-1713.NASL", "EULEROS_SA-2023-1748.NASL", "EULEROS_SA-2023-2183.NASL", "F5_BIGIP_SOL07944249.NASL", "F5_BIGIP_SOL10002140.NASL", "F5_BIGIP_SOL15402727.NASL", "F5_BIGIP_SOL18484125.NASL", "F5_BIGIP_SOL21054458.NASL", "F5_BIGIP_SOL24624116.NASL", "F5_BIGIP_SOL32469285.NASL", "F5_BIGIP_SOL40508224.NASL", "F5_BIGIP_SOL42910051.NASL", "F5_BIGIP_SOL61186963.NASL", "F5_BIGIP_SOL63025104.NASL", "F5_BIGIP_SOL63525058.NASL", "F5_BIGIP_SOL92451315.NASL", "FEDORA_2016-38E5B05260.NASL", "FEDORA_2016-3C5D606035.NASL", "FEDORA_2016-4094BD4AD6.NASL", "FEDORA_2016-B2DFB591CD.NASL", "FEDORA_2016-C1B01B9278.NASL", "FEDORA_2017-03954B6DC4.NASL", "FEDORA_2017-1206F87545.NASL", "FEDORA_2017-4CF72E2C11.NASL", "FEDORA_2017-4E2312892E.NASL", "FEDORA_2017-512A6C5AAE.NASL", "FEDORA_2017-55A3247CFD.NASL", "FEDORA_2017-7F30914972.NASL", "FEDORA_2017-DBEC196DD8.NASL", "FEDORA_2018-02A38AF202.NASL", "FEDORA_2018-1B4F1158E2.NASL", "FEDORA_2018-24BD6C9D4A.NASL", "FEDORA_2018-2F696A3BE3.NASL", "FEDORA_2018-39E0872379.NASL", "FEDORA_2018-40DC8B8B16.NASL", "FEDORA_2018-48B73ED393.NASL", "FEDORA_2018-49651B2236.NASL", "FEDORA_2018-520E4C5B4E.NASL", "FEDORA_2018-76AFAF1961.NASL", "FEDORA_2018-93A507FD0F.NASL", "FEDORA_2018-9490B422E7.NASL", "FEDORA_2018-9D667BDFF8.NASL", "FEDORA_2018-C402EEA18B.NASL", "FEDORA_2019-00C25B9379.NASL", "FEDORA_2019-1A3EDD7E8A.NASL", "FEDORA_2019-2A0CE0C58C.NASL", "FEDORA_2019-6FA01D12B4.NASL", "FEDORA_2019-79B5790566.NASL", "FEDORA_2019-7EAF0BBE7C.NASL", "FEDORA_2019-88F53A7433.NASL", "FEDORA_2019-9A0A7C0986.NASL", "FEDORA_2019-9E91AFA2BE.NASL", "FEDORA_2019-A06DFFAB1C.NASL", "FEDORA_2019-A6960910D8.NASL", "FEDORA_2019-B171554877.NASL", "FEDORA_2019-BCAD44B5D6.NASL", "FEDORA_2019-C96A8D12B0.NASL", "FEDORA_2019-DA0EAC1EB6.NASL", "FEDORA_2019-DB06EFDEA1.NASL", "FEDORA_2019-EBA8E44EE6.NASL", "FEDORA_2019-F511B38B1F.NASL", "FEDORA_2019-F563E66380.NASL", "FEDORA_2020-0B32A59B54.NASL", "FEDORA_2020-0DF38B2843.NASL", "FEDORA_2020-0E055EA503.NASL", "FEDORA_2020-11BE4B36D4.NASL", "FEDORA_2020-2640AA4E19.NASL", "FEDORA_2020-27B577AB23.NASL", "FEDORA_2020-307946CFB6.NASL", "FEDORA_2020-307E873389.NASL", "FEDORA_2020-32193CBBE6.NASL", "FEDORA_2020-36D2DB5F51.NASL", "FEDORA_2020-3838C8EA98.NASL", "FEDORA_2020-3CE0F55BC5.NASL", "FEDORA_2020-3E00413763.NASL", "FEDORA_2020-4021BF2AE8.NASL", "FEDORA_2020-47EFC31973.NASL", "FEDORA_2020-4A8F110332.NASL", "FEDORA_2020-52741B0A49.NASL", "FEDORA_2020-7473744DE1.NASL", "FEDORA_2020-7AB62C73BC.NASL", "FEDORA_2020-7F07DA3FEF.NASL", "FEDORA_2020-92B1D001B3.NASL", "FEDORA_2020-9CD524EECA.NASL", "FEDORA_2020-A31B01E945.NASL", "FEDORA_2020-A857113C7A.NASL", "FEDORA_2020-BB91BF9B8E.NASL", "FEDORA_2020-CE396E7D5C.NASL", "FEDORA_2020-CEAF490686.NASL", "FEDORA_2020-CF8EF2F333.NASL", "FEDORA_2020-D32853A28D.NASL", "FEDORA_2020-D7B29838F6.NASL", "FEDORA_2020-DA2D1EF2D7.NASL", "FEDORA_2020-EF1870065A.NASL", "FEDORA_2020-F29254BD5E.NASL", "FEDORA_2020-F80E5C0D65.NASL", "FEDORA_2020-FBB94073A1.NASL", "FEDORA_2020-FD73C08076.NASL", "FEDORA_2021-076A2DCCBA.NASL", "FEDORA_2021-17668E344A.NASL", "FEDORA_2021-1BB399A5AF.NASL", "FEDORA_2021-1D8254899C.NASL", "FEDORA_2021-2897F5366C.NASL", "FEDORA_2021-2CB63D912A.NASL", "FEDORA_2021-309BC2E727.NASL", "FEDORA_2021-3352C1C802.NASL", "FEDORA_2021-33A1B73E48.NASL", "FEDORA_2021-42BA9FEB47.NASL", "FEDORA_2021-66547FF92D.NASL", "FEDORA_2021-7547AD987F.NASL", "FEDORA_2021-7C1BB32D13.NASL", "FEDORA_2021-7D3A9004E2.NASL", "FEDORA_2021-851C6E4E2D.NASL", "FEDORA_2021-8840CBDCCD.NASL", "FEDORA_2021-8B17A2725E.NASL", "FEDORA_2021-907F3BACAE.NASL", "FEDORA_2021-A760169C3C.NASL", "FEDORA_2021-AFED2B904E.NASL", "FEDORA_2021-B1843407CA.NASL", "FEDORA_2021-B326FCB83F.NASL", "FEDORA_2021-B76EDE8F4D.NASL", "FEDORA_2021-C07A9E79CF.NASL", "FEDORA_2021-CAB5C9BEFB.NASL", "FEDORA_2021-CC3FF94CFC.NASL", "FEDORA_2021-CED31F3F0C.NASL", "FEDORA_2021-D5CDE50865.NASL", "FEDORA_2021-DC83AE690A.NASL", "FEDORA_2021-E3A5A74610.NASL", "FEDORA_2021-EE913722DB.NASL", "FEDORA_2021-EF83E8525A.NASL", "FEDORA_2021-F4FD9372C7.NASL", "FEDORA_2021-F6BD75E9D4.NASL", "FEDORA_2021-FAF88B9499.NASL", "FREEBSD_PKG_0032400F624F11EAB495000D3AB229D6.NASL", "FREEBSD_PKG_012809CE83F311EA92AB00163E433440.NASL", "FREEBSD_PKG_08B553ED537A11EBBE6E0022489AD614.NASL", "FREEBSD_PKG_10E3ED8ADB7F11EA8BDF643150D3111D.NASL", "FREEBSD_PKG_11FCFA8FAC6411EA9DAB000D3AB229D6.NASL", "FREEBSD_PKG_1D56CFC5397011EB929DD4C9EF517024.NASL", "FREEBSD_PKG_1FB13175ED5211EA8B93001B217B3468.NASL", "FREEBSD_PKG_20006B5FA0BC11EB8AE6FC4DD43E2B6A.NASL", "FREEBSD_PKG_2F3CD69E7DEE11EBB92E0022489AD614.NASL", "FREEBSD_PKG_36A35D83C56011EB84ABE0D55E2A8BF9.NASL", "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "FREEBSD_PKG_3AE106E2D52111E6AE1B002590263BF5.NASL", "FREEBSD_PKG_3C5A4FE09EBB11E99169FCAA147E860E.NASL", "FREEBSD_PKG_3C77F1393A0911EB929DD4C9EF517024.NASL", "FREEBSD_PKG_4CB165F06E48423E814792255D35C0F7.NASL", "FREEBSD_PKG_53CAF29B918011EDACBEB42E991FC52E.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_5A668AB38D8611EBB8D6D4C9EF517024.NASL", "FREEBSD_PKG_5A9BBB6E32D311E8A7696DAABA161086.NASL", "FREEBSD_PKG_5E0A038ACA30416DA2F538CBF5E7DF33.NASL", "FREEBSD_PKG_676CA4869C1E11EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_67B050AEEC8211EA907110C37B4AC2EA.NASL", "FREEBSD_PKG_6A72EFF7CCD611EA91724C72B94353B5.NASL", "FREEBSD_PKG_6D5F1B0BB86548D5935B3FB6EBB425FC.NASL", "FREEBSD_PKG_70E71A24015111ECBF0C080027EEDC6A.NASL", "FREEBSD_PKG_76B5068C843611EB9469080027F515EA.NASL", "FREEBSD_PKG_8B571FB2F31111EBB12BFC4DD43E2B6A.NASL", "FREEBSD_PKG_8F353420419711E88777B499BAEBFEAF.NASL", "FREEBSD_PKG_909BE51B9B3B11E8ADD2B499BAEBFEAF.NASL", "FREEBSD_PKG_9442A811DAB311E7B5AFA4BADB2F4699.NASL", "FREEBSD_PKG_96A21236707B11EB96D8D4C9EF517024.NASL", "FREEBSD_PKG_A45D945ACC2C4CD7A941FB58FDB1B01E.NASL", "FREEBSD_PKG_AD7921692AA411EBAB710022489AD614.NASL", "FREEBSD_PKG_AF485EF41C5811E88477D05099C0AE8C.NASL", "FREEBSD_PKG_AF61B2719E474DB0A0F629FB032236A3.NASL", "FREEBSD_PKG_B1194286958E11EB9C34080027F515EA.NASL", "FREEBSD_PKG_B7CFF5A931CC11E88F07B499BAEBFEAF.NASL", "FREEBSD_PKG_C0C1834C976111EBACFD0022489AD614.NASL", "FREEBSD_PKG_CD2DC126CFE411EA91724C72B94353B5.NASL", "FREEBSD_PKG_D10FC771958F11EB9C34080027F515EA.NASL", "FREEBSD_PKG_D34BEF0BF31211EBB12BFC4DD43E2B6A.NASL", "FREEBSD_PKG_E84831158B8E11EABDCF001B217B3468.NASL", "FREEBSD_PKG_EB888CE51F1911E9BE054C72B94353B5.NASL", "FREEBSD_PKG_F00B65D87CCB11EBB3BEE09467587C17.NASL", "FREEBSD_PKG_F3CF4B33601311EB9A0E206A8A720317.NASL", "FREEBSD_PKG_F40F07AAC00F11E7AC58B499BAEBFEAF.NASL", "FREEBSD_PKG_FFC73E8787F011E9AD56FCAA147E860E.NASL", "GENTOO_GLSA-201705-04.NASL", "GENTOO_GLSA-201712-03.NASL", "GENTOO_GLSA-201802-03.NASL", "GENTOO_GLSA-201805-12.NASL", "GENTOO_GLSA-201810-10.NASL", "GENTOO_GLSA-201811-21.NASL", "GENTOO_GLSA-201903-21.NASL", "GENTOO_GLSA-202003-48.NASL", "GENTOO_GLSA-202004-10.NASL", "GENTOO_GLSA-202006-03.NASL", "GENTOO_GLSA-202006-21.NASL", "GENTOO_GLSA-202007-03.NASL", "GENTOO_GLSA-202007-12.NASL", "GENTOO_GLSA-202007-34.NASL", "GENTOO_GLSA-202007-53.NASL", "GENTOO_GLSA-202011-17.NASL", "GENTOO_GLSA-202011-18.NASL", "GENTOO_GLSA-202012-11.NASL", "GENTOO_GLSA-202012-13.NASL", "GENTOO_GLSA-202012-14.NASL", "GENTOO_GLSA-202012-21.NASL", "GENTOO_GLSA-202012-23.NASL", "GENTOO_GLSA-202101-07.NASL", "GENTOO_GLSA-202101-18.NASL", "GENTOO_GLSA-202101-19.NASL", "GENTOO_GLSA-202101-29.NASL", "GENTOO_GLSA-202101-33.NASL", "GENTOO_GLSA-202103-03.NASL", "GENTOO_GLSA-202103-04.NASL", "GENTOO_GLSA-202104-04.NASL", "GENTOO_GLSA-202105-35.NASL", "GENTOO_GLSA-202105-36.NASL", "GENTOO_GLSA-202107-31.NASL", "GENTOO_GLSA-202107-32.NASL", "GENTOO_GLSA-202208-34.NASL", "GENTOO_GLSA-202208-36.NASL", "GENTOO_GLSA-202209-05.NASL", "GENTOO_GLSA-202210-02.NASL", "GENTOO_GLSA-202210-40.NASL", "GENTOO_GLSA-202305-02.NASL", "GOOGLE_CHROME_89_0_4389_72.NASL", "IBM_JAVA_2020_01_14.NASL", "IBM_JAVA_2021_07_20.NASL", "IBM_TEM_9_5_10.NASL", "JENKINS_2_280.NASL", "JFROG_ARTIFACTORY_6_23_0.NASL", "JFROG_ARTIFACTORY_7_10_1.NASL", "JFROG_ARTIFACTORY_7_11_1.NASL", "JFROG_ARTIFACTORY_7_7_0.NASL", "JIRA_8_15_0_JRASERVER-72052.NASL", "JIRA_8_21_0_JRASERVER-73171.NASL", "JOOMLA_3919.NASL", "JQUERY_3_4_0.NASL", "JQUERY_CVE-2020-11022.NASL", "JUNIPER_JSA10919.NASL", "JUNIPER_JSA11207.NASL", "JUNIPER_JSA11289.NASL", "JUNIPER_JSA69705.NASL", "JUNIPER_JSA69715.NASL", "JUNIPER_NSM_JSA10851.NASL", "LCE_5_1_1.NASL", "LCE_6_0_9.NASL", "LIBGCRYPT_1_9_0.NASL", "LINUX_CVE-2021-3156.NBIN", "MACOSX_FIREFOX_45_9_ESR.NASL", "MACOSX_FIREFOX_52_1_ESR.NASL", "MACOSX_FIREFOX_53_0.NASL", "MACOSX_GOOGLE_CHROME_89_0_4389_72.NASL", "MACOSX_SECUPD2017-005.NASL", "MACOSX_THUNDERBIRD_52_1.NASL", "MACOS_10_13_2.NASL", "MACOS_HT212177.NASL", "MACOS_HT212325.NASL", "MACOS_HT212326.NASL", "MACOS_HT212327.NASL", "MACOS_HT212529.NASL", "MARIADB_10_2_40.NASL", "MARIADB_10_3_31.NASL", "MARIADB_10_4_21.NASL", "MARIADB_10_5_12.NASL", "MARIADB_10_6_4.NASL", "MARINER_CURL_CVE-2021-22897.NASL", "MARINER_CURL_CVE-2021-22898.NASL", "MARINER_CURL_CVE-2021-22901.NASL", "MCAFEE_EPO_SB10332.NASL", "MICROSOFT_EDGE_CHROMIUM_89_0_774_45.NASL", "MOZILLA_FIREFOX_45_9_ESR.NASL", "MOZILLA_FIREFOX_52_1_ESR.NASL", "MOZILLA_FIREFOX_53_0.NASL", "MOZILLA_THUNDERBIRD_52_1.NASL", "MYSQL_5_6_41_RPM.NASL", "MYSQL_5_6_49.NASL", "MYSQL_5_7_23.NASL", "MYSQL_5_7_23_RPM.NASL", "MYSQL_5_7_31.NASL", "MYSQL_5_7_33.NASL", "MYSQL_5_7_34.NASL", "MYSQL_5_7_35.NASL", "MYSQL_8_0_12.NASL", "MYSQL_8_0_12_RPM.NASL", "MYSQL_8_0_21.NASL", "MYSQL_8_0_22.NASL", "MYSQL_8_0_23.NASL", "MYSQL_8_0_24.NASL", "MYSQL_8_0_26.NASL", "MYSQL_ENTERPRISE_MONITOR_3_4_8.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_21_1240.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_21_1243.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_22_1262.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_23.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_27.NASL", "NESSUS_TNS-2023-09.NASL", "NESSUS_TNS_2018_14.NASL", "NESSUS_TNS_2018_17.NASL", "NESSUS_TNS_2021_04.NASL", "NEWSTART_CGSL_NS-SA-2019-0065_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2019-0066_OVMF.NASL", "NEWSTART_CGSL_NS-SA-2019-0105_NSS.NASL", "NEWSTART_CGSL_NS-SA-2019-0196_SYSTEMD.NASL", "NEWSTART_CGSL_NS-SA-2019-0242_SYSTEMD.NASL", "NEWSTART_CGSL_NS-SA-2020-0011_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0022_JAVA-1_8_0-OPENJDK.NASL", "NEWSTART_CGSL_NS-SA-2020-0029_HTTP-PARSER.NASL", "NEWSTART_CGSL_NS-SA-2020-0048_JAVA-1_7_0-OPENJDK.NASL", "NEWSTART_CGSL_NS-SA-2020-0055_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2020-0083_NTP.NASL", "NEWSTART_CGSL_NS-SA-2020-0100_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0119_HTTP-PARSER.NASL", "NEWSTART_CGSL_NS-SA-2021-0001_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0020_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0028_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0032_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0045_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0086_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0089_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0095_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0099_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0101_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0104_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0108_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0120_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0127_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0134_PERL.NASL", "NEWSTART_CGSL_NS-SA-2021-0135_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0142_NTP.NASL", "NEWSTART_CGSL_NS-SA-2021-0144_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0158_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2021-0171_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0178_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2021-0179_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2021-0184_PERL.NASL", "NEWSTART_CGSL_NS-SA-2022-0005_NSS.NASL", "NEWSTART_CGSL_NS-SA-2022-0017_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0028_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2022-0030_NSS.NASL", "NEWSTART_CGSL_NS-SA-2022-0033_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2022-0037_IPA.NASL", "NEWSTART_CGSL_NS-SA-2022-0049_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2022-0051_LZ4.NASL", "NEWSTART_CGSL_NS-SA-2022-0057_KRB5.NASL", "NEWSTART_CGSL_NS-SA-2022-0061_POLKIT.NASL", "NEWSTART_CGSL_NS-SA-2022-0083_CURL.NASL", "NEWSTART_CGSL_NS-SA-2022-0096_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0098_NSS.NASL", "NEWSTART_CGSL_NS-SA-2022-0102_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2023-0008_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2023-0025_OPENSSL.NASL", "NNM_5_13_0.NASL", "NNM_5_13_1.NASL", "NNM_6_2_2.NASL", "NODEJS_2018_AUG.NASL", "NODEJS_2018_MAR.NASL", "NODEJS_2020_NOV.NASL", "NODEJS_2021_FEB.NASL", "NODEJS_2021_JAN.NASL", "NODEJS_2022_JUL.NASL", "NTP_4_2_8P11.NASL", "NTP_4_2_8P14.NASL", "NUTANIX_NXSA-AHV-20201105_1045.NASL", "NUTANIX_NXSA-AHV-20201105_1082.NASL", "NUTANIX_NXSA-AHV-20220304_10013.NASL", "NUTANIX_NXSA-AHV-20220304_242.NASL", "NUTANIX_NXSA-AHV-20230302_207.NASL", "NUTANIX_NXSA-AOS-5_10_9.NASL", "NUTANIX_NXSA-AOS-5_11_2.NASL", "NUTANIX_NXSA-AOS-5_11_3.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_16.NASL", "NUTANIX_NXSA-AOS-5_16_1_1.NASL", "NUTANIX_NXSA-AOS-5_16_1_3.NASL", "NUTANIX_NXSA-AOS-5_17.NASL", "NUTANIX_NXSA-AOS-5_17_1.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_17_1_5.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_19_1_5.NASL", "NUTANIX_NXSA-AOS-5_19_2.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-5_20_2.NASL", "NUTANIX_NXSA-AOS-5_20_3.NASL", "NUTANIX_NXSA-AOS-5_20_3_5.NASL", "NUTANIX_NXSA-AOS-5_20_4.NASL", "NUTANIX_NXSA-AOS-5_20_5.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_0_1_5.NASL", "NUTANIX_NXSA-AOS-6_0_1_6.NASL", "NUTANIX_NXSA-AOS-6_0_2.NASL", "NUTANIX_NXSA-AOS-6_0_2_5.NASL", "NUTANIX_NXSA-AOS-6_0_2_6.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "NUTANIX_NXSA-AOS-6_1_1.NASL", "NUTANIX_NXSA-AOS-6_5_1_5.NASL", "NUTANIX_NXSA-AOS-6_5_2.NASL", "NUTANIX_NXSA-AOS-6_6.NASL", "OPENJDK_2020-01-14.NASL", "OPENJDK_2021-07-20.NASL", "OPENSSH_85.NASL", "OPENSSL_1_0_2M.NASL", "OPENSSL_1_0_2O.NASL", "OPENSSL_1_0_2P.NASL", "OPENSSL_1_0_2W.NASL", "OPENSSL_1_0_2X.NASL", "OPENSSL_1_0_2Y.NASL", "OPENSSL_1_1_0G.NASL", "OPENSSL_1_1_0H.NASL", "OPENSSL_1_1_0I.NASL", "OPENSSL_1_1_1G.NASL", "OPENSSL_1_1_1I.NASL", "OPENSSL_1_1_1J.NASL", "OPENSSL_1_1_1K.NASL", "OPENSUSE-2015-658.NASL", "OPENSUSE-2016-1455.NASL", "OPENSUSE-2016-1456.NASL", "OPENSUSE-2016-699.NASL", "OPENSUSE-2016-852.NASL", "OPENSUSE-2017-1324.NASL", "OPENSUSE-2017-509.NASL", "OPENSUSE-2017-545.NASL", "OPENSUSE-2018-1091.NASL", "OPENSUSE-2018-1110.NASL", "OPENSUSE-2018-116.NASL", "OPENSUSE-2018-1382.NASL", "OPENSUSE-2018-1423.NASL", "OPENSUSE-2018-361.NASL", "OPENSUSE-2018-376.NASL", "OPENSUSE-2018-389.NASL", "OPENSUSE-2018-444.NASL", "OPENSUSE-2018-5.NASL", "OPENSUSE-2018-807.NASL", "OPENSUSE-2018-823.NASL", "OPENSUSE-2018-844.NASL", "OPENSUSE-2018-938.NASL", "OPENSUSE-2018-997.NASL", "OPENSUSE-2019-152.NASL", "OPENSUSE-2019-1839.NASL", "OPENSUSE-2019-2058.NASL", "OPENSUSE-2019-2222.NASL", "OPENSUSE-2019-2223.NASL", "OPENSUSE-2019-2398.NASL", "OPENSUSE-2019-2399.NASL", "OPENSUSE-2019-2466.NASL", "OPENSUSE-2019-563.NASL", "OPENSUSE-2019-753.NASL", "OPENSUSE-2019-909.NASL", "OPENSUSE-2020-1007.NASL", "OPENSUSE-2020-1022.NASL", "OPENSUSE-2020-1060.NASL", "OPENSUSE-2020-1102.NASL", "OPENSUSE-2020-1111.NASL", "OPENSUSE-2020-113.NASL", "OPENSUSE-2020-147.NASL", "OPENSUSE-2020-1584.NASL", "OPENSUSE-2020-1587.NASL", "OPENSUSE-2020-1888.NASL", "OPENSUSE-2020-2037.NASL", "OPENSUSE-2020-2045.NASL", "OPENSUSE-2020-2062.NASL", "OPENSUSE-2020-2092.NASL", "OPENSUSE-2020-2223.NASL", "OPENSUSE-2020-2236.NASL", "OPENSUSE-2020-2238.NASL", "OPENSUSE-2020-2245.NASL", "OPENSUSE-2020-2249.NASL", "OPENSUSE-2020-2269.NASL", "OPENSUSE-2020-2367.NASL", "OPENSUSE-2020-293.NASL", "OPENSUSE-2020-711.NASL", "OPENSUSE-2020-719.NASL", "OPENSUSE-2020-802.NASL", "OPENSUSE-2020-850.NASL", "OPENSUSE-2020-851.NASL", "OPENSUSE-2020-933.NASL", "OPENSUSE-2020-934.NASL", "OPENSUSE-2020-945.NASL", "OPENSUSE-2021-1059.NASL", "OPENSUSE-2021-1061.NASL", "OPENSUSE-2021-1092.NASL", "OPENSUSE-2021-1114.NASL", "OPENSUSE-2021-1130.NASL", "OPENSUSE-2021-1176.NASL", "OPENSUSE-2021-12.NASL", "OPENSUSE-2021-1233.NASL", "OPENSUSE-2021-140.NASL", "OPENSUSE-2021-1455.NASL", "OPENSUSE-2021-1490.NASL", "OPENSUSE-2021-169.NASL", "OPENSUSE-2021-170.NASL", "OPENSUSE-2021-1762.NASL", "OPENSUSE-2021-1825.NASL", "OPENSUSE-2021-1840.NASL", "OPENSUSE-2021-1843.NASL", "OPENSUSE-2021-221.NASL", "OPENSUSE-2021-2327.NASL", "OPENSUSE-2021-2353.NASL", "OPENSUSE-2021-2575.NASL", "OPENSUSE-2021-2637.NASL", "OPENSUSE-2021-270.NASL", "OPENSUSE-2021-2795.NASL", "OPENSUSE-2021-2798.NASL", "OPENSUSE-2021-2835.NASL", "OPENSUSE-2021-2837.NASL", "OPENSUSE-2021-2939.NASL", "OPENSUSE-2021-2940.NASL", "OPENSUSE-2021-2952.NASL", "OPENSUSE-2021-330.NASL", "OPENSUSE-2021-331.NASL", "OPENSUSE-2021-356.NASL", "OPENSUSE-2021-357.NASL", "OPENSUSE-2021-3615.NASL", "OPENSUSE-2021-3672.NASL", "OPENSUSE-2021-372.NASL", "OPENSUSE-2021-389.NASL", "OPENSUSE-2021-392.NASL", "OPENSUSE-2021-4153.NASL", "OPENSUSE-2021-427.NASL", "OPENSUSE-2021-43.NASL", "OPENSUSE-2021-430.NASL", "OPENSUSE-2021-435.NASL", "OPENSUSE-2021-476.NASL", "OPENSUSE-2021-496.NASL", "OPENSUSE-2021-510.NASL", "OPENSUSE-2021-602.NASL", "OPENSUSE-2021-64.NASL", "OPENSUSE-2021-65.NASL", "OPENSUSE-2021-66.NASL", "OPENSUSE-2021-760.NASL", "OPENSUSE-2021-808.NASL", "OPENSUSE-2021-81.NASL", "OPENSUSE-2021-82.NASL", "OPENSUSE-2021-832.NASL", "OPENSUSE-2021-838.NASL", "OPENSUSE-2022-0108-1.NASL", "OPENSUSE-2022-0818-1.NASL", "ORACLELINUX_ELSA-2015-1695.NASL", "ORACLELINUX_ELSA-2017-1100.NASL", "ORACLELINUX_ELSA-2017-1101.NASL", "ORACLELINUX_ELSA-2017-2247.NASL", "ORACLELINUX_ELSA-2018-3090.NASL", "ORACLELINUX_ELSA-2018-3221.NASL", "ORACLELINUX_ELSA-2018-4187.NASL", "ORACLELINUX_ELSA-2018-4228.NASL", "ORACLELINUX_ELSA-2018-4248.NASL", "ORACLELINUX_ELSA-2018-4249.NASL", "ORACLELINUX_ELSA-2019-2091.NASL", "ORACLELINUX_ELSA-2020-0122.NASL", "ORACLELINUX_ELSA-2020-0128.NASL", "ORACLELINUX_ELSA-2020-0157.NASL", "ORACLELINUX_ELSA-2020-0194.NASL", "ORACLELINUX_ELSA-2020-0196.NASL", "ORACLELINUX_ELSA-2020-0202.NASL", "ORACLELINUX_ELSA-2020-0541.NASL", "ORACLELINUX_ELSA-2020-0579.NASL", "ORACLELINUX_ELSA-2020-0598.NASL", "ORACLELINUX_ELSA-2020-0632.NASL", "ORACLELINUX_ELSA-2020-0703.NASL", "ORACLELINUX_ELSA-2020-0708.NASL", "ORACLELINUX_ELSA-2020-1644.NASL", "ORACLELINUX_ELSA-2020-2529.NASL", "ORACLELINUX_ELSA-2020-2530.NASL", "ORACLELINUX_ELSA-2020-2663.NASL", "ORACLELINUX_ELSA-2020-2848.NASL", "ORACLELINUX_ELSA-2020-2852.NASL", "ORACLELINUX_ELSA-2020-3936.NASL", "ORACLELINUX_ELSA-2020-4004.NASL", "ORACLELINUX_ELSA-2020-4670.NASL", "ORACLELINUX_ELSA-2020-4847.NASL", "ORACLELINUX_ELSA-2020-5476.NASL", "ORACLELINUX_ELSA-2020-5493.NASL", "ORACLELINUX_ELSA-2020-5499.NASL", "ORACLELINUX_ELSA-2020-55661.NASL", "ORACLELINUX_ELSA-2021-0162.NASL", "ORACLELINUX_ELSA-2021-0218.NASL", "ORACLELINUX_ELSA-2021-0221.NASL", "ORACLELINUX_ELSA-2021-0343.NASL", "ORACLELINUX_ELSA-2021-0549.NASL", "ORACLELINUX_ELSA-2021-0551.NASL", "ORACLELINUX_ELSA-2021-0557.NASL", "ORACLELINUX_ELSA-2021-0734.NASL", "ORACLELINUX_ELSA-2021-0735.NASL", "ORACLELINUX_ELSA-2021-0744.NASL", "ORACLELINUX_ELSA-2021-0860.NASL", "ORACLELINUX_ELSA-2021-1024.NASL", "ORACLELINUX_ELSA-2021-1354.NASL", "ORACLELINUX_ELSA-2021-1384.NASL", "ORACLELINUX_ELSA-2021-1593.NASL", "ORACLELINUX_ELSA-2021-1610.NASL", "ORACLELINUX_ELSA-2021-1633.NASL", "ORACLELINUX_ELSA-2021-1678.NASL", "ORACLELINUX_ELSA-2021-1761.NASL", "ORACLELINUX_ELSA-2021-1846.NASL", "ORACLELINUX_ELSA-2021-1879.NASL", "ORACLELINUX_ELSA-2021-1898.NASL", "ORACLELINUX_ELSA-2021-2238.NASL", "ORACLELINUX_ELSA-2021-2575.NASL", "ORACLELINUX_ELSA-2021-2776.NASL", "ORACLELINUX_ELSA-2021-2781.NASL", "ORACLELINUX_ELSA-2021-2784.NASL", "ORACLELINUX_ELSA-2021-2845.NASL", "ORACLELINUX_ELSA-2021-3572.NASL", "ORACLELINUX_ELSA-2021-3590.NASL", "ORACLELINUX_ELSA-2021-3798.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4160.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-4251.NASL", "ORACLELINUX_ELSA-2021-4424.NASL", "ORACLELINUX_ELSA-2021-4511.NASL", "ORACLELINUX_ELSA-2021-9019.NASL", "ORACLELINUX_ELSA-2021-9028.NASL", "ORACLELINUX_ELSA-2021-9029.NASL", "ORACLELINUX_ELSA-2021-9100.NASL", "ORACLELINUX_ELSA-2021-9101.NASL", "ORACLELINUX_ELSA-2021-9107.NASL", "ORACLELINUX_ELSA-2021-9121.NASL", "ORACLELINUX_ELSA-2021-9128.NASL", "ORACLELINUX_ELSA-2021-9129.NASL", "ORACLELINUX_ELSA-2021-9130.NASL", "ORACLELINUX_ELSA-2021-9137.NASL", "ORACLELINUX_ELSA-2021-9150.NASL", "ORACLELINUX_ELSA-2021-9151.NASL", "ORACLELINUX_ELSA-2021-9169.NASL", "ORACLELINUX_ELSA-2021-9238.NASL", "ORACLELINUX_ELSA-2021-9294.NASL", "ORACLELINUX_ELSA-2021-9400.NASL", "ORACLELINUX_ELSA-2021-9478.NASL", "ORACLELINUX_ELSA-2021-9528.NASL", "ORACLELINUX_ELSA-2021-9552.NASL", "ORACLELINUX_ELSA-2021-9561.NASL", "ORACLELINUX_ELSA-2022-1556.NASL", "ORACLELINUX_ELSA-2022-1557.NASL", "ORACLELINUX_ELSA-2022-1860.NASL", "ORACLELINUX_ELSA-2022-1861.NASL", "ORACLELINUX_ELSA-2022-5235.NASL", "ORACLELINUX_ELSA-2022-7343.NASL", "ORACLELINUX_ELSA-2022-9177.NASL", "ORACLELINUX_ELSA-2022-9341.NASL", "ORACLEVM_OVMSA-2019-0040.NASL", "ORACLEVM_OVMSA-2021-0003.NASL", "ORACLEVM_OVMSA-2021-0011.NASL", "ORACLEVM_OVMSA-2021-0012.NASL", "ORACLE_ACCESS_MANAGER_CPU_JUL_2021.NASL", "ORACLE_BI_PUBLISHER_APR_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_JUL_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_OAS_CPU_JUL_2022.NASL", "ORACLE_BI_PUBLISHER_OCT_2019_CPU.NASL", "ORACLE_BI_PUBLISHER_OCT_2020_CPU.NASL", "ORACLE_BPM_CPU_APR_2022.NASL", "ORACLE_BPM_CPU_JAN_2021.NASL", "ORACLE_BPM_CPU_OCT_2020.NASL", "ORACLE_COHERENCE_CPU_APR_2021.NASL", "ORACLE_COHERENCE_CPU_JAN_2020.NASL", "ORACLE_COHERENCE_CPU_JAN_2021.NASL", "ORACLE_COHERENCE_CPU_JUL_2021.NASL", "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_JAN_2018.NASL", "ORACLE_E-BUSINESS_CPU_JAN_2022.NASL", "ORACLE_E-BUSINESS_CPU_JUL_2021.NASL", "ORACLE_E-BUSINESS_CPU_OCT_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_APR_2018_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JAN_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JUL_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_OCT_2020.NASL", "ORACLE_ENTERPRISE_MANAGER_JAN_2019_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_JUL_2020_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OCT_2018_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_APR_2021_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_APR_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JAN_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JAN_2022_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JUL_2021_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_OCT_2021_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JAN_2019_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JUL_2020_CPU_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2019_CPU_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2020_CPU.NASL", "ORACLE_GOLDENGATE_CPU_JAN_2022.NASL", "ORACLE_GOLDENGATE_CPU_OCT_2021.NASL", "ORACLE_HTTP_SERVER_CPU_APR_2022.NASL", "ORACLE_HTTP_SERVER_CPU_JAN_2018.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2020.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2021.NASL", "ORACLE_IDENTITY_MANAGEMENT_CPU_JUL_2021.NASL", "ORACLE_JAVA_CPU_JAN_2020.NASL", "ORACLE_JAVA_CPU_JAN_2020_UNIX.NASL", "ORACLE_JAVA_CPU_JUL_2021.NASL", "ORACLE_JAVA_CPU_JUL_2021_UNIX.NASL", "ORACLE_JDEVELOPER_CPU_JUL_2021.NASL", "ORACLE_JDEVELOPER_CPU_OCT_2020.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2018.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2020.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2021.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_23.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_27.NASL", "ORACLE_NOSQL_CPU_APR_2021.NASL", "ORACLE_NOSQL_CPU_OCT_2021.NASL", "ORACLE_OATS_CPU_APR_2021.NASL", "ORACLE_OATS_CPU_JAN_2020.NASL", "ORACLE_OATS_CPU_JAN_2021.NASL", "ORACLE_OATS_CPU_JAN_2022.NASL", "ORACLE_OATS_CPU_JUL_2021.NASL", "ORACLE_OBIEE_CPU_APR_2023.NASL", "ORACLE_OBIEE_CPU_APR_2023_OAS.NASL", "ORACLE_OBIEE_CPU_JUL_2023.NASL", "ORACLE_OBIEE_CPU_JUL_2023_OAS.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2017.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2019.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2019.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2022.NASL", "ORACLE_RDBMS_CPU_APR_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2023.NASL", "ORACLE_RDBMS_CPU_JAN_2023_WIN.NASL", "ORACLE_RDBMS_CPU_JUL_2020.NASL", "ORACLE_RDBMS_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_JUL_2023.NASL", "ORACLE_RDBMS_CPU_OCT_2020.NASL", "ORACLE_RDBMS_CPU_OCT_2021.NASL", "ORACLE_RDBMS_CPU_OCT_2022.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_APR_2017_CPU.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JAN_2018_CPU.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JUL_2018_CPU.NASL", "ORACLE_TUXEDO_CPU_JUL_2018.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JAN_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2020.NBIN", "ORACLE_WEBCENTER_SITES_APR_2020_CPU.NASL", "ORACLE_WEBCENTER_SITES_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_SITES_JAN_2021_CPU.NASL", "ORACLE_WEBCENTER_SITES_OCT_2021_CPU.NASL", "ORACLE_WEBLOGIC_CVE-2019-2725.NASL", "ORACLE_WEBLOGIC_CVE_2019_2729.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2023.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2023.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2019.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022_V14.NASL", "OT_500292.NASL", "PALO_ALTO_CVE-2020-1968.NASL", "PALO_ALTO_PAN-SA-2018-0015.NASL", "PFSENSE_SA-17_07.NASL", "PHOTONOS_PHSA-2017-0013.NASL", "PHOTONOS_PHSA-2017-0013_GLIBC.NASL", "PHOTONOS_PHSA-2017-0013_LIBEVENT.NASL", "PHOTONOS_PHSA-2017-0042.NASL", "PHOTONOS_PHSA-2017-0042_OPENSSL.NASL", "PHOTONOS_PHSA-2018-1_0-0149.NASL", "PHOTONOS_PHSA-2018-1_0-0149_OPENSSL.NASL", "PHOTONOS_PHSA-2018-1_0-0167.NASL", "PHOTONOS_PHSA-2018-1_0-0167_NTP.NASL", "PHOTONOS_PHSA-2018-2_0-0078.NASL", "PHOTONOS_PHSA-2018-2_0-0078_OPENSSL.NASL", "PHOTONOS_PHSA-2019-1_0-0203_SYSTEMD.NASL", "PHOTONOS_PHSA-2019-1_0-0230_HTTPD.NASL", "PHOTONOS_PHSA-2019-1_0-0237_ZOOKEEPER.NASL", "PHOTONOS_PHSA-2019-2_0-0157_HTTPD.NASL", "PHOTONOS_PHSA-2020-1_0-0289_NODEJS10.NASL", "PHOTONOS_PHSA-2020-1_0-0292_NTP.NASL", "PHOTONOS_PHSA-2020-1_0-0298_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0301_PERL.NASL", "PHOTONOS_PHSA-2020-1_0-0302_PERL.NASL", "PHOTONOS_PHSA-2020-1_0-0309_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0312_NODEJS.NASL", "PHOTONOS_PHSA-2020-1_0-0312_NODEJS10.NASL", "PHOTONOS_PHSA-2020-1_0-0321_KIBANA.NASL", "PHOTONOS_PHSA-2020-1_0-0324_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0335_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0345_OPENSSL.NASL", "PHOTONOS_PHSA-2020-1_0-0346_CURL.NASL", "PHOTONOS_PHSA-2020-1_0-0350_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0235_LZ4.NASL", "PHOTONOS_PHSA-2020-2_0-0239_NTP.NASL", "PHOTONOS_PHSA-2020-2_0-0248_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0254_PERL.NASL", "PHOTONOS_PHSA-2020-2_0-0265_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0269_NODEJS.NASL", "PHOTONOS_PHSA-2020-2_0-0281_KIBANA.NASL", "PHOTONOS_PHSA-2020-2_0-0284_OPENSSL.NASL", "PHOTONOS_PHSA-2020-2_0-0291_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0304_CURL.NASL", "PHOTONOS_PHSA-2020-2_0-0304_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0060_NODEJS.NASL", "PHOTONOS_PHSA-2020-3_0-0082_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0083_LZ4.NASL", "PHOTONOS_PHSA-2020-3_0-0099_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0100_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0104_PERL.NASL", "PHOTONOS_PHSA-2020-3_0-0116_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0135_KIBANA.NASL", "PHOTONOS_PHSA-2020-3_0-0141_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0155_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0174_CURL.NASL", "PHOTONOS_PHSA-2020-3_0-0175_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0175_OPENSSL.NASL", "PHOTONOS_PHSA-2020-3_0-0180_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0358_SUDO.NASL", "PHOTONOS_PHSA-2021-1_0-0366_OPENSSL.NASL", "PHOTONOS_PHSA-2021-1_0-0372_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0373_NODEJS10.NASL", "PHOTONOS_PHSA-2021-1_0-0377_CURL.NASL", "PHOTONOS_PHSA-2021-1_0-0378_C.NASL", "PHOTONOS_PHSA-2021-1_0-0393_CURL.NASL", "PHOTONOS_PHSA-2021-1_0-0397_POLKIT.NASL", "PHOTONOS_PHSA-2021-1_0-0420_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0427_MYSQL.NASL", "PHOTONOS_PHSA-2021-2_0-0308_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0315_SUDO.NASL", "PHOTONOS_PHSA-2021-2_0-0317_PYTHON3.NASL", "PHOTONOS_PHSA-2021-2_0-0327_PYTHON3.NASL", "PHOTONOS_PHSA-2021-2_0-0328_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0330_NODEJS.NASL", "PHOTONOS_PHSA-2021-2_0-0331_NXTGN.NASL", "PHOTONOS_PHSA-2021-2_0-0334_CURL.NASL", "PHOTONOS_PHSA-2021-2_0-0337_C.NASL", "PHOTONOS_PHSA-2021-2_0-0349_CURL.NASL", "PHOTONOS_PHSA-2021-2_0-0350_POLKIT.NASL", "PHOTONOS_PHSA-2021-2_0-0357_LZ4.NASL", "PHOTONOS_PHSA-2021-2_0-0358_ZOOKEEPER.NASL", "PHOTONOS_PHSA-2021-2_0-0366_CURL.NASL", "PHOTONOS_PHSA-2021-2_0-0375_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0381_MYSQL.NASL", "PHOTONOS_PHSA-2021-3_0-0188_SUDO.NASL", "PHOTONOS_PHSA-2021-3_0-0192_PYTHON3.NASL", "PHOTONOS_PHSA-2021-3_0-0200_OPENSSL.NASL", "PHOTONOS_PHSA-2021-3_0-0208_APACHE.NASL", "PHOTONOS_PHSA-2021-3_0-0209_C.NASL", "PHOTONOS_PHSA-2021-3_0-0210_NXTGN.NASL", "PHOTONOS_PHSA-2021-3_0-0215_CURL.NASL", "PHOTONOS_PHSA-2021-3_0-0227_SQLITE.NASL", "PHOTONOS_PHSA-2021-3_0-0243_CURL.NASL", "PHOTONOS_PHSA-2021-3_0-0248_GO.NASL", "PHOTONOS_PHSA-2021-3_0-0248_POLKIT.NASL", "PHOTONOS_PHSA-2021-3_0-0254_ZOOKEEPER.NASL", "PHOTONOS_PHSA-2021-3_0-0255_LZ4.NASL", "PHOTONOS_PHSA-2021-3_0-0277_APACHE.NASL", "PHOTONOS_PHSA-2021-3_0-0342_KRB5.NASL", "PHOTONOS_PHSA-2021-4_0-0006_C.NASL", "PHOTONOS_PHSA-2021-4_0-0006_PERL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_APACHE.NASL", "PHOTONOS_PHSA-2021-4_0-0007_CURL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_MYSQL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_NODEJS.NASL", "PHOTONOS_PHSA-2021-4_0-0007_OPENSSL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0028_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0033_CURL.NASL", "PHOTONOS_PHSA-2021-4_0-0033_OPENSSH.NASL", "PHOTONOS_PHSA-2021-4_0-0037_POLKIT.NASL", "PHOTONOS_PHSA-2021-4_0-0047_LZ4.NASL", "PHOTONOS_PHSA-2021-4_0-0072_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0077_MYSQL.NASL", "PULSE_CONNECT_SECURE-SA44601.NASL", "PULSE_POLICY_SECURE-SA44601.NASL", "PYTHON_3_9_1.NASL", "REDHAT-RHSA-2015-1695.NASL", "REDHAT-RHSA-2016-0121.NASL", "REDHAT-RHSA-2016-0122.NASL", "REDHAT-RHSA-2016-0123.NASL", "REDHAT-RHSA-2016-0124.NASL", "REDHAT-RHSA-2016-1838.NASL", "REDHAT-RHSA-2016-1839.NASL", "REDHAT-RHSA-2016-1840.NASL", "REDHAT-RHSA-2017-0455.NASL", "REDHAT-RHSA-2017-0456.NASL", "REDHAT-RHSA-2017-1100.NASL", "REDHAT-RHSA-2017-1101.NASL", "REDHAT-RHSA-2017-1102.NASL", "REDHAT-RHSA-2017-1103.NASL", "REDHAT-RHSA-2017-2247.NASL", "REDHAT-RHSA-2018-3090.NASL", "REDHAT-RHSA-2018-3221.NASL", "REDHAT-RHSA-2019-0367.NASL", "REDHAT-RHSA-2019-1711.NASL", "REDHAT-RHSA-2019-2091.NASL", "REDHAT-RHSA-2019-3023.NASL", "REDHAT-RHSA-2019-3024.NASL", "REDHAT-RHSA-2019-3222.NASL", "REDHAT-RHSA-2019-3932.NASL", "REDHAT-RHSA-2019-3933.NASL", "REDHAT-RHSA-2020-0057.NASL", "REDHAT-RHSA-2020-0122.NASL", "REDHAT-RHSA-2020-0128.NASL", "REDHAT-RHSA-2020-0157.NASL", "REDHAT-RHSA-2020-0159.NASL", "REDHAT-RHSA-2020-0160.NASL", "REDHAT-RHSA-2020-0161.NASL", "REDHAT-RHSA-2020-0194.NASL", "REDHAT-RHSA-2020-0196.NASL", "REDHAT-RHSA-2020-0202.NASL", "REDHAT-RHSA-2020-0231.NASL", "REDHAT-RHSA-2020-0232.NASL", "REDHAT-RHSA-2020-0465.NASL", "REDHAT-RHSA-2020-0467.NASL", "REDHAT-RHSA-2020-0468.NASL", "REDHAT-RHSA-2020-0469.NASL", "REDHAT-RHSA-2020-0470.NASL", "REDHAT-RHSA-2020-0541.NASL", "REDHAT-RHSA-2020-0573.NASL", "REDHAT-RHSA-2020-0579.NASL", "REDHAT-RHSA-2020-0593.NASL", "REDHAT-RHSA-2020-0597.NASL", "REDHAT-RHSA-2020-0598.NASL", "REDHAT-RHSA-2020-0602.NASL", "REDHAT-RHSA-2020-0632.NASL", "REDHAT-RHSA-2020-0703.NASL", "REDHAT-RHSA-2020-0707.NASL", "REDHAT-RHSA-2020-0708.NASL", "REDHAT-RHSA-2020-0804.NASL", "REDHAT-RHSA-2020-0805.NASL", "REDHAT-RHSA-2020-0806.NASL", "REDHAT-RHSA-2020-0856.NASL", "REDHAT-RHSA-2020-0962.NASL", "REDHAT-RHSA-2020-1264.NASL", "REDHAT-RHSA-2020-1308.NASL", "REDHAT-RHSA-2020-1325.NASL", "REDHAT-RHSA-2020-1454.NASL", "REDHAT-RHSA-2020-1510.NASL", "REDHAT-RHSA-2020-1644.NASL", "REDHAT-RHSA-2020-2217.NASL", "REDHAT-RHSA-2020-2362.NASL", "REDHAT-RHSA-2020-2483.NASL", "REDHAT-RHSA-2020-2506.NASL", "REDHAT-RHSA-2020-2511.NASL", "REDHAT-RHSA-2020-2512.NASL", "REDHAT-RHSA-2020-2513.NASL", "REDHAT-RHSA-2020-2529.NASL", "REDHAT-RHSA-2020-2530.NASL", "REDHAT-RHSA-2020-2605.NASL", "REDHAT-RHSA-2020-2663.NASL", "REDHAT-RHSA-2020-2740.NASL", "REDHAT-RHSA-2020-2847.NASL", "REDHAT-RHSA-2020-2848.NASL", "REDHAT-RHSA-2020-2849.NASL", "REDHAT-RHSA-2020-2852.NASL", "REDHAT-RHSA-2020-2895.NASL", "REDHAT-RHSA-2020-3042.NASL", "REDHAT-RHSA-2020-3084.NASL", "REDHAT-RHSA-2020-3303.NASL", "REDHAT-RHSA-2020-3306.NASL", "REDHAT-RHSA-2020-3369.NASL", "REDHAT-RHSA-2020-3383.NASL", "REDHAT-RHSA-2020-3461.NASL", "REDHAT-RHSA-2020-3462.NASL", "REDHAT-RHSA-2020-3463.NASL", "REDHAT-RHSA-2020-3637.NASL", "REDHAT-RHSA-2020-3638.NASL", "REDHAT-RHSA-2020-3639.NASL", "REDHAT-RHSA-2020-3730.NASL", "REDHAT-RHSA-2020-3807.NASL", "REDHAT-RHSA-2020-3936.NASL", "REDHAT-RHSA-2020-4004.NASL", "REDHAT-RHSA-2020-4173.NASL", "REDHAT-RHSA-2020-4312.NASL", "REDHAT-RHSA-2020-4366.NASL", "REDHAT-RHSA-2020-4401.NASL", "REDHAT-RHSA-2020-4670.NASL", "REDHAT-RHSA-2020-4847.NASL", "REDHAT-RHSA-2020-5168.NASL", "REDHAT-RHSA-2020-5175.NASL", "REDHAT-RHSA-2020-5179.NASL", "REDHAT-RHSA-2020-5305.NASL", "REDHAT-RHSA-2020-5340.NASL", "REDHAT-RHSA-2020-5341.NASL", "REDHAT-RHSA-2020-5342.NASL", "REDHAT-RHSA-2020-5412.NASL", "REDHAT-RHSA-2020-5422.NASL", "REDHAT-RHSA-2020-5476.NASL", "REDHAT-RHSA-2020-5493.NASL", "REDHAT-RHSA-2020-5499.NASL", "REDHAT-RHSA-2020-5566.NASL", "REDHAT-RHSA-2020-5581.NASL", "REDHAT-RHSA-2020-5588.NASL", "REDHAT-RHSA-2020-5611.NASL", "REDHAT-RHSA-2020-5623.NASL", "REDHAT-RHSA-2020-5637.NASL", "REDHAT-RHSA-2020-5639.NASL", "REDHAT-RHSA-2020-5640.NASL", "REDHAT-RHSA-2020-5641.NASL", "REDHAT-RHSA-2020-5642.NASL", "REDHAT-RHSA-2021-0056.NASL", "REDHAT-RHSA-2021-0079.NASL", "REDHAT-RHSA-2021-0162.NASL", "REDHAT-RHSA-2021-0218.NASL", "REDHAT-RHSA-2021-0219.NASL", "REDHAT-RHSA-2021-0220.NASL", "REDHAT-RHSA-2021-0221.NASL", "REDHAT-RHSA-2021-0222.NASL", "REDHAT-RHSA-2021-0223.NASL", "REDHAT-RHSA-2021-0224.NASL", "REDHAT-RHSA-2021-0225.NASL", "REDHAT-RHSA-2021-0226.NASL", "REDHAT-RHSA-2021-0227.NASL", "REDHAT-RHSA-2021-0246.NASL", "REDHAT-RHSA-2021-0247.NASL", "REDHAT-RHSA-2021-0248.NASL", "REDHAT-RHSA-2021-0343.NASL", "REDHAT-RHSA-2021-0381.NASL", "REDHAT-RHSA-2021-0395.NASL", "REDHAT-RHSA-2021-0401.NASL", "REDHAT-RHSA-2021-0421.NASL", "REDHAT-RHSA-2021-0423.NASL", "REDHAT-RHSA-2021-0429.NASL", "REDHAT-RHSA-2021-0485.NASL", "REDHAT-RHSA-2021-0486.NASL", "REDHAT-RHSA-2021-0489.NASL", "REDHAT-RHSA-2021-0494.NASL", "REDHAT-RHSA-2021-0549.NASL", "REDHAT-RHSA-2021-0551.NASL", "REDHAT-RHSA-2021-0557.NASL", "REDHAT-RHSA-2021-0637.NASL", "REDHAT-RHSA-2021-0734.NASL", "REDHAT-RHSA-2021-0735.NASL", "REDHAT-RHSA-2021-0738.NASL", "REDHAT-RHSA-2021-0739.NASL", "REDHAT-RHSA-2021-0740.NASL", "REDHAT-RHSA-2021-0741.NASL", "REDHAT-RHSA-2021-0744.NASL", "REDHAT-RHSA-2021-0827.NASL", "REDHAT-RHSA-2021-0830.NASL", "REDHAT-RHSA-2021-0831.NASL", "REDHAT-RHSA-2021-0860.NASL", "REDHAT-RHSA-2021-0872.NASL", "REDHAT-RHSA-2021-0873.NASL", "REDHAT-RHSA-2021-0874.NASL", "REDHAT-RHSA-2021-0883.NASL", "REDHAT-RHSA-2021-1024.NASL", "REDHAT-RHSA-2021-1032.NASL", "REDHAT-RHSA-2021-1063.NASL", "REDHAT-RHSA-2021-1131.NASL", "REDHAT-RHSA-2021-1189.NASL", "REDHAT-RHSA-2021-1195.NASL", "REDHAT-RHSA-2021-1199.NASL", "REDHAT-RHSA-2021-1202.NASL", "REDHAT-RHSA-2021-1266.NASL", "REDHAT-RHSA-2021-1313.NASL", "REDHAT-RHSA-2021-1354.NASL", "REDHAT-RHSA-2021-1384.NASL", "REDHAT-RHSA-2021-1511.NASL", "REDHAT-RHSA-2021-1593.NASL", "REDHAT-RHSA-2021-1610.NASL", "REDHAT-RHSA-2021-1633.NASL", "REDHAT-RHSA-2021-1678.NASL", "REDHAT-RHSA-2021-1761.NASL", "REDHAT-RHSA-2021-1846.NASL", "REDHAT-RHSA-2021-1879.NASL", "REDHAT-RHSA-2021-1898.NASL", "REDHAT-RHSA-2021-2046.NASL", "REDHAT-RHSA-2021-2047.NASL", "REDHAT-RHSA-2021-2048.NASL", "REDHAT-RHSA-2021-2184.NASL", "REDHAT-RHSA-2021-2236.NASL", "REDHAT-RHSA-2021-2237.NASL", "REDHAT-RHSA-2021-2238.NASL", "REDHAT-RHSA-2021-2239.NASL", "REDHAT-RHSA-2021-2431.NASL", "REDHAT-RHSA-2021-2472.NASL", "REDHAT-RHSA-2021-2499.NASL", "REDHAT-RHSA-2021-2517.NASL", "REDHAT-RHSA-2021-2522.NASL", "REDHAT-RHSA-2021-2555.NASL", "REDHAT-RHSA-2021-2561.NASL", "REDHAT-RHSA-2021-2575.NASL", "REDHAT-RHSA-2021-2692.NASL", "REDHAT-RHSA-2021-2693.NASL", "REDHAT-RHSA-2021-2694.NASL", "REDHAT-RHSA-2021-2774.NASL", "REDHAT-RHSA-2021-2775.NASL", "REDHAT-RHSA-2021-2776.NASL", "REDHAT-RHSA-2021-2781.NASL", "REDHAT-RHSA-2021-2782.NASL", "REDHAT-RHSA-2021-2783.NASL", "REDHAT-RHSA-2021-2784.NASL", "REDHAT-RHSA-2021-2792.NASL", "REDHAT-RHSA-2021-2845.NASL", "REDHAT-RHSA-2021-2865.NASL", "REDHAT-RHSA-2021-3252.NASL", "REDHAT-RHSA-2021-3254.NASL", "REDHAT-RHSA-2021-3292.NASL", "REDHAT-RHSA-2021-3293.NASL", "REDHAT-RHSA-2021-3572.NASL", "REDHAT-RHSA-2021-3590.NASL", "REDHAT-RHSA-2021-3656.NASL", "REDHAT-RHSA-2021-3658.NASL", "REDHAT-RHSA-2021-3798.NASL", "REDHAT-RHSA-2021-3811.NASL", "REDHAT-RHSA-2021-4089.NASL", "REDHAT-RHSA-2021-4142.NASL", "REDHAT-RHSA-2021-4151.NASL", "REDHAT-RHSA-2021-4160.NASL", "REDHAT-RHSA-2021-4162.NASL", "REDHAT-RHSA-2021-4198.NASL", "REDHAT-RHSA-2021-4251.NASL", "REDHAT-RHSA-2021-4424.NASL", "REDHAT-RHSA-2021-4511.NASL", "REDHAT-RHSA-2021-4614.NASL", "REDHAT-RHSA-2021-4626.NASL", "REDHAT-RHSA-2021-4702.NASL", "REDHAT-RHSA-2021-4861.NASL", "REDHAT-RHSA-2022-0190.NASL", "REDHAT-RHSA-2022-0722.NASL", "REDHAT-RHSA-2022-1007.NASL", "REDHAT-RHSA-2022-1010.NASL", "REDHAT-RHSA-2022-1354.NASL", "REDHAT-RHSA-2022-1556.NASL", "REDHAT-RHSA-2022-1557.NASL", "REDHAT-RHSA-2022-1860.NASL", "REDHAT-RHSA-2022-1861.NASL", "REDHAT-RHSA-2022-4818.NASL", "REDHAT-RHSA-2022-5235.NASL", "REDHAT-RHSA-2022-5459.NASL", "REDHAT-RHSA-2022-5460.NASL", "REDHAT-RHSA-2022-6393.NASL", "REDHAT-RHSA-2022-7343.NASL", "REDHAT-RHSA-2023-0552.NASL", "REDHAT-RHSA-2023-0553.NASL", "REDHAT-RHSA-2023-0554.NASL", "REDHAT-RHSA-2023-1043.NASL", "REDHAT-RHSA-2023-1044.NASL", "REDHAT-RHSA-2023-1045.NASL", "ROCKY_LINUX_RLSA-2021-2238.NASL", "ROCKY_LINUX_RLSA-2021-2575.NASL", "ROCKY_LINUX_RLSA-2021-2776.NASL", "ROCKY_LINUX_RLSA-2021-2781.NASL", "ROCKY_LINUX_RLSA-2021-3572.NASL", "ROCKY_LINUX_RLSA-2021-3590.NASL", "SECURITYCENTER_5_14_0_TNS_2020_02.NASL", "SECURITYCENTER_5_17_0_TNS_2020_11.NASL", "SECURITYCENTER_5_17_0_TNS_2021_06.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08_XSS.NASL", "SECURITYCENTER_5_19_0_TNS_2021_14.NASL", "SECURITYCENTER_5_7_1_TNS_2018_12.NASL", "SECURITYCENTER_OPENSSL_1_0_2M.NASL", "SECURITYCENTER_OPENSSL_1_0_2N.NASL", "SECURITYCENTER_OPENSSL_1_1_1J_TNS_2021_03.NASL", "SECURITYCENTER_OPENSSL_1_1_1K_TNS_2021_03.NASL", "SLACKWARE_SSA_2018-087-01.NASL", "SLACKWARE_SSA_2018-226-01.NASL", "SLACKWARE_SSA_2019-022-01.NASL", "SLACKWARE_SSA_2020-344-01.NASL", "SLACKWARE_SSA_2021-026-01.NASL", "SLACKWARE_SSA_2021-090-01.NASL", "SLACKWARE_SSA_2021-146-01.NASL", "SLACKWARE_SSA_2021-158-02.NASL", "SL_20170420_NSS_AND_NSS_UTIL_ON_SL6_X.NASL", "SL_20170420_NSS_UTIL_ON_SL6_X.NASL", "SL_20170802_TOMCAT_ON_SL7_X.NASL", "SL_20181030_OPENSSL_ON_SL7_X.NASL", "SL_20181030_OVMF_ON_ON_SL7_X.NASL", "SL_20190806_SYSTEMD_ON_SL7_X.NASL", "SL_20200116_JAVA_11_OPENJDK_ON_SL7_X.NASL", "SL_20200121_APACHE_COMMONS_BEANUTILS_ON_SL7_X.NASL", "SL_20200121_JAVA_1_8_0_OPENJDK_ON_SL6_X.NASL", "SL_20200122_JAVA_1_8_0_OPENJDK_ON_SL7_X.NASL", "SL_20200218_JAVA_1_7_0_OPENJDK_ON_SL7_X.NASL", "SL_20200227_JAVA_1_7_0_OPENJDK_ON_SL6_X.NASL", "SL_20200304_HTTP_PARSER_ON_SL7_X.NASL", "SL_20200611_TOMCAT6_ON_SL6_X.NASL", "SL_20200611_TOMCAT_ON_SL7_X.NASL", "SL_20200623_NTP_ON_SL7_X.NASL", "SL_20201001_IPA_ON_SL7_X.NASL", "SL_20201001_TOMCAT_ON_SL7_X.NASL", "SL_20201217_OPENSSL_ON_SL7_X.NASL", "SL_20210119_XSTREAM_ON_SL7_X.NASL", "SL_20210126_SUDO_ON_SL7_X.NASL", "SL_20210202_PERL_ON_SL7_X.NASL", "SL_20210721_JAVA_11_OPENJDK_ON_SL7_X.NASL", "SL_20210721_JAVA_1_8_0_OPENJDK_ON_SL7_X.NASL", "SL_20220628_PYTHON_ON_SL7_X.NASL", "SL_20221103_PCS_ON_SL7_X.NASL", "SMB_NT_MS21_JAN_VISUAL_STUDIO.NASL", "SMB_NT_MS21_NOV_VISUAL_STUDIO.NASL", "SMB_NT_MS21_OCT_VISUAL_STUDIO.NASL", "SOLARIS_JUL2021_SRU11_3_36_26_0.NASL", "SOLARIS_JUL2021_SRU11_4_34_94_4.NASL", "SOLARWINDS_ORION_CVE-2020-14005.NASL", "SONICWALL_SNWLID-2019-0009.NASL", "SPRING_CVE-2020-5398.NASL", "STRUTS_2_5_26.NASL", "STRUTS_S2-061.NASL", "STRUTS_S2-062.NASL", "SUSE_SU-2016-1721-1.NASL", "SUSE_SU-2016-1733-1.NASL", "SUSE_SU-2016-2156-1.NASL", "SUSE_SU-2017-1175-1.NASL", "SUSE_SU-2017-1248-1.NASL", "SUSE_SU-2017-1669-1.NASL", "SUSE_SU-2017-2235-1.NASL", "SUSE_SU-2017-2981-1.NASL", "SUSE_SU-2017-3169-1.NASL", "SUSE_SU-2018-0002-1.NASL", "SUSE_SU-2018-0053-1.NASL", "SUSE_SU-2018-0112-1.NASL", "SUSE_SU-2018-0293-1.NASL", "SUSE_SU-2018-0808-1.NASL", "SUSE_SU-2018-0902-1.NASL", "SUSE_SU-2018-0906-1.NASL", "SUSE_SU-2018-0925-1.NASL", "SUSE_SU-2018-0956-1.NASL", "SUSE_SU-2018-0975-1.NASL", "SUSE_SU-2018-1183-1.NASL", "SUSE_SU-2018-1464-1.NASL", "SUSE_SU-2018-1765-1.NASL", "SUSE_SU-2018-1765-2.NASL", "SUSE_SU-2018-2072-1.NASL", "SUSE_SU-2018-2158-1.NASL", "SUSE_SU-2018-2486-1.NASL", "SUSE_SU-2018-2492-1.NASL", "SUSE_SU-2018-2683-1.NASL", "SUSE_SU-2018-2928-1.NASL", "SUSE_SU-2018-2928-2.NASL", "SUSE_SU-2018-2965-1.NASL", "SUSE_SU-2018-3644-1.NASL", "SUSE_SU-2018-3767-1.NASL", "SUSE_SU-2018-3767-2.NASL", "SUSE_SU-2018-3864-1.NASL", "SUSE_SU-2019-0053-1.NASL", "SUSE_SU-2019-0054-1.NASL", "SUSE_SU-2019-0197-1.NASL", "SUSE_SU-2019-1553-1.NASL", "SUSE_SU-2019-2460-1.NASL", "SUSE_SU-2019-2478-1.NASL", "SUSE_SU-2019-2757-1.NASL", "SUSE_SU-2020-0140-1.NASL", "SUSE_SU-2020-0213-1.NASL", "SUSE_SU-2020-0231-1.NASL", "SUSE_SU-2020-0261-1.NASL", "SUSE_SU-2020-0427-1.NASL", "SUSE_SU-2020-0429-1.NASL", "SUSE_SU-2020-0454-1.NASL", "SUSE_SU-2020-0455-1.NASL", "SUSE_SU-2020-0456-1.NASL", "SUSE_SU-2020-0466-1.NASL", "SUSE_SU-2020-0488-1.NASL", "SUSE_SU-2020-0495-1.NASL", "SUSE_SU-2020-0528-1.NASL", "SUSE_SU-2020-0628-1.NASL", "SUSE_SU-2020-1058-1.NASL", "SUSE_SU-2020-14287-1.NASL", "SUSE_SU-2020-14375-1.NASL", "SUSE_SU-2020-14415-1.NASL", "SUSE_SU-2020-14491-1.NASL", "SUSE_SU-2020-14511-1.NASL", "SUSE_SU-2020-14560-1.NASL", "SUSE_SU-2020-14585-1.NASL", "SUSE_SU-2020-1568-1.NASL", "SUSE_SU-2020-1575-1.NASL", "SUSE_SU-2020-1576-1.NASL", "SUSE_SU-2020-1606-1.NASL", "SUSE_SU-2020-1623-1.NASL", "SUSE_SU-2020-1662-1.NASL", "SUSE_SU-2020-1682-1.NASL", "SUSE_SU-2020-1682-2.NASL", "SUSE_SU-2020-1805-1.NASL", "SUSE_SU-2020-2041-1.NASL", "SUSE_SU-2020-2634-1.NASL", "SUSE_SU-2020-2761-1.NASL", "SUSE_SU-2020-2776-1.NASL", "SUSE_SU-2020-2800-1.NASL", "SUSE_SU-2020-3375-1.NASL", "SUSE_SU-2020-3377-1.NASL", "SUSE_SU-2020-3379-1.NASL", "SUSE_SU-2020-3478-1.NASL", "SUSE_SU-2020-3549-1.NASL", "SUSE_SU-2020-3720-1.NASL", "SUSE_SU-2020-3721-1.NASL", "SUSE_SU-2020-3722-1.NASL", "SUSE_SU-2020-3732-1.NASL", "SUSE_SU-2020-3733-1.NASL", "SUSE_SU-2020-3735-1.NASL", "SUSE_SU-2020-3739-1.NASL", "SUSE_SU-2020-3740-1.NASL", "SUSE_SU-2020-3762-1.NASL", "SUSE_SU-2020-3763-1.NASL", "SUSE_SU-2021-0060-1.NASL", "SUSE_SU-2021-0061-1.NASL", "SUSE_SU-2021-0062-1.NASL", "SUSE_SU-2021-0068-1.NASL", "SUSE_SU-2021-0082-1.NASL", "SUSE_SU-2021-0225-1.NASL", "SUSE_SU-2021-0226-1.NASL", "SUSE_SU-2021-0227-1.NASL", "SUSE_SU-2021-0232-1.NASL", "SUSE_SU-2021-0355-1.NASL", "SUSE_SU-2021-0428-1.NASL", "SUSE_SU-2021-0432-1.NASL", "SUSE_SU-2021-0529-1.NASL", "SUSE_SU-2021-0648-1.NASL", "SUSE_SU-2021-0649-1.NASL", "SUSE_SU-2021-0650-1.NASL", "SUSE_SU-2021-0651-1.NASL", "SUSE_SU-2021-0673-1.NASL", "SUSE_SU-2021-0674-1.NASL", "SUSE_SU-2021-0686-1.NASL", "SUSE_SU-2021-0725-1.NASL", "SUSE_SU-2021-0752-1.NASL", "SUSE_SU-2021-0753-1.NASL", "SUSE_SU-2021-0754-1.NASL", "SUSE_SU-2021-0755-1.NASL", "SUSE_SU-2021-0768-1.NASL", "SUSE_SU-2021-0769-1.NASL", "SUSE_SU-2021-0793-1.NASL", "SUSE_SU-2021-0794-1.NASL", "SUSE_SU-2021-0886-1.NASL", "SUSE_SU-2021-0887-1.NASL", "SUSE_SU-2021-0928-1.NASL", "SUSE_SU-2021-0939-1.NASL", "SUSE_SU-2021-0947-1.NASL", "SUSE_SU-2021-0954-1.NASL", "SUSE_SU-2021-0955-1.NASL", "SUSE_SU-2021-0955-2.NASL", "SUSE_SU-2021-1006-1.NASL", "SUSE_SU-2021-1267-1.NASL", "SUSE_SU-2021-1273-1.NASL", "SUSE_SU-2021-1274-1.NASL", "SUSE_SU-2021-1275-1.NASL", "SUSE_SU-2021-1396-1.NASL", "SUSE_SU-2021-14667-1.NASL", "SUSE_SU-2021-14670-1.NASL", "SUSE_SU-2021-14705-1.NASL", "SUSE_SU-2021-14707-1.NASL", "SUSE_SU-2021-14735-1.NASL", "SUSE_SU-2021-14760-1.NASL", "SUSE_SU-2021-1647-1.NASL", "SUSE_SU-2021-1762-1.NASL", "SUSE_SU-2021-1763-1.NASL", "SUSE_SU-2021-1786-1.NASL", "SUSE_SU-2021-1809-1.NASL", "SUSE_SU-2021-1825-1.NASL", "SUSE_SU-2021-1842-1.NASL", "SUSE_SU-2021-1843-1.NASL", "SUSE_SU-2021-1844-1.NASL", "SUSE_SU-2021-2323-1.NASL", "SUSE_SU-2021-2326-1.NASL", "SUSE_SU-2021-2327-1.NASL", "SUSE_SU-2021-2353-1.NASL", "SUSE_SU-2021-2613-1.NASL", "SUSE_SU-2021-2620-1.NASL", "SUSE_SU-2021-2797-1.NASL", "SUSE_SU-2021-2798-1.NASL", "SUSE_SU-2021-2835-1.NASL", "SUSE_SU-2021-2837-1.NASL", "SUSE_SU-2021-2939-1.NASL", "SUSE_SU-2021-2940-1.NASL", "SUSE_SU-2021-2952-1.NASL", "SUSE_SU-2021-3007-1.NASL", "SUSE_SU-2021-3008-1.NASL", "SUSE_SU-2021-3602-1.NASL", "SUSE_SU-2021-3669-1.NASL", "SUSE_SU-2021-3670-1.NASL", "SUSE_SU-2021-3672-1.NASL", "SUSE_SU-2021-4153-1.NASL", "SUSE_SU-2022-0107-1.NASL", "SUSE_SU-2022-0108-1.NASL", "SUSE_SU-2022-0166-1.NASL", "SUSE_SU-2022-0694-1.NASL", "SUSE_SU-2022-0695-1.NASL", "SUSE_SU-2022-0784-1.NASL", "SUSE_SU-2022-0803-1.NASL", "SUSE_SU-2022-0818-1.NASL", "SUSE_SU-2022-0895-1.NASL", "SUSE_SU-2022-1129-1.NASL", "SUSE_SU-2022-1252-1.NASL", "SUSE_SU-2022-1271-1.NASL", "SUSE_SU-2022-1296-1.NASL", "SUSE_SU-2022-1315-1.NASL", "SUSE_SU-2022-14875-1.NASL", "SUSE_SU-2022-14876-1.NASL", "SUSE_SU-2022-1678-1.NASL", "SUSE_SU-2022-3460-1.NASL", "SUSE_SU-2022-3461-1.NASL", "SUSE_SU-2022-3550-1.NASL", "SUSE_SU-2022-3801-1.NASL", "SUSE_SU-2022-3802-1.NASL", "SUSE_SU-2022-3836-1.NASL", "SUSE_SU-2022-4022-1.NASL", "SUSE_SU-2022-4082-1.NASL", "SUSE_SU-2023-2096-1.NASL", "SUSE_SU-2023-2096-2.NASL", "SUSE_SU-2023-3090-1.NASL", "SYMANTEC_CONTENT_ANALYSIS_SYMSA1451.NASL", "TENABLE_NESSUS_AGENT_TNS_2020_03.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_04.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_08.NASL", "TENABLE_OT_ABB_CVE-2019-12260.NASL", "TENABLE_OT_SIEMENS_CVE-2019-12260.NASL", "TENABLE_OT_SIEMENS_CVE-2021-3449.NASL", "TOMCAT_10_0_0_M10.NASL", "TOMCAT_10_0_0_M5.NASL", "TOMCAT_10_0_0_M7.NASL", "TOMCAT_10_0_16.NASL", "TOMCAT_10_0_2.NASL", "TOMCAT_10_0_6.NASL", "TOMCAT_10_0_7.NASL", "TOMCAT_10_1_0_M10.NASL", "TOMCAT_7_0_104.NASL", "TOMCAT_7_0_105.NASL", "TOMCAT_7_0_107.NASL", "TOMCAT_7_0_108.NASL", "TOMCAT_8_5_5.NASL", "TOMCAT_8_5_55.NASL", "TOMCAT_8_5_57.NASL", "TOMCAT_8_5_60.NASL", "TOMCAT_8_5_63.NASL", "TOMCAT_8_5_68.NASL", "TOMCAT_8_5_75.NASL", "TOMCAT_9_0_35.NASL", "TOMCAT_9_0_37.NASL", "TOMCAT_9_0_40.NASL", "TOMCAT_9_0_43.NASL", "TOMCAT_9_0_48.NASL", "TOMCAT_9_0_58.NASL", "UBUNTU_USN-2551-1.NASL", "UBUNTU_USN-3177-1.NASL", "UBUNTU_USN-3177-2.NASL", "UBUNTU_USN-3239-1.NASL", "UBUNTU_USN-3239-2.NASL", "UBUNTU_USN-3239-3.NASL", "UBUNTU_USN-3260-1.NASL", "UBUNTU_USN-3260-2.NASL", "UBUNTU_USN-3270-1.NASL", "UBUNTU_USN-3278-1.NASL", "UBUNTU_USN-3475-1.NASL", "UBUNTU_USN-3611-1.NASL", "UBUNTU_USN-3628-1.NASL", "UBUNTU_USN-3692-1.NASL", "UBUNTU_USN-3707-1.NASL", "UBUNTU_USN-3759-1.NASL", "UBUNTU_USN-3816-1.NASL", "UBUNTU_USN-3816-2.NASL", "UBUNTU_USN-3816-3.NASL", "UBUNTU_USN-4257-1.NASL", "UBUNTU_USN-4380-1.NASL", "UBUNTU_USN-4448-1.NASL", "UBUNTU_USN-4497-1.NASL", "UBUNTU_USN-4504-1.NASL", "UBUNTU_USN-4557-1.NASL", "UBUNTU_USN-4575-1.NASL", "UBUNTU_USN-4596-1.NASL", "UBUNTU_USN-4600-2.NASL", "UBUNTU_USN-4602-1.NASL", "UBUNTU_USN-4635-1.NASL", "UBUNTU_USN-4638-1.NASL", "UBUNTU_USN-4662-1.NASL", "UBUNTU_USN-4665-1.NASL", "UBUNTU_USN-4666-1.NASL", "UBUNTU_USN-4666-2.NASL", "UBUNTU_USN-4685-1.NASL", "UBUNTU_USN-4686-1.NASL", "UBUNTU_USN-4705-1.NASL", "UBUNTU_USN-4714-1.NASL", "UBUNTU_USN-4732-1.NASL", "UBUNTU_USN-4738-1.NASL", "UBUNTU_USN-4742-1.NASL", "UBUNTU_USN-4754-1.NASL", "UBUNTU_USN-4754-3.NASL", "UBUNTU_USN-4754-4.NASL", "UBUNTU_USN-4758-1.NASL", "UBUNTU_USN-4762-1.NASL", "UBUNTU_USN-4880-1.NASL", "UBUNTU_USN-4891-1.NASL", "UBUNTU_USN-4898-1.NASL", "UBUNTU_USN-4943-1.NASL", "UBUNTU_USN-4968-1.NASL", "UBUNTU_USN-4968-2.NASL", "UBUNTU_USN-4973-1.NASL", "UBUNTU_USN-4973-2.NASL", "UBUNTU_USN-4980-1.NASL", "UBUNTU_USN-5021-1.NASL", "UBUNTU_USN-5021-2.NASL", "UBUNTU_USN-5022-1.NASL", "UBUNTU_USN-5022-2.NASL", "UBUNTU_USN-5022-3.NASL", "UBUNTU_USN-5038-1.NASL", "UBUNTU_USN-5088-1.NASL", "UBUNTU_USN-5202-1.NASL", "UBUNTU_USN-5360-1.NASL", "UBUNTU_USN-5410-1.NASL", "UBUNTU_USN-5894-1.NASL", "UBUNTU_USN-5952-1.NASL", "UBUNTU_USN-5990-1.NASL", "UBUNTU_USN-6049-1.NASL", "UBUNTU_USN-6117-1.NASL", "VIRTUALBOX_5_2_10.NASL", "VIRTUALBOX_5_2_6.NASL", "VIRTUALBOX_JUL_2021_CPU.NASL", "VIRTUOZZO_VZLSA-2017-1100.NASL", "VXWORKS_URGENT11.NASL", "WEBLOGIC_CVE_2019_2729.NASL", "WEBSPHERE_1115085.NASL", "WEBSPHERE_544293.NASL", "WEBSPHERE_6322683.NASL", "WEB_APPLICATION_SCANNING_112430", "WEB_APPLICATION_SCANNING_112437", "WEB_APPLICATION_SCANNING_112438", "WEB_APPLICATION_SCANNING_112485", "WEB_APPLICATION_SCANNING_112709", "WEB_APPLICATION_SCANNING_112710", "WEB_APPLICATION_SCANNING_112711", "WEB_APPLICATION_SCANNING_112712", "WEB_APPLICATION_SCANNING_113226", "WEB_APPLICATION_SCANNING_113534", "WEB_APPLICATION_SCANNING_113626", "WEB_APPLICATION_SCANNING_113627", "WEB_APPLICATION_SCANNING_113628", "WEB_APPLICATION_SCANNING_113629", "WEB_APPLICATION_SCANNING_98537", "XEROX_XRX19_016.NASL"]}, {"type": "nodejs", "idList": ["NODEJS:1013", "NODEJS:1467", "NODEJS:1518", "NODEJS:1591", "NODEJS:1682", "NODEJS:1702"]}, {"type": "nodejsblog", "idList": ["NODEJSBLOG:APRIL-2021-SECURITY-RELEASES", "NODEJSBLOG:AUGUST-2018-SECURITY-RELEASES", "NODEJSBLOG:FEBRUARY-2020-SECURITY-RELEASES", "NODEJSBLOG:FEBRUARY-2021-SECURITY-RELEASES", "NODEJSBLOG:JANUARY-2021-SECURITY-RELEASES", "NODEJSBLOG:JULY-2022-SECURITY-RELEASES", "NODEJSBLOG:JUNE-2020-SECURITY-RELEASES", "NODEJSBLOG:MARCH-2018-SECURITY-RELEASES", "NODEJSBLOG:NOVEMBER-2020-SECURITY-RELEASES", "NODEJSBLOG:OPENSSL-NOVEMBER-2017", "NODEJSBLOG:SEPTEMBER-2022-SECURITY-RELEASES"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2017-3735", "OPENSSL:CVE-2018-0737", "OPENSSL:CVE-2018-0739", "OPENSSL:CVE-2020-1967", "OPENSSL:CVE-2020-1968", "OPENSSL:CVE-2020-1971", "OPENSSL:CVE-2021-23839", "OPENSSL:CVE-2021-23840", "OPENSSL:CVE-2021-23841", "OPENSSL:CVE-2021-3449", "OPENSSL:CVE-2021-3450"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310107203", "OPENVAS:1361412562310107204", "OPENVAS:1361412562310107358", "OPENVAS:1361412562310107444", "OPENVAS:1361412562310107831", "OPENVAS:1361412562310107838", "OPENVAS:1361412562310108499", "OPENVAS:1361412562310108500", "OPENVAS:1361412562310108601", "OPENVAS:1361412562310108752", "OPENVAS:1361412562310108753", "OPENVAS:1361412562310108764", "OPENVAS:1361412562310108811", "OPENVAS:1361412562310113369", "OPENVAS:1361412562310120000", "OPENVAS:1361412562310123017", "OPENVAS:1361412562310140261", "OPENVAS:1361412562310141961", "OPENVAS:1361412562310141962", "OPENVAS:1361412562310142300", "OPENVAS:1361412562310142301", "OPENVAS:1361412562310142314", "OPENVAS:1361412562310142508", "OPENVAS:1361412562310142509", "OPENVAS:1361412562310143179", "OPENVAS:1361412562310143220", "OPENVAS:1361412562310143812", "OPENVAS:1361412562310143813", "OPENVAS:1361412562310143963", "OPENVAS:1361412562310143964", "OPENVAS:1361412562310144144", "OPENVAS:1361412562310144145", "OPENVAS:1361412562310144273", "OPENVAS:1361412562310144274", "OPENVAS:1361412562310703720", "OPENVAS:1361412562310703721", "OPENVAS:1361412562310703831", "OPENVAS:1361412562310703871", "OPENVAS:1361412562310703872", "OPENVAS:1361412562310704017", "OPENVAS:1361412562310704018", "OPENVAS:1361412562310704157", "OPENVAS:1361412562310704158", "OPENVAS:1361412562310704278", "OPENVAS:1361412562310704348", "OPENVAS:1361412562310704355", "OPENVAS:1361412562310704434", "OPENVAS:1361412562310704460", "OPENVAS:1361412562310704461", "OPENVAS:1361412562310704542", "OPENVAS:1361412562310704605", "OPENVAS:1361412562310704621", "OPENVAS:1361412562310704661", "OPENVAS:1361412562310704669", "OPENVAS:1361412562310704693", "OPENVAS:1361412562310704696", "OPENVAS:1361412562310704727", "OPENVAS:1361412562310808360", "OPENVAS:1361412562310808460", "OPENVAS:1361412562310810182", "OPENVAS:1361412562310810184", "OPENVAS:1361412562310810751", "OPENVAS:1361412562310810752", "OPENVAS:1361412562310810756", "OPENVAS:1361412562310810758", "OPENVAS:1361412562310810760", "OPENVAS:1361412562310810761", "OPENVAS:1361412562310811298", "OPENVAS:1361412562310811703", "OPENVAS:1361412562310811719", "OPENVAS:1361412562310811720", "OPENVAS:1361412562310812401", "OPENVAS:1361412562310812641", "OPENVAS:1361412562310812642", "OPENVAS:1361412562310812643", "OPENVAS:1361412562310812790", "OPENVAS:1361412562310813153", "OPENVAS:1361412562310813154", "OPENVAS:1361412562310813302", "OPENVAS:1361412562310813303", "OPENVAS:1361412562310813304", "OPENVAS:1361412562310813437", "OPENVAS:1361412562310813471", "OPENVAS:1361412562310813480", "OPENVAS:1361412562310813551", "OPENVAS:1361412562310813712", "OPENVAS:1361412562310813713", "OPENVAS:1361412562310815899", "OPENVAS:1361412562310816603", "OPENVAS:1361412562310842149", "OPENVAS:1361412562310843024", "OPENVAS:1361412562310843035", "OPENVAS:1361412562310843099", "OPENVAS:1361412562310843104", "OPENVAS:1361412562310843108", "OPENVAS:1361412562310843135", "OPENVAS:1361412562310843145", "OPENVAS:1361412562310843157", "OPENVAS:1361412562310843171", "OPENVAS:1361412562310843360", "OPENVAS:1361412562310843487", "OPENVAS:1361412562310843569", "OPENVAS:1361412562310843586", "OPENVAS:1361412562310843673", "OPENVAS:1361412562310843755", "OPENVAS:1361412562310843814", "OPENVAS:1361412562310843827", "OPENVAS:1361412562310843834", "OPENVAS:1361412562310844315", "OPENVAS:1361412562310844454", "OPENVAS:1361412562310851455", "OPENVAS:1361412562310851503", "OPENVAS:1361412562310851540", "OPENVAS:1361412562310851734", "OPENVAS:1361412562310851840", "OPENVAS:1361412562310851845", "OPENVAS:1361412562310851869", "OPENVAS:1361412562310851888", "OPENVAS:1361412562310851920", "OPENVAS:1361412562310852013", "OPENVAS:1361412562310852061", "OPENVAS:1361412562310852121", "OPENVAS:1361412562310852128", "OPENVAS:1361412562310852279", "OPENVAS:1361412562310852686", "OPENVAS:1361412562310852722", "OPENVAS:1361412562310852753", "OPENVAS:1361412562310852849", "OPENVAS:1361412562310852913", "OPENVAS:1361412562310852930", "OPENVAS:1361412562310852959", "OPENVAS:1361412562310853015", "OPENVAS:1361412562310853022", "OPENVAS:1361412562310853059", "OPENVAS:1361412562310853179", "OPENVAS:1361412562310853182", "OPENVAS:1361412562310853207", "OPENVAS:1361412562310853223", "OPENVAS:1361412562310853226", "OPENVAS:1361412562310853253", "OPENVAS:1361412562310853254", "OPENVAS:1361412562310853258", "OPENVAS:1361412562310871440", "OPENVAS:1361412562310871803", "OPENVAS:1361412562310871857", "OPENVAS:1361412562310871971", "OPENVAS:1361412562310872861", "OPENVAS:1361412562310872864", "OPENVAS:1361412562310872871", "OPENVAS:1361412562310872874", "OPENVAS:1361412562310873627", "OPENVAS:1361412562310873748", "OPENVAS:1361412562310873785", "OPENVAS:1361412562310873829", "OPENVAS:1361412562310873837", "OPENVAS:1361412562310874283", "OPENVAS:1361412562310874313", "OPENVAS:1361412562310874318", "OPENVAS:1361412562310874324", "OPENVAS:1361412562310874326", "OPENVAS:1361412562310874337", "OPENVAS:1361412562310874349", "OPENVAS:1361412562310874356", "OPENVAS:1361412562310874796", "OPENVAS:1361412562310874809", "OPENVAS:1361412562310874832", "OPENVAS:1361412562310874838", "OPENVAS:1361412562310875095", "OPENVAS:1361412562310875100", "OPENVAS:1361412562310875133", "OPENVAS:1361412562310875239", "OPENVAS:1361412562310875464", "OPENVAS:1361412562310875502", "OPENVAS:1361412562310875785", "OPENVAS:1361412562310875894", "OPENVAS:1361412562310876003", "OPENVAS:1361412562310876042", "OPENVAS:1361412562310876319", "OPENVAS:1361412562310876320", "OPENVAS:1361412562310876325", "OPENVAS:1361412562310876327", "OPENVAS:1361412562310876331", "OPENVAS:1361412562310876342", "OPENVAS:1361412562310876410", "OPENVAS:1361412562310876414", "OPENVAS:1361412562310876417", "OPENVAS:1361412562310876784", "OPENVAS:1361412562310876785", "OPENVAS:1361412562310876816", "OPENVAS:1361412562310876840", "OPENVAS:1361412562310876846", "OPENVAS:1361412562310876898", "OPENVAS:1361412562310876900", "OPENVAS:1361412562310876901", "OPENVAS:1361412562310876904", "OPENVAS:1361412562310876908", "OPENVAS:1361412562310876940", "OPENVAS:1361412562310876994", "OPENVAS:1361412562310877037", "OPENVAS:1361412562310877098", "OPENVAS:1361412562310877119", "OPENVAS:1361412562310877134", "OPENVAS:1361412562310877152", "OPENVAS:1361412562310877192", "OPENVAS:1361412562310877212", "OPENVAS:1361412562310877235", "OPENVAS:1361412562310877238", "OPENVAS:1361412562310877267", "OPENVAS:1361412562310877283", "OPENVAS:1361412562310877291", "OPENVAS:1361412562310877322", "OPENVAS:1361412562310877432", "OPENVAS:1361412562310877449", "OPENVAS:1361412562310877452", "OPENVAS:1361412562310877455", "OPENVAS:1361412562310877456", "OPENVAS:1361412562310877502", "OPENVAS:1361412562310877503", "OPENVAS:1361412562310877736", "OPENVAS:1361412562310877748", "OPENVAS:1361412562310877816", "OPENVAS:1361412562310877925", "OPENVAS:1361412562310877930", "OPENVAS:1361412562310877939", "OPENVAS:1361412562310877942", "OPENVAS:1361412562310877967", "OPENVAS:1361412562310877975", "OPENVAS:1361412562310877986", "OPENVAS:1361412562310877995", "OPENVAS:1361412562310878017", "OPENVAS:1361412562310882269", "OPENVAS:1361412562310882270", "OPENVAS:1361412562310882698", "OPENVAS:1361412562310882701", "OPENVAS:1361412562310882702", "OPENVAS:1361412562310882704", "OPENVAS:1361412562310883164", "OPENVAS:1361412562310883171", "OPENVAS:1361412562310883173", "OPENVAS:1361412562310883175", "OPENVAS:1361412562310883182", "OPENVAS:1361412562310883192", "OPENVAS:1361412562310883196", "OPENVAS:1361412562310883252", "OPENVAS:1361412562310883258", "OPENVAS:1361412562310890906", "OPENVAS:1361412562310890946", "OPENVAS:1361412562310890986", "OPENVAS:1361412562310891020", "OPENVAS:1361412562310891021", "OPENVAS:1361412562310891330", "OPENVAS:1361412562310891449", "OPENVAS:1361412562310891580", "OPENVAS:1361412562310891777", "OPENVAS:1361412562310891797", "OPENVAS:1361412562310891801", "OPENVAS:1361412562310891896", "OPENVAS:1361412562310891943", "OPENVAS:1361412562310891950", "OPENVAS:1361412562310891984", "OPENVAS:1361412562310892030", "OPENVAS:1361412562310892111", "OPENVAS:1361412562310892118", "OPENVAS:1361412562310892128", "OPENVAS:1361412562310892139", "OPENVAS:1361412562310892191", "OPENVAS:1361412562310892201", "OPENVAS:1361412562310892209", "OPENVAS:1361412562310892217", "OPENVAS:1361412562310892256", "OPENVAS:1361412562310892270", "OPENVAS:1361412562310892277", "OPENVAS:1361412562310892279", "OPENVAS:1361412562311220171075", "OPENVAS:1361412562311220171076", "OPENVAS:1361412562311220171191", "OPENVAS:1361412562311220171192", "OPENVAS:1361412562311220181088", "OPENVAS:1361412562311220181089", "OPENVAS:1361412562311220181156", "OPENVAS:1361412562311220181214", "OPENVAS:1361412562311220181257", "OPENVAS:1361412562311220181258", "OPENVAS:1361412562311220181306", "OPENVAS:1361412562311220181383", "OPENVAS:1361412562311220181392", "OPENVAS:1361412562311220181420", "OPENVAS:1361412562311220191009", "OPENVAS:1361412562311220191084", "OPENVAS:1361412562311220191164", "OPENVAS:1361412562311220191185", "OPENVAS:1361412562311220191201", "OPENVAS:1361412562311220191400", "OPENVAS:1361412562311220191546", "OPENVAS:1361412562311220191643", "OPENVAS:1361412562311220191667", "OPENVAS:1361412562311220191721", "OPENVAS:1361412562311220191998", "OPENVAS:1361412562311220192030", "OPENVAS:1361412562311220192215", "OPENVAS:1361412562311220192232", "OPENVAS:1361412562311220192291", "OPENVAS:1361412562311220192360", "OPENVAS:1361412562311220192364", "OPENVAS:1361412562311220192509", "OPENVAS:1361412562311220192542", "OPENVAS:1361412562311220192630", "OPENVAS:1361412562311220201057", "OPENVAS:1361412562311220201111", "OPENVAS:1361412562311220201210", "OPENVAS:1361412562311220201216", "OPENVAS:1361412562311220201262", "OPENVAS:1361412562311220201395", "OPENVAS:1361412562311220201451", "OPENVAS:1361412562311220201457", "OPENVAS:1361412562311220201581", "OPENVAS:1361412562311220201596", "OPENVAS:1361412562311220201613", "OPENVAS:1361412562311220201645", "OPENVAS:1361412562311220201677", "OPENVAS:1361412562311220201684", "OPENVAS:1361412562311220201771", "OPENVAS:703720", "OPENVAS:703721", "OPENVAS:703831", "OPENVAS:703871", "OPENVAS:703872"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2017", "ORACLE:CPUAPR2018", "ORACLE:CPUAPR2019", "ORACLE:CPUAPR2020", "ORACLE:CPUAPR2021", "ORACLE:CPUAPR2022", "ORACLE:CPUAPR2023", "ORACLE:CPUJAN2018", "ORACLE:CPUJAN2019", "ORACLE:CPUJAN2020", "ORACLE:CPUJAN2021", "ORACLE:CPUJAN2022", "ORACLE:CPUJAN2023", "ORACLE:CPUJUL2017", "ORACLE:CPUJUL2018", "ORACLE:CPUJUL2019", "ORACLE:CPUJUL2020", "ORACLE:CPUJUL2022", "ORACLE:CPUJUL2023", "ORACLE:CPUOCT2017", "ORACLE:CPUOCT2018", "ORACLE:CPUOCT2019", "ORACLE:CPUOCT2020", "ORACLE:CPUOCT2021", "ORACLE:CPUOCT2022"]}, {"type": "oraclelinux", "idList": ["ELSA-2015-1695", "ELSA-2017-1100", "ELSA-2017-1101", "ELSA-2017-2247", "ELSA-2018-3090", "ELSA-2018-3221", "ELSA-2018-4187", "ELSA-2018-4228", "ELSA-2018-4229", "ELSA-2018-4248", "ELSA-2018-4249", "ELSA-2018-4253", "ELSA-2018-4254", "ELSA-2018-4267", "ELSA-2019-2091", "ELSA-2019-2471", "ELSA-2019-4581", "ELSA-2019-4747", "ELSA-2020-0122", "ELSA-2020-0128", "ELSA-2020-0157", "ELSA-2020-0194", "ELSA-2020-0196", "ELSA-2020-0202", "ELSA-2020-0541", "ELSA-2020-0579", "ELSA-2020-0598", "ELSA-2020-0632", "ELSA-2020-0703", "ELSA-2020-0708", "ELSA-2020-1317", "ELSA-2020-1644", "ELSA-2020-2529", "ELSA-2020-2530", "ELSA-2020-2663", "ELSA-2020-2848", "ELSA-2020-2852", "ELSA-2020-3936", "ELSA-2020-4004", "ELSA-2020-4670", "ELSA-2020-4847", "ELSA-2020-5476", "ELSA-2020-5493", "ELSA-2020-5499", "ELSA-2020-5566-1", "ELSA-2021-0162", "ELSA-2021-0218", "ELSA-2021-0221", "ELSA-2021-0343", "ELSA-2021-0549", "ELSA-2021-0551", "ELSA-2021-0557", "ELSA-2021-0734", "ELSA-2021-0735", "ELSA-2021-0744", "ELSA-2021-0860", "ELSA-2021-1024", "ELSA-2021-1354", "ELSA-2021-1384", "ELSA-2021-1593", "ELSA-2021-1610", "ELSA-2021-1633", "ELSA-2021-1678", "ELSA-2021-1761", "ELSA-2021-1846", "ELSA-2021-1879", "ELSA-2021-1898", "ELSA-2021-2238", "ELSA-2021-2575", "ELSA-2021-2776", "ELSA-2021-2781", "ELSA-2021-2784", "ELSA-2021-2845", "ELSA-2021-3572", "ELSA-2021-3590", "ELSA-2021-3798", "ELSA-2021-4151", "ELSA-2021-4160", "ELSA-2021-4162", "ELSA-2021-4251", "ELSA-2021-4424", "ELSA-2021-4511", "ELSA-2021-9019", "ELSA-2021-9028", "ELSA-2021-9029", "ELSA-2021-9100", "ELSA-2021-9101", "ELSA-2021-9107", "ELSA-2021-9121", "ELSA-2021-9128", "ELSA-2021-9129", "ELSA-2021-9130", "ELSA-2021-9137", "ELSA-2021-9150", "ELSA-2021-9151", "ELSA-2021-9169", "ELSA-2021-9238", "ELSA-2021-9294", "ELSA-2021-9400", "ELSA-2021-9478", "ELSA-2021-9528", "ELSA-2021-9552", "ELSA-2021-9561", "ELSA-2022-1556", "ELSA-2022-1557", "ELSA-2022-1860", "ELSA-2022-1861", "ELSA-2022-5235", "ELSA-2022-7343", "ELSA-2022-9177", "ELSA-2022-9341"]}, {"type": "osv", "idList": ["OSV:CVE-2017-3735", "OSV:CVE-2018-21010", "OSV:CVE-2019-12973", "OSV:CVE-2019-15604", "OSV:CVE-2019-15605", "OSV:CVE-2019-15606", "OSV:CVE-2020-15389", "OSV:CVE-2020-27814", "OSV:CVE-2020-27844", "OSV:CVE-2021-20227", "OSV:CVE-2021-22883", "OSV:CVE-2021-2372", "OSV:CVE-2021-23839", "OSV:CVE-2021-23841", "OSV:CVE-2021-29921", "OSV:CVE-2021-3177", "OSV:CVE-2021-3520", "OSV:DLA-1020-1", "OSV:DLA-1021-1", "OSV:DLA-1157-1", "OSV:DLA-1194-1", "OSV:DLA-1449-1", "OSV:DLA-1580-1", "OSV:DLA-1797-1", "OSV:DLA-1801-1", "OSV:DLA-1896-1", "OSV:DLA-1950-1", "OSV:DLA-1984-1", "OSV:DLA-2111-1", "OSV:DLA-2118-1", "OSV:DLA-2139-1", "OSV:DLA-2191-1", "OSV:DLA-2201-1", "OSV:DLA-2209-1", "OSV:DLA-2217-1", "OSV:DLA-2256-1", "OSV:DLA-2270-1", "OSV:DLA-2277-1", "OSV:DLA-2279-1", "OSV:DLA-2286-1", "OSV:DLA-2364-1", "OSV:DLA-2378-1", "OSV:DLA-2405-1", "OSV:DLA-2406-1", "OSV:DLA-2437-1", "OSV:DLA-2467-1", "OSV:DLA-2467-2", "OSV:DLA-2471-1", "OSV:DLA-2474-1", "OSV:DLA-2492-1", "OSV:DLA-2493-1", "OSV:DLA-2495-1", "OSV:DLA-2500-1", "OSV:DLA-2512-1", "OSV:DLA-2550-1", "OSV:DLA-2555-1", "OSV:DLA-2563-1", "OSV:DLA-2565-1", "OSV:DLA-2569-1", "OSV:DLA-2583-1", "OSV:DLA-2594-1", "OSV:DLA-2616-1", "OSV:DLA-2619-1", "OSV:DLA-2628-1", "OSV:DLA-2638-1", "OSV:DLA-2657-1", "OSV:DLA-2661-1", "OSV:DLA-2664-1", "OSV:DLA-2733-1", "OSV:DLA-2734-1", "OSV:DLA-2737-1", "OSV:DLA-2751-1", "OSV:DLA-2877-1", "OSV:DLA-2919-1", "OSV:DLA-2975-1", "OSV:DLA-3085-1", "OSV:DLA-3129-1", "OSV:DLA-3160-1", "OSV:DLA-3164-1", "OSV:DLA-3205-1", "OSV:DLA-3432-1", "OSV:DLA-728-1", "OSV:DLA-729-1", "OSV:DLA-906-1", "OSV:DLA-946-1", "OSV:DSA-3720-1", "OSV:DSA-3721-1", "OSV:DSA-4017-1", "OSV:DSA-4018-1", "OSV:DSA-4157-1", "OSV:DSA-4348-1", "OSV:DSA-4355-1", "OSV:DSA-4434-1", "OSV:DSA-4460-1", "OSV:DSA-4461-1", "OSV:DSA-4605-1", "OSV:DSA-4661-1", "OSV:DSA-4669-1", "OSV:DSA-4727-1", "OSV:DSA-4772-1", "OSV:DSA-4789-1", "OSV:DSA-4795-1", "OSV:DSA-4811-1", "OSV:DSA-4863-1", "OSV:DSA-4875-1", "OSV:DSA-4881-1", "OSV:DSA-4882-1", "OSV:DSA-4885-1", "OSV:DSA-4891-1", "OSV:DSA-4908-1", "OSV:DSA-4946-1", "OSV:DSA-4952-1", "OSV:DSA-5265-1", "OSV:GHSA-269G-PWP5-87PP", "OSV:GHSA-269Q-HMXG-M83Q", "OSV:GHSA-288C-CQ4H-88GQ", "OSV:GHSA-2H3J-M7GR-25XJ", "OSV:GHSA-2H63-QP69-FWVW", "OSV:GHSA-2HW2-62CP-P9P7", "OSV:GHSA-2P3X-QW9C-25HH", "OSV:GHSA-2RVV-W9R2-RG7M", "OSV:GHSA-3244-8MFF-W398", "OSV:GHSA-344F-F5VG-2JFJ", "OSV:GHSA-36QH-35CM-5W2W", "OSV:GHSA-3C6G-PVG8-GQW2", "OSV:GHSA-3XXV-P78R-4FC6", "OSV:GHSA-43GC-MJXG-GVRQ", "OSV:GHSA-4GW3-8F77-F72C", "OSV:GHSA-4HRM-M67V-5CXR", "OSV:GHSA-4M44-5J2G-XF64", "OSV:GHSA-4P6W-M9WC-C9C9", "OSV:GHSA-4PV3-63JW-4JW2", "OSV:GHSA-4VWW-MC66-62M6", "OSV:GHSA-5325-XW5M-PHM3", "OSV:GHSA-53X6-4X5P-RRVV", "OSV:GHSA-562R-VG33-8X8H", "OSV:GHSA-56P8-3FH9-4CVQ", "OSV:GHSA-5949-RW7G-WX7W", "OSV:GHSA-59JW-JQF4-3WQ3", "OSV:GHSA-5MCR-GQ6C-3HQ2", "OSV:GHSA-5MG8-W23W-74H3", "OSV:GHSA-5R5R-6HPJ-8GG9", "OSV:GHSA-63Q7-H895-M982", "OSV:GHSA-662X-FHQG-9P8V", "OSV:GHSA-6C3J-C64M-QHGQ", "OSV:GHSA-6JMF-MXWF-R3JC", "OSV:GHSA-6PHF-73Q6-GH87", "OSV:GHSA-6VQP-H455-42MR", "OSV:GHSA-6X4W-8W53-XRVV", "OSV:GHSA-6X9X-8QW9-9PP6", "OSV:GHSA-73XV-W5GP-FRXH", "OSV:GHSA-74CV-F58X-F9WF", "OSV:GHSA-7CWJ-J333-X7F7", "OSV:GHSA-7PM4-G2QJ-J85X", "OSV:GHSA-7R82-7XV7-XCPJ", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-84Q7-P226-4X5W", "OSV:GHSA-84RM-QF37-FGC2", "OSV:GHSA-86QR-9VQC-PGC6", "OSV:GHSA-86WM-RRJM-8WH8", "OSV:GHSA-89QR-369F-5M5X", "OSV:GHSA-8C4J-34R4-XR8G", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-8HXH-R6F7-JF45", "OSV:GHSA-8W26-6F25-CM9X", "OSV:GHSA-8WX2-9Q48-VM9R", "OSV:GHSA-9F3J-PM6F-9FM5", "OSV:GHSA-9GPH-22XH-8X98", "OSV:GHSA-9JWC-Q6J3-8G9G", "OSV:GHSA-9M6F-7XCQ-8VF8", "OSV:GHSA-9MGM-GCQ8-86WQ", "OSV:GHSA-9Q5J-JM53-V7VR", "OSV:GHSA-9QCF-C26R-X5RF", "OSV:GHSA-C265-37VJ-CWCC", "OSV:GHSA-C2Q3-4QRH-FM48", "OSV:GHSA-C43Q-5HPJ-4CRV", "OSV:GHSA-C6PW-Q7F2-97HV", "OSV:GHSA-C9JJ-3WVG-Q65H", "OSV:GHSA-CC94-3V9C-7RM8", "OSV:GHSA-CMX4-P4V5-HMR5", "OSV:GHSA-CQCC-MM6X-VMVW", "OSV:GHSA-CQJ8-47CH-RVVQ", "OSV:GHSA-CVM9-FJM9-3572", "OSV:GHSA-F256-J965-7F32", "OSV:GHSA-F62V-XPXF-3V68", "OSV:GHSA-F6HM-88X3-MFJV", "OSV:GHSA-F6VF-PQ8C-69M4", "OSV:GHSA-F9XH-2QGP-CQ57", "OSV:GHSA-FG3J-Q579-V8X4", "OSV:GHSA-FHJF-83WG-R2J9", "OSV:GHSA-FMJ2-7WX8-QJ4V", "OSV:GHSA-FMMC-742Q-JG75", "OSV:GHSA-G2FG-MR77-6VRM", "OSV:GHSA-G3WG-6MCF-8JJ6", "OSV:GHSA-GFWJ-FWQJ-FP3V", "OSV:GHSA-GJMW-VF9H-G25V", "OSV:GHSA-GQ28-H5VG-8PRX", "OSV:GHSA-GWW7-P5W4-WRFV", "OSV:GHSA-GXR4-XJJ5-5PX2", "OSV:GHSA-H3CW-G4MQ-C5X2", "OSV:GHSA-H79P-32MX-FJJ9", "OSV:GHSA-HF23-9PF7-388P", "OSV:GHSA-HRCP-8F3Q-4W2C", "OSV:GHSA-HVV8-336G-RX3M", "OSV:GHSA-HWJ3-M3P6-HJ38", "OSV:GHSA-HWPC-8XQV-JVJ4", "OSV:GHSA-HWVM-VFW8-93MW", "OSV:GHSA-J39C-C8HJ-X4J3", "OSV:GHSA-J823-4QCH-3RGM", "OSV:GHSA-J8JW-G6FQ-MP7H", "OSV:GHSA-J9WF-VVM6-4R9W", "OSV:GHSA-JC35-Q369-45PV", "OSV:GHSA-JGWR-3QM3-26F3", "OSV:GHSA-JPCQ-CGW6-V4J6", "OSV:GHSA-JQ65-29V4-4X35", "OSV:GHSA-JQ7P-26H5-W78R", "OSV:GHSA-JXFH-8WGV-VFR2", "OSV:GHSA-M6VM-8G8V-XFJH", "OSV:GHSA-M6X4-97WX-4Q27", "OSV:GHSA-M7JV-HQ7H-MQ7C", "OSV:GHSA-MC6H-4QGP-37QH", "OSV:GHSA-MM9X-G8PC-W292", "OSV:GHSA-MW36-7C6C-Q4Q2", "OSV:GHSA-MX7P-6679-8G3Q", "OSV:GHSA-P6MC-M468-83GW", "OSV:GHSA-PGWW-XF46-H92R", "OSV:GHSA-Q44V-XC3G-V7JQ", "OSV:GHSA-Q799-Q27X-VP7W", "OSV:GHSA-QGM6-9472-PWQ7", "OSV:GHSA-QJW2-HR98-QGFH", "OSV:GHSA-QPFQ-PH7R-QV6F", "OSV:GHSA-QRMM-W75W-3WPX", "OSV:GHSA-R3GR-CXRF-HG25", "OSV:GHSA-R695-7VR9-JGC2", "OSV:GHSA-RCJJ-H6GH-JF3R", "OSV:GHSA-RJ7P-RFGP-852X", "OSV:GHSA-RV39-3QH7-9V7W", "OSV:GHSA-V528-7HRM-FRQP", "OSV:GHSA-V585-23HC-C647", "OSV:GHSA-V73W-R9XG-7CR9", "OSV:GHSA-V8J6-6C2R-R27C", "OSV:GHSA-VF77-8H7G-GGHP", "OSV:GHSA-VFQX-33QM-G869", "OSV:GHSA-VGG8-72F2-QM23", "OSV:GHSA-VMQM-G3VH-847M", "OSV:GHSA-VVW4-RFWF-P6HX", "OSV:GHSA-WFCC-PFF6-RGC5", "OSV:GHSA-WH8G-3J2C-RQJ5", "OSV:GHSA-WPVM-WQR4-P7CW", "OSV:GHSA-WQ4C-WM6X-JW44", "OSV:GHSA-WQFH-9M4G-7X6X", "OSV:GHSA-WXCP-F2C8-X6XV", "OSV:GO-2021-0101", "OSV:GO-2021-0143", "OSV:GO-2021-0226", "OSV:PYSEC-2020-62", "OSV:PYSEC-2021-4", "OSV:RUSTSEC-2020-0015", "OSV:RUSTSEC-2021-0055", "OSV:RUSTSEC-2021-0056", "OSV:RUSTSEC-2021-0057", "OSV:RUSTSEC-2021-0058", "OSV:RUSTSEC-2022-0051"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:149972", "PACKETSTORM:152756", "PACKETSTORM:155886", "PACKETSTORM:157054", "PACKETSTORM:157207", "PACKETSTORM:157795", "PACKETSTORM:159049", "PACKETSTORM:160721", "PACKETSTORM:161160", "PACKETSTORM:161230", "PACKETSTORM:161270", "PACKETSTORM:161293", "PACKETSTORM:162159", "PACKETSTORM:162160", "PACKETSTORM:163142", "PACKETSTORM:163452", "PACKETSTORM:165255", "PACKETSTORM:165258"]}, {"type": "paloalto", "idList": ["PA-CVE-2020-1968", "PA-CVE-2021-28041", "PA-CVE-2021-3156", "PAN-SA-2018-0015"]}, {"type": "photon", "idList": ["PHSA-2017-0013", "PHSA-2017-0037", "PHSA-2017-0091", "PHSA-2018-0078", "PHSA-2018-0149", "PHSA-2018-0167", "PHSA-2018-1.0-0149", "PHSA-2018-1.0-0167", "PHSA-2018-2.0-0078", "PHSA-2019-0013", "PHSA-2019-0017", "PHSA-2019-0121", "PHSA-2019-0157", "PHSA-2019-0161", "PHSA-2019-0203", "PHSA-2019-0230", "PHSA-2019-0237", "PHSA-2019-1.0-0203", "PHSA-2019-1.0-0230", "PHSA-2019-1.0-0237", "PHSA-2019-2.0-0120", "PHSA-2019-2.0-0157", "PHSA-2019-2.0-0161", "PHSA-2019-3.0-0013", "PHSA-2019-3.0-0017", "PHSA-2020-0060", "PHSA-2020-0082", "PHSA-2020-0083", "PHSA-2020-0093", "PHSA-2020-0099", "PHSA-2020-0100", "PHSA-2020-0104", "PHSA-2020-0116", "PHSA-2020-0135", "PHSA-2020-0141", "PHSA-2020-0155", "PHSA-2020-0174", "PHSA-2020-0175", "PHSA-2020-0180", "PHSA-2020-0233", "PHSA-2020-0235", "PHSA-2020-0239", "PHSA-2020-0247", "PHSA-2020-0248", "PHSA-2020-0254", "PHSA-2020-0265", "PHSA-2020-0269", "PHSA-2020-0281", "PHSA-2020-0284", "PHSA-2020-0291", "PHSA-2020-0302", "PHSA-2020-0304", "PHSA-2020-0309", "PHSA-2020-0312", "PHSA-2020-0321", "PHSA-2020-0324", "PHSA-2020-0335", "PHSA-2020-0345", "PHSA-2020-0346", "PHSA-2020-0350", "PHSA-2020-1.0-0289", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0301", "PHSA-2020-1.0-0302", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0312", "PHSA-2020-1.0-0321", "PHSA-2020-1.0-0324", "PHSA-2020-1.0-0335", "PHSA-2020-1.0-0345", "PHSA-2020-1.0-0346", "PHSA-2020-1.0-0350", "PHSA-2020-2.0-0233", "PHSA-2020-2.0-0235", "PHSA-2020-2.0-0239", "PHSA-2020-2.0-0247", "PHSA-2020-2.0-0248", "PHSA-2020-2.0-0254", "PHSA-2020-2.0-0265", "PHSA-2020-2.0-0269", "PHSA-2020-2.0-0281", "PHSA-2020-2.0-0284", "PHSA-2020-2.0-0291", "PHSA-2020-2.0-0304", "PHSA-2020-3.0-0060", "PHSA-2020-3.0-0082", "PHSA-2020-3.0-0083", "PHSA-2020-3.0-0093", "PHSA-2020-3.0-0099", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0104", "PHSA-2020-3.0-0116", "PHSA-2020-3.0-0135", "PHSA-2020-3.0-0141", "PHSA-2020-3.0-0155", "PHSA-2020-3.0-0174", "PHSA-2020-3.0-0175", "PHSA-2020-3.0-0180", "PHSA-2021-0006", "PHSA-2021-0007", "PHSA-2021-0028", "PHSA-2021-0031", "PHSA-2021-0033", "PHSA-2021-0036", "PHSA-2021-0037", "PHSA-2021-0047", "PHSA-2021-0054", "PHSA-2021-0066", "PHSA-2021-0072", "PHSA-2021-0077", "PHSA-2021-0188", "PHSA-2021-0192", "PHSA-2021-0197", "PHSA-2021-0200", "PHSA-2021-0204", "PHSA-2021-0208", "PHSA-2021-0209", "PHSA-2021-0210", "PHSA-2021-0215", "PHSA-2021-0227", "PHSA-2021-0243", "PHSA-2021-0248", "PHSA-2021-0254", "PHSA-2021-0255", "PHSA-2021-0262", "PHSA-2021-0277", "PHSA-2021-0281", "PHSA-2021-0308", "PHSA-2021-0315", "PHSA-2021-0317", "PHSA-2021-0325", "PHSA-2021-0327", "PHSA-2021-0328", "PHSA-2021-0330", "PHSA-2021-0331", "PHSA-2021-0334", "PHSA-2021-0337", "PHSA-2021-0349", "PHSA-2021-0350", "PHSA-2021-0357", "PHSA-2021-0358", "PHSA-2021-0366", "PHSA-2021-0375", "PHSA-2021-0381", "PHSA-2021-0397", "PHSA-2021-0420", "PHSA-2021-0422", "PHSA-2021-0455", "PHSA-2021-1.0-0358", "PHSA-2021-1.0-0366", "PHSA-2021-1.0-0372", "PHSA-2021-1.0-0373", "PHSA-2021-1.0-0377", "PHSA-2021-1.0-0378", "PHSA-2021-1.0-0393", "PHSA-2021-1.0-0397", "PHSA-2021-1.0-0412", "PHSA-2021-1.0-0420", "PHSA-2021-1.0-0427", "PHSA-2021-2.0-0308", "PHSA-2021-2.0-0315", "PHSA-2021-2.0-0317", "PHSA-2021-2.0-0323", "PHSA-2021-2.0-0325", "PHSA-2021-2.0-0327", "PHSA-2021-2.0-0328", "PHSA-2021-2.0-0330", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0334", "PHSA-2021-2.0-0337", "PHSA-2021-2.0-0349", "PHSA-2021-2.0-0350", "PHSA-2021-2.0-0357", "PHSA-2021-2.0-0358", "PHSA-2021-2.0-0366", "PHSA-2021-2.0-0375", "PHSA-2021-2.0-0381", "PHSA-2021-3.0-0188", "PHSA-2021-3.0-0192", "PHSA-2021-3.0-0197", "PHSA-2021-3.0-0200", "PHSA-2021-3.0-0204", "PHSA-2021-3.0-0208", "PHSA-2021-3.0-0209", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0215", "PHSA-2021-3.0-0227", "PHSA-2021-3.0-0243", "PHSA-2021-3.0-0248", "PHSA-2021-3.0-0254", "PHSA-2021-3.0-0255", "PHSA-2021-3.0-0262", "PHSA-2021-3.0-0277", "PHSA-2021-3.0-0281", "PHSA-2021-3.0-0327", "PHSA-2021-3.0-0342", "PHSA-2021-4.0-0006", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0028", "PHSA-2021-4.0-0031", "PHSA-2021-4.0-0033", "PHSA-2021-4.0-0036", "PHSA-2021-4.0-0037", "PHSA-2021-4.0-0047", "PHSA-2021-4.0-0054", "PHSA-2021-4.0-0066", "PHSA-2021-4.0-0072", "PHSA-2021-4.0-0077", "PHSA-2021-4.0-0139", "PHSA-2022-0216", "PHSA-2022-0374", "PHSA-2022-0456", "PHSA-2022-3.0-0342", "PHSA-2022-3.0-0374", "PHSA-2022-4.0-0216", "PHSA-2023-3.0-0520", "PHSA-2023-3.0-0601", "PHSA-2023-3.0-0603", "PHSA-2023-3.0-0617", "PHSA-2023-4.0-0435", "PHSA-2023-5.0-0041", "PHSA-2023-5.0-0056"]}, {"type": "prion", "idList": ["PRION:CVE-2020-10543", "PRION:CVE-2020-10683", "PRION:CVE-2020-10878", "PRION:CVE-2020-11022", "PRION:CVE-2020-11023", "PRION:CVE-2020-11612", "PRION:CVE-2020-11868", "PRION:CVE-2020-11973", "PRION:CVE-2020-11979", "PRION:CVE-2020-11987", "PRION:CVE-2020-11988", "PRION:CVE-2020-11998", "PRION:CVE-2021-20190", "PRION:CVE-2021-20227", "PRION:CVE-2021-21275", "PRION:CVE-2021-21290", "PRION:CVE-2021-21341", "PRION:CVE-2021-21342", "PRION:CVE-2021-21343", "PRION:CVE-2021-21344", "PRION:CVE-2021-21345", "PRION:CVE-2021-21346", "PRION:CVE-2021-21347", "PRION:CVE-2021-21348", "PRION:CVE-2021-21349", "PRION:CVE-2021-21350", "PRION:CVE-2021-21351", "PRION:CVE-2021-21409", "PRION:CVE-2021-22112", "PRION:CVE-2021-22118", "PRION:CVE-2021-2244", "PRION:CVE-2021-22876", "PRION:CVE-2021-22883", "PRION:CVE-2021-22884", "PRION:CVE-2021-22890", "PRION:CVE-2021-22897", "PRION:CVE-2021-22898", "PRION:CVE-2021-22901", "PRION:CVE-2021-2323", "PRION:CVE-2021-2324", "PRION:CVE-2021-2326", "PRION:CVE-2021-2328", "PRION:CVE-2021-2329", "PRION:CVE-2021-2330", "PRION:CVE-2021-2333", "PRION:CVE-2021-23336", "PRION:CVE-2021-2334", "PRION:CVE-2021-2335", "PRION:CVE-2021-2336", "PRION:CVE-2021-2337", "PRION:CVE-2021-2338", "PRION:CVE-2021-2339", "PRION:CVE-2021-2340", "PRION:CVE-2021-2341", "PRION:CVE-2021-2342", "PRION:CVE-2021-2343", "PRION:CVE-2021-2344", "PRION:CVE-2021-2345", "PRION:CVE-2021-2346", "PRION:CVE-2021-2347", "PRION:CVE-2021-2348", "PRION:CVE-2021-2349", "PRION:CVE-2021-2350", "PRION:CVE-2021-2351", "PRION:CVE-2021-2352", "PRION:CVE-2021-2353", "PRION:CVE-2021-2354", "PRION:CVE-2021-2355", "PRION:CVE-2021-2356", "PRION:CVE-2021-2357", "PRION:CVE-2021-2358", "PRION:CVE-2021-2359", "PRION:CVE-2021-2360", "PRION:CVE-2021-2361", "PRION:CVE-2021-2362", "PRION:CVE-2021-2363", "PRION:CVE-2021-2364", "PRION:CVE-2021-2365", "PRION:CVE-2021-2366", "PRION:CVE-2021-2367", "PRION:CVE-2021-2368", "PRION:CVE-2021-2369", "PRION:CVE-2021-2370", "PRION:CVE-2021-2371", "PRION:CVE-2021-2372", "PRION:CVE-2021-2373", "PRION:CVE-2021-2374", "PRION:CVE-2021-2375", "PRION:CVE-2021-2376", "PRION:CVE-2021-2377", "PRION:CVE-2021-2378", "PRION:CVE-2021-2380", "PRION:CVE-2021-2381", "PRION:CVE-2021-2382", "PRION:CVE-2021-2383", "PRION:CVE-2021-23839", "PRION:CVE-2021-2384", "PRION:CVE-2021-23840", "PRION:CVE-2021-23841", "PRION:CVE-2021-2385", "PRION:CVE-2021-2386", "PRION:CVE-2021-2387", "PRION:CVE-2021-2388", "PRION:CVE-2021-2389", "PRION:CVE-2021-2390", "PRION:CVE-2021-2391", "PRION:CVE-2021-2392", "PRION:CVE-2021-2393", "PRION:CVE-2021-2394", "PRION:CVE-2021-2395", "PRION:CVE-2021-2396", "PRION:CVE-2021-2397", "PRION:CVE-2021-2398", "PRION:CVE-2021-2399", "PRION:CVE-2021-2400", "PRION:CVE-2021-2401", "PRION:CVE-2021-2402", "PRION:CVE-2021-2403", "PRION:CVE-2021-2404", "PRION:CVE-2021-2405", "PRION:CVE-2021-2406", "PRION:CVE-2021-2407", "PRION:CVE-2021-2408", "PRION:CVE-2021-2409", "PRION:CVE-2021-2410", "PRION:CVE-2021-2411", "PRION:CVE-2021-2412", "PRION:CVE-2021-24122", "PRION:CVE-2021-2415", "PRION:CVE-2021-2417", "PRION:CVE-2021-2418", "PRION:CVE-2021-2419", "PRION:CVE-2021-2420", "PRION:CVE-2021-2421", "PRION:CVE-2021-2422", "PRION:CVE-2021-2423", "PRION:CVE-2021-2424", "PRION:CVE-2021-2425", "PRION:CVE-2021-2426", "PRION:CVE-2021-2427", "PRION:CVE-2021-2428", "PRION:CVE-2021-2429", "PRION:CVE-2021-2430", "PRION:CVE-2021-2431", "PRION:CVE-2021-2432", "PRION:CVE-2021-2433", "PRION:CVE-2021-2434", "PRION:CVE-2021-2435", "PRION:CVE-2021-2436", "PRION:CVE-2021-2437", "PRION:CVE-2021-2438", "PRION:CVE-2021-2439", "PRION:CVE-2021-2440", "PRION:CVE-2021-2441", "PRION:CVE-2021-2442", "PRION:CVE-2021-2443", "PRION:CVE-2021-2444", "PRION:CVE-2021-2445", "PRION:CVE-2021-2446", "PRION:CVE-2021-2447", "PRION:CVE-2021-2448", "PRION:CVE-2021-2449", "PRION:CVE-2021-2450", "PRION:CVE-2021-2451", "PRION:CVE-2021-2452", "PRION:CVE-2021-2453", "PRION:CVE-2021-2454", "PRION:CVE-2021-2455", "PRION:CVE-2021-2456", "PRION:CVE-2021-2457", "PRION:CVE-2021-2458", "PRION:CVE-2021-2460", "PRION:CVE-2021-2462", "PRION:CVE-2021-2463", "PRION:CVE-2021-25122", "PRION:CVE-2021-25329", "PRION:CVE-2021-26117", "PRION:CVE-2021-26271", "PRION:CVE-2021-26272", "PRION:CVE-2021-27568", "PRION:CVE-2021-27807", "PRION:CVE-2021-27906", "PRION:CVE-2021-28041", "PRION:CVE-2021-28359", "PRION:CVE-2021-29921", "PRION:CVE-2021-30640", "PRION:CVE-2021-3156", "PRION:CVE-2021-3177", "PRION:CVE-2021-31805", "PRION:CVE-2021-31811", "PRION:CVE-2021-33037", "PRION:CVE-2021-3345", "PRION:CVE-2021-3449", "PRION:CVE-2021-3450", "PRION:CVE-2021-3520", "PRION:CVE-2021-3560", "PRION:CVE-2021-38193", "PRION:CVE-2021-40491", "PRION:CVE-2022-0552", "PRION:CVE-2022-23181", "PRION:CVE-2022-24823"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:01C65083E501A6BAFB08FCDA1D561012", "QUALYSBLOG:09A996513FDD86534E6C20CD7200C36D", "QUALYSBLOG:109D60A9AB08A6976BCD4E297E8B6878", "QUALYSBLOG:5FAC1C82A388DBB84ECD7CD43450B624", "QUALYSBLOG:6AFD8E9AB405FBE460877D857273A9AF", "QUALYSBLOG:8A2B26102098E31C5F8E392A55929F58", "QUALYSBLOG:9BA334FCEF38374A0B09A0614B2D74D4", "QUALYSBLOG:A341C9278C6DD389E0F263AE83CB5579", "QUALYSBLOG:D140886B3C4505719904327B06F12032", "QUALYSBLOG:DE1FEC2B9B661D42DAA0BA398DBFD24E", "QUALYSBLOG:E9408B9A1592F0FED621B417D14ABECD", "QUALYSBLOG:FE0BAF7268104D525CC0A2ABC0471C4C"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:46A54401F6ED43B72F664A32EA043CB8", "RAPID7BLOG:5482AC1594C82A230828023816657B57", "RAPID7BLOG:5D8768D89A817B5475C9FEA3577FB0BC", "RAPID7BLOG:73EAE8A2825E9B6764F314122B4E5F25", "RAPID7BLOG:8495B2B62A16EF7A1217077330A344B3", "RAPID7BLOG:88A83067D8D3C5AEBAF1B793818EEE53", "RAPID7BLOG:8F65784C67333FC453D98DBB9FBEBA4C", "RAPID7BLOG:A8AF62CC15B38126207722D29F080EE3", "RAPID7BLOG:B7BFF90DF2218C3CFB5ABB1CFE63700E", "RAPID7BLOG:BCCD03F6B72FD7F9410FC063D6F16682", "RAPID7BLOG:CBB459355DA52AAEA21DDFD10D5B6FDB"]}, {"type": "redhat", "idList": ["RHSA-2015:1695", "RHSA-2016:0121", "RHSA-2016:0122", "RHSA-2016:0123", "RHSA-2016:0124", "RHSA-2016:0125", "RHSA-2016:1376", "RHSA-2016:1838", "RHSA-2016:1839", "RHSA-2016:1840", "RHSA-2017:0455", "RHSA-2017:0456", "RHSA-2017:0457", "RHSA-2017:1100", "RHSA-2017:1101", "RHSA-2017:1102", "RHSA-2017:1103", "RHSA-2017:2247", "RHSA-2017:2477", "RHSA-2017:3354", "RHSA-2017:3355", "RHSA-2018:2949", "RHSA-2018:3090", "RHSA-2018:3221", "RHSA-2018:3505", "RHSA-2019:0366", "RHSA-2019:0367", "RHSA-2019:0910", "RHSA-2019:1456", "RHSA-2019:1711", "RHSA-2019:1712", "RHSA-2019:1822", "RHSA-2019:1823", "RHSA-2019:2091", "RHSA-2019:2587", "RHSA-2019:3023", "RHSA-2019:3024", "RHSA-2019:3140", "RHSA-2019:3222", "RHSA-2019:3892", "RHSA-2019:3901", "RHSA-2019:3932", "RHSA-2019:3933", "RHSA-2019:3935", "RHSA-2019:4192", "RHSA-2019:4317", "RHSA-2019:4352", "RHSA-2020:0057", "RHSA-2020:0122", "RHSA-2020:0128", "RHSA-2020:0157", "RHSA-2020:0159", "RHSA-2020:0160", "RHSA-2020:0161", "RHSA-2020:0164", "RHSA-2020:0194", "RHSA-2020:0196", "RHSA-2020:0202", "RHSA-2020:0231", "RHSA-2020:0232", "RHSA-2020:0445", "RHSA-2020:0465", "RHSA-2020:0467", "RHSA-2020:0468", "RHSA-2020:0469", "RHSA-2020:0470", "RHSA-2020:0541", "RHSA-2020:0573", "RHSA-2020:0579", "RHSA-2020:0593", "RHSA-2020:0597", "RHSA-2020:0598", "RHSA-2020:0602", "RHSA-2020:0632", "RHSA-2020:0703", "RHSA-2020:0707", "RHSA-2020:0708", "RHSA-2020:0727", "RHSA-2020:0804", "RHSA-2020:0805", "RHSA-2020:0806", "RHSA-2020:0811", "RHSA-2020:0856", "RHSA-2020:0895", "RHSA-2020:0899", "RHSA-2020:0939", "RHSA-2020:0951", "RHSA-2020:0961", "RHSA-2020:0962", "RHSA-2020:1264", "RHSA-2020:1308", "RHSA-2020:1325", "RHSA-2020:1422", "RHSA-2020:1454", "RHSA-2020:1510", "RHSA-2020:1538", "RHSA-2020:1644", "RHSA-2020:2067", "RHSA-2020:2217", "RHSA-2020:2321", "RHSA-2020:2333", "RHSA-2020:2362", "RHSA-2020:2412", "RHSA-2020:2483", "RHSA-2020:2487", "RHSA-2020:2506", "RHSA-2020:2509", "RHSA-2020:2511", "RHSA-2020:2512", "RHSA-2020:2513", "RHSA-2020:2515", "RHSA-2020:2529", "RHSA-2020:2530", "RHSA-2020:2605", "RHSA-2020:2618", "RHSA-2020:2619", "RHSA-2020:2663", "RHSA-2020:2740", "RHSA-2020:2751", "RHSA-2020:2813", "RHSA-2020:2847", "RHSA-2020:2848", "RHSA-2020:2849", "RHSA-2020:2852", "RHSA-2020:2895", "RHSA-2020:3017", "RHSA-2020:3042", "RHSA-2020:3084", "RHSA-2020:3133", "RHSA-2020:3192", "RHSA-2020:3196", "RHSA-2020:3197", "RHSA-2020:3247", "RHSA-2020:3303", "RHSA-2020:3305", "RHSA-2020:3306", "RHSA-2020:3308", "RHSA-2020:3369", "RHSA-2020:3382", "RHSA-2020:3383", "RHSA-2020:3461", "RHSA-2020:3462", "RHSA-2020:3463", "RHSA-2020:3464", "RHSA-2020:3501", "RHSA-2020:3578", "RHSA-2020:3585", "RHSA-2020:3587", "RHSA-2020:3626", "RHSA-2020:3637", "RHSA-2020:3638", "RHSA-2020:3639", "RHSA-2020:3642", "RHSA-2020:3730", "RHSA-2020:3731", "RHSA-2020:3779", "RHSA-2020:3806", "RHSA-2020:3807", "RHSA-2020:3936", "RHSA-2020:4004", "RHSA-2020:4154", "RHSA-2020:4173", "RHSA-2020:4211", "RHSA-2020:4252", "RHSA-2020:4264", "RHSA-2020:4298", "RHSA-2020:4312", "RHSA-2020:4366", "RHSA-2020:4379", "RHSA-2020:4401", "RHSA-2020:4402", "RHSA-2020:4670", "RHSA-2020:4847", "RHSA-2020:4960", "RHSA-2020:4961", "RHSA-2020:5168", "RHSA-2020:5174", "RHSA-2020:5175", "RHSA-2020:5179", "RHSA-2020:5249", "RHSA-2020:5254", "RHSA-2020:5302", "RHSA-2020:5305", "RHSA-2020:5340", "RHSA-2020:5341", "RHSA-2020:5342", "RHSA-2020:5344", "RHSA-2020:5361", "RHSA-2020:5364", "RHSA-2020:5365", "RHSA-2020:5388", "RHSA-2020:5410", "RHSA-2020:5412", "RHSA-2020:5422", "RHSA-2020:5476", "RHSA-2020:5493", "RHSA-2020:5499", "RHSA-2020:5533", "RHSA-2020:5566", "RHSA-2020:5568", "RHSA-2020:5581", "RHSA-2020:5588", "RHSA-2020:5611", "RHSA-2020:5614", "RHSA-2020:5623", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2020:5637", "RHSA-2020:5639", "RHSA-2020:5640", "RHSA-2020:5641", "RHSA-2020:5642", "RHSA-2021:0037", "RHSA-2021:0039", "RHSA-2021:0050", "RHSA-2021:0056", "RHSA-2021:0079", "RHSA-2021:0083", "RHSA-2021:0084", "RHSA-2021:0105", "RHSA-2021:0106", "RHSA-2021:0145", "RHSA-2021:0146", "RHSA-2021:0162", "RHSA-2021:0187", "RHSA-2021:0190", "RHSA-2021:0218", "RHSA-2021:0219", "RHSA-2021:0220", "RHSA-2021:0221", "RHSA-2021:0222", "RHSA-2021:0223", "RHSA-2021:0224", "RHSA-2021:0225", "RHSA-2021:0226", "RHSA-2021:0227", "RHSA-2021:0246", "RHSA-2021:0247", "RHSA-2021:0248", "RHSA-2021:0250", "RHSA-2021:0292", "RHSA-2021:0327", "RHSA-2021:0329", "RHSA-2021:0343", "RHSA-2021:0381", "RHSA-2021:0384", "RHSA-2021:0395", "RHSA-2021:0401", "RHSA-2021:0417", "RHSA-2021:0421", "RHSA-2021:0423", "RHSA-2021:0429", "RHSA-2021:0433", "RHSA-2021:0436", "RHSA-2021:0485", "RHSA-2021:0486", "RHSA-2021:0488", "RHSA-2021:0489", "RHSA-2021:0491", "RHSA-2021:0494", "RHSA-2021:0495", "RHSA-2021:0549", "RHSA-2021:0551", "RHSA-2021:0557", "RHSA-2021:0600", "RHSA-2021:0603", "RHSA-2021:0607", "RHSA-2021:0637", "RHSA-2021:0719", "RHSA-2021:0734", "RHSA-2021:0735", "RHSA-2021:0738", "RHSA-2021:0739", "RHSA-2021:0740", "RHSA-2021:0741", "RHSA-2021:0744", "RHSA-2021:0778", "RHSA-2021:0779", "RHSA-2021:0780", "RHSA-2021:0799", "RHSA-2021:0811", "RHSA-2021:0827", "RHSA-2021:0830", "RHSA-2021:0831", "RHSA-2021:0860", "RHSA-2021:0872", "RHSA-2021:0873", "RHSA-2021:0874", "RHSA-2021:0883", "RHSA-2021:0885", "RHSA-2021:0943", "RHSA-2021:0949", "RHSA-2021:0974", "RHSA-2021:0986", "RHSA-2021:1024", "RHSA-2021:1032", "RHSA-2021:1044", "RHSA-2021:1063", "RHSA-2021:1079", "RHSA-2021:1129", "RHSA-2021:1131", "RHSA-2021:1168", "RHSA-2021:1189", "RHSA-2021:1195", "RHSA-2021:1196", "RHSA-2021:1199", "RHSA-2021:1200", "RHSA-2021:1202", "RHSA-2021:1203", "RHSA-2021:1230", "RHSA-2021:1260", "RHSA-2021:1266", "RHSA-2021:1313", "RHSA-2021:1338", "RHSA-2021:1354", "RHSA-2021:1369", "RHSA-2021:1384", "RHSA-2021:1401", "RHSA-2021:1429", "RHSA-2021:1448", "RHSA-2021:1511", "RHSA-2021:1515", "RHSA-2021:1593", "RHSA-2021:1610", "RHSA-2021:1633", "RHSA-2021:1678", "RHSA-2021:1761", "RHSA-2021:1846", "RHSA-2021:1879", "RHSA-2021:1898", "RHSA-2021:2021", "RHSA-2021:2039", "RHSA-2021:2041", "RHSA-2021:2046", "RHSA-2021:2047", "RHSA-2021:2048", "RHSA-2021:2051", "RHSA-2021:2053", "RHSA-2021:2070", "RHSA-2021:2121", "RHSA-2021:2130", "RHSA-2021:2136", "RHSA-2021:2139", "RHSA-2021:2184", "RHSA-2021:2210", "RHSA-2021:2236", "RHSA-2021:2237", "RHSA-2021:2238", "RHSA-2021:2239", "RHSA-2021:2431", "RHSA-2021:2438", "RHSA-2021:2461", "RHSA-2021:2465", "RHSA-2021:2471", "RHSA-2021:2472", "RHSA-2021:2475", "RHSA-2021:2476", "RHSA-2021:2479", "RHSA-2021:2499", "RHSA-2021:2517", "RHSA-2021:2522", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:2555", "RHSA-2021:2561", "RHSA-2021:2562", "RHSA-2021:2575", "RHSA-2021:2689", "RHSA-2021:2692", "RHSA-2021:2693", "RHSA-2021:2694", "RHSA-2021:2696", "RHSA-2021:2705", "RHSA-2021:2755", "RHSA-2021:2774", "RHSA-2021:2775", "RHSA-2021:2776", "RHSA-2021:2777", "RHSA-2021:2778", "RHSA-2021:2779", "RHSA-2021:2780", "RHSA-2021:2781", "RHSA-2021:2782", "RHSA-2021:2783", "RHSA-2021:2784", "RHSA-2021:2792", "RHSA-2021:2845", "RHSA-2021:2865", "RHSA-2021:2920", "RHSA-2021:2965", "RHSA-2021:3016", "RHSA-2021:3024", "RHSA-2021:3119", "RHSA-2021:3140", "RHSA-2021:3205", "RHSA-2021:3207", "RHSA-2021:3225", "RHSA-2021:3229", "RHSA-2021:3252", "RHSA-2021:3254", "RHSA-2021:3259", "RHSA-2021:3292", "RHSA-2021:3293", "RHSA-2021:3361", "RHSA-2021:3425", "RHSA-2021:3556", "RHSA-2021:3572", "RHSA-2021:3590", "RHSA-2021:3656", "RHSA-2021:3658", "RHSA-2021:3660", "RHSA-2021:3700", "RHSA-2021:3748", "RHSA-2021:3798", "RHSA-2021:3811", "RHSA-2021:3873", "RHSA-2021:3880", "RHSA-2021:3917", "RHSA-2021:3925", "RHSA-2021:3949", "RHSA-2021:4012", "RHSA-2021:4032", "RHSA-2021:4089", "RHSA-2021:4100", "RHSA-2021:4104", "RHSA-2021:4142", "RHSA-2021:4151", "RHSA-2021:4160", "RHSA-2021:4162", "RHSA-2021:4198", "RHSA-2021:4251", "RHSA-2021:4424", "RHSA-2021:4511", "RHSA-2021:4613", "RHSA-2021:4614", "RHSA-2021:4626", "RHSA-2021:4627", "RHSA-2021:4702", "RHSA-2021:4725", "RHSA-2021:4767", "RHSA-2021:4845", "RHSA-2021:4848", "RHSA-2021:4861", "RHSA-2021:4863", "RHSA-2021:4902", "RHSA-2021:4914", "RHSA-2021:4918", "RHSA-2021:5038", "RHSA-2021:5127", "RHSA-2021:5128", "RHSA-2021:5129", "RHSA-2021:5134", "RHSA-2021:5137", "RHSA-2022:0056", "RHSA-2022:0190", "RHSA-2022:0202", "RHSA-2022:0318", "RHSA-2022:0434", "RHSA-2022:0580", "RHSA-2022:0721", "RHSA-2022:0722", "RHSA-2022:0727", "RHSA-2022:0728", "RHSA-2022:0842", "RHSA-2022:0856", "RHSA-2022:1007", "RHSA-2022:1010", "RHSA-2022:1013", "RHSA-2022:1029", "RHSA-2022:1081", "RHSA-2022:1108", "RHSA-2022:1110", "RHSA-2022:1179", "RHSA-2022:1345", "RHSA-2022:1354", "RHSA-2022:1396", "RHSA-2022:1556", "RHSA-2022:1557", "RHSA-2022:1860", "RHSA-2022:1861", "RHSA-2022:4818", "RHSA-2022:5235", "RHSA-2022:5458", "RHSA-2022:5459", "RHSA-2022:5460", "RHSA-2022:5498", "RHSA-2022:5532", "RHSA-2022:5606", "RHSA-2022:5924", "RHSA-2022:6252", "RHSA-2022:6271", "RHSA-2022:6393", "RHSA-2022:6407", "RHSA-2022:7343", "RHSA-2023:0552", "RHSA-2023:0553", "RHSA-2023:0554", "RHSA-2023:0556", "RHSA-2023:1043", "RHSA-2023:1044", "RHSA-2023:1045", "RHSA-2023:1047", "RHSA-2023:1049", "RHSA-2023:3954"]}, {"type": "redhatcve", "idList": ["RH:CVE-2016-4429", "RH:CVE-2017-12133", "RH:CVE-2017-16931", "RH:CVE-2017-3735", "RH:CVE-2017-5461", "RH:CVE-2017-5637", "RH:CVE-2017-7656", "RH:CVE-2017-7657", "RH:CVE-2017-7658", "RH:CVE-2017-9735", "RH:CVE-2018-0737", "RH:CVE-2018-0739", "RH:CVE-2018-15686", "RH:CVE-2018-21010", "RH:CVE-2018-7160", "RH:CVE-2018-7183", "RH:CVE-2019-0190", "RH:CVE-2019-0201", "RH:CVE-2019-0205", "RH:CVE-2019-0210", "RH:CVE-2019-0228", "RH:CVE-2019-10086", "RH:CVE-2019-10173", "RH:CVE-2019-10746", "RH:CVE-2019-11358", "RH:CVE-2019-12399", "RH:CVE-2019-12402", "RH:CVE-2019-12415", "RH:CVE-2019-12973", "RH:CVE-2019-13990", "RH:CVE-2019-15604", "RH:CVE-2019-15605", "RH:CVE-2019-15606", "RH:CVE-2019-16942", "RH:CVE-2019-16943", "RH:CVE-2019-17195", "RH:CVE-2019-17531", "RH:CVE-2019-17543", "RH:CVE-2019-17566", "RH:CVE-2019-20330", "RH:CVE-2019-5063", "RH:CVE-2019-5064", "RH:CVE-2020-10543", "RH:CVE-2020-10683", "RH:CVE-2020-10878", "RH:CVE-2020-11022", "RH:CVE-2020-11023", "RH:CVE-2020-11612", "RH:CVE-2020-11868", "RH:CVE-2020-11973", "RH:CVE-2020-11979", "RH:CVE-2020-11987", "RH:CVE-2020-11988", "RH:CVE-2020-12723", "RH:CVE-2020-13934", "RH:CVE-2020-13935", "RH:CVE-2020-13949", "RH:CVE-2020-13956", "RH:CVE-2020-14060", "RH:CVE-2020-14061", "RH:CVE-2020-14062", "RH:CVE-2020-14195", "RH:CVE-2020-14384", "RH:CVE-2020-15389", "RH:CVE-2020-17521", "RH:CVE-2020-17527", "RH:CVE-2020-17530", "RH:CVE-2020-1941", "RH:CVE-2020-1945", "RH:CVE-2020-1967", "RH:CVE-2020-1968", "RH:CVE-2020-1971", "RH:CVE-2020-24553", "RH:CVE-2020-24616", "RH:CVE-2020-24750", "RH:CVE-2020-25638", "RH:CVE-2020-25648", "RH:CVE-2020-25649", "RH:CVE-2020-2604", "RH:CVE-2020-26217", "RH:CVE-2020-27216", "RH:CVE-2020-27218", "RH:CVE-2020-27783", "RH:CVE-2020-27814", "RH:CVE-2020-27841", "RH:CVE-2020-27842", "RH:CVE-2020-27843", "RH:CVE-2020-27844", "RH:CVE-2020-27845", "RH:CVE-2020-28052", "RH:CVE-2020-28196", "RH:CVE-2020-29582", "RH:CVE-2020-35490", "RH:CVE-2020-35491", "RH:CVE-2020-35728", "RH:CVE-2020-36179", "RH:CVE-2020-36180", "RH:CVE-2020-36181", "RH:CVE-2020-36182", "RH:CVE-2020-36183", "RH:CVE-2020-36184", "RH:CVE-2020-36185", "RH:CVE-2020-36186", "RH:CVE-2020-36187", "RH:CVE-2020-36188", "RH:CVE-2020-36189", "RH:CVE-2020-36242", "RH:CVE-2020-5258", "RH:CVE-2020-5397", "RH:CVE-2020-5398", "RH:CVE-2020-5421", "RH:CVE-2020-7016", "RH:CVE-2020-7017", "RH:CVE-2020-7733", "RH:CVE-2020-7760", "RH:CVE-2020-8174", "RH:CVE-2020-8203", "RH:CVE-2020-8277", "RH:CVE-2020-8284", "RH:CVE-2020-8285", "RH:CVE-2020-8286", "RH:CVE-2020-8554", "RH:CVE-2020-8908", "RH:CVE-2020-9484", "RH:CVE-2020-9489", "RH:CVE-2021-20190", "RH:CVE-2021-20227", "RH:CVE-2021-21290", "RH:CVE-2021-21341", "RH:CVE-2021-21342", "RH:CVE-2021-21343", "RH:CVE-2021-21344", "RH:CVE-2021-21345", "RH:CVE-2021-21346", "RH:CVE-2021-21347", "RH:CVE-2021-21348", "RH:CVE-2021-21349", "RH:CVE-2021-21350", "RH:CVE-2021-21351", "RH:CVE-2021-21409", "RH:CVE-2021-22112", "RH:CVE-2021-22118", "RH:CVE-2021-22876", "RH:CVE-2021-22883", "RH:CVE-2021-22884", "RH:CVE-2021-22890", "RH:CVE-2021-22897", "RH:CVE-2021-22898", "RH:CVE-2021-22901", "RH:CVE-2021-22925", "RH:CVE-2021-23336", "RH:CVE-2021-2339", "RH:CVE-2021-2340", "RH:CVE-2021-2341", "RH:CVE-2021-2342", "RH:CVE-2021-2352", "RH:CVE-2021-2354", "RH:CVE-2021-2356", "RH:CVE-2021-2357", "RH:CVE-2021-2367", "RH:CVE-2021-2369", "RH:CVE-2021-2370", "RH:CVE-2021-2372", "RH:CVE-2021-2374", "RH:CVE-2021-2383", "RH:CVE-2021-23839", "RH:CVE-2021-2384", "RH:CVE-2021-23840", "RH:CVE-2021-23841", "RH:CVE-2021-2385", "RH:CVE-2021-2387", "RH:CVE-2021-2388", "RH:CVE-2021-2389", "RH:CVE-2021-2390", "RH:CVE-2021-2399", "RH:CVE-2021-2402", "RH:CVE-2021-2410", "RH:CVE-2021-2412", "RH:CVE-2021-24122", "RH:CVE-2021-2417", "RH:CVE-2021-2418", "RH:CVE-2021-2422", "RH:CVE-2021-2424", "RH:CVE-2021-2425", "RH:CVE-2021-2426", "RH:CVE-2021-2427", "RH:CVE-2021-2429", "RH:CVE-2021-2432", "RH:CVE-2021-2437", "RH:CVE-2021-2440", "RH:CVE-2021-2441", "RH:CVE-2021-2444", "RH:CVE-2021-25122", "RH:CVE-2021-25329", "RH:CVE-2021-26117", "RH:CVE-2021-26272", "RH:CVE-2021-27568", "RH:CVE-2021-27807", "RH:CVE-2021-27906", "RH:CVE-2021-28041", "RH:CVE-2021-29921", "RH:CVE-2021-30640", "RH:CVE-2021-3156", "RH:CVE-2021-3177", "RH:CVE-2021-31805", "RH:CVE-2021-31811", "RH:CVE-2021-33037", "RH:CVE-2021-3345", "RH:CVE-2021-3449", "RH:CVE-2021-3450", "RH:CVE-2021-3520", "RH:CVE-2021-3560", "RH:CVE-2022-0552", "RH:CVE-2022-23181", "RH:CVE-2022-24823", "RH:CVE-2022-32212"]}, {"type": "redos", "idList": ["ROS-20211223-06", "ROS-20220125-11"]}, {"type": "rocky", "idList": ["RLSA-2020:0579", "RLSA-2020:0598", "RLSA-2020:1644", "RLSA-2020:2848", "RLSA-2020:2852", "RLSA-2020:4670", "RLSA-2020:4847", "RLSA-2020:5499", "RLSA-2021:0549", "RLSA-2021:0551", "RLSA-2021:0734", "RLSA-2021:0735", "RLSA-2021:0744", "RLSA-2021:1024", "RLSA-2021:1593", "RLSA-2021:1610", "RLSA-2021:1678", "RLSA-2021:1761", "RLSA-2021:1846", "RLSA-2021:1879", "RLSA-2021:1898", "RLSA-2021:2238", "RLSA-2021:2575", "RLSA-2021:2776", "RLSA-2021:2781", "RLSA-2021:3572", "RLSA-2021:3590", "RLSA-2021:4142", "RLSA-2021:4151", "RLSA-2021:4160", "RLSA-2021:4162", "RLSA-2021:4198", "RLSA-2021:4251", "RLSA-2021:4424", "RLSA-2021:4511", "RLSA-2022:1556", "RLSA-2022:1557", "RLSA-2022:1860", "RLSA-2022:1861", "RLSA-2022:5498"]}, {"type": "rosalinux", "idList": ["ROSA-SA-2021-1957", "ROSA-SA-2021-1975", "ROSA-SA-2021-1988", "ROSA-SA-2023-2133", "ROSA-SA-2023-2203", "ROSA-SA-2023-2211"]}, {"type": "rustsec", "idList": ["RUSTSEC-2020-0015", "RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2021-0057", "RUSTSEC-2021-0058", "RUSTSEC-2022-0051"]}, {"type": "saint", "idList": ["SAINT:0FABA93E56CFEDDCAFAA28589FA1F1A2", "SAINT:3367EB0908CC68021EF65D9C41812230", "SAINT:37548F7E4861F75CE2B72672750C1CB3", "SAINT:50889C53D3A04E98F4F7E31365C75978", "SAINT:61E99B83D8C03F67350245D1B8BDC99C", "SAINT:880C926D2511DE57F08789A66AFE11F2", "SAINT:9870FA2AA27A04C7E50DC7E0A2A344D0", "SAINT:D1B88155F516D415CE4F67A190458DDB"]}, {"type": "securelist", "idList": ["SECURELIST:967D8B65D5D554FFB5B46411F654A78A"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:31772", "SECURITYVULNS:VULN:14297"]}, {"type": "seebug", "idList": ["SSV:99170", "SSV:99275", "SSV:99316"]}, {"type": "slackware", "idList": ["SSA-2018-087-01", "SSA-2018-226-01", "SSA-2019-022-01", "SSA-2020-344-01", "SSA-2021-026-01", "SSA-2021-090-01", "SSA-2021-146-01", "SSA-2021-158-02"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "sqlite", "idList": ["SQLT:CVE-2021-20227"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2016:3129-1", "OPENSUSE-SU-2016:3144-1", "OPENSUSE-SU-2017:1099-1", "OPENSUSE-SU-2018:1057-1", "OPENSUSE-SU-2018:2208-1", "OPENSUSE-SU-2018:2238-1", "OPENSUSE-SU-2018:2293-1", "OPENSUSE-SU-2018:2524-1", "OPENSUSE-SU-2018:2695-1", "OPENSUSE-SU-2018:2957-1", "OPENSUSE-SU-2018:3015-1", "OPENSUSE-SU-2018:3695-1", "OPENSUSE-SU-2018:3803-1", "OPENSUSE-SU-2019:0152-1", "OPENSUSE-SU-2019:1839-1", "OPENSUSE-SU-2019:1872-1", "OPENSUSE-SU-2019:2058-1", "OPENSUSE-SU-2019:2222-1", "OPENSUSE-SU-2019:2223-1", "OPENSUSE-SU-2019:2398-1", "OPENSUSE-SU-2019:2399-1", "OPENSUSE-SU-2019:2466-1", "OPENSUSE-SU-2020:0113-1", "OPENSUSE-SU-2020:0147-1", "OPENSUSE-SU-2020:0293-1", "OPENSUSE-SU-2020:0711-1", "OPENSUSE-SU-2020:0719-1", "OPENSUSE-SU-2020:0802-1", "OPENSUSE-SU-2020:0850-1", "OPENSUSE-SU-2020:0851-1", "OPENSUSE-SU-2020:0933-1", "OPENSUSE-SU-2020:0934-1", "OPENSUSE-SU-2020:0945-1", "OPENSUSE-SU-2020:1007-1", "OPENSUSE-SU-2020:1022-1", "OPENSUSE-SU-2020:1043-1", "OPENSUSE-SU-2020:1060-1", "OPENSUSE-SU-2020:1102-1", "OPENSUSE-SU-2020:1106-1", "OPENSUSE-SU-2020:1111-1", "OPENSUSE-SU-2020:1584-1", "OPENSUSE-SU-2020:1587-1", "OPENSUSE-SU-2020:1888-1", "OPENSUSE-SU-2020:2037-1", "OPENSUSE-SU-2020:2045-1", "OPENSUSE-SU-2020:2062-1", "OPENSUSE-SU-2020:2092-1", "OPENSUSE-SU-2020:2223-1", "OPENSUSE-SU-2020:2236-1", "OPENSUSE-SU-2020:2238-1", "OPENSUSE-SU-2020:2245-1", "OPENSUSE-SU-2020:2249-1", "OPENSUSE-SU-2020:2269-1", "OPENSUSE-SU-2020:2367-1", "OPENSUSE-SU-2021:0012-1", "OPENSUSE-SU-2021:0043-1", "OPENSUSE-SU-2021:0064-1", "OPENSUSE-SU-2021:0065-1", "OPENSUSE-SU-2021:0066-1", "OPENSUSE-SU-2021:0081-1", "OPENSUSE-SU-2021:0082-1", "OPENSUSE-SU-2021:0140-1", "OPENSUSE-SU-2021:0169-1", "OPENSUSE-SU-2021:0170-1", "OPENSUSE-SU-2021:0270-1", "OPENSUSE-SU-2021:0330-1", "OPENSUSE-SU-2021:0331-1", "OPENSUSE-SU-2021:0356-1", "OPENSUSE-SU-2021:0357-1", "OPENSUSE-SU-2021:0372-1", "OPENSUSE-SU-2021:0389-1", "OPENSUSE-SU-2021:0392-1", "OPENSUSE-SU-2021:0401-1", "OPENSUSE-SU-2021:0427-1", "OPENSUSE-SU-2021:0430-1", "OPENSUSE-SU-2021:0435-1", "OPENSUSE-SU-2021:0476-1", "OPENSUSE-SU-2021:0496-1", "OPENSUSE-SU-2021:0510-1", "OPENSUSE-SU-2021:0602-1", "OPENSUSE-SU-2021:0760-1", "OPENSUSE-SU-2021:0808-1", "OPENSUSE-SU-2021:0832-1", "OPENSUSE-SU-2021:0838-1", "OPENSUSE-SU-2021:1059-1", "OPENSUSE-SU-2021:1061-1", "OPENSUSE-SU-2021:1092-1", "OPENSUSE-SU-2021:1114-1", "OPENSUSE-SU-2021:1176-1", "OPENSUSE-SU-2021:1233-1", "OPENSUSE-SU-2021:1455-1", "OPENSUSE-SU-2021:1490-1", "OPENSUSE-SU-2021:1762-1", "OPENSUSE-SU-2021:1825-1", "OPENSUSE-SU-2021:1840-1", "OPENSUSE-SU-2021:1843-1", "OPENSUSE-SU-2021:2327-1", "OPENSUSE-SU-2021:2353-1", "OPENSUSE-SU-2021:2798-1", "OPENSUSE-SU-2021:2835-1", "OPENSUSE-SU-2021:2837-1", "OPENSUSE-SU-2021:2939-1", "OPENSUSE-SU-2021:2940-1", "OPENSUSE-SU-2021:2952-1", "OPENSUSE-SU-2021:3615-1", "OPENSUSE-SU-2021:3672-1", "OPENSUSE-SU-2021:4153-1", "OPENSUSE-SU-2022:0108-1", "OPENSUSE-SU-2022:0803-1", "SUSE-SU-2016:3079-1", "SUSE-SU-2016:3081-1", "SUSE-SU-2017:1175-1", "SUSE-SU-2017:1248-1", "SUSE-SU-2017:1568-1", "SUSE-SU-2017:1632-1", "SUSE-SU-2017:1660-1", "SUSE-SU-2017:1669-1", "SUSE-SU-2017:1701-1", "SUSE-SU-2017:2235-1", "SUSE-SU-2017:2699-1", "SUSE-SU-2017:2700-1", "SUSE-SU-2017:2968-1", "SUSE-SU-2017:2981-1", "SUSE-SU-2018:0112-1", "SUSE-SU-2018:0902-1", "SUSE-SU-2018:0905-1", "SUSE-SU-2018:0906-1", "SUSE-SU-2018:0975-1", "SUSE-SU-2022:1252-1", "SUSE-SU-2022:1271-1", "SUSE-SU-2022:1296-1", "SUSE-SU-2022:1315-1", "SUSE-SU-2022:1678-1", "SUSE-SU-2022:3802-1", "SUSE-SU-2022:3836-1"]}, {"type": "symantec", "idList": ["SMNTC-105656", "SMNTC-108023", "SMNTC-108822", "SMNTC-109915", "SMNTC-110517", "SMNTC-110539", "SMNTC-110540", "SMNTC-110969", "SMNTC-111028", "SMNTC-111283", "SMNTC-111480", "SMNTC-111482", "SMNTC-111546", "SMNTC-111564", "SMNTC-1405", "SMNTC-1423", "SMNTC-1443", "SMNTC-1451", "SMNTC-1462", "SMNTC-16056", "SMNTC-17570", "SMNTC-17650", "SMNTC-1768", "SMNTC-17849"]}, {"type": "talos", "idList": ["TALOS-2019-0852", "TALOS-2019-0853"]}, {"type": "talosblog", "idList": ["TALOSBLOG:309A8BCC0A7CD66A2777CFCCF3B46465", "TALOSBLOG:311242B8285F529AAB4833CDEBC9989C", "TALOSBLOG:7A681329F7813E49DED3E928ED08D453", "TALOSBLOG:E398382645C9465F51D4AC68FBE13C7B", "TALOSBLOG:E8F926D413AF8A060A5CA7289C0EAD20"]}, {"type": "tenable", "idList": ["TENABLE:50BE3CD37FC3509DDA43C11702778C75", "TENABLE:F29BAD72446123F9BCC7E3C50234FFF8", "TENABLE:FF52F52E6157E81F57A22D9356B954AC"]}, {"type": "thn", "idList": ["THN:110765F121B8FFAB197ACDBB4C117D2E", "THN:1ED1BB1B7B192353E154FB0B02F314F4", "THN:205C973376C6EB6419ADECED2ADA9A25", "THN:2B49FD6B1FE640C017C0531F850B4C11", "THN:2F8F4C57A4BFEE821BF1AB72DB36A273", "THN:3E9680853FA3A677106A8ED8B7AACBE6", "THN:4DE731C9D113C3993C96A773C079023F", "THN:515CD17353FD69BC2811599574546F0A", "THN:5A2336DDF5F519EE27D85DAAB3059B95", "THN:7D808DA5BB6D2A23EA6B46357E238546", "THN:7FD924637D99697D78D53283817508DA", "THN:AF0CBD71A7E1DCE8E508D374E0760687", "THN:C3BFE86E2BE38F28D9CEB17AD2C50EBD", "THN:D65992731CD4A3B443CD2E03761CE18B", "THN:F0450E1253FFE5CA527F039D3B3A72BD"]}, {"type": "threatpost", "idList": ["THREATPOST:042C17DFFA5D83F8091BA8DFCBFA8A8A", "THREATPOST:12E93CDF8BAC1B158CE1737E859FDD80", "THREATPOST:136544A8850662645EB54E79AAB40F75", "THREATPOST:15EF9F86D0EEBCD1CD450BF55954D1D2", "THREATPOST:27232AA8871910ACCF00E8FC6A9EDEA9", "THREATPOST:3A6A7F7256BF05AA048512CF2D064F7F", "THREATPOST:3E82813FD33FCC5937E06B9D667A547A", "THREATPOST:420EE567E806D93092741D7BB375AC57", "THREATPOST:4844442F117316BC8EEC54269FACDAA8", "THREATPOST:4DD624E32718A8990263A37199EEBD02", "THREATPOST:626313834C3B7D13BDDD703C425DACA5", "THREATPOST:760547BA8017A91CB7219FE7629E28B3", "THREATPOST:C408DF21547B7B4327FBAB82B97A4C96", "THREATPOST:E415CA5BCD7AC520A44AB5246664528A", "THREATPOST:F8F0749C57FDD3CABE842BDFEAD33452"]}, {"type": "tomcat", "idList": ["TOMCAT:0272BA84012892D369AEA1B59399E0A5", "TOMCAT:05A191E24B2303184CA1970729C00C81", "TOMCAT:134FFF2A5E889835054EC92E557C984D", "TOMCAT:297A2EAE99263A165E24C66156B7872A", "TOMCAT:324E50A03961FCE2265C4097A2D9383A", "TOMCAT:3535F2AFC77921EE4AD662129D83A68D", "TOMCAT:36341E62C29FA8D208E5019D7D60DFC8", "TOMCAT:38E1DC5950ADDBB8A055F354B172C65E", "TOMCAT:3BE7322A30732B9FCCD5C138E261173F", "TOMCAT:45B79B8310F1BFC7F37B086A2FAD7202", "TOMCAT:47B91042927062AB4C945C176AD09B02", "TOMCAT:6C657C163FFE0205CE2090ED59CA418E", "TOMCAT:72A659F35396F865D9A18EB5614CF486", "TOMCAT:75BDD1762995663D2613C2EC3D1F16DD", "TOMCAT:790F7EF00EBD814D5B55BBA9ADFAB91D", "TOMCAT:8423D2ED2F8751548B2F3411FE07D05F", "TOMCAT:8A2C262DE6E0BAC59E53AD562A9743FE", "TOMCAT:937E284FF802C2D5A6E9C8A59AB6C822", "TOMCAT:9B658D22C08634C8C17F1EFEE3366D4D", "TOMCAT:A01991EC43D0F6A28E9CB4553C6B4670", "TOMCAT:A0B0592E070D3A4A393867C40FBB81D8", "TOMCAT:AAAFF92A877D76F23F91AFEA545747C7", "TOMCAT:AD0486867C1A6A6A3190FBD12362991E", "TOMCAT:B7EB6B23524A2491A4E8200F0D520A47", "TOMCAT:BAAFFB46A35FA23A4961B3B00F383DC9", "TOMCAT:BD106E970B6D4964B80C5CC3715C6DD2", "TOMCAT:C3F367059A3E9B8636ED41FF901D93F9", "TOMCAT:C5537152452B543D3F3B9565BB62CA70", "TOMCAT:C878975BAAD7823EE793B63FC6053125", "TOMCAT:DB1F1FE6D60B303FBCEB1A98F0CAE318", "TOMCAT:E76617B2A121AAAE8F7420BCA50A252C", "TOMCAT:EB4C199992CB1582B3ABCDFAD324BF0F"]}, {"type": "trellix", "idList": ["TRELLIX:39F5630F37B0A70500113404A73FE414"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:1FEAB54A2EB3929007298481113A7219", "TRENDMICROBLOG:95887FEB5A63B08E103EC931F4C1ED08", "TRENDMICROBLOG:99C513629DD4D60C7FD34F2B784F534A"]}, {"type": "typo3", "idList": ["TYPO3-EXT-SA-2020-015", "TYPO3-PSA-2019-004"]}, {"type": "ubuntu", "idList": ["USN-2551-1", "USN-3177-1", "USN-3177-2", "USN-3239-1", "USN-3239-2", "USN-3239-3", "USN-3260-1", "USN-3260-2", "USN-3270-1", "USN-3278-1", "USN-3372-1", "USN-3475-1", "USN-3611-1", "USN-3611-2", "USN-3628-1", "USN-3628-2", "USN-3692-1", "USN-3692-2", "USN-3707-1", "USN-3707-2", "USN-3759-1", "USN-3759-2", "USN-3816-1", "USN-3816-2", "USN-3816-3", "USN-4257-1", "USN-4380-1", "USN-4448-1", "USN-4497-1", "USN-4504-1", "USN-4557-1", "USN-4575-1", "USN-4596-1", "USN-4600-2", "USN-4602-1", "USN-4602-2", "USN-4635-1", "USN-4638-1", "USN-4662-1", "USN-4665-1", "USN-4665-2", "USN-4666-1", "USN-4666-2", "USN-4685-1", "USN-4686-1", "USN-4705-1", "USN-4705-2", "USN-4714-1", "USN-4732-1", "USN-4738-1", "USN-4742-1", "USN-4745-1", "USN-4754-1", "USN-4754-2", "USN-4754-3", "USN-4754-4", "USN-4754-5", "USN-4758-1", "USN-4762-1", "USN-4766-1", "USN-4782-1", "USN-4789-1", "USN-4796-1", "USN-4813-1", "USN-4874-1", "USN-4880-1", "USN-4891-1", "USN-4898-1", "USN-4903-1", "USN-4943-1", "USN-4968-1", "USN-4968-2", "USN-4973-1", "USN-4973-2", "USN-4980-1", "USN-5021-1", "USN-5021-2", "USN-5022-1", "USN-5022-2", "USN-5022-3", "USN-5038-1", "USN-5088-1", "USN-5202-1", "USN-5239-1", "USN-5360-1", "USN-5410-1", "USN-5894-1", "USN-5952-1", "USN-5990-1", "USN-6049-1", "USN-6117-1", "USN-6380-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2012-0881", "UB:CVE-2015-0254", "UB:CVE-2016-0762", "UB:CVE-2016-4429", "UB:CVE-2017-12133", "UB:CVE-2017-16931", "UB:CVE-2017-3735", "UB:CVE-2017-5461", "UB:CVE-2017-5637", "UB:CVE-2017-7656", "UB:CVE-2017-7657", "UB:CVE-2017-7658", "UB:CVE-2017-9735", "UB:CVE-2018-0737", "UB:CVE-2018-0739", "UB:CVE-2018-15686", "UB:CVE-2018-21010", "UB:CVE-2018-7160", "UB:CVE-2018-7183", "UB:CVE-2019-0190", "UB:CVE-2019-0201", "UB:CVE-2019-0205", "UB:CVE-2019-0210", "UB:CVE-2019-0228", "UB:CVE-2019-10086", "UB:CVE-2019-10173", "UB:CVE-2019-10746", "UB:CVE-2019-11358", "UB:CVE-2019-12402", "UB:CVE-2019-12415", "UB:CVE-2019-12973", "UB:CVE-2019-13990", "UB:CVE-2019-15604", "UB:CVE-2019-15605", "UB:CVE-2019-15606", "UB:CVE-2019-16942", "UB:CVE-2019-16943", "UB:CVE-2019-17531", "UB:CVE-2019-17543", "UB:CVE-2019-17545", "UB:CVE-2019-17566", "UB:CVE-2019-20330", "UB:CVE-2019-5063", "UB:CVE-2019-5064", "UB:CVE-2020-10543", "UB:CVE-2020-10683", "UB:CVE-2020-10878", "UB:CVE-2020-11022", "UB:CVE-2020-11023", "UB:CVE-2020-11612", "UB:CVE-2020-11868", "UB:CVE-2020-11979", "UB:CVE-2020-11987", "UB:CVE-2020-11988", "UB:CVE-2020-11998", "UB:CVE-2020-12723", "UB:CVE-2020-13934", "UB:CVE-2020-13935", "UB:CVE-2020-13949", "UB:CVE-2020-13956", "UB:CVE-2020-14060", "UB:CVE-2020-14061", "UB:CVE-2020-14062", "UB:CVE-2020-14195", "UB:CVE-2020-15389", "UB:CVE-2020-17521", "UB:CVE-2020-17527", "UB:CVE-2020-17530", "UB:CVE-2020-1941", "UB:CVE-2020-1945", "UB:CVE-2020-1967", "UB:CVE-2020-1968", "UB:CVE-2020-1971", "UB:CVE-2020-23064", "UB:CVE-2020-24553", "UB:CVE-2020-24616", "UB:CVE-2020-24750", "UB:CVE-2020-25638", "UB:CVE-2020-25648", "UB:CVE-2020-25649", "UB:CVE-2020-2604", "UB:CVE-2020-26217", "UB:CVE-2020-26870", "UB:CVE-2020-27216", "UB:CVE-2020-27218", "UB:CVE-2020-27783", "UB:CVE-2020-27814", "UB:CVE-2020-27841", "UB:CVE-2020-27842", "UB:CVE-2020-27843", "UB:CVE-2020-27844", "UB:CVE-2020-27845", "UB:CVE-2020-28052", "UB:CVE-2020-28196", "UB:CVE-2020-28928", "UB:CVE-2020-29582", "UB:CVE-2020-35490", "UB:CVE-2020-35491", "UB:CVE-2020-35728", "UB:CVE-2020-36179", "UB:CVE-2020-36180", "UB:CVE-2020-36181", "UB:CVE-2020-36182", "UB:CVE-2020-36183", "UB:CVE-2020-36184", "UB:CVE-2020-36185", "UB:CVE-2020-36186", "UB:CVE-2020-36187", "UB:CVE-2020-36188", "UB:CVE-2020-36189", "UB:CVE-2020-5258", "UB:CVE-2020-5397", "UB:CVE-2020-5398", "UB:CVE-2020-5421", "UB:CVE-2020-7733", "UB:CVE-2020-7760", "UB:CVE-2020-8174", "UB:CVE-2020-8203", "UB:CVE-2020-8277", "UB:CVE-2020-8284", "UB:CVE-2020-8285", "UB:CVE-2020-8286", "UB:CVE-2020-8554", "UB:CVE-2020-8908", "UB:CVE-2020-9484", "UB:CVE-2020-9489", "UB:CVE-2021-20190", "UB:CVE-2021-20227", "UB:CVE-2021-21290", "UB:CVE-2021-21341", "UB:CVE-2021-21342", "UB:CVE-2021-21343", "UB:CVE-2021-21344", "UB:CVE-2021-21345", "UB:CVE-2021-21346", "UB:CVE-2021-21347", "UB:CVE-2021-21348", "UB:CVE-2021-21349", "UB:CVE-2021-21350", "UB:CVE-2021-21351", "UB:CVE-2021-21409", "UB:CVE-2021-22118", "UB:CVE-2021-22876", "UB:CVE-2021-22883", "UB:CVE-2021-22884", "UB:CVE-2021-22890", "UB:CVE-2021-22897", "UB:CVE-2021-22898", "UB:CVE-2021-22901", "UB:CVE-2021-22925", "UB:CVE-2021-23336", "UB:CVE-2021-2339", "UB:CVE-2021-2340", "UB:CVE-2021-2341", "UB:CVE-2021-2342", "UB:CVE-2021-2352", "UB:CVE-2021-2354", "UB:CVE-2021-2356", "UB:CVE-2021-2357", "UB:CVE-2021-2367", "UB:CVE-2021-2369", "UB:CVE-2021-2370", "UB:CVE-2021-2372", "UB:CVE-2021-2374", "UB:CVE-2021-2383", "UB:CVE-2021-23839", "UB:CVE-2021-2384", "UB:CVE-2021-23840", "UB:CVE-2021-23841", "UB:CVE-2021-2385", "UB:CVE-2021-2387", "UB:CVE-2021-2388", "UB:CVE-2021-2389", "UB:CVE-2021-2390", "UB:CVE-2021-2399", "UB:CVE-2021-2402", "UB:CVE-2021-2409", "UB:CVE-2021-2410", "UB:CVE-2021-2412", "UB:CVE-2021-24122", "UB:CVE-2021-2417", "UB:CVE-2021-2418", "UB:CVE-2021-2422", "UB:CVE-2021-2424", "UB:CVE-2021-2425", "UB:CVE-2021-2426", "UB:CVE-2021-2427", "UB:CVE-2021-2429", "UB:CVE-2021-2432", "UB:CVE-2021-2437", "UB:CVE-2021-2440", "UB:CVE-2021-2441", "UB:CVE-2021-2442", "UB:CVE-2021-2443", "UB:CVE-2021-2444", "UB:CVE-2021-2454", "UB:CVE-2021-25122", "UB:CVE-2021-25329", "UB:CVE-2021-26117", "UB:CVE-2021-26271", "UB:CVE-2021-26272", "UB:CVE-2021-27807", "UB:CVE-2021-27906", "UB:CVE-2021-28041", "UB:CVE-2021-29921", "UB:CVE-2021-30640", "UB:CVE-2021-3156", "UB:CVE-2021-3177", "UB:CVE-2021-31805", "UB:CVE-2021-31811", "UB:CVE-2021-33037", "UB:CVE-2021-3345", "UB:CVE-2021-33571", "UB:CVE-2021-3449", "UB:CVE-2021-3450", "UB:CVE-2021-3520", "UB:CVE-2021-3560", "UB:CVE-2021-38193", "UB:CVE-2021-40491", "UB:CVE-2022-23181", "UB:CVE-2022-24823"]}, {"type": "veracode", "idList": ["VERACODE:11921", "VERACODE:12348", "VERACODE:12415", "VERACODE:13161", "VERACODE:13637", "VERACODE:13659", "VERACODE:19894", "VERACODE:19895", "VERACODE:19899", "VERACODE:20316", "VERACODE:20566", "VERACODE:20878", "VERACODE:21314", "VERACODE:21389", "VERACODE:21602", "VERACODE:21603", "VERACODE:21692", "VERACODE:21707", "VERACODE:21775", "VERACODE:21791", "VERACODE:22052", "VERACODE:22246", "VERACODE:22253", "VERACODE:22272", "VERACODE:22296", "VERACODE:22309", "VERACODE:22312", "VERACODE:22313", "VERACODE:22474", "VERACODE:22477", "VERACODE:22479", "VERACODE:22529", "VERACODE:22667", "VERACODE:22967", "VERACODE:25055", "VERACODE:25075", "VERACODE:25079", "VERACODE:25140", "VERACODE:25141", "VERACODE:25275", "VERACODE:25438", "VERACODE:25439", "VERACODE:25441", "VERACODE:25469", "VERACODE:25519", "VERACODE:25679", "VERACODE:25680", "VERACODE:25681", "VERACODE:25693", "VERACODE:25696", "VERACODE:25749", "VERACODE:25877", "VERACODE:25888", "VERACODE:25889", "VERACODE:25945", "VERACODE:25967", "VERACODE:25970", "VERACODE:26076", "VERACODE:26179", "VERACODE:26180", "VERACODE:26238", "VERACODE:26245", "VERACODE:26493", "VERACODE:26514", "VERACODE:26602", "VERACODE:26731", "VERACODE:26747", "VERACODE:26764", "VERACODE:26773", "VERACODE:26775", "VERACODE:26776", "VERACODE:26780", "VERACODE:26795", "VERACODE:27516", "VERACODE:27547", "VERACODE:27558", "VERACODE:27584", "VERACODE:27671", "VERACODE:27672", "VERACODE:27726", "VERACODE:27884", "VERACODE:27911", "VERACODE:27938", "VERACODE:27978", "VERACODE:27979", "VERACODE:28001", "VERACODE:28030", "VERACODE:28041", "VERACODE:28046", "VERACODE:28055", "VERACODE:28516", "VERACODE:28524", "VERACODE:28525", "VERACODE:28566", "VERACODE:28567", "VERACODE:28570", "VERACODE:28632", "VERACODE:28637", "VERACODE:28807", "VERACODE:28823", "VERACODE:28909", "VERACODE:28915", "VERACODE:28916", "VERACODE:28917", "VERACODE:28920", "VERACODE:28931", "VERACODE:28932", "VERACODE:28933", "VERACODE:28934", "VERACODE:28935", "VERACODE:28936", "VERACODE:28938", "VERACODE:28939", "VERACODE:28940", "VERACODE:28941", "VERACODE:28942", "VERACODE:29014", "VERACODE:29076", "VERACODE:29098", "VERACODE:29105", "VERACODE:29144", "VERACODE:29148", "VERACODE:29151", "VERACODE:29173", "VERACODE:29283", "VERACODE:29314", "VERACODE:29417", "VERACODE:29418", "VERACODE:29419", "VERACODE:29449", "VERACODE:29475", "VERACODE:29476", "VERACODE:29490", "VERACODE:29512", "VERACODE:29537", "VERACODE:29541", "VERACODE:29554", "VERACODE:29683", "VERACODE:29689", "VERACODE:29698", "VERACODE:29700", "VERACODE:29743", "VERACODE:29772", "VERACODE:29784", "VERACODE:29785", "VERACODE:29787", "VERACODE:29788", "VERACODE:29789", "VERACODE:29790", "VERACODE:29793", "VERACODE:29814", "VERACODE:29816", "VERACODE:29818", "VERACODE:29835", "VERACODE:29836", "VERACODE:29839", "VERACODE:29869", "VERACODE:29876", "VERACODE:29877", "VERACODE:29909", "VERACODE:30389", "VERACODE:30649", "VERACODE:30708", "VERACODE:30715", "VERACODE:30717", "VERACODE:30804", "VERACODE:30955", "VERACODE:30958", "VERACODE:31185", "VERACODE:31289", "VERACODE:31346", "VERACODE:31347", "VERACODE:31348", "VERACODE:31434", "VERACODE:31438", "VERACODE:31439", "VERACODE:31440", "VERACODE:31441", "VERACODE:31536", "VERACODE:31537", "VERACODE:32118", "VERACODE:32616", "VERACODE:32617", "VERACODE:32618", "VERACODE:32619", "VERACODE:32620", "VERACODE:32621", "VERACODE:32622", "VERACODE:32623", "VERACODE:32624", "VERACODE:32625", "VERACODE:32626", "VERACODE:32627", "VERACODE:32628", "VERACODE:32629", "VERACODE:32630", "VERACODE:32631", "VERACODE:32632", "VERACODE:32633", "VERACODE:32634", "VERACODE:32635", "VERACODE:32636", "VERACODE:32637", "VERACODE:32638", "VERACODE:32639", "VERACODE:32640", "VERACODE:32641", "VERACODE:32642", "VERACODE:32643", "VERACODE:32644", "VERACODE:32645", "VERACODE:32646", "VERACODE:32735", "VERACODE:35070", "VERACODE:35443", "VERACODE:3584", "VERACODE:4247", "VERACODE:4973", "VERACODE:5352", "VERACODE:5414", "VERACODE:5482", "VERACODE:6024", "VERACODE:6124", "VERACODE:6262", "VERACODE:6849", "VERACODE:6851", "VERACODE:7108", "VERACODE:7652"]}, {"type": "virtuozzo", "idList": ["VZA-2021-004", "VZA-2021-005"]}, {"type": "zdi", "idList": ["ZDI-20-128", "ZDI-21-452", "ZDI-21-880", "ZDI-21-881", "ZDI-21-882", "ZDI-21-883", "ZDI-21-884", "ZDI-21-885", "ZDI-21-886", "ZDI-21-887", "ZDI-21-888", "ZDI-21-889"]}, {"type": "zdt", "idList": ["1337DAY-ID-31439", "1337DAY-ID-31457", "1337DAY-ID-32626", "1337DAY-ID-32663", "1337DAY-ID-33787", "1337DAY-ID-34184", "1337DAY-ID-34235", "1337DAY-ID-34468", "1337DAY-ID-35571", "1337DAY-ID-35741", "1337DAY-ID-35772", "1337DAY-ID-35779", "1337DAY-ID-35785", "1337DAY-ID-36102", "1337DAY-ID-36103", "1337DAY-ID-36421", "1337DAY-ID-36544", "1337DAY-ID-37132", "1337DAY-ID-37133"]}]}, "score": {"value": 7.7, "vector": "NONE"}, "backreferences": {"references": [{"type": "0daydb", "idList": ["0DAYDB:7673EE0281A214ED87D52BA25B8C65BA", "0DAYDB:AF426AEE507511B61499B493AB5C0D11", "0DAYDB:C05243B3F6EF6FD2D281FAA1565DB0D6"]}, {"type": "aix", "idList": ["JAVA_FEB2022_ADVISORY.ASC", "OPENSSL_ADVISORY24.ASC", "OPENSSL_ADVISORY32.ASC"]}, {"type": "almalinux", "idList": ["ALSA-2020:0579", "ALSA-2020:2848", "ALSA-2020:4670", "ALSA-2020:5476", "ALSA-2020:5493", "ALSA-2021:0218", "ALSA-2021:0549", "ALSA-2021:0551", "ALSA-2021:0557", "ALSA-2021:0734", "ALSA-2021:0735", "ALSA-2021:0744", "ALSA-2021:1024", "ALSA-2021:1593", "ALSA-2021:1610", "ALSA-2021:1633", "ALSA-2021:1678", "ALSA-2021:1761", "ALSA-2021:1846", "ALSA-2021:1879", "ALSA-2021:2238", "ALSA-2021:2776", "ALSA-2021:2781", "ALSA-2021:3590"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2021-20227", "ALPINE:CVE-2021-28041"]}, {"type": "amazon", "idList": ["ALAS-2017-825", "ALAS-2018-1000", "ALAS-2018-1065", "ALAS-2018-1069", "ALAS-2018-1070", "ALAS-2020-1359", "ALAS-2020-1445", "ALAS-2021-1473", "ALAS-2021-1478", "ALAS2-2018-1102", "ALAS2-2020-1387", "ALAS2-2020-1395", "ALAS2-2020-1396", "ALAS2-2020-1403", "ALAS2-2020-1417", "ALAS2-2020-1449", "ALAS2-2020-1455", "ALAS2-2020-1519", "ALAS2-2020-1554", "ALAS2-2021-1590", "ALAS2-2021-1593", "ALAS2-2021-1626", "ALAS2-2021-1647", "ALAS2-2021-1653", "ALAS2-2021-1664", "ALAS2-2021-1666", "ALAS2-2021-1692"]}, {"type": "android", "idList": ["ANDROID:CVE-2016-4429"]}, {"type": "androidsecurity", "idList": ["ANDROID:2017-12-01"]}, {"type": "apple", "idList": ["APPLE:2A32C0762786DF36357D645066CDC600", "APPLE:3D7765FAAA5588336144E1B60D0B775E", "APPLE:B7AA5B9368DE4BD135A602B017EB0259", "APPLE:BEC13883FC65A6FD008F312DB93C0A36", "APPLE:F7DADB3E958148A6B63512580383CEA2", "APPLE:HT208331"]}, {"type": "archlinux", "idList": ["ASA-201606-16", "ASA-201606-17", "ASA-202011-18", "ASA-202011-29", "ASA-202101-25", "ASA-202101-45", "ASA-202106-24", "ASA-202107-52", "ASA-202107-53", "ASA-202107-54", "ASA-202107-59", "ASA-202107-60", "ASA-202107-61", "ASA-202107-62", "ASA-202107-63", "ASA-202107-64", "ASA-202107-65", "ASA-202107-66"]}, {"type": "atlassian", "idList": ["ATLASSIAN:BSERV-11753", "ATLASSIAN:CRUC-8408", "ATLASSIAN:CRUC-8410", "ATLASSIAN:CWD-5683", "ATLASSIAN:FE-7196", "ATLASSIAN:FE-7202", "ATLASSIAN:JRASERVER-70929", "ATLASSIAN:JRASERVER-72052", "ATLASSIAN:JRASERVER-72609", "JRASERVER-73223"]}, {"type": "attackerkb", "idList": ["AKB:255908B4-BA2B-4575-84E5-63690A0110AE", "AKB:2941EA77-EC87-4EFE-8B5C-AD997AEB5502", "AKB:38F76C83-56D0-4112-A583-4513CC15B1B3", "AKB:67AA97AC-E920-4D0C-9B50-6B1C42E683D1", "AKB:9B4E2AEC-697D-42F0-9FED-B010FB1F82ED", "AKB:A4BDBFB9-4493-4EF5-8C05-276721F6549F"]}, {"type": "avleonov", "idList": ["AVLEONOV:101A90D5F21CD7ACE01781C2913D1B6D"]}, {"type": "centos", "idList": ["CESA-2017:1100", "CESA-2019:2091", "CESA-2020:0122", "CESA-2020:0157", "CESA-2020:0194", "CESA-2020:0196", "CESA-2020:2663", "CESA-2021:0162", "CESA-2021:0221", "CESA-2021:0343", "CESA-2021:1354", "CESA-2021:2784"]}, {"type": "cert", "idList": ["VU:794544"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2017-0740", "CPAI-2019-0268", "CPAI-2019-0546", "CPAI-2019-0561", "CPAI-2019-0786", "CPAI-2019-1870", "CPAI-2020-0179", "CPAI-2020-0407", "CPAI-2020-0416", "CPAI-2020-1183", "CPAI-2020-1284", "CPAI-2020-1285", "CPAI-2020-1331", "CPAI-2020-1346", "CPAI-2020-3205", "CPAI-2020-3297"]}, {"type": "checkpoint_security", "idList": ["CPS:SK171751", "CPS:SK172983"]}, {"type": "chrome", "idList": ["GCSA-3803715665928870837"]}, {"type": "cisa", "idList": ["CISA:458CA29A7DFCD2DEAB1DE7A9587A5EE6", "CISA:6D325600F427E8426F81E5829305E20F", "CISA:765265E5BF9328E9BAF09F93A1684580", "CISA:7E752ED3C4545FF8F72629B02D303E84", "CISA:D18A1F7A4028BFC8CA059218F16ECBFD"]}, {"type": "cisco", "idList": ["CISCO-SA-SUDO-PRIVESC-JAN2021-QNYQFCM"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:6AAA637C3916EA2A44D93B95BEA9728B", "CFOUNDRY:9243E8457D02CBA7A3505CB1E0E03739", "CFOUNDRY:BCFE0333C3F2E89FFDF11615D117C9AF", "CFOUNDRY:D09A12445CD6214C067F9255280BC24D", "CFOUNDRY:DBBC716FD85510861511BDE10DD24963", "CFOUNDRY:DC7BE5C08671B54CC5F39351987D8CA3"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1608724009", "CLSA-2020:1608724134", "CLSA-2021:1611743864"]}, {"type": "cve", "idList": ["CVE-2014-0107", "CVE-2016-4429", "CVE-2017-5461", "CVE-2017-5637", "CVE-2018-0739", "CVE-2018-15756", "CVE-2018-21010", "CVE-2018-7160", "CVE-2019-0190", "CVE-2019-0201", "CVE-2019-0219", "CVE-2019-0228", "CVE-2019-10086", "CVE-2019-10173", "CVE-2019-10746", "CVE-2019-11358", "CVE-2019-12260", "CVE-2019-12399", "CVE-2019-12402", "CVE-2019-12973", "CVE-2019-13990", "CVE-2019-15604", "CVE-2019-15605", "CVE-2019-15606", "CVE-2019-17566", "CVE-2019-20330", "CVE-2019-2725", "CVE-2019-2729", "CVE-2019-3773", "CVE-2019-5063", "CVE-2019-5064", "CVE-2020-10683", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11612", "CVE-2020-11868", "CVE-2020-13956", "CVE-2020-14756", "CVE-2020-1967", "CVE-2020-2555", "CVE-2020-25638", "CVE-2020-2604", "CVE-2020-26217", "CVE-2020-27193", "CVE-2020-27218", "CVE-2020-27814", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28928", "CVE-2020-29582", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-5397", "CVE-2020-5398", "CVE-2020-7733", "CVE-2020-8277", "CVE-2020-8554", "CVE-2020-9489", "CVE-2021-20190", "CVE-2021-21275", "CVE-2021-2244", "CVE-2021-22897", "CVE-2021-22898", "CVE-2021-22901", "CVE-2021-2323", "CVE-2021-2324", "CVE-2021-2326", "CVE-2021-2328", "CVE-2021-2329", "CVE-2021-2330", "CVE-2021-2333", "CVE-2021-2334", "CVE-2021-2335", "CVE-2021-2336", "CVE-2021-2337", "CVE-2021-2338", "CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2341", "CVE-2021-2342", "CVE-2021-2343", "CVE-2021-2344", "CVE-2021-2345", "CVE-2021-2346", "CVE-2021-2347", "CVE-2021-2348", "CVE-2021-2349", "CVE-2021-2350", "CVE-2021-2351", "CVE-2021-2352", "CVE-2021-2353", "CVE-2021-2354", "CVE-2021-2355", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2358", "CVE-2021-2359", "CVE-2021-2360", "CVE-2021-2361", "CVE-2021-2362", "CVE-2021-2363", "CVE-2021-2364", "CVE-2021-2365", "CVE-2021-2366", "CVE-2021-2367", "CVE-2021-2368", "CVE-2021-2369", "CVE-2021-2370", "CVE-2021-2371", "CVE-2021-2372", "CVE-2021-2373", "CVE-2021-2374", "CVE-2021-2375", "CVE-2021-2376", "CVE-2021-2377", "CVE-2021-2378", "CVE-2021-2380", "CVE-2021-2381", "CVE-2021-2382", "CVE-2021-2383", "CVE-2021-2384", "CVE-2021-2385", "CVE-2021-2386", "CVE-2021-2387", "CVE-2021-2388", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2391", "CVE-2021-2392", "CVE-2021-2393", "CVE-2021-2394", "CVE-2021-2395", "CVE-2021-2396", "CVE-2021-2397", "CVE-2021-2398", "CVE-2021-2399", "CVE-2021-2400", "CVE-2021-2401", "CVE-2021-2402", "CVE-2021-2403", "CVE-2021-2404", "CVE-2021-2405", "CVE-2021-2406", "CVE-2021-2407", "CVE-2021-2408", "CVE-2021-2409", "CVE-2021-2410", "CVE-2021-2411", "CVE-2021-2412", "CVE-2021-24122", "CVE-2021-2415", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2419", "CVE-2021-2420", "CVE-2021-2421", "CVE-2021-2422", "CVE-2021-2423", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2428", "CVE-2021-2429", "CVE-2021-2430", "CVE-2021-2431", "CVE-2021-2432", "CVE-2021-2433", "CVE-2021-2434", "CVE-2021-2435", "CVE-2021-2436", "CVE-2021-2437", "CVE-2021-2438", "CVE-2021-2439", "CVE-2021-2440", "CVE-2021-2441", "CVE-2021-2442", "CVE-2021-2443", "CVE-2021-2444", "CVE-2021-2445", "CVE-2021-2446", "CVE-2021-2447", "CVE-2021-2448", "CVE-2021-2449", "CVE-2021-2450", "CVE-2021-2451", "CVE-2021-2452", "CVE-2021-2453", "CVE-2021-2454", "CVE-2021-2455", "CVE-2021-2456", "CVE-2021-2457", "CVE-2021-2458", "CVE-2021-2460", "CVE-2021-2462", "CVE-2021-2463", "CVE-2021-26117", "CVE-2021-26271", "CVE-2021-26272", "CVE-2021-30369", "CVE-2021-3156", "CVE-2021-3177", "CVE-2021-31811", "CVE-2021-3345"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1020-1:153AB", "DEBIAN:DLA-1020-1:D77C3", "DEBIAN:DLA-1021-1:3F138", "DEBIAN:DLA-1021-1:8BAEA", "DEBIAN:DLA-1157-1:16CF2", "DEBIAN:DLA-1157-1:FA549", "DEBIAN:DLA-1194-1:E9867", "DEBIAN:DLA-1330-1:A6756", "DEBIAN:DLA-1449-1:6B9AF", "DEBIAN:DLA-1449-1:EF247", "DEBIAN:DLA-1777-1:55799", "DEBIAN:DLA-1797-1:1A7B8", "DEBIAN:DLA-1797-1:A2877", "DEBIAN:DLA-1801-1:60303", "DEBIAN:DLA-1801-1:C744B", "DEBIAN:DLA-1896-1:572E2", "DEBIAN:DLA-1896-1:853E6", "DEBIAN:DLA-1943-1:9AD98", "DEBIAN:DLA-1984-1:5FA59", "DEBIAN:DLA-1984-1:DC1E9", "DEBIAN:DLA-2030-1:DE561", "DEBIAN:DLA-2111-1:E5D8F", "DEBIAN:DLA-2128-1:E0A22", "DEBIAN:DLA-2139-1:BE12E", "DEBIAN:DLA-2191-1:6C344", "DEBIAN:DLA-2191-1:AF8DE", "DEBIAN:DLA-2201-1:04D06", "DEBIAN:DLA-2201-1:2AD7B", "DEBIAN:DLA-2209-1:D154F", "DEBIAN:DLA-2270-1:4546C", "DEBIAN:DLA-2277-1:CD763", "DEBIAN:DLA-2279-1:AB3FB", "DEBIAN:DLA-2286-1:A2783", "DEBIAN:DLA-2405-1:33C7A", "DEBIAN:DLA-2406-1:00733", "DEBIAN:DLA-2437-1:9852C", "DEBIAN:DLA-2467-1:7F045", "DEBIAN:DLA-2467-1:C258D", "DEBIAN:DLA-2471-1:AFC93", "DEBIAN:DLA-2474-1:CB226", "DEBIAN:DLA-2512-1:EDD15", "DEBIAN:DLA-2534-1:1EFB7", "DEBIAN:DLA-2534-1:AA5E2", "DEBIAN:DLA-2555-1:64862", "DEBIAN:DLA-2563-1:B363B", "DEBIAN:DLA-2565-1:CC1A3", "DEBIAN:DLA-2569-1:11737", "DEBIAN:DLA-2628-1:6F808", "DEBIAN:DLA-2638-1:5B442", "DEBIAN:DLA-2638-1:AB692", "DEBIAN:DLA-2657-1:654CC", "DEBIAN:DLA-906-1:3F80D", "DEBIAN:DLA-906-1:D16E9", "DEBIAN:DLA-946-1:9FF89", "DEBIAN:DLA-986-1:199D0", "DEBIAN:DLA-986-1:5A238", "DEBIAN:DSA-3831-1:EE460", "DEBIAN:DSA-3871-1:11373", "DEBIAN:DSA-3872-1:C19C1", "DEBIAN:DSA-4017-1:88D36", "DEBIAN:DSA-4017-1:AEF53", "DEBIAN:DSA-4018-1:01441", "DEBIAN:DSA-4018-1:DD3DF", "DEBIAN:DSA-4157-1:5A16B", "DEBIAN:DSA-4157-1:D7BEA", "DEBIAN:DSA-4158-1:43C61", "DEBIAN:DSA-4158-1:561AF", "DEBIAN:DSA-4278-1:4CF44", "DEBIAN:DSA-4434-1:82FB6", "DEBIAN:DSA-4434-1:D2F07", "DEBIAN:DSA-4460-1:50632", "DEBIAN:DSA-4461-1:C87EB", "DEBIAN:DSA-4542-1:432E5", "DEBIAN:DSA-4605-1:EA4B2", "DEBIAN:DSA-4621-1:E16D0", "DEBIAN:DSA-4661-1:70270", "DEBIAN:DSA-4669-1:2AD2E", "DEBIAN:DSA-4789-1:72A9C", "DEBIAN:DSA-4789-1:817CC", "DEBIAN:DSA-4795-1:5CD54", "DEBIAN:DSA-4807-1:1C1CB", "DEBIAN:DSA-4835-1:22674", "DEBIAN:DSA-4839-1:0839A", "DEBIAN:DSA-4839-1:3997C", "DEBIAN:DSA-4855-1:B091B", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4908-1:0437F", "DEBIAN:DSA-4908-1:07D7B", "DEBIAN:DSA-4919-1:5433F", "DEBIAN:DSA-4946-1:45300", "DEBIAN:DSA-4949-1:1212B", "DEBIAN:DSA-5004-1:999C3"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2017-5637", "DEBIANCVE:CVE-2019-0190", "DEBIANCVE:CVE-2019-0201", "DEBIANCVE:CVE-2019-10086", "DEBIANCVE:CVE-2019-17566", "DEBIANCVE:CVE-2020-11979", "DEBIANCVE:CVE-2020-11987", "DEBIANCVE:CVE-2020-11988", "DEBIANCVE:CVE-2020-11998", "DEBIANCVE:CVE-2020-1941", "DEBIANCVE:CVE-2020-1945", "DEBIANCVE:CVE-2020-28052", "DEBIANCVE:CVE-2020-7760", "DEBIANCVE:CVE-2020-8277", "DEBIANCVE:CVE-2021-26117", "DEBIANCVE:CVE-2021-26271", "DEBIANCVE:CVE-2021-26272"]}, {"type": "dsquare", "idList": ["E-701"]}, {"type": "exploitdb", "idList": ["EDB-ID:46780", "EDB-ID:46814", "EDB-ID:47895", "EDB-ID:48320", "EDB-ID:49521", "EDB-ID:49522", "EDB-ID:50011"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:58B106E51A80290DC1E08B730B3B0DCC"]}, {"type": "f5", "idList": ["F5:K08044291", "F5:K12109859", "F5:K21462542", "F5:K22893952", "F5:K40508224", "F5:K41190253", "F5:K43429502", "F5:K63025104", "F5:K90059138"]}, {"type": "fedora", "idList": ["FEDORA:000423094DC3", "FEDORA:017273129EBB", "FEDORA:0240B604B381", "FEDORA:049CA30B267A", "FEDORA:05AFB3091421", "FEDORA:08AC0606CFA2", "FEDORA:096673094224", "FEDORA:0A8AA34B5326", "FEDORA:0C9B630E4D25", "FEDORA:0D7F230979AB", "FEDORA:0FDC630A5C68", "FEDORA:10ED96049C48", "FEDORA:11C9F606DF50", "FEDORA:1364530979AB", "FEDORA:146FE30DD5E7", "FEDORA:18A7960877B3", "FEDORA:1F076314BE6F", "FEDORA:21C3E309DE29", "FEDORA:26A3B606353E", "FEDORA:2703C614C115", "FEDORA:277F560476FA", "FEDORA:2BD533098BA0", "FEDORA:2D51F60C28B2", "FEDORA:3097E609077F", "FEDORA:320386075B54", "FEDORA:336A5601C68D", "FEDORA:353CF60468D9", "FEDORA:353D73154ABE", "FEDORA:371D8608F499", "FEDORA:38A0630A1F03", "FEDORA:3ADCC618DE6A", "FEDORA:3AEB830B2656", "FEDORA:3ED26601CEE3", "FEDORA:3F234602D69C", "FEDORA:438D16045644", "FEDORA:46E1E6087BCB", "FEDORA:4788E309FF20", "FEDORA:481D1608F47B", "FEDORA:4840930CA036", "FEDORA:49205309799A", "FEDORA:4A1276046F94", "FEDORA:4BBBA6067EC9", "FEDORA:4D359608778C", "FEDORA:4F5D560BF24D", "FEDORA:5188060D12AE", "FEDORA:52396606732B", "FEDORA:54575302587A", "FEDORA:54C15615CE59", "FEDORA:59A883072F03", "FEDORA:5A27030A7064", "FEDORA:5D3AA60DDB80", "FEDORA:5F36E6079A0D", "FEDORA:60E3A30D1484", "FEDORA:61A713098ED5", "FEDORA:6431E305A8AE", "FEDORA:6869030D3139", "FEDORA:68D44601BD0C", "FEDORA:6E524310A486", "FEDORA:6E66C608B5D9", "FEDORA:6EC9D33D7FE1", "FEDORA:6F712609154B", "FEDORA:7307C30AD43B", "FEDORA:772A7605712B", "FEDORA:77A873096A19", "FEDORA:7A1EA3098BA2", "FEDORA:7B564604AACC", "FEDORA:7C20C304C264", "FEDORA:7CFF660874FE", "FEDORA:7EA4A615D50A", "FEDORA:7F23B6061573", "FEDORA:822D960BF257", "FEDORA:8514B6312F21", "FEDORA:85B0430979AB", "FEDORA:86D5D3097097", "FEDORA:88EAA30905CF", "FEDORA:8C9CB30BDABD", "FEDORA:8D7CB30BB4E7", "FEDORA:8D89730AB4B5", "FEDORA:8D9BA60468B9", "FEDORA:9084B6049CB5", "FEDORA:9228F60BF265", "FEDORA:929076060E6D", "FEDORA:93A083094AEF", "FEDORA:94A8C309799A", "FEDORA:98315602F10D", "FEDORA:9BFED31347B3", "FEDORA:9F2FE3098B94", "FEDORA:A09EE6087595", "FEDORA:A0E7D606D492", "FEDORA:A1A2C305A886", "FEDORA:A387A3072636", "FEDORA:A94C730ECAFD", "FEDORA:A9F00305D406", "FEDORA:AA46430A6A34", "FEDORA:AAF643072F13", "FEDORA:AB5346014BB3", "FEDORA:ACC466324C7C", "FEDORA:AE16260D235E", "FEDORA:AE6D630AA059", "FEDORA:AE8886060E81", "FEDORA:AEECE6075DBF", "FEDORA:AF19730979AB", "FEDORA:AFDBD60E76E0", "FEDORA:B0BBE6085FBF", "FEDORA:B0FEC30C5629", "FEDORA:B4E3C6062CB4", "FEDORA:B56AC605DCD2", "FEDORA:B5C736087A8D", "FEDORA:B7EBC30957D8", "FEDORA:B803860875BB", "FEDORA:B87A730E900E", "FEDORA:B98866076020", "FEDORA:BACE03098BA0", "FEDORA:BB3096070A55", "FEDORA:BDC9D3090DB1", "FEDORA:BEC8530B267D", "FEDORA:BFACF60A35B3", "FEDORA:BFF95608779F", "FEDORA:C337330A46EA", "FEDORA:C3D293095AFD", "FEDORA:C5613607A3CF", "FEDORA:C6AD93098B94", "FEDORA:C798F309DE1C", "FEDORA:C7A34627CF63", "FEDORA:C7AFE309727E", "FEDORA:C8F726082DB8", "FEDORA:C91E46060E8C", "FEDORA:CB91560BFDF4", "FEDORA:CD864304939A", "FEDORA:D013361742CE", "FEDORA:D02A2309CDA4", "FEDORA:D126131F01F8", "FEDORA:D208C60874AA", "FEDORA:D4B143098BA2", "FEDORA:D529B625B834", "FEDORA:D8E3E608F496", "FEDORA:D948D608771F", "FEDORA:DB7B1314E1E1", "FEDORA:DC31630C8352", "FEDORA:DC7DF3111B2E", "FEDORA:DD55E6047337", "FEDORA:DEA206060997", "FEDORA:E0E2C3098BA0", "FEDORA:E1DB3601E80E", "FEDORA:E5B6E30BA77A", "FEDORA:E66CE6076F5E", "FEDORA:E700F3072E21", "FEDORA:EA4F2309E0EF", "FEDORA:EDF1E309799A", "FEDORA:EF5B36120D8F", "FEDORA:F015D61278C8", "FEDORA:F113230AA459", "FEDORA:F12FB31404B0"]}, {"type": "fortinet", "idList": ["FG-IR-19-222"]}, {"type": "freebsd", "idList": ["012809CE-83F3-11EA-92AB-00163E433440", "08B553ED-537A-11EB-BE6E-0022489AD614", "20006B5F-A0BC-11EB-8AE6-FC4DD43E2B6A", "36A35D83-C560-11EB-84AB-E0D55E2A8BF9", "3C5A4FE0-9EBB-11E9-9169-FCAA147E860E", "4CB165F0-6E48-423E-8147-92255D35C0F7", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "5A9BBB6E-32D3-11E8-A769-6DAABA161086", "5E0A038A-CA30-416D-A2F5-38CBF5E7DF33", "8B571FB2-F311-11EB-B12B-FC4DD43E2B6A", "AD792169-2AA4-11EB-AB71-0022489AD614", "AF61B271-9E47-4DB0-A0F6-29FB032236A3", "B7CFF5A9-31CC-11E8-8F07-B499BAEBFEAF", "D34BEF0B-F312-11EB-B12B-FC4DD43E2B6A", "E8483115-8B8E-11EA-BDCF-001B217B3468", "EB888CE5-1F19-11E9-BE05-4C72B94353B5", "F3CF4B33-6013-11EB-9A0E-206A8A720317", "FFC73E87-87F0-11E9-AD56-FCAA147E860E"]}, {"type": "gentoo", "idList": ["GLSA-201705-04", "GLSA-202003-48", "GLSA-202004-10", "GLSA-202011-17", "GLSA-202011-18", "GLSA-202012-11", "GLSA-202012-13", "GLSA-202012-14", "GLSA-202012-23", "GLSA-202101-07", "GLSA-202101-18", "GLSA-202101-19", "GLSA-202101-29", "GLSA-202101-33", "GLSA-202104-04"]}, {"type": "github", "idList": ["GHSA-2H3J-M7GR-25XJ", "GHSA-2HW2-62CP-P9P7", "GHSA-35JH-R3H4-6JHM", "GHSA-3C6G-PVG8-GQW2", "GHSA-4PV3-63JW-4JW2", "GHSA-53X6-4X5P-RRVV", "GHSA-5949-RW7G-WX7W", "GHSA-5R5R-6HPJ-8GG9", "GHSA-662X-FHQG-9P8V", "GHSA-6C3J-C64M-QHGQ", "GHSA-6JMF-MXWF-R3JC", "GHSA-6X4W-8W53-XRVV", "GHSA-6X9X-8QW9-9PP6", "GHSA-73XV-W5GP-FRXH", "GHSA-7PM4-G2QJ-J85X", "GHSA-7R82-7XV7-XCPJ", "GHSA-84Q7-P226-4X5W", "GHSA-86WM-RRJM-8WH8", "GHSA-89QR-369F-5M5X", "GHSA-8C4J-34R4-XR8G", "GHSA-8W26-6F25-CM9X", "GHSA-8WX2-9Q48-VM9R", "GHSA-9GPH-22XH-8X98", "GHSA-9M6F-7XCQ-8VF8", "GHSA-9MGM-GCQ8-86WQ", "GHSA-C9JJ-3WVG-Q65H", "GHSA-CVM9-FJM9-3572", "GHSA-F62V-XPXF-3V68", "GHSA-F6VF-PQ8C-69M4", "GHSA-F9XH-2QGP-CQ57", "GHSA-FG3J-Q579-V8X4", "GHSA-FHJF-83WG-R2J9", "GHSA-FMMC-742Q-JG75", "GHSA-GJMW-VF9H-G25V", "GHSA-GXR4-XJJ5-5PX2", "GHSA-H3CW-G4MQ-C5X2", "GHSA-HF23-9PF7-388P", "GHSA-HPCF-8VF9-Q4GJ", "GHSA-J39C-C8HJ-X4J3", "GHSA-JPCQ-CGW6-V4J6", "GHSA-M6X4-97WX-4Q27", "GHSA-MW36-7C6C-Q4Q2", "GHSA-MX7P-6679-8G3Q", "GHSA-PGWW-XF46-H92R", "GHSA-Q44V-XC3G-V7JQ", "GHSA-QJW2-HR98-QGFH", "GHSA-R3GR-CXRF-HG25", "GHSA-R695-7VR9-JGC2", "GHSA-RV39-3QH7-9V7W", "GHSA-V528-7HRM-FRQP", "GHSA-VFQX-33QM-G869", "GHSA-VGG8-72F2-QM23", "GHSA-WFCC-PFF6-RGC5", "GHSA-WH8G-3J2C-RQJ5", "GITHUB:D8A86B15D051270840BFEF47E7434ED2"]}, {"type": "githubexploit", "idList": ["05A9BE7D-0317-5F20-87C1-D63BA3A06BE4", "10F73C81-91F0-5199-9C8E-432BF228C96A", "13878B3B-FB04-5CE3-9B74-E27EB76E916B", "14CD7401-C309-52B2-B4EE-AD54900F0455", "18F5237C-DCAC-5831-AED6-F0880A11DFF2", "20E0E007-A9C4-58EA-917F-E225D8785B3F", "24A6D0CC-8F53-539E-8FBC-D5222C4BC565", "2691C74B-4ECB-5E22-8BDF-7784E321BE55", "2747307D-D8C7-5045-A017-AA9E18552C41", "2AF9B196-507F-5F76-9363-5651035AE371", "2B8C7714-D2D7-50C4-BEB8-B616BD51A554", "2E148A24-696B-55C2-8FB2-F74B47F8DD25", "2ED15233-2A01-53F8-A939-8A4D06481CF4", "32FB08A0-ACB0-5E2F-8691-570E7B806086", "3640EAF9-330F-508E-A488-D3A51649AD96", "37DBE88A-3249-51AF-8021-8619CFD56A4B", "4278B435-D22E-57E8-ABC4-639BAAFA6FC9", "458891C6-0BE7-5AC1-8119-7DD6B0884A9A", "49F291AB-38E4-506D-A185-70178D091F27", "4A0B6F24-4FEF-56AE-909F-602D0623246C", "4F4AF4AC-0953-5098-98D6-592B918B0836", "504A0052-A0EB-53EA-AFC3-4E5EEC236795", "504D019A-423C-50A0-9677-93192F0ECDFC", "5602A60A-886A-598C-99B3-EE2E820506AD", "58CD2EEE-5826-5136-84D4-BCAC28741415", "62E1CDF6-537F-52B5-8ACE-87CDDFB3544D", "6FE4C3C0-D500-5202-A7DB-D2A17693D071", "7247E67F-6DD7-5526-8312-91D0D99FED26", "72ACBBC1-E9FB-5A12-8614-06BEF5F96394", "743F51FB-8BF4-5425-AEFA-10B2A14C8F3B", "79FADEDE-9F29-583A-908E-676A91E2F562", "7BA07704-21CC-5BFC-A0F9-8FDA2BC84402", "80F73667-B6DA-5D40-984F-3F104E58C6B4", "860137A6-8A6A-5B9E-8DA2-9D56B4F7F3BB", "8A038044-FF93-55CF-A4E2-E5AF05A46130", "92CE6110-40F8-5FE5-909B-BE6B59186578", "94095106-8E25-54E1-924C-2C3B4E99610F", "968DBE0A-CC05-5F47-B348-E8E33AA33F6C", "96B2FD46-0F7E-5581-BBA6-E4A48966E225", "9D09C8C3-35C2-51CD-B6E1-6542183770EF", "9D1AE9EC-AAED-5991-9F41-9458ABC7EFC3", "9E63B0B5-5583-5FC0-85B1-048296D9FC6A", "A36243CA-7BAA-5CA7-82CB-A7C4B24456B6", "A46721A6-23E8-5E16-B9CA-0C887A66551D", "A906B17D-A78F-5755-8763-7D1AA7E65750", "A96AA4B1-C8BB-579A-8D24-BC5F3628A0A4", "AE10BD2D-66B3-5C55-9296-FA884BA0CA27", "B0BA17F5-F171-5C97-9F6C-D5F38B5B64F5", "B21658F5-5752-5A2C-89E3-68378412AA6F", "B2E1F725-D74D-5E81-88CC-6530BC9BAB30", "B38C8387-765B-587E-BBED-9336E586B3E2", "B41082A1-4177-53E2-A74C-8ABA13AA3E86", "B663ED8E-3FC8-597C-94C8-F7D1BA5DAF2B", "B9EB8E0F-C53A-5795-92FA-1994F120A1CF", "BA9D322B-4694-5B07-BD2F-83E700A62DE8", "BC46DAAE-9274-500B-A6A2-DB7DA8EAF068", "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "C3C9928F-AC84-5B3E-980E-F594CABE8EA3", "C4EDB405-454C-5160-9A99-21A930740C3F", "C7E2EC97-A49D-5063-BC43-995A0E058FCF", "C878132C-FB46-5C51-9D3B-B87DB3578112", "D2931851-B196-5CD6-AF75-B24EA22F6115", "D2A327FF-6F42-51F0-85B3-C36F8A1DB33E", "D5CBA0E2-A4B0-52CE-B93B-F433CE8662DA", "DC2FB701-98C0-58E1-9CBB-F9E17BA3A8A0", "E33DA23C-583C-5F85-BB23-9315943B5C00", "E56192E7-FC31-58F7-A982-BEA41F95D172", "E5C9B17F-EC84-52B1-8901-335B1815C813", "E83D6606-6F89-5700-B703-B87CF90D6565", "E95D9A0E-E9DE-5D95-9879-E07C0257318C", "EEB220AD-2CB0-50FB-A3B9-A87BBC32BA19", "EF08F582-5E5C-506D-B223-26A7028B4A16", "EF22B1BD-85C3-525C-B7D6-94014939E96B", "F0C27A65-B942-5D87-B7D9-08451A15456C", "F60737C1-A24B-51C1-AE8D-73A65C778FFF"]}, {"type": "hackerone", "idList": ["H1:1045844", "H1:1101882", "H1:1129529", "H1:1223882", "H1:746733"]}, {"type": "hp", "idList": ["HP:C06911998"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20180613-01-OPENSSL", "HUAWEI-SA-20181212-01-CACHE"]}, {"type": "ibm", "idList": ["007E1AC1E4228B8135E45C63FCEF82799BD02C157157F082CD8D3E0F0D61C361", "023AF7CE811F35CB9EA5BD22171F66AA17D83D1B9FF44FF925D320814BAE40E2", "07988475CE9095B9471700FFB4FFB199A58AB32837E3178BE094D53E97B8461A", "0A3CB536625237AF6E1A39B78799B41B9AF062894DA038E4F769071D72640FDB", "0A425AE154320282FF38ABB3C8BA8D3AD10793B88A3CFCA031B295F986453B12", "0BC76EEB65523D395F4DA742FB52689780638A43870F5C4EC44A6261A2CCA67B", "0BDDBA484F3367829DBE683BE155B8F63CE6E7CF5747401F154DB308D91D8FD4", "0FF78AF1C487DE3B1A92548681C12BB71F6CB2B0B453E94F828CDEF3248FE0FD", "1360BEF97E01B87A4E58CA581A1F32ECD385845F24783D4980B6E64F68F389FB", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "1581A32F1B584B51FF02BECA01D9BDEF635D6686BA710EA3BB5BFE756956948A", "17179127276D2C8BCC739D66B23A070D5DCF232A120A9E4EF31DA0C49E8077B9", "17E2A2234B8EB1A1FD88875B4639DD7977B1A0F62BC6D5F9D6C40BAFB9288E47", "1816205804EFBBBBB94018144A008A33799E226A9B559AA545872E5FBE25A885", "1A35248CBBA17AE981ED0B52B133E7CA1678042C1A9C93C2EC8BED2EF8994420", "1A7668E81452E83AB00678328095567DA17543F8BDE6DB1EE678E96C5B064FD6", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1BF7C13C6BA15A6BD297836C5ABBD65ADD120927A9AB5EC2DD0D2C820A678FB9", "1D527A951F660BFCA1836671A2A328C87E8B448B01A672269419352520CFA6F1", "1E65403338C4160C6671F6E9BE4C657DE48E1EA2770DD6A8FFF5C5BD5F4ED166", "217BB6C17A6FD504F278CE0259F71540873D9ACBEC02EC2F580CED3F0A79FB4A", "226FFFCDF94FA8471AA279C7EA3B887FAA510E3463B5ABDBC303B7D6583EE6BE", "24998913BBA24560DF90F23DACB1EE1AF91DAA3212C9A03EEBBD3A5EFE2155E0", "2694AA73D362C44211F7B5F683DFD553297424954F09C3B91396E15F975BA3AA", "295AADC2BDA75DE708729FC2E48FF012F497BCA3F20C0D83AFE9E96E09FA035F", "2A203D8BF52DCAFF8B5E95996A1B55C43D9BF20BC5F58B0B4D388698819D6CF7", "2B4BFF0D4D521D5012752D32EC9AED8D7B42C9CCDA58A0989CACAC0FE91E3799", "2B8ED03AFB64688F7C236312BC8155AB0C092B0BB10F225899EEE28BFC95B925", "2E99FBB731310229E5D67CCF834D84A3C63F588068BE4D2601929B95EFC9AA89", "2FBDB647A432042A10EC78183C73C0F6FB59930DA021F42ACDA90C79715CDA31", "30A5CA62F6580AAFA852738DF5325C812D685A3292E94F7A9E759C1125E79A0A", "31D774CF733E3311087AF9DBF776C5768E99CD088E058FFAFD8CB6ADDEE91194", "32B20434710D4CE2D9F48A3DF5BB5D8CEAA637E619A2F59A623867C3064BC74E", "3410A57294243E5BBAFB4C69F17AC837FB02B049396A85D095AF16279272DED9", "34BD53EB31AD88FE6BCD0318A3283205983F8374B4E36C18A2AB87E881443510", "350AAD2689BD8D51867044299A4DE1EF4D4026FF797C56E941A05A20C7B464E9", "353C8048EB40D7C11CD60ABB9D7F5DFD666EDB60B698E9932FC1A04919041609", "359D81A32B636B6B41B26FA1EB195DCDD898364CBE4C284C377BC53F3B665B24", "3806864362596B8F499C9B331631D79EC751CD68B24068ED9B36CFB553A6D005", "39104B54F5C4237FB05664C0CDAA7B85966DC25744CB7F77796A970C5B19D7A7", "3A0EC58D68A9FF044EFDD59A19016C7F96E811E1FC47D2E23F42FDF074B43F35", "3BBC35C5643FFD317D4A62B5798A483EBE56001A5385E266B4CE69127D6565DF", "3C732FE7415FBA3DE391A641FEEFD9EF355B5481A82CB22A125F154F83F4488A", "3C757E6C207C325B90893148C70649850957A2F8AB27DE4E6D68D3EA4F71D013", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "441A6459C1CBE843EDD7F5C4D862AA7C6F90584EA901F82EF1B6D31B418078EB", "4B368485BFA6ADA7A8F198258CDD04752B4DE77DE562AA584131224F23C92F1E", "4CA0C5A39CDF0A6C145F40C0D734FEA846B14FA988249228B6F0344FB0D8ED97", "4E6353F1062DDEE2F859DA9376A59A0A02E58324E8A0BB460968024ADB369792", "4F83742D4D9E3F03A6481F27A21969D4333962D309ACFDC2D174BF09D63F0F8A", "4F8D39F3F464E5E9FD3000C317BC69CF4FEEE9F0605C69E62D810607C6BB87CD", "50D6AB8BFC4B38B3B5A2A79B2815AA71FB82CF937CA979BCACDDD58A775A78E4", "53514A62D7D9E2E178325FAF1EFBB4FF93020BF2D45F01788543FEAA40036C15", "55F965177D0FDBAFC93D2D5192178D55E13ED48EC0BAA93F60AB1C52EDA0DB76", "597C2145694DF5A917E3F9F9BD43AEC462B29FC711E770CD5D9D878B4692E6CD", "5A23BE34322F36780B2821378B1628B3331997E99E3A9C4B3B0067399EEBC3F5", "5A2425933E89E2C50FE1F3B1903983FFF1089EEE55483682712FA0DB9D6A700B", "5B64BCE3EE0E68F7C1E61B0134954FDB115D5AD76AD549C8F967018D7BA777A6", "5C3100D70ADB390CF29EE321F5267DF9F7C52BC43BD74C50D3B3B555F7F88599", "5D567CAC8B1B91B66CC85A1C9A61736F3CBA22497515DD3F0D18247FA0662627", "5DFB309EEACC06B61D408A7963D4B9522D38B36040304E118E4A9237BCD1B461", "5EB2EF02E634D1E359DD6A4601AEC530DE4DEB31B9F3BBEF88114B9BCCFA1DAC", "643278CE1BB636D8764FFFB99832A74E1EB43BC79E059A2AF6DA2A9DF4BB4FCB", "64936DB1043AFFB68ACA6293C18288E8B3D8252A6898115168646F4A5B00CE7B", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "654F3603785F612FCB89C4655C367EC60F72994A083FCDAAF1A7F63C68137F21", "69FB72CCB8D5FCC39004FA966C700C2C3FAC030FB41B36D5BE112D01469B6B39", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6ABEA86F95DECD03C32F5BD7AF2042BF07A1C544724C672F6BFA6EC88894C596", "6D72F5E2F90CAC5A4D151DD3483103FAB60A4A6FCD9FF4EB47E5E45ACF7A4129", "70427712BA5BC5CC0FCAD9F41BE90E49714240938954BF076BBFB058FA595319", "70627666C31162C53BD5D03CF6016D0A8D8680FFF735FF221AFD4462F55D9E39", "762B934E108817D7EC500735D49B8383A3D66B67FECEE7DB94420501348B7A66", "7953C97B0B3FD289B52A4661DACD83E4D1965A9A77B680B17D60E3604DDFB0FB", "797C010D7F91BFD9A4AED687662A3AD4BBC6C570591ECDE2F84EA7CAFC728939", "7CFB9BE2DA6D94FEBCA1C4AA8CF9F47ECB13D1F735997F5255B4A85A3E13B4E7", "7FD9F7FFE1C0EF8F68DFE234A094535CE5CD56211AA4CA79732A71BF6B3C0262", "82A9F24907A9B5CA433EF30634767972B95813695A7590E7216F059F1BAF1D8D", "87080652FFA8C2DEE3311F586A003938E50130A6E44D8B6827D7A32AB3C18132", "888B18D627FBDF7183E9A5A773EC125FB2EBEF80DF319F6CAD751E006641978C", "8A4B8F016E20BE062D275D1D7DA531E398846FA5F653F9077E943F8758AD58E1", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "90D59D207E240BE5AC750765C539B8ED7F5604D85518190296B85710EF6190ED", "92CB3843138A52E09E1E53A7B1F44996ABBC10BE478421F26B6289555D2F2CAE", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "94B2D11D8B2A3C1556D68D2A82651D2B407EFDC4765439D01B02E9690918B657", "981346B4F2948F216BED89C4CD8BE79AD6F63DE1FBA4E88FB16B5600DC4A27C5", "98B323422CA792F32B2EA7482D9D79B9F9D15C3830E9ED03453DF7CC38205557", "9A04620999F6A5C33EA2D706818867EC5FDA6193AE9CFACF3632E54A7A590B2D", "9BBB794BF1DCF8660F8460268754D1A7E827EF26EEF07D631316C9EF5FC3CBDD", "9D10729AB8873D23F2244363D8A1DDDC6F4683B3420052FC513112D30B8E6FC8", "9D4EC30B388B671B00F0D192ACD964A17D2BA337E5388809BC8935D15D6F2731", "A1EF9298714E6ED876FC447E879AE4AEF24B3BAE418A5BF1CCD587D6F1B0DF70", "A32C6DF76505CE1438834C46A179D3BAF5C4C941E7A4CCE13657E37ADAA6DA21", "A34D0E048A73C5A65337D15C81E91BD27C5B42EDF1544B7EF1B8E9568A6466A3", "A545DB1C220C2CED88336E81FF848EF91603811394EF649FEC94F4D2653CBD45", "A5DABD1C1B1C58D900A9518CCA7EC1C03488CC2DF1750F65600D7F0C8E0E4763", "A732768396D3457C046680097E6471B9E0199C0B42AE8FA920595C4B7BD45203", "A87D3B01BEB3628C5A4865D02456C6AE700642AF49B89B34D8697869591CCEC7", "AB1AC7E7CE95316265077790DC2D6CE23068401552650F2CE08BCFDA4CE41AA9", "ACBA42A9F266755DB30CE35DBA1907FB61B1687AAD3415499AF5573BC67595AA", "AD93426B49228B04BDAB79161DCBCCF882ED48D9F34985BDEF0F8736255A81ED", "B0A45CB551A212004F67CB37E137C4F8BDE8F8943B137919DC68C8ADB0B15896", "B0FF85DCDE8644B3484BD6CF258480DD40154E7BDFEEDF7A128BF747F3AC618F", "B5AA883A7ECBB98CC082171970FB0FD2158AEB520B2B654518056D674E2939C5", "B74A3B00A34D8FDB4B8EEF99280CED566B09656A926E55692D07C56A91D80E06", "B9609A42BFED86C36189258C748597C29F9D824D3DD52ECECFEEA902FDA884B1", "BD254A15BAD5E287C6B2C82F2D724824C0DAE3774F51EFD21CA2855E0233A70B", "C034F4A93C7986F86B5276634B82B774DA1796B9A2CC2371DA4859670D82233E", "C06037486063080DAF0903578E651F281F08105507F07A61B0292AD4FC96B7DB", "C0BDB67449527274F6BF935813A76F827DBFB1EAD61444E49DD24177F6B0ABE0", "C240DF09D934E998A5A6E9F16EE5D00606D3852B389FD502ED34EB411645C177", "C65722F809C01B5483BEFD48484EDC46960C65030D132C9D08F70EDB8A00D231", "C7BF9E3DE547E76D7B7B89B7E31D72468FCCCF0D24D3580B01C6BA30FC2F324D", "C8805CB7A9877952E3B667A528AE49619053A2D7DB5F1F65CA2C84C382A15EAE", "CA981B58A5E97CE429C00373F26C546F845A09834BC4BA2EA642FA32E67EE613", "CBD8847E98393D15AF7D2691A1958B4AAF9058B018D5E477DFB037CCB9D75D3F", "D1CB85104D6425EADABAF28CF6CF9EB9A90389B1D6AFFC5FE976A773A70523CD", "D272B1ACFC08FB00F71DAECEAF120EF8F47B4AA0F575849F81F09FF6E35CBFB5", "D783A7F4DFFB9905E79E357ACA80CE9623FFC55147AEC4BAF71DFFC0CC45C9F3", "D794EA27CA7E3FF8825CDCEFF3439F08F1C4C2B94C2E54C22629BF94087D371F", "D92ADA90B46EC7B09898EB31D2D008827097E27BEC48AE4B2D1B9121A6F37C05", "DC05F94C20E54530B22A0F7C5D47B16BEB79F796391043B6D8D2F3934DA6C247", "DD34B9BC3B107A1DC572E91FE164C11C4D3B050CFD5A53884C66DA680566DEB4", "DFF1640DBEB48B8BDF07B3856E1B96CFEE191A513A8879122CB35B6ECF091230", "E07C0C4D82739BCF3EC12790499FE045BA8E517D49D7B04601CDBB95AF91DA23", "E1FCC005B9B4F10E866821B7041A82A13C2A3FF7E8C96FE58654CD435743D4A8", "E440BB041ED6E708A034C8A54F6AE3020468A449ED6AA8A4467710E6C681D881", "E51DDF73E3F5CD96B12560329D18889F698C09D96494E43FCCF428FEC32A1F2E", "E61FF499B7EFFD92A0884B1108A602A50283CF6842D88D47BD14A9C1F5EC2065", "E73B069C22847DCB042A534F76F473BEF350E9CFB3DC356BB864C5308AA99F79", "EF3E1BF0DE5F016F1A98A8949DD7F8CAEA643BD1CE65EBCFA855B994473DB3F0", "EF6DDDE67CC12C367CCDE00775111E8D298AFCD89C1584B532293E6AAEF36962", "F2C6F73567D1EF939E0A7A3BEABA49374976591C6C10FEBC5058CCA1937D64FE", "F479B1D4D6CE6F94562BE83AEBC7D30E6633A6727AB24138B99039D7EB3AB70F", "F479ED9A8ECDFA2B5CCFF34D9B19F1AF511DF153068E2232B40DE0943441A404", "F75806AF51F262CD91F3E2017F6775AF7816B8E15289C5596B33856B18979E5B", "FB37F0F7CF6522CCB3B684C95B5F64BEC8DDF83F29BF1BF109AD27B6810731D6", "FC367D3847B3B18A075985BFC8A2A8898C7B9AFE3FE16A6F84968131CD5047B4", "FD3F7FDFA4DAAB71D175F1E137285D1F69A465922921368206BF33D36AB43D22", "FD54ED57D0984C8885C877F9181732A5619A1E525F7855FB4A72EC63053B7375", "FE682ECFC10CBB3EA19CC98A95397F776F34168220DD72550FAE4CF5E216A9CC", "FEDE4F7915CF8E683DBC7AB56D68872D5740EF9C5D19FED52B140130771052A2", "FEE45A44E8C46E13896C20C8C9B2A275C16E5652E4DF723FE4A044838B932DB1"]}, {"type": "ics", "idList": ["ICSA-21-147-02", "ICSA-22-055-02"]}, {"type": "intothesymmetry", "idList": ["INTOTHESYMMETRY:03170E09A2C6F4BE8A3B9D5EF113B293"]}, {"type": "joomla", "idList": ["JOOMLA-779"]}, {"type": "jvn", "idList": ["JVN:90729322"]}, {"type": "kaspersky", "idList": ["KLA11231"]}, {"type": "kitploit", "idList": ["KITPLOIT:8656177976839178440"]}, {"type": "lenovo", "idList": ["LENOVO:PS500190-NOSID"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:0FEB0AF7A8D15834DA7D1882395A9D7C"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/MULTI/MISC/WEBLOGIC_DESERIALIZE_ASYNCRESPONSESERVICE", "MSF:ILITIES/ALPINE-LINUX-CVE-2020-1967/", "MSF:ILITIES/AMAZON-LINUX-AMI-2-CVE-2017-3735/", "MSF:ILITIES/AMAZON_LINUX-CVE-2019-15605/", "MSF:ILITIES/APPLE-OSX-OPENSSL-CVE-2017-3735/", "MSF:ILITIES/CENTOS_LINUX-CVE-2019-15604/", "MSF:ILITIES/CENTOS_LINUX-CVE-2019-15605/", "MSF:ILITIES/CENTOS_LINUX-CVE-2019-17531/", "MSF:ILITIES/CENTOS_LINUX-CVE-2020-26217/", "MSF:ILITIES/CENTOS_LINUX-CVE-2021-3560/", "MSF:ILITIES/DEBIAN-CVE-2020-26217/", "MSF:ILITIES/F5-BIG-IP-CVE-2017-3735/", "MSF:ILITIES/F5-BIG-IP-CVE-2020-8285/", "MSF:ILITIES/FREEBSD-CVE-2017-5449/", "MSF:ILITIES/FREEBSD-CVE-2020-1967/", "MSF:ILITIES/FREEBSD-CVE-2020-8286/", "MSF:ILITIES/GENTOO-LINUX-CVE-2017-3735/", "MSF:ILITIES/GENTOO-LINUX-CVE-2019-15604/", "MSF:ILITIES/GENTOO-LINUX-CVE-2019-15605/", "MSF:ILITIES/GENTOO-LINUX-CVE-2019-15606/", "MSF:ILITIES/GENTOO-LINUX-CVE-2020-1967/", "MSF:ILITIES/HTTP-OPENSSL-CVE-2017-3735/", "MSF:ILITIES/HTTP-OPENSSL-CVE-2020-1967/", "MSF:ILITIES/HTTP-OPENSSL-CVE-2020-1971/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP2-CVE-2017-3735/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2017-3735/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2020-1967/", "MSF:ILITIES/HUAWEI-EULEROS-2_0_SP8-CVE-2020-1967/", "MSF:ILITIES/IBM-AIX-CVE-2017-3735/", "MSF:ILITIES/ORACLE-MYSQL-CVE-2020-1967/", "MSF:ILITIES/ORACLE-SOLARIS-CVE-2020-1967/", "MSF:ILITIES/ORACLE_LINUX-CVE-2017-3735/", "MSF:ILITIES/ORACLE_LINUX-CVE-2019-15604/", "MSF:ILITIES/ORACLE_LINUX-CVE-2020-26217/", "MSF:ILITIES/ORACLE_LINUX-CVE-2020-8285/", "MSF:ILITIES/ORACLE_LINUX-CVE-2021-3560/", "MSF:ILITIES/REDHAT_LINUX-CVE-2017-3735/", "MSF:ILITIES/REDHAT_LINUX-CVE-2020-26217/", "MSF:ILITIES/REDHAT_LINUX-CVE-2021-3560/", "MSF:ILITIES/SUSE-CVE-2019-15604/", "MSF:ILITIES/SUSE-CVE-2019-15605/", "MSF:ILITIES/SUSE-CVE-2019-15606/", "MSF:ILITIES/SUSE-CVE-2020-1967/", "MSF:ILITIES/SUSE-CVE-2020-26217/", "MSF:ILITIES/SUSE-CVE-2020-8286/", "MSF:ILITIES/SUSE-CVE-2021-3560/", "MSF:ILITIES/UBUNTU-CVE-2017-3735/", "MSF:ILITIES/UBUNTU-CVE-2020-8284/", "MSF:ILITIES/UBUNTU-CVE-2020-8285/", "MSF:ILITIES/UBUNTU-CVE-2020-8286/", "MSF:ILITIES/UBUNTU-CVE-2021-3560/"]}, {"type": "mozilla", "idList": ["MFSA2017-12"]}, {"type": "mscve", "idList": ["MS:ADV200007", "MS:CVE-2020-1971", "MS:CVE-2020-26870", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "myhack58", "idList": ["MYHACK58:62201994562", "MYHACK58:62201994593", "MYHACK58:62201995369"]}, {"type": "nessus", "idList": ["701324.PASL", "701329.PASL", "701330.PASL", "701350.PASL", "701351.PASL", "701352.PASL", "701353.PASL", "701354.PASL", "701355.PASL", "701356.PASL", "701357.PASL", "ACTIVEMQ_5_16_1.NASL", "AL2_ALAS-2020-1387.NASL", "AL2_ALAS-2020-1403.NASL", "AL2_ALAS-2020-1417.NASL", "AL2_ALAS-2020-1554.NASL", "AL2_ALAS-2021-1590.NASL", "AL2_ALAS-2021-1593.NASL", "AL2_ALAS-2021-1626.NASL", "AL2_ALAS-2021-1647.NASL", "AL2_ALAS-2021-1653.NASL", "AL2_ALAS-2021-1664.NASL", "AL2_ALAS-2021-1666.NASL", "AL2_ALAS-2021-1692.NASL", "ALA_ALAS-2017-825.NASL", "ALA_ALAS-2020-1354.NASL", "ALA_ALAS-2020-1359.NASL", "ALA_ALAS-2020-1445.NASL", "ALA_ALAS-2021-1473.NASL", "ALA_ALAS-2021-1478.NASL", "APPLE_IOS_146_CHECK.NBIN", "CENTOS8_RHSA-2020-0128.NASL", "CENTOS8_RHSA-2020-0202.NASL", "CENTOS8_RHSA-2020-0579.NASL", "CENTOS8_RHSA-2020-0598.NASL", "CENTOS8_RHSA-2020-0708.NASL", "CENTOS8_RHSA-2020-1644.NASL", "CENTOS8_RHSA-2020-2848.NASL", "CENTOS8_RHSA-2020-2852.NASL", "CENTOS8_RHSA-2020-4670.NASL", "CENTOS8_RHSA-2020-4847.NASL", "CENTOS8_RHSA-2020-5476.NASL", "CENTOS8_RHSA-2020-5493.NASL", "CENTOS8_RHSA-2020-5499.NASL", "CENTOS8_RHSA-2021-0218.NASL", "CENTOS8_RHSA-2021-2238.NASL", "CENTOS8_RHSA-2021-2776.NASL", "CENTOS8_RHSA-2021-2781.NASL", "CENTOS_RHSA-2017-1100.NASL", "CENTOS_RHSA-2020-0122.NASL", "CENTOS_RHSA-2020-0157.NASL", "CENTOS_RHSA-2020-0194.NASL", "CENTOS_RHSA-2020-0196.NASL", "CENTOS_RHSA-2020-5566.NASL", "CENTOS_RHSA-2021-0162.NASL", "CENTOS_RHSA-2021-0221.NASL", "CENTOS_RHSA-2021-0343.NASL", "CENTOS_RHSA-2021-1354.NASL", "CENTOS_RHSA-2021-2784.NASL", "DEBIAN_DLA-1020.NASL", "DEBIAN_DLA-1021.NASL", "DEBIAN_DLA-1330.NASL", "DEBIAN_DLA-1984.NASL", "DEBIAN_DLA-2191.NASL", "DEBIAN_DLA-2201.NASL", "DEBIAN_DLA-2437.NASL", "DEBIAN_DLA-2467.NASL", "DEBIAN_DLA-2471.NASL", "DEBIAN_DLA-2474.NASL", "DEBIAN_DLA-2500.NASL", "DEBIAN_DLA-2512.NASL", "DEBIAN_DLA-2534.NASL", "DEBIAN_DLA-2628.NASL", "DEBIAN_DLA-2638.NASL", "DEBIAN_DLA-906.NASL", "DEBIAN_DSA-3831.NASL", "DEBIAN_DSA-4157.NASL", "DEBIAN_DSA-4158.NASL", "DEBIAN_DSA-4605.NASL", "DEBIAN_DSA-4621.NASL", "DEBIAN_DSA-4661.NASL", "DEBIAN_DSA-4669.NASL", "DEBIAN_DSA-4789.NASL", "DEBIAN_DSA-4795.NASL", "DEBIAN_DSA-4835.NASL", "DEBIAN_DSA-4839.NASL", "DEBIAN_DSA-4908.NASL", "DEBIAN_DSA-4946.NASL", "DEBIAN_DSA-4986.NASL", "EULEROS_SA-2017-1075.NASL", "EULEROS_SA-2017-1076.NASL", "EULEROS_SA-2018-1306.NASL", "EULEROS_SA-2019-2232.NASL", "EULEROS_SA-2020-1057.NASL", "EULEROS_SA-2020-1395.NASL", "EULEROS_SA-2020-1451.NASL", "EULEROS_SA-2020-2478.NASL", "EULEROS_SA-2020-2487.NASL", "EULEROS_SA-2020-2500.NASL", "EULEROS_SA-2021-1003.NASL", "EULEROS_SA-2021-1010.NASL", "EULEROS_SA-2021-1014.NASL", "EULEROS_SA-2021-1016.NASL", "EULEROS_SA-2021-1022.NASL", "EULEROS_SA-2021-1029.NASL", "EULEROS_SA-2021-1033.NASL", "EULEROS_SA-2021-1035.NASL", "EULEROS_SA-2021-1063.NASL", "EULEROS_SA-2021-1073.NASL", "EULEROS_SA-2021-1080.NASL", "EULEROS_SA-2021-1102.NASL", "EULEROS_SA-2021-1104.NASL", "EULEROS_SA-2021-1133.NASL", "EULEROS_SA-2021-1137.NASL", "EULEROS_SA-2021-1149.NASL", "EULEROS_SA-2021-1156.NASL", "EULEROS_SA-2021-1160.NASL", "EULEROS_SA-2021-1166.NASL", "EULEROS_SA-2021-1173.NASL", "EULEROS_SA-2021-1175.NASL", "EULEROS_SA-2021-1221.NASL", "EULEROS_SA-2021-1257.NASL", "EULEROS_SA-2021-1276.NASL", "EULEROS_SA-2021-1825.NASL", "EULEROS_SA-2021-1826.NASL", "EULEROS_SA-2021-1831.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1856.NASL", "EULEROS_SA-2021-1920.NASL", "EULEROS_SA-2021-1921.NASL", "EULEROS_SA-2021-1928.NASL", "EULEROS_SA-2021-1934.NASL", "EULEROS_SA-2021-1935.NASL", "EULEROS_SA-2021-1936.NASL", "EULEROS_SA-2021-1941.NASL", "EULEROS_SA-2021-1942.NASL", "EULEROS_SA-2021-1949.NASL", "EULEROS_SA-2021-1955.NASL", "EULEROS_SA-2021-1956.NASL", "EULEROS_SA-2021-1957.NASL", "EULEROS_SA-2021-1960.NASL", "EULEROS_SA-2021-1962.NASL", "EULEROS_SA-2021-1965.NASL", "EULEROS_SA-2021-1969.NASL", "EULEROS_SA-2021-1970.NASL", "EULEROS_SA-2021-1973.NASL", "EULEROS_SA-2021-2456.NASL", "EULEROS_SA-2021-2457.NASL", "EULEROS_SA-2021-2464.NASL", "EULEROS_SA-2021-2474.NASL", "EULEROS_SA-2021-2489.NASL", "EULEROS_SA-2021-2501.NASL", "EULEROS_SA-2021-2510.NASL", "EULEROS_SA-2021-2520.NASL", "EULEROS_SA-2021-2535.NASL", "EULEROS_SA-2021-2537.NASL", "EULEROS_SA-2021-2542.NASL", "EULEROS_SA-2021-2559.NASL", "EULEROS_SA-2021-2561.NASL", "EULEROS_SA-2021-2566.NASL", "EULEROS_SA-2021-2808.NASL", "EULEROS_SA-2021-2831.NASL", "EULEROS_SA-2022-1265.NASL", "F5_BIGIP_SOL40508224.NASL", "F5_BIGIP_SOL63025104.NASL", "FEDORA_2016-3C5D606035.NASL", "FEDORA_2016-B2DFB591CD.NASL", "FEDORA_2017-03954B6DC4.NASL", "FEDORA_2017-1206F87545.NASL", "FEDORA_2017-4E2312892E.NASL", "FEDORA_2018-02A38AF202.NASL", "FEDORA_2018-1B4F1158E2.NASL", "FEDORA_2018-40DC8B8B16.NASL", "FEDORA_2018-76AFAF1961.NASL", "FEDORA_2018-9490B422E7.NASL", "FEDORA_2019-79B5790566.NASL", "FEDORA_2019-A6960910D8.NASL", "FEDORA_2019-BCAD44B5D6.NASL", "FEDORA_2019-F511B38B1F.NASL", "FEDORA_2020-0B32A59B54.NASL", "FEDORA_2020-0DF38B2843.NASL", "FEDORA_2020-0E055EA503.NASL", "FEDORA_2020-27B577AB23.NASL", "FEDORA_2020-307946CFB6.NASL", "FEDORA_2020-32193CBBE6.NASL", "FEDORA_2020-3838C8EA98.NASL", "FEDORA_2020-3E00413763.NASL", "FEDORA_2020-4A8F110332.NASL", "FEDORA_2020-7473744DE1.NASL", "FEDORA_2020-7AB62C73BC.NASL", "FEDORA_2020-A31B01E945.NASL", "FEDORA_2020-A857113C7A.NASL", "FEDORA_2020-BB91BF9B8E.NASL", "FEDORA_2020-CE396E7D5C.NASL", "FEDORA_2020-D32853A28D.NASL", "FEDORA_2020-D7B29838F6.NASL", "FEDORA_2020-DA2D1EF2D7.NASL", "FEDORA_2020-F80E5C0D65.NASL", "FEDORA_2020-FBB94073A1.NASL", "FEDORA_2021-2CB63D912A.NASL", "FEDORA_2021-33A1B73E48.NASL", "FEDORA_2021-42BA9FEB47.NASL", "FEDORA_2021-8840CBDCCD.NASL", "FEDORA_2021-C07A9E79CF.NASL", "FEDORA_2021-CAB5C9BEFB.NASL", "FEDORA_2021-CC3FF94CFC.NASL", "FEDORA_2021-CED31F3F0C.NASL", "FEDORA_2021-E3A5A74610.NASL", "FEDORA_2021-FAF88B9499.NASL", "FREEBSD_PKG_012809CE83F311EA92AB00163E433440.NASL", "FREEBSD_PKG_08B553ED537A11EBBE6E0022489AD614.NASL", "FREEBSD_PKG_20006B5FA0BC11EB8AE6FC4DD43E2B6A.NASL", "FREEBSD_PKG_36A35D83C56011EB84ABE0D55E2A8BF9.NASL", "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "FREEBSD_PKG_3AE106E2D52111E6AE1B002590263BF5.NASL", "FREEBSD_PKG_4CB165F06E48423E814792255D35C0F7.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_5A9BBB6E32D311E8A7696DAABA161086.NASL", "FREEBSD_PKG_5E0A038ACA30416DA2F538CBF5E7DF33.NASL", "FREEBSD_PKG_AD7921692AA411EBAB710022489AD614.NASL", "FREEBSD_PKG_AF61B2719E474DB0A0F629FB032236A3.NASL", "FREEBSD_PKG_B7CFF5A931CC11E88F07B499BAEBFEAF.NASL", "FREEBSD_PKG_E84831158B8E11EABDCF001B217B3468.NASL", "FREEBSD_PKG_EB888CE51F1911E9BE054C72B94353B5.NASL", "FREEBSD_PKG_F3CF4B33601311EB9A0E206A8A720317.NASL", "GENTOO_GLSA-201705-04.NASL", "GENTOO_GLSA-202003-48.NASL", "GENTOO_GLSA-202004-10.NASL", "GENTOO_GLSA-202011-17.NASL", "GENTOO_GLSA-202011-18.NASL", "GENTOO_GLSA-202012-11.NASL", "GENTOO_GLSA-202012-13.NASL", "GENTOO_GLSA-202012-14.NASL", "GENTOO_GLSA-202012-23.NASL", "GENTOO_GLSA-202101-07.NASL", "GENTOO_GLSA-202101-18.NASL", "GENTOO_GLSA-202101-19.NASL", "GENTOO_GLSA-202101-29.NASL", "GENTOO_GLSA-202101-33.NASL", "GENTOO_GLSA-202104-04.NASL", "LCE_5_1_1.NASL", "LIBGCRYPT_1_9_0.NASL", "LINUX_CVE-2021-3156.NBIN", "MACOS_HT212325.NASL", "MACOS_HT212326.NASL", "MACOS_HT212327.NASL", "MOZILLA_THUNDERBIRD_52_1.NASL", "MYSQL_5_7_34.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_27.NASL", "NEWSTART_CGSL_NS-SA-2019-0242_SYSTEMD.NASL", "NODEJS_2020_NOV.NASL", "NODEJS_2021_JAN.NASL", "NTP_4_2_8P14.NASL", "OPENJDK_2021-07-20.NASL", "OPENSUSE-2017-509.NASL", "OPENSUSE-2017-545.NASL", "OPENSUSE-2018-1091.NASL", "OPENSUSE-2018-1110.NASL", "OPENSUSE-2018-361.NASL", "OPENSUSE-2018-5.NASL", "OPENSUSE-2019-152.NASL", "OPENSUSE-2019-2466.NASL", "OPENSUSE-2020-113.NASL", "OPENSUSE-2020-147.NASL", "OPENSUSE-2020-1888.NASL", "OPENSUSE-2020-2037.NASL", "OPENSUSE-2020-2045.NASL", "OPENSUSE-2020-2062.NASL", "OPENSUSE-2020-2092.NASL", "OPENSUSE-2020-2245.NASL", "OPENSUSE-2020-2249.NASL", "OPENSUSE-2020-2269.NASL", "OPENSUSE-2020-2367.NASL", "OPENSUSE-2021-1059.NASL", "OPENSUSE-2021-1061.NASL", "OPENSUSE-2021-12.NASL", "OPENSUSE-2021-140.NASL", "OPENSUSE-2021-169.NASL", "OPENSUSE-2021-170.NASL", "OPENSUSE-2021-1843.NASL", "OPENSUSE-2021-221.NASL", "OPENSUSE-2021-4153.NASL", "OPENSUSE-2021-43.NASL", "OPENSUSE-2021-64.NASL", "OPENSUSE-2021-65.NASL", "OPENSUSE-2021-66.NASL", "OPENSUSE-2021-81.NASL", "OPENSUSE-2021-82.NASL", "OPENSUSE-2021-832.NASL", "OPENSUSE-2021-838.NASL", "ORACLELINUX_ELSA-2017-1100.NASL", "ORACLELINUX_ELSA-2017-1101.NASL", "ORACLELINUX_ELSA-2018-4228.NASL", "ORACLELINUX_ELSA-2018-4248.NASL", "ORACLELINUX_ELSA-2018-4249.NASL", "ORACLELINUX_ELSA-2020-0122.NASL", "ORACLELINUX_ELSA-2020-0128.NASL", "ORACLELINUX_ELSA-2020-0157.NASL", "ORACLELINUX_ELSA-2020-0194.NASL", "ORACLELINUX_ELSA-2020-0196.NASL", "ORACLELINUX_ELSA-2020-0202.NASL", "ORACLELINUX_ELSA-2020-5493.NASL", "ORACLELINUX_ELSA-2021-0162.NASL", "ORACLELINUX_ELSA-2021-0218.NASL", "ORACLELINUX_ELSA-2021-0221.NASL", "ORACLELINUX_ELSA-2021-0343.NASL", "ORACLELINUX_ELSA-2021-1354.NASL", "ORACLELINUX_ELSA-2021-1384.NASL", "ORACLELINUX_ELSA-2021-2238.NASL", "ORACLELINUX_ELSA-2021-2776.NASL", "ORACLELINUX_ELSA-2021-2781.NASL", "ORACLELINUX_ELSA-2021-2784.NASL", "ORACLELINUX_ELSA-2021-2845.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4160.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-9019.NASL", "ORACLELINUX_ELSA-2021-9294.NASL", "ORACLELINUX_ELSA-2021-9561.NASL", "ORACLEVM_OVMSA-2021-0003.NASL", "ORACLEVM_OVMSA-2021-0011.NASL", "ORACLEVM_OVMSA-2021-0012.NASL", "ORACLE_ACCESS_MANAGER_CPU_JUL_2021.NASL", "ORACLE_BI_PUBLISHER_APR_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_JUL_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_OCT_2019_CPU.NASL", "ORACLE_BPM_CPU_JAN_2021.NASL", "ORACLE_COHERENCE_CPU_APR_2021.NASL", "ORACLE_COHERENCE_CPU_JAN_2021.NASL", "ORACLE_COHERENCE_CPU_JUL_2021.NASL", "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_JUL_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JUL_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_JAN_2019_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OCT_2018_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_APR_2021_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JAN_2019_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2019_CPU.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2021.NASL", "ORACLE_JAVA_CPU_JAN_2020.NASL", "ORACLE_JAVA_CPU_JAN_2020_UNIX.NASL", "ORACLE_JDEVELOPER_CPU_JUL_2021.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2021.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_23.NASL", "ORACLE_NOSQL_CPU_APR_2021.NASL", "ORACLE_NOSQL_CPU_OCT_2021.NASL", "ORACLE_OATS_CPU_APR_2021.NASL", "ORACLE_OATS_CPU_JAN_2020.NASL", "ORACLE_OATS_CPU_JAN_2021.NASL", "ORACLE_OATS_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2019.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_APR_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2021.NASL", "ORACLE_RDBMS_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_OCT_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JAN_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2020.NBIN", "ORACLE_WEBCENTER_SITES_APR_2020_CPU.NASL", "ORACLE_WEBCENTER_SITES_JAN_2021_CPU.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2021.NASL", "PHOTONOS_PHSA-2017-0042_OPENSSL.NASL", "PHOTONOS_PHSA-2018-1_0-0149_OPENSSL.NASL", "PHOTONOS_PHSA-2018-2_0-0078_OPENSSL.NASL", "PHOTONOS_PHSA-2019-1_0-0203_SYSTEMD.NASL", "PHOTONOS_PHSA-2020-1_0-0289_NODEJS10.NASL", "PHOTONOS_PHSA-2020-1_0-0292_NTP.NASL", "PHOTONOS_PHSA-2020-1_0-0350_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0235_LZ4.NASL", "PHOTONOS_PHSA-2020-2_0-0239_NTP.NASL", "PHOTONOS_PHSA-2020-2_0-0254_PERL.NASL", "PHOTONOS_PHSA-2020-3_0-0082_NXTGN.NASL", "PHOTONOS_PHSA-2020-3_0-0083_LZ4.NASL", "PHOTONOS_PHSA-2020-3_0-0180_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0358_SUDO.NASL", "PHOTONOS_PHSA-2021-1_0-0378_C.NASL", "PHOTONOS_PHSA-2021-1_0-0397_POLKIT.NASL", "PHOTONOS_PHSA-2021-2_0-0308_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0315_SUDO.NASL", "PHOTONOS_PHSA-2021-2_0-0337_C.NASL", "PHOTONOS_PHSA-2021-2_0-0350_POLKIT.NASL", "PHOTONOS_PHSA-2021-2_0-0357_LZ4.NASL", "PHOTONOS_PHSA-2021-2_0-0358_ZOOKEEPER.NASL", "PHOTONOS_PHSA-2021-3_0-0188_SUDO.NASL", "PHOTONOS_PHSA-2021-3_0-0227_SQLITE.NASL", "PHOTONOS_PHSA-2021-3_0-0248_GO.NASL", "PHOTONOS_PHSA-2021-3_0-0248_POLKIT.NASL", "PHOTONOS_PHSA-2021-3_0-0254_ZOOKEEPER.NASL", "PHOTONOS_PHSA-2021-3_0-0255_LZ4.NASL", "PHOTONOS_PHSA-2021-4_0-0037_POLKIT.NASL", "PHOTONOS_PHSA-2021-4_0-0047_LZ4.NASL", "PYTHON_3_9_1.NASL", "REDHAT-RHSA-2017-1100.NASL", "REDHAT-RHSA-2017-1102.NASL", "REDHAT-RHSA-2017-1103.NASL", "REDHAT-RHSA-2019-0367.NASL", "REDHAT-RHSA-2019-3932.NASL", "REDHAT-RHSA-2019-3933.NASL", "REDHAT-RHSA-2020-0122.NASL", "REDHAT-RHSA-2020-0128.NASL", "REDHAT-RHSA-2020-0157.NASL", "REDHAT-RHSA-2020-0159.NASL", "REDHAT-RHSA-2020-0160.NASL", "REDHAT-RHSA-2020-0161.NASL", "REDHAT-RHSA-2020-0194.NASL", "REDHAT-RHSA-2020-0196.NASL", "REDHAT-RHSA-2020-0202.NASL", "REDHAT-RHSA-2020-0231.NASL", "REDHAT-RHSA-2020-0232.NASL", "REDHAT-RHSA-2020-0465.NASL", "REDHAT-RHSA-2020-0467.NASL", "REDHAT-RHSA-2020-0468.NASL", "REDHAT-RHSA-2020-0469.NASL", "REDHAT-RHSA-2020-0470.NASL", "REDHAT-RHSA-2020-0962.NASL", "REDHAT-RHSA-2020-1264.NASL", "REDHAT-RHSA-2020-1308.NASL", "REDHAT-RHSA-2020-1325.NASL", "REDHAT-RHSA-2020-1454.NASL", "REDHAT-RHSA-2020-1510.NASL", "REDHAT-RHSA-2020-1644.NASL", "REDHAT-RHSA-2020-3936.NASL", "REDHAT-RHSA-2020-5168.NASL", "REDHAT-RHSA-2020-5175.NASL", "REDHAT-RHSA-2020-5179.NASL", "REDHAT-RHSA-2020-5637.NASL", "REDHAT-RHSA-2020-5639.NASL", "REDHAT-RHSA-2020-5640.NASL", "REDHAT-RHSA-2020-5641.NASL", "REDHAT-RHSA-2020-5642.NASL", "REDHAT-RHSA-2021-0079.NASL", "REDHAT-RHSA-2021-0162.NASL", "REDHAT-RHSA-2021-0218.NASL", "REDHAT-RHSA-2021-0219.NASL", "REDHAT-RHSA-2021-0220.NASL", "REDHAT-RHSA-2021-0221.NASL", "REDHAT-RHSA-2021-0222.NASL", "REDHAT-RHSA-2021-0223.NASL", "REDHAT-RHSA-2021-0224.NASL", "REDHAT-RHSA-2021-0225.NASL", "REDHAT-RHSA-2021-0226.NASL", "REDHAT-RHSA-2021-0227.NASL", "REDHAT-RHSA-2021-0246.NASL", "REDHAT-RHSA-2021-0247.NASL", "REDHAT-RHSA-2021-0248.NASL", "REDHAT-RHSA-2021-0343.NASL", "REDHAT-RHSA-2021-0381.NASL", "REDHAT-RHSA-2021-0395.NASL", "REDHAT-RHSA-2021-0401.NASL", "REDHAT-RHSA-2021-1032.NASL", "REDHAT-RHSA-2021-1266.NASL", "REDHAT-RHSA-2021-1354.NASL", "REDHAT-RHSA-2021-1384.NASL", "REDHAT-RHSA-2021-1511.NASL", "REDHAT-RHSA-2021-2237.NASL", "REDHAT-RHSA-2021-2238.NASL", "REDHAT-RHSA-2021-2472.NASL", "REDHAT-RHSA-2021-2522.NASL", "REDHAT-RHSA-2021-2774.NASL", "REDHAT-RHSA-2021-2775.NASL", "REDHAT-RHSA-2021-2776.NASL", "REDHAT-RHSA-2021-2781.NASL", "REDHAT-RHSA-2021-2782.NASL", "REDHAT-RHSA-2021-2783.NASL", "REDHAT-RHSA-2021-2784.NASL", "REDHAT-RHSA-2021-2792.NASL", "REDHAT-RHSA-2021-2845.NASL", "REDHAT-RHSA-2021-2865.NASL", "REDHAT-RHSA-2021-4861.NASL", "SECURITYCENTER_5_17_0_TNS_2020_11.NASL", "SECURITYCENTER_5_19_0_TNS_2021_14.NASL", "SECURITYCENTER_5_7_1_TNS_2018_12.NASL", "SLACKWARE_SSA_2018-087-01.NASL", "SLACKWARE_SSA_2019-022-01.NASL", "SLACKWARE_SSA_2021-026-01.NASL", "SLACKWARE_SSA_2021-158-02.NASL", "SL_20170420_NSS_AND_NSS_UTIL_ON_SL6_X.NASL", "SL_20170420_NSS_UTIL_ON_SL6_X.NASL", "SL_20200116_JAVA_11_OPENJDK_ON_SL7_X.NASL", "SL_20200121_APACHE_COMMONS_BEANUTILS_ON_SL7_X.NASL", "SL_20200121_JAVA_1_8_0_OPENJDK_ON_SL6_X.NASL", "SL_20200122_JAVA_1_8_0_OPENJDK_ON_SL7_X.NASL", "SL_20210119_XSTREAM_ON_SL7_X.NASL", "SL_20210126_SUDO_ON_SL7_X.NASL", "SL_20210202_PERL_ON_SL7_X.NASL", "SL_20210721_JAVA_11_OPENJDK_ON_SL7_X.NASL", "SL_20210721_JAVA_1_8_0_OPENJDK_ON_SL7_X.NASL", "SMB_NT_MS21_JAN_VISUAL_STUDIO.NASL", "SOLARIS_JUL2021_SRU11_3_36_26_0.NASL", "SOLARIS_JUL2021_SRU11_4_34_94_4.NASL", "SPRING_CVE-2020-5398.NASL", "STRUTS_CVE_2020_17530.NBIN", "SUSE_SU-2018-0902-1.NASL", "SUSE_SU-2018-0906-1.NASL", "SUSE_SU-2018-0925-1.NASL", "SUSE_SU-2018-2928-1.NASL", "SUSE_SU-2018-2928-2.NASL", "SUSE_SU-2019-0197-1.NASL", "SUSE_SU-2020-0140-1.NASL", "SUSE_SU-2020-0213-1.NASL", "SUSE_SU-2020-0231-1.NASL", "SUSE_SU-2020-0261-1.NASL", "SUSE_SU-2020-1058-1.NASL", "SUSE_SU-2020-14287-1.NASL", "SUSE_SU-2020-14375-1.NASL", "SUSE_SU-2020-14415-1.NASL", "SUSE_SU-2020-14491-1.NASL", "SUSE_SU-2020-14511-1.NASL", "SUSE_SU-2020-14560-1.NASL", "SUSE_SU-2020-14585-1.NASL", "SUSE_SU-2021-0060-1.NASL", "SUSE_SU-2021-0061-1.NASL", "SUSE_SU-2021-0062-1.NASL", "SUSE_SU-2021-0068-1.NASL", "SUSE_SU-2021-0082-1.NASL", "SUSE_SU-2021-0225-1.NASL", "SUSE_SU-2021-0226-1.NASL", "SUSE_SU-2021-0227-1.NASL", "SUSE_SU-2021-0232-1.NASL", "SUSE_SU-2021-1267-1.NASL", "SUSE_SU-2021-1273-1.NASL", "SUSE_SU-2021-1274-1.NASL", "SUSE_SU-2021-1275-1.NASL", "SUSE_SU-2021-1396-1.NASL", "SUSE_SU-2021-14667-1.NASL", "SUSE_SU-2021-14670-1.NASL", "SUSE_SU-2021-14705-1.NASL", "SUSE_SU-2021-14707-1.NASL", "SUSE_SU-2021-14735-1.NASL", "SUSE_SU-2021-1825-1.NASL", "SUSE_SU-2021-1842-1.NASL", "SUSE_SU-2021-1843-1.NASL", "SUSE_SU-2021-1844-1.NASL", "SUSE_SU-2021-4153-1.NASL", "SUSE_SU-2022-0107-1.NASL", "SUSE_SU-2022-0108-1.NASL", "SUSE_SU-2022-14875-1.NASL", "TOMCAT_10_0_0_M5.NASL", "TOMCAT_10_0_2.NASL", "TOMCAT_8_5_55.NASL", "TOMCAT_9_0_35.NASL", "UBUNTU_USN-3260-1.NASL", "UBUNTU_USN-3270-1.NASL", "UBUNTU_USN-3611-1.NASL", "UBUNTU_USN-4257-1.NASL", "UBUNTU_USN-4497-1.NASL", "UBUNTU_USN-4504-1.NASL", "UBUNTU_USN-4602-1.NASL", "UBUNTU_USN-4635-1.NASL", "UBUNTU_USN-4638-1.NASL", "UBUNTU_USN-4685-1.NASL", "UBUNTU_USN-4686-1.NASL", "UBUNTU_USN-4705-1.NASL", "UBUNTU_USN-4714-1.NASL", "UBUNTU_USN-4968-2.NASL", "UBUNTU_USN-4980-1.NASL", "UBUNTU_USN-5021-1.NASL", "UBUNTU_USN-5022-1.NASL", "VIRTUALBOX_JUL_2021_CPU.NASL", "VIRTUOZZO_VZLSA-2017-1100.NASL", "WEB_APPLICATION_SCANNING_112383", "WEB_APPLICATION_SCANNING_112426", "WEB_APPLICATION_SCANNING_112427", "WEB_APPLICATION_SCANNING_112428", "WEB_APPLICATION_SCANNING_112429", "WEB_APPLICATION_SCANNING_112430", "WEB_APPLICATION_SCANNING_112437", "WEB_APPLICATION_SCANNING_112438", "WEB_APPLICATION_SCANNING_112485", "WEB_APPLICATION_SCANNING_112548", "WEB_APPLICATION_SCANNING_112549", "WEB_APPLICATION_SCANNING_112557", "WEB_APPLICATION_SCANNING_112558", "WEB_APPLICATION_SCANNING_112667", "WEB_APPLICATION_SCANNING_112668", "WEB_APPLICATION_SCANNING_112669", "WEB_APPLICATION_SCANNING_112676", "WEB_APPLICATION_SCANNING_112704", "WEB_APPLICATION_SCANNING_112706", "WEB_APPLICATION_SCANNING_112709", "WEB_APPLICATION_SCANNING_112710", "WEB_APPLICATION_SCANNING_112711", "WEB_APPLICATION_SCANNING_112712", "WEB_APPLICATION_SCANNING_112765"]}, {"type": "nodejs", "idList": ["NODEJS:1467"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2021-23840"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108601", "OPENVAS:1361412562310108752", "OPENVAS:1361412562310108753", "OPENVAS:1361412562310141961", "OPENVAS:1361412562310141962", "OPENVAS:1361412562310142314", "OPENVAS:1361412562310142508", "OPENVAS:1361412562310142509", "OPENVAS:1361412562310143812", "OPENVAS:1361412562310143813", "OPENVAS:1361412562310704157", "OPENVAS:1361412562310704158", "OPENVAS:1361412562310704434", "OPENVAS:1361412562310704460", "OPENVAS:1361412562310704461", "OPENVAS:1361412562310704605", "OPENVAS:1361412562310704661", "OPENVAS:1361412562310704669", "OPENVAS:1361412562310810756", "OPENVAS:1361412562310810758", "OPENVAS:1361412562310810760", "OPENVAS:1361412562310810761", "OPENVAS:1361412562310815899", "OPENVAS:1361412562310816603", "OPENVAS:1361412562310843135", "OPENVAS:1361412562310843157", "OPENVAS:1361412562310843171", "OPENVAS:1361412562310843487", "OPENVAS:1361412562310843673", "OPENVAS:1361412562310844315", "OPENVAS:1361412562310851540", "OPENVAS:1361412562310851920", "OPENVAS:1361412562310852686", "OPENVAS:1361412562310852849", "OPENVAS:1361412562310852913", "OPENVAS:1361412562310852930", "OPENVAS:1361412562310852959", "OPENVAS:1361412562310853015", "OPENVAS:1361412562310853022", "OPENVAS:1361412562310853207", "OPENVAS:1361412562310853223", "OPENVAS:1361412562310853226", "OPENVAS:1361412562310871803", "OPENVAS:1361412562310874313", "OPENVAS:1361412562310874318", "OPENVAS:1361412562310874324", "OPENVAS:1361412562310874326", "OPENVAS:1361412562310875785", "OPENVAS:1361412562310875894", "OPENVAS:1361412562310876003", "OPENVAS:1361412562310876042", "OPENVAS:1361412562310876319", "OPENVAS:1361412562310876320", "OPENVAS:1361412562310876325", "OPENVAS:1361412562310876327", "OPENVAS:1361412562310876342", "OPENVAS:1361412562310876414", "OPENVAS:1361412562310876994", "OPENVAS:1361412562310877098", "OPENVAS:1361412562310877119", "OPENVAS:1361412562310877134", "OPENVAS:1361412562310877152", "OPENVAS:1361412562310877192", "OPENVAS:1361412562310877212", "OPENVAS:1361412562310877235", "OPENVAS:1361412562310877238", "OPENVAS:1361412562310877267", "OPENVAS:1361412562310877283", "OPENVAS:1361412562310877291", "OPENVAS:1361412562310877322", "OPENVAS:1361412562310877432", "OPENVAS:1361412562310877449", "OPENVAS:1361412562310877452", "OPENVAS:1361412562310877455", "OPENVAS:1361412562310877456", "OPENVAS:1361412562310877736", "OPENVAS:1361412562310877748", "OPENVAS:1361412562310877816", "OPENVAS:1361412562310877967", "OPENVAS:1361412562310877975", "OPENVAS:1361412562310877986", "OPENVAS:1361412562310877995", "OPENVAS:1361412562310882698", "OPENVAS:1361412562310882701", "OPENVAS:1361412562310882702", "OPENVAS:1361412562310882704", "OPENVAS:1361412562310883164", "OPENVAS:1361412562310883171", "OPENVAS:1361412562310883173", "OPENVAS:1361412562310883175", "OPENVAS:1361412562310891330", "OPENVAS:1361412562310891777", "OPENVAS:1361412562310891797", "OPENVAS:1361412562310891801", "OPENVAS:1361412562310891896", "OPENVAS:1361412562310891984", "OPENVAS:1361412562310892191", "OPENVAS:1361412562310892201", "OPENVAS:1361412562311220171075", "OPENVAS:1361412562311220171076", "OPENVAS:1361412562311220181214", "OPENVAS:1361412562311220181257", "OPENVAS:1361412562311220181258", "OPENVAS:1361412562311220181306", "OPENVAS:1361412562311220181383", "OPENVAS:1361412562311220181392", "OPENVAS:1361412562311220181420", "OPENVAS:1361412562311220191009", "OPENVAS:1361412562311220191084", "OPENVAS:1361412562311220191164", "OPENVAS:1361412562311220191185", "OPENVAS:1361412562311220191201", "OPENVAS:1361412562311220191643", "OPENVAS:1361412562311220191998", "OPENVAS:1361412562311220192030", "OPENVAS:1361412562311220192232", "OPENVAS:1361412562311220192291", "OPENVAS:1361412562311220192360", "OPENVAS:1361412562311220192364", "OPENVAS:1361412562311220192542", "OPENVAS:1361412562311220192630", "OPENVAS:1361412562311220201057", "OPENVAS:1361412562311220201395", "OPENVAS:1361412562311220201451", "OPENVAS:703831", "OPENVAS:703871", "OPENVAS:703872"]}, {"type": "oracle", "idList": ["ORACLE:CPUJAN2022", "ORACLE:CPUOCT2019-5072832"]}, {"type": "oraclelinux", "idList": ["ELSA-2017-1100", "ELSA-2017-1101", "ELSA-2018-4228", "ELSA-2018-4229", "ELSA-2018-4248", "ELSA-2018-4249", "ELSA-2018-4253", "ELSA-2018-4254", "ELSA-2019-2091", "ELSA-2019-2471", "ELSA-2020-0122", "ELSA-2020-0128", "ELSA-2020-0157", "ELSA-2020-0196", "ELSA-2020-0202", "ELSA-2020-1317", "ELSA-2020-2663", "ELSA-2020-5493", "ELSA-2021-0162", "ELSA-2021-0218", "ELSA-2021-0221", "ELSA-2021-0343", "ELSA-2021-1354", "ELSA-2021-1384", "ELSA-2021-2238", "ELSA-2021-2575", "ELSA-2021-2776", "ELSA-2021-2781", "ELSA-2021-2784", "ELSA-2021-2845", "ELSA-2021-4151", "ELSA-2021-4160", "ELSA-2021-4162", "ELSA-2021-9019", "ELSA-2021-9294"]}, {"type": "osv", "idList": ["OSV:GHSA-26VR-8J45-3R4W", "OSV:GHSA-288C-CQ4H-88GQ", "OSV:GHSA-2H3J-M7GR-25XJ", "OSV:GHSA-2HW2-62CP-P9P7", "OSV:GHSA-2P3X-QW9C-25HH", "OSV:GHSA-344F-F5VG-2JFJ", "OSV:GHSA-35JH-R3H4-6JHM", "OSV:GHSA-36QH-35CM-5W2W", "OSV:GHSA-3C6G-PVG8-GQW2", "OSV:GHSA-43GC-MJXG-GVRQ", "OSV:GHSA-4HRM-M67V-5CXR", "OSV:GHSA-4P6W-M9WC-C9C9", "OSV:GHSA-53X6-4X5P-RRVV", "OSV:GHSA-59JW-JQF4-3WQ3", "OSV:GHSA-5R5R-6HPJ-8GG9", "OSV:GHSA-6C3J-C64M-QHGQ", "OSV:GHSA-6JMF-MXWF-R3JC", "OSV:GHSA-6PHF-73Q6-GH87", "OSV:GHSA-74CV-F58X-F9WF", "OSV:GHSA-7R82-7XV7-XCPJ", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-84RM-QF37-FGC2", "OSV:GHSA-89QR-369F-5M5X", "OSV:GHSA-8C4J-34R4-XR8G", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-8W26-6F25-CM9X", "OSV:GHSA-9GPH-22XH-8X98", "OSV:GHSA-9M6F-7XCQ-8VF8", "OSV:GHSA-9QCF-C26R-X5RF", "OSV:GHSA-C265-37VJ-CWCC", "OSV:GHSA-C6PW-Q7F2-97HV", "OSV:GHSA-C9JJ-3WVG-Q65H", "OSV:GHSA-CVM9-FJM9-3572", "OSV:GHSA-F256-J965-7F32", "OSV:GHSA-F6HM-88X3-MFJV", "OSV:GHSA-F9XH-2QGP-CQ57", "OSV:GHSA-FG3J-Q579-V8X4", "OSV:GHSA-G2FG-MR77-6VRM", "OSV:GHSA-GXR4-XJJ5-5PX2", "OSV:GHSA-H3CW-G4MQ-C5X2", "OSV:GHSA-HPCF-8VF9-Q4GJ", "OSV:GHSA-HRCP-8F3Q-4W2C", "OSV:GHSA-HVV8-336G-RX3M", "OSV:GHSA-HWJ3-M3P6-HJ38", "OSV:GHSA-HWPC-8XQV-JVJ4", "OSV:GHSA-J823-4QCH-3RGM", "OSV:GHSA-J9WF-VVM6-4R9W", "OSV:GHSA-JPCQ-CGW6-V4J6", "OSV:GHSA-JQ65-29V4-4X35", "OSV:GHSA-JXFH-8WGV-VFR2", "OSV:GHSA-M6X4-97WX-4Q27", "OSV:GHSA-P6MC-M468-83GW", "OSV:GHSA-QGM6-9472-PWQ7", "OSV:GHSA-QJW2-HR98-QGFH", "OSV:GHSA-R3GR-CXRF-HG25", "OSV:GHSA-R695-7VR9-JGC2", "OSV:GHSA-V585-23HC-C647", "OSV:GHSA-VFQX-33QM-G869", "OSV:GHSA-VMQM-G3VH-847M", "OSV:GHSA-WH8G-3J2C-RQJ5"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:149972", "PACKETSTORM:152756", "PACKETSTORM:155886", "PACKETSTORM:157207", "PACKETSTORM:160721", "PACKETSTORM:161160", "PACKETSTORM:161230", "PACKETSTORM:161270", "PACKETSTORM:161293", "PACKETSTORM:163142", "PACKETSTORM:165255", "PACKETSTORM:165258"]}, {"type": "paloalto", "idList": ["PAN-SA-2018-0015"]}, {"type": "photon", "idList": ["PHSA-2018-1.0-0149", "PHSA-2018-2.0-0078", "PHSA-2019-1.0-0203", "PHSA-2019-1.0-0230", "PHSA-2019-1.0-0237", "PHSA-2019-2.0-0120", "PHSA-2019-2.0-0157", "PHSA-2019-2.0-0161", "PHSA-2019-3.0-0013", "PHSA-2019-3.0-0017", "PHSA-2020-0289", "PHSA-2020-0292", "PHSA-2020-0298", "PHSA-2020-0301", "PHSA-2020-1.0-0289", "PHSA-2020-1.0-0292", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0301", "PHSA-2020-1.0-0302", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0312", "PHSA-2020-1.0-0321", "PHSA-2020-1.0-0324", "PHSA-2020-1.0-0335", "PHSA-2020-1.0-0345", "PHSA-2020-1.0-0346", "PHSA-2020-1.0-0350", "PHSA-2020-2.0-0233", "PHSA-2020-2.0-0235", "PHSA-2020-2.0-0239", "PHSA-2020-2.0-0247", "PHSA-2020-2.0-0248", "PHSA-2020-2.0-0254", "PHSA-2020-2.0-0265", "PHSA-2020-2.0-0269", "PHSA-2020-2.0-0281", "PHSA-2020-2.0-0284", "PHSA-2020-2.0-0291", "PHSA-2020-2.0-0304", "PHSA-2020-3.0-0060", "PHSA-2020-3.0-0082", "PHSA-2020-3.0-0083", "PHSA-2020-3.0-0093", "PHSA-2020-3.0-0099", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0104", "PHSA-2020-3.0-0116", "PHSA-2020-3.0-0135", "PHSA-2020-3.0-0155", "PHSA-2020-3.0-0174", "PHSA-2020-3.0-0175", "PHSA-2020-3.0-0180", "PHSA-2021-0342", "PHSA-2021-0372", "PHSA-2021-0373", "PHSA-2021-0377", "PHSA-2021-0378", "PHSA-2021-0393", "PHSA-2021-0412", "PHSA-2021-0427", "PHSA-2021-1.0-0358", "PHSA-2021-1.0-0366", "PHSA-2021-1.0-0372", "PHSA-2021-1.0-0373", "PHSA-2021-1.0-0377", "PHSA-2021-1.0-0378", "PHSA-2021-1.0-0393", "PHSA-2021-1.0-0397", "PHSA-2021-1.0-0412", "PHSA-2021-1.0-0420", "PHSA-2021-1.0-0427", "PHSA-2021-2.0-0308", "PHSA-2021-2.0-0315", "PHSA-2021-2.0-0317", "PHSA-2021-2.0-0323", "PHSA-2021-2.0-0325", "PHSA-2021-2.0-0327", "PHSA-2021-2.0-0328", "PHSA-2021-2.0-0330", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0334", "PHSA-2021-2.0-0337", "PHSA-2021-2.0-0349", "PHSA-2021-2.0-0350", "PHSA-2021-2.0-0357", "PHSA-2021-2.0-0358", "PHSA-2021-2.0-0366", "PHSA-2021-2.0-0375", "PHSA-2021-2.0-0381", "PHSA-2021-3.0-0188", "PHSA-2021-3.0-0192", "PHSA-2021-3.0-0200", "PHSA-2021-3.0-0204", "PHSA-2021-3.0-0208", "PHSA-2021-3.0-0209", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0215", "PHSA-2021-3.0-0227", "PHSA-2021-3.0-0243", "PHSA-2021-3.0-0248", "PHSA-2021-3.0-0254", "PHSA-2021-3.0-0255", "PHSA-2021-3.0-0277", "PHSA-2021-4.0-0006", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0028", "PHSA-2021-4.0-0033", "PHSA-2021-4.0-0036", "PHSA-2021-4.0-0037", "PHSA-2021-4.0-0047", "PHSA-2021-4.0-0072", "PHSA-2021-4.0-0077"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:09A996513FDD86534E6C20CD7200C36D", "QUALYSBLOG:8A2B26102098E31C5F8E392A55929F58", "QUALYSBLOG:A341C9278C6DD389E0F263AE83CB5579", "QUALYSBLOG:E9408B9A1592F0FED621B417D14ABECD"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:5482AC1594C82A230828023816657B57", "RAPID7BLOG:5D8768D89A817B5475C9FEA3577FB0BC", "RAPID7BLOG:A8AF62CC15B38126207722D29F080EE3", "RAPID7BLOG:B7BFF90DF2218C3CFB5ABB1CFE63700E", "RAPID7BLOG:BCCD03F6B72FD7F9410FC063D6F16682"]}, {"type": "redhat", "idList": ["RHSA-2016:0123", "RHSA-2017:1100", "RHSA-2017:1102", "RHSA-2019:2091", "RHSA-2019:2587", "RHSA-2020:0057", "RHSA-2020:0811", "RHSA-2020:0856", "RHSA-2020:1422", "RHSA-2020:1454", "RHSA-2020:1538", "RHSA-2020:2848", "RHSA-2020:3192", "RHSA-2020:4173", "RHSA-2020:4298", "RHSA-2020:5175", "RHSA-2020:5302", "RHSA-2020:5635", "RHSA-2020:5637", "RHSA-2021:0039", "RHSA-2021:0105", "RHSA-2021:0106", "RHSA-2021:0162", "RHSA-2021:0190", "RHSA-2021:0220", "RHSA-2021:0221", "RHSA-2021:0227", "RHSA-2021:0741", "RHSA-2021:0943", "RHSA-2021:1129", "RHSA-2021:1260", "RHSA-2021:1610", "RHSA-2021:2039", "RHSA-2021:2210", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:2778", "RHSA-2021:2784", "RHSA-2021:3024", "RHSA-2021:4142", "RHSA-2021:4511", "RHSA-2021:4725", "RHSA-2021:4767", "RHSA-2021:4861", "RHSA-2022:0728"]}, {"type": "redhatcve", "idList": ["RH:CVE-2016-4429", "RH:CVE-2020-11979", "RH:CVE-2020-11987", "RH:CVE-2020-11988", "RH:CVE-2020-13949", "RH:CVE-2020-13956", "RH:CVE-2020-17521", "RH:CVE-2020-17527", "RH:CVE-2020-17530", "RH:CVE-2020-1968", "RH:CVE-2020-1971", "RH:CVE-2020-24750", "RH:CVE-2020-25638", "RH:CVE-2020-25648", "RH:CVE-2020-26217", "RH:CVE-2020-27216", "RH:CVE-2020-27218", "RH:CVE-2020-27783", "RH:CVE-2020-27814", "RH:CVE-2020-27841", "RH:CVE-2020-27842", "RH:CVE-2020-27843", "RH:CVE-2020-27844", "RH:CVE-2020-27845", "RH:CVE-2020-28052", "RH:CVE-2020-28196", "RH:CVE-2020-29582", "RH:CVE-2020-35490", "RH:CVE-2020-35491", "RH:CVE-2020-35728", "RH:CVE-2020-36179", "RH:CVE-2020-36180", "RH:CVE-2020-36181", "RH:CVE-2020-36182", "RH:CVE-2020-36183", "RH:CVE-2020-36184", "RH:CVE-2020-36185", "RH:CVE-2020-36186", "RH:CVE-2020-36187", "RH:CVE-2020-36188", "RH:CVE-2020-36189", "RH:CVE-2020-36242", "RH:CVE-2020-7733", "RH:CVE-2020-7760", "RH:CVE-2020-8284", "RH:CVE-2020-8285", "RH:CVE-2020-8286", "RH:CVE-2020-8554", "RH:CVE-2020-8908", "RH:CVE-2021-20190", "RH:CVE-2021-20227", "RH:CVE-2021-21290", "RH:CVE-2021-21341", "RH:CVE-2021-21342", "RH:CVE-2021-21343", "RH:CVE-2021-21344", "RH:CVE-2021-21345", "RH:CVE-2021-21346", "RH:CVE-2021-21347", "RH:CVE-2021-21348", "RH:CVE-2021-21349", "RH:CVE-2021-21350", "RH:CVE-2021-21351", "RH:CVE-2021-21409", "RH:CVE-2021-22112", "RH:CVE-2021-22118", "RH:CVE-2021-22876", "RH:CVE-2021-22883", "RH:CVE-2021-22884", "RH:CVE-2021-22890", "RH:CVE-2021-22925", "RH:CVE-2021-23336", "RH:CVE-2021-2341", "RH:CVE-2021-2369", "RH:CVE-2021-23839", "RH:CVE-2021-23840", "RH:CVE-2021-23841", "RH:CVE-2021-2388", "RH:CVE-2021-24122", "RH:CVE-2021-25122", "RH:CVE-2021-25329", "RH:CVE-2021-26117", "RH:CVE-2021-27568", "RH:CVE-2021-27807", "RH:CVE-2021-27906", "RH:CVE-2021-28041", "RH:CVE-2021-29921", "RH:CVE-2021-3177", "RH:CVE-2021-31811", "RH:CVE-2021-3345", "RH:CVE-2021-3449", "RH:CVE-2021-3450", "RH:CVE-2021-3520"]}, {"type": "rocky", "idList": ["RLSA-2021:2238", "RLSA-2021:2575", "RLSA-2021:2776", "RLSA-2021:2781", "RLSA-2021:3572", "RLSA-2021:3590"]}, {"type": "rustsec", "idList": ["RUSTSEC-2020-0015", "RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2021-0057", "RUSTSEC-2021-0058"]}, {"type": "saint", "idList": ["SAINT:0FABA93E56CFEDDCAFAA28589FA1F1A2", "SAINT:37548F7E4861F75CE2B72672750C1CB3"]}, {"type": "securelist", "idList": ["SECURELIST:967D8B65D5D554FFB5B46411F654A78A"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14297"]}, {"type": "seebug", "idList": ["SSV:99170", "SSV:99275", "SSV:99316"]}, {"type": "slackware", "idList": ["SSA-2018-087-01", "SSA-2019-022-01", "SSA-2021-026-01", "SSA-2021-158-02"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2017:1099-1", "OPENSUSE-SU-2018:2957-1", "OPENSUSE-SU-2018:3015-1", "OPENSUSE-SU-2019:0152-1", "OPENSUSE-SU-2019:1839-1", "OPENSUSE-SU-2019:1872-1", "OPENSUSE-SU-2019:2058-1", "OPENSUSE-SU-2019:2466-1", "OPENSUSE-SU-2020:0113-1", "OPENSUSE-SU-2020:0147-1", "OPENSUSE-SU-2020:0850-1", "OPENSUSE-SU-2020:0851-1", "OPENSUSE-SU-2020:1888-1", "OPENSUSE-SU-2021:1092-1", "OPENSUSE-SU-2022:0108-1", "SUSE-SU-2018:0902-1", "SUSE-SU-2018:0905-1", "SUSE-SU-2018:0906-1"]}, {"type": "symantec", "idList": ["SMNTC-108023", "SMNTC-111546", "SMNTC-1451"]}, {"type": "talos", "idList": ["TALOS-2019-0852", "TALOS-2019-0853"]}, {"type": "talosblog", "idList": ["TALOSBLOG:309A8BCC0A7CD66A2777CFCCF3B46465", "TALOSBLOG:311242B8285F529AAB4833CDEBC9989C", "TALOSBLOG:7A681329F7813E49DED3E928ED08D453", "TALOSBLOG:E398382645C9465F51D4AC68FBE13C7B"]}, {"type": "tenable", "idList": ["TENABLE:FF52F52E6157E81F57A22D9356B954AC"]}, {"type": "thn", "idList": ["THN:110765F121B8FFAB197ACDBB4C117D2E", "THN:2B49FD6B1FE640C017C0531F850B4C11", "THN:515CD17353FD69BC2811599574546F0A", "THN:7D808DA5BB6D2A23EA6B46357E238546", "THN:7FD924637D99697D78D53283817508DA", "THN:C3BFE86E2BE38F28D9CEB17AD2C50EBD"]}, {"type": "threatpost", "idList": ["THREATPOST:042C17DFFA5D83F8091BA8DFCBFA8A8A", "THREATPOST:15EF9F86D0EEBCD1CD450BF55954D1D2", "THREATPOST:3A6A7F7256BF05AA048512CF2D064F7F", "THREATPOST:3E82813FD33FCC5937E06B9D667A547A", "THREATPOST:420EE567E806D93092741D7BB375AC57", "THREATPOST:4DD624E32718A8990263A37199EEBD02", "THREATPOST:760547BA8017A91CB7219FE7629E28B3", "THREATPOST:C408DF21547B7B4327FBAB82B97A4C96", "THREATPOST:E415CA5BCD7AC520A44AB5246664528A"]}, {"type": "tomcat", "idList": ["TOMCAT:38E1DC5950ADDBB8A055F354B172C65E", "TOMCAT:937E284FF802C2D5A6E9C8A59AB6C822"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:1FEAB54A2EB3929007298481113A7219", "TRENDMICROBLOG:95887FEB5A63B08E103EC931F4C1ED08", "TRENDMICROBLOG:99C513629DD4D60C7FD34F2B784F534A"]}, {"type": "ubuntu", "idList": ["USN-2551-1", "USN-3260-1", "USN-3260-2", "USN-3278-1", "USN-3475-1", "USN-3611-1", "USN-4257-1", "USN-4504-1", "USN-4635-1", "USN-4638-1", "USN-4685-1", "USN-4686-1", "USN-4705-1", "USN-4705-2", "USN-4714-1", "USN-5021-1", "USN-5021-2", "USN-5022-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-29582", "UB:CVE-2021-21409", "UB:CVE-2021-22118", "UB:CVE-2021-22876", "UB:CVE-2021-22890", "UB:CVE-2021-22897", "UB:CVE-2021-22898", "UB:CVE-2021-22901", "UB:CVE-2021-2339", "UB:CVE-2021-2340", "UB:CVE-2021-2341", "UB:CVE-2021-2342", "UB:CVE-2021-2352", "UB:CVE-2021-2354", "UB:CVE-2021-2356", "UB:CVE-2021-2357", "UB:CVE-2021-2367", "UB:CVE-2021-2369", "UB:CVE-2021-2370", "UB:CVE-2021-2372", "UB:CVE-2021-2374", "UB:CVE-2021-2383", "UB:CVE-2021-2384", "UB:CVE-2021-2385", "UB:CVE-2021-2387", "UB:CVE-2021-2388", "UB:CVE-2021-2389", "UB:CVE-2021-2390", "UB:CVE-2021-2399", "UB:CVE-2021-2402", "UB:CVE-2021-2409", "UB:CVE-2021-2410", "UB:CVE-2021-2412", "UB:CVE-2021-2417", "UB:CVE-2021-2418", "UB:CVE-2021-2422", "UB:CVE-2021-2424", "UB:CVE-2021-2425", "UB:CVE-2021-2426", "UB:CVE-2021-2427", "UB:CVE-2021-2429", "UB:CVE-2021-2432", "UB:CVE-2021-2437", "UB:CVE-2021-2440", "UB:CVE-2021-2441", "UB:CVE-2021-2442", "UB:CVE-2021-2443", "UB:CVE-2021-2444", "UB:CVE-2021-2454", "UB:CVE-2021-29921", "UB:CVE-2021-31811", "UB:CVE-2021-3449", "UB:CVE-2021-3450", "UB:CVE-2021-3520", "UB:CVE-2021-3560"]}, {"type": "virtuozzo", "idList": ["VZA-2021-004", "VZA-2021-005"]}, {"type": "zdi", "idList": ["ZDI-20-128", "ZDI-21-452", "ZDI-21-880", "ZDI-21-881", "ZDI-21-882", "ZDI-21-883", "ZDI-21-884", "ZDI-21-885", "ZDI-21-886", "ZDI-21-887", "ZDI-21-888", "ZDI-21-889"]}, {"type": "zdt", "idList": ["1337DAY-ID-31439", "1337DAY-ID-32626", "1337DAY-ID-32663", "1337DAY-ID-33787", "1337DAY-ID-37132", "1337DAY-ID-37133"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2012-0881", "epss": 0.00939, "percentile": 0.80793, "modified": "2023-05-02"}, {"cve": "CVE-2015-0254", "epss": 0.05434, "percentile": 0.91965, "modified": "2023-05-01"}, {"cve": "CVE-2016-0762", "epss": 0.00188, "percentile": 0.54843, "modified": "2023-05-01"}, {"cve": "CVE-2016-4429", "epss": 0.00545, "percentile": 0.7401, "modified": "2023-05-02"}, {"cve": "CVE-2017-14735", "epss": 0.00444, "percentile": 0.71131, "modified": "2023-05-01"}, {"cve": "CVE-2017-16931", "epss": 0.00853, "percentile": 0.79829, "modified": "2023-05-01"}, {"cve": "CVE-2017-3735", "epss": 0.03385, "percentile": 0.89993, "modified": "2023-05-01"}, {"cve": "CVE-2017-5461", "epss": 0.01326, "percentile": 0.83985, "modified": "2023-05-01"}, {"cve": "CVE-2017-5637", "epss": 0.06461, "percentile": 0.92615, "modified": "2023-05-01"}, {"cve": "CVE-2017-7656", "epss": 0.01102, "percentile": 0.82324, "modified": "2023-05-02"}, {"cve": "CVE-2017-7657", "epss": 0.00355, "percentile": 0.67803, "modified": "2023-05-01"}, {"cve": "CVE-2017-7658", "epss": 0.0033, "percentile": 0.66669, "modified": "2023-05-02"}, {"cve": "CVE-2017-9735", "epss": 0.00311, "percentile": 0.65559, "modified": "2023-05-01"}, {"cve": "CVE-2018-0737", "epss": 0.00676, "percentile": 0.76928, "modified": "2023-05-01"}, {"cve": "CVE-2018-0739", "epss": 0.01551, "percentile": 0.85228, "modified": "2023-05-01"}, {"cve": "CVE-2018-15686", "epss": 0.00173, "percentile": 0.52915, "modified": "2023-05-02"}, {"cve": "CVE-2018-21010", "epss": 0.00815, "percentile": 0.79354, "modified": "2023-05-02"}, {"cve": "CVE-2018-7160", "epss": 0.03128, "percentile": 0.89627, "modified": "2023-05-01"}, {"cve": "CVE-2018-7183", "epss": 0.88006, "percentile": 0.98104, "modified": "2023-05-01"}, {"cve": "CVE-2019-0190", "epss": 0.01265, "percentile": 0.836, "modified": "2023-05-02"}, {"cve": "CVE-2019-0201", "epss": 0.00107, "percentile": 0.42045, "modified": "2023-05-02"}, {"cve": "CVE-2019-0205", "epss": 0.00301, "percentile": 0.64962, "modified": "2023-05-02"}, {"cve": "CVE-2019-0210", "epss": 0.00328, "percentile": 0.66492, "modified": "2023-05-02"}, {"cve": "CVE-2019-0219", "epss": 0.00356, "percentile": 0.67851, "modified": "2023-05-01"}, {"cve": "CVE-2019-0228", "epss": 0.00235, "percentile": 0.60104, "modified": "2023-05-02"}, {"cve": "CVE-2019-10086", "epss": 0.00311, "percentile": 0.65581, "modified": "2023-05-02"}, {"cve": "CVE-2019-10173", "epss": 0.95537, "percentile": 0.9902, "modified": "2023-05-02"}, {"cve": "CVE-2019-10746", "epss": 0.0027, "percentile": 0.62967, "modified": "2023-05-02"}, {"cve": "CVE-2019-11358", "epss": 0.01863, "percentile": 0.8662, "modified": "2023-05-02"}, {"cve": "CVE-2019-12260", "epss": 0.33969, "percentile": 0.96435, "modified": "2023-05-02"}, {"cve": "CVE-2019-12399", "epss": 0.001, "percentile": 0.40059, "modified": "2023-05-01"}, {"cve": "CVE-2019-12402", "epss": 0.003, "percentile": 0.64937, "modified": "2023-05-02"}, {"cve": "CVE-2019-12415", "epss": 0.00069, "percentile": 0.28401, "modified": "2023-05-02"}, {"cve": "CVE-2019-12973", "epss": 0.0019, "percentile": 0.55038, "modified": "2023-05-02"}, {"cve": "CVE-2019-13990", "epss": 0.00354, "percentile": 0.67748, "modified": "2023-05-02"}, {"cve": "CVE-2019-15604", "epss": 0.00455, "percentile": 0.71515, "modified": "2023-05-01"}, {"cve": "CVE-2019-15605", "epss": 0.0037, "percentile": 0.68471, "modified": "2023-05-01"}, {"cve": "CVE-2019-15606", "epss": 0.00716, "percentile": 0.77694, "modified": "2023-05-01"}, {"cve": "CVE-2019-16942", "epss": 0.00292, "percentile": 0.6445, "modified": "2023-05-02"}, {"cve": "CVE-2019-16943", "epss": 0.00292, "percentile": 0.6445, "modified": "2023-05-02"}, {"cve": "CVE-2019-17195", "epss": 0.00581, "percentile": 0.74887, "modified": "2023-05-02"}, {"cve": "CVE-2019-17531", "epss": 0.00837, "percentile": 0.79645, "modified": "2023-05-02"}, {"cve": "CVE-2019-17543", "epss": 0.006, "percentile": 0.75303, "modified": "2023-05-02"}, {"cve": "CVE-2019-17545", "epss": 0.02307, "percentile": 0.88088, "modified": "2023-05-02"}, {"cve": "CVE-2019-17566", "epss": 0.00172, "percentile": 0.52789, "modified": "2023-05-01"}, {"cve": "CVE-2019-20330", "epss": 0.00463, "percentile": 0.71728, "modified": "2023-05-01"}, {"cve": "CVE-2019-2725", "epss": 0.97555, "percentile": 0.99993, "modified": "2023-05-02"}, {"cve": "CVE-2019-2729", "epss": 0.9715, "percentile": 0.99644, "modified": "2023-05-02"}, {"cve": "CVE-2019-2897", "epss": 0.00065, "percentile": 0.26626, "modified": "2023-05-02"}, {"cve": "CVE-2019-3738", "epss": 0.0026, "percentile": 0.62209, "modified": "2023-05-02"}, {"cve": "CVE-2019-3739", "epss": 0.0027, "percentile": 0.62946, "modified": "2023-05-02"}, {"cve": "CVE-2019-3740", "epss": 0.0027, "percentile": 0.62946, "modified": "2023-05-02"}, {"cve": "CVE-2019-5063", "epss": 0.1177, "percentile": 0.94434, "modified": "2023-05-01"}, {"cve": "CVE-2019-5064", "epss": 0.03184, "percentile": 0.89714, "modified": "2023-05-01"}, {"cve": "CVE-2020-10543", "epss": 0.00299, "percentile": 0.64884, "modified": "2023-05-01"}, {"cve": "CVE-2020-10683", "epss": 0.00261, "percentile": 0.62278, "modified": "2023-05-01"}, {"cve": "CVE-2020-10878", "epss": 0.00274, "percentile": 0.63229, "modified": "2023-05-01"}, {"cve": "CVE-2020-11022", "epss": 0.08634, "percentile": 0.93497, "modified": "2023-05-01"}, {"cve": "CVE-2020-11023", "epss": 0.00518, "percentile": 0.73312, "modified": "2023-05-01"}, {"cve": "CVE-2020-11612", "epss": 0.00593, "percentile": 0.75132, "modified": "2023-05-01"}, {"cve": "CVE-2020-11868", "epss": 0.01552, "percentile": 0.8523, "modified": "2023-05-01"}, {"cve": "CVE-2020-11973", "epss": 0.01072, "percentile": 0.82098, "modified": "2023-05-01"}, {"cve": "CVE-2020-11979", "epss": 0.00177, "percentile": 0.53289, "modified": "2023-05-01"}, {"cve": "CVE-2020-11987", "epss": 0.00075, "percentile": 0.30478, "modified": "2023-05-01"}, {"cve": "CVE-2020-11988", "epss": 0.00083, "percentile": 0.33687, "modified": "2023-05-01"}, {"cve": "CVE-2020-11998", "epss": 0.00319, "percentile": 0.66014, "modified": "2023-05-01"}, {"cve": "CVE-2020-12723", "epss": 0.00319, "percentile": 0.66045, "modified": "2023-05-01"}, {"cve": "CVE-2020-13934", "epss": 0.95922, "percentile": 0.99125, "modified": "2023-05-01"}, {"cve": "CVE-2020-13935", "epss": 0.38651, "percentile": 0.96656, "modified": "2023-05-01"}, {"cve": "CVE-2020-13949", "epss": 0.00379, "percentile": 0.68857, "modified": "2023-05-01"}, {"cve": "CVE-2020-13956", "epss": 0.00124, "percentile": 0.45417, "modified": "2023-05-01"}, {"cve": "CVE-2020-14060", "epss": 0.39335, "percentile": 0.96677, "modified": "2023-05-01"}, {"cve": "CVE-2020-14061", "epss": 0.02076, "percentile": 0.87406, "modified": "2023-05-01"}, {"cve": "CVE-2020-14062", "epss": 0.04035, "percentile": 0.90765, "modified": "2023-05-01"}, {"cve": "CVE-2020-14195", "epss": 0.02609, "percentile": 0.88739, "modified": "2023-05-01"}, {"cve": "CVE-2020-14756", "epss": 0.01796, "percentile": 0.86302, "modified": "2023-05-01"}, {"cve": "CVE-2020-15389", "epss": 0.00937, "percentile": 0.80761, "modified": "2023-05-01"}, {"cve": "CVE-2020-17521", "epss": 0.00051, "percentile": 0.17713, "modified": "2023-05-01"}, {"cve": "CVE-2020-17527", "epss": 0.00219, "percentile": 0.58319, "modified": "2023-05-01"}, {"cve": "CVE-2020-17530", "epss": 0.96641, "percentile": 0.99383, "modified": "2023-05-01"}, {"cve": "CVE-2020-1941", "epss": 0.00165, "percentile": 0.51728, "modified": "2023-05-01"}, {"cve": "CVE-2020-1945", "epss": 0.00062, "percentile": 0.24434, "modified": "2023-05-01"}, {"cve": "CVE-2020-1967", "epss": 0.06151, "percentile": 0.92437, "modified": "2023-05-01"}, {"cve": "CVE-2020-1968", "epss": 0.00388, "percentile": 0.69221, "modified": "2023-05-01"}, {"cve": "CVE-2020-1971", "epss": 0.00318, "percentile": 0.65957, "modified": "2023-05-01"}, {"cve": "CVE-2020-24553", "epss": 0.00517, "percentile": 0.73287, "modified": "2023-05-01"}, {"cve": "CVE-2020-24616", "epss": 0.00322, "percentile": 0.6619, "modified": "2023-05-01"}, {"cve": "CVE-2020-24750", "epss": 0.00493, "percentile": 0.72636, "modified": "2023-05-01"}, {"cve": "CVE-2020-2555", "epss": 0.95786, "percentile": 0.9908, "modified": "2023-05-01"}, {"cve": "CVE-2020-25638", "epss": 0.00137, "percentile": 0.47786, "modified": "2023-05-01"}, {"cve": "CVE-2020-25648", "epss": 0.00673, "percentile": 0.76867, "modified": "2023-05-01"}, {"cve": "CVE-2020-25649", "epss": 0.0014, "percentile": 0.48322, "modified": "2023-05-01"}, {"cve": "CVE-2020-2604", "epss": 0.00244, "percentile": 0.60766, "modified": "2023-05-01"}, {"cve": "CVE-2020-26217", "epss": 0.97456, "percentile": 0.99914, "modified": "2023-05-01"}, {"cve": "CVE-2020-26870", "epss": 0.0029, "percentile": 0.64369, "modified": "2023-05-01"}, {"cve": "CVE-2020-27193", "epss": 0.00214, "percentile": 0.57948, "modified": "2023-05-01"}, {"cve": "CVE-2020-27216", "epss": 0.00052, "percentile": 0.18349, "modified": "2023-05-01"}, {"cve": "CVE-2020-27218", "epss": 0.00302, "percentile": 0.64996, "modified": "2023-05-01"}, {"cve": "CVE-2020-27783", "epss": 0.00202, "percentile": 0.56593, "modified": "2023-05-01"}, {"cve": "CVE-2020-27814", "epss": 0.0021, "percentile": 0.57424, "modified": "2023-05-01"}, {"cve": "CVE-2020-27841", "epss": 0.00087, "percentile": 0.35349, "modified": "2023-05-01"}, {"cve": "CVE-2020-27842", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-27843", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-27844", "epss": 0.0009, "percentile": 0.37183, "modified": "2023-05-01"}, {"cve": "CVE-2020-27845", "epss": 0.00066, "percentile": 0.26919, "modified": "2023-05-01"}, {"cve": "CVE-2020-28052", "epss": 0.00199, "percentile": 0.56203, "modified": "2023-05-01"}, {"cve": "CVE-2020-28196", "epss": 0.00328, "percentile": 0.66518, "modified": "2023-05-01"}, {"cve": "CVE-2020-28928", "epss": 0.00051, "percentile": 0.17804, "modified": "2023-05-01"}, {"cve": "CVE-2020-29582", "epss": 0.00106, "percentile": 0.41798, "modified": "2023-05-01"}, {"cve": "CVE-2020-35490", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35491", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35728", "epss": 0.00367, "percentile": 0.68335, "modified": "2023-05-01"}, {"cve": "CVE-2020-36179", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36180", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36181", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36182", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36183", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36184", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36185", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36186", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36187", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36188", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36189", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-5258", "epss": 0.00181, "percentile": 0.53745, "modified": "2023-05-01"}, {"cve": "CVE-2020-5397", "epss": 0.00128, "percentile": 0.46164, "modified": "2023-05-01"}, {"cve": "CVE-2020-5398", "epss": 0.97067, "percentile": 0.99603, "modified": "2023-05-01"}, {"cve": "CVE-2020-5413", "epss": 0.0029, "percentile": 0.64361, "modified": "2023-05-01"}, {"cve": "CVE-2020-5421", "epss": 0.85045, "percentile": 0.97969, "modified": "2023-05-01"}, {"cve": "CVE-2020-7016", "epss": 0.00083, "percentile": 0.33748, "modified": "2023-05-01"}, {"cve": "CVE-2020-7017", "epss": 0.00131, "percentile": 0.46667, "modified": "2023-05-01"}, {"cve": "CVE-2020-7712", "epss": 0.00626, "percentile": 0.75866, "modified": "2023-05-01"}, {"cve": "CVE-2020-7733", "epss": 0.00338, "percentile": 0.66986, "modified": "2023-05-01"}, {"cve": "CVE-2020-7760", "epss": 0.01176, "percentile": 0.82928, "modified": "2023-05-01"}, {"cve": "CVE-2020-8174", "epss": 0.01437, "percentile": 0.84594, "modified": "2023-05-01"}, {"cve": "CVE-2020-8203", "epss": 0.01036, "percentile": 0.81708, "modified": "2023-05-01"}, {"cve": "CVE-2020-8277", "epss": 0.00379, "percentile": 0.68844, "modified": "2023-05-01"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49432, "modified": "2023-05-01"}, {"cve": "CVE-2020-8285", "epss": 0.00364, "percentile": 0.68199, "modified": "2023-05-01"}, {"cve": "CVE-2020-8286", "epss": 0.0021, "percentile": 0.57438, "modified": "2023-05-01"}, {"cve": "CVE-2020-8554", "epss": 0.00131, "percentile": 0.46556, "modified": "2023-05-01"}, {"cve": "CVE-2020-8908", "epss": 0.0006, "percentile": 0.23242, "modified": "2023-05-01"}, {"cve": "CVE-2020-9484", "epss": 0.9701, "percentile": 0.99569, "modified": "2023-05-01"}, {"cve": "CVE-2020-9489", "epss": 0.00055, "percentile": 0.2089, "modified": "2023-05-01"}, {"cve": "CVE-2021-20190", "epss": 0.0029, "percentile": 0.64371, "modified": "2023-05-01"}, {"cve": "CVE-2021-20227", "epss": 0.00065, "percentile": 0.26819, "modified": "2023-05-01"}, {"cve": "CVE-2021-21275", "epss": 0.00062, "percentile": 0.24263, "modified": "2023-05-01"}, {"cve": "CVE-2021-21290", "epss": 0.00045, "percentile": 0.12536, "modified": "2023-05-01"}, {"cve": "CVE-2021-21341", "epss": 0.01713, "percentile": 0.85969, "modified": "2023-05-01"}, {"cve": "CVE-2021-21342", "epss": 0.01517, "percentile": 0.85038, "modified": "2023-05-01"}, {"cve": "CVE-2021-21343", "epss": 0.00328, "percentile": 0.66509, "modified": "2023-05-01"}, {"cve": "CVE-2021-21344", "epss": 0.01147, "percentile": 0.82697, "modified": "2023-05-01"}, {"cve": "CVE-2021-21345", "epss": 0.46618, "percentile": 0.96873, "modified": "2023-05-01"}, {"cve": "CVE-2021-21346", "epss": 0.01147, "percentile": 0.82697, "modified": "2023-05-01"}, {"cve": "CVE-2021-21347", "epss": 0.00988, "percentile": 0.81298, "modified": "2023-05-01"}, {"cve": "CVE-2021-21348", "epss": 0.01076, "percentile": 0.82133, "modified": "2023-05-01"}, {"cve": "CVE-2021-21349", "epss": 0.00726, "percentile": 0.77905, "modified": "2023-05-01"}, {"cve": "CVE-2021-21350", "epss": 0.01147, "percentile": 0.82697, "modified": "2023-05-01"}, {"cve": "CVE-2021-21351", "epss": 0.95509, "percentile": 0.99011, "modified": "2023-05-01"}, {"cve": "CVE-2021-21409", "epss": 0.77039, "percentile": 0.97685, "modified": "2023-05-01"}, {"cve": "CVE-2021-22112", "epss": 0.00397, "percentile": 0.69564, "modified": "2023-05-01"}, {"cve": "CVE-2021-22118", "epss": 0.00046, "percentile": 0.14115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2244", "epss": 0.02117, "percentile": 0.87531, "modified": "2023-05-01"}, {"cve": "CVE-2021-22876", "epss": 0.00333, "percentile": 0.66802, "modified": "2023-05-01"}, {"cve": "CVE-2021-22883", "epss": 0.00315, "percentile": 0.65793, "modified": "2023-05-01"}, {"cve": "CVE-2021-22884", "epss": 0.00222, "percentile": 0.59044, "modified": "2023-05-01"}, {"cve": "CVE-2021-22890", "epss": 0.00252, "percentile": 0.6156, "modified": "2023-05-01"}, {"cve": "CVE-2021-22897", "epss": 0.00168, "percentile": 0.5234, "modified": "2023-05-01"}, {"cve": "CVE-2021-22898", "epss": 0.00166, "percentile": 0.51776, "modified": "2023-05-01"}, {"cve": "CVE-2021-22901", "epss": 0.02266, "percentile": 0.87975, "modified": "2023-05-01"}, {"cve": "CVE-2021-2323", "epss": 0.00168, "percentile": 0.52057, "modified": "2023-05-01"}, {"cve": "CVE-2021-2324", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2326", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2328", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2329", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2330", "epss": 0.00053, "percentile": 0.18993, "modified": "2023-05-01"}, {"cve": "CVE-2021-2333", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.49521, "modified": "2023-05-01"}, {"cve": "CVE-2021-2334", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2335", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2336", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2337", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2338", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2339", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2340", "epss": 0.00097, "percentile": 0.39244, "modified": "2023-05-01"}, {"cve": "CVE-2021-2341", "epss": 0.00116, "percentile": 0.44032, "modified": "2023-05-01"}, {"cve": "CVE-2021-2342", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2343", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2344", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2345", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2346", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2347", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2348", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2349", "epss": 0.00182, "percentile": 0.53995, "modified": "2023-05-01"}, {"cve": "CVE-2021-2350", "epss": 0.00168, "percentile": 0.52057, "modified": "2023-05-01"}, {"cve": "CVE-2021-2351", "epss": 0.01165, "percentile": 0.82842, "modified": "2023-05-01"}, {"cve": "CVE-2021-2352", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2353", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2354", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2355", "epss": 0.00172, "percentile": 0.52797, "modified": "2023-05-01"}, {"cve": "CVE-2021-2356", "epss": 0.00135, "percentile": 0.47243, "modified": "2023-05-01"}, {"cve": "CVE-2021-2357", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2358", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2359", "epss": 0.00215, "percentile": 0.58033, "modified": "2023-05-01"}, {"cve": "CVE-2021-2360", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2361", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2362", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2363", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2364", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2365", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2366", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2367", "epss": 0.00081, "percentile": 0.33115, "modified": "2023-05-01"}, {"cve": "CVE-2021-2368", "epss": 0.00168, "percentile": 0.52057, "modified": "2023-05-01"}, {"cve": "CVE-2021-2369", "epss": 0.00069, "percentile": 0.28284, "modified": "2023-05-01"}, {"cve": "CVE-2021-2370", "epss": 0.00153, "percentile": 0.50105, "modified": "2023-05-01"}, {"cve": "CVE-2021-2371", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2372", "epss": 0.00153, "percentile": 0.50158, "modified": "2023-05-01"}, {"cve": "CVE-2021-2373", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2374", "epss": 0.00049, "percentile": 0.15362, "modified": "2023-05-01"}, {"cve": "CVE-2021-2375", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2376", "epss": 0.00165, "percentile": 0.51723, "modified": "2023-05-01"}, {"cve": "CVE-2021-2377", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2378", "epss": 0.00165, "percentile": 0.51723, "modified": "2023-05-01"}, {"cve": "CVE-2021-2380", "epss": 0.00063, "percentile": 0.24789, "modified": "2023-05-01"}, {"cve": "CVE-2021-2381", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2382", "epss": 0.07717, "percentile": 0.93184, "modified": "2023-05-01"}, {"cve": "CVE-2021-2383", "epss": 0.00153, "percentile": 0.50105, "modified": "2023-05-01"}, {"cve": "CVE-2021-23839", "epss": 0.00174, "percentile": 0.52981, "modified": "2023-05-01"}, {"cve": "CVE-2021-2384", "epss": 0.00153, "percentile": 0.50105, "modified": "2023-05-01"}, {"cve": "CVE-2021-23840", "epss": 0.00316, "percentile": 0.65886, "modified": "2023-05-01"}, {"cve": "CVE-2021-23841", "epss": 0.00299, "percentile": 0.64861, "modified": "2023-05-01"}, {"cve": "CVE-2021-2385", "epss": 0.00142, "percentile": 0.48552, "modified": "2023-05-01"}, {"cve": "CVE-2021-2386", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2387", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2388", "epss": 0.00098, "percentile": 0.39553, "modified": "2023-05-01"}, {"cve": "CVE-2021-2389", "epss": 0.11296, "percentile": 0.94311, "modified": "2023-05-01"}, {"cve": "CVE-2021-2390", "epss": 0.06851, "percentile": 0.92841, "modified": "2023-05-01"}, {"cve": "CVE-2021-2391", "epss": 0.05971, "percentile": 0.92349, "modified": "2023-05-01"}, {"cve": "CVE-2021-2392", "epss": 0.05971, "percentile": 0.92349, "modified": "2023-05-01"}, {"cve": "CVE-2021-2393", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2394", "epss": 0.07717, "percentile": 0.93184, "modified": "2023-05-01"}, {"cve": "CVE-2021-2395", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2396", "epss": 0.08188, "percentile": 0.9334, "modified": "2023-05-01"}, {"cve": "CVE-2021-2397", "epss": 0.07717, "percentile": 0.93184, "modified": "2023-05-01"}, {"cve": "CVE-2021-2398", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2399", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2400", "epss": 0.00276, "percentile": 0.6339, "modified": "2023-05-01"}, {"cve": "CVE-2021-2401", "epss": 0.02763, "percentile": 0.89032, "modified": "2023-05-01"}, {"cve": "CVE-2021-2402", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2403", "epss": 0.0014, "percentile": 0.48259, "modified": "2023-05-01"}, {"cve": "CVE-2021-2404", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2405", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2406", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2407", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2408", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2409", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2021-2410", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2411", "epss": 0.00091, "percentile": 0.3775, "modified": "2023-05-01"}, {"cve": "CVE-2021-2412", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-24122", "epss": 0.0016, "percentile": 0.51157, "modified": "2023-05-01"}, {"cve": "CVE-2021-2415", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2417", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2418", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2419", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2420", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2421", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2422", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2423", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2424", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2425", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2426", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2427", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2428", "epss": 0.00497, "percentile": 0.72747, "modified": "2023-05-01"}, {"cve": "CVE-2021-2429", "epss": 0.01258, "percentile": 0.83554, "modified": "2023-05-01"}, {"cve": "CVE-2021-2430", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2431", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2432", "epss": 0.00135, "percentile": 0.47513, "modified": "2023-05-01"}, {"cve": "CVE-2021-2433", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2434", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2435", "epss": 0.00167, "percentile": 0.52008, "modified": "2023-05-01"}, {"cve": "CVE-2021-2436", "epss": 0.00204, "percentile": 0.56876, "modified": "2023-05-01"}, {"cve": "CVE-2021-2437", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2438", "epss": 0.00053, "percentile": 0.18993, "modified": "2023-05-01"}, {"cve": "CVE-2021-2439", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2440", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2441", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2442", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2443", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2444", "epss": 0.00059, "percentile": 0.23092, "modified": "2023-05-01"}, {"cve": "CVE-2021-2445", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2446", "epss": 0.00351, "percentile": 0.676, "modified": "2023-05-01"}, {"cve": "CVE-2021-2447", "epss": 0.00164, "percentile": 0.51579, "modified": "2023-05-01"}, {"cve": "CVE-2021-2448", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2449", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2450", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2451", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2452", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2453", "epss": 0.00102, "percentile": 0.40543, "modified": "2023-05-01"}, {"cve": "CVE-2021-2454", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-05-01"}, {"cve": "CVE-2021-2455", "epss": 0.00063, "percentile": 0.24781, "modified": "2023-05-01"}, {"cve": "CVE-2021-2456", "epss": 0.04759, "percentile": 0.91449, "modified": "2023-05-01"}, {"cve": "CVE-2021-2457", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2458", "epss": 0.00063, "percentile": 0.24789, "modified": "2023-05-01"}, {"cve": "CVE-2021-2460", "epss": 0.00054, "percentile": 0.20551, "modified": "2023-05-01"}, {"cve": "CVE-2021-2462", "epss": 0.00077, "percentile": 0.31489, "modified": "2023-05-01"}, {"cve": "CVE-2021-2463", "epss": 0.00705, "percentile": 0.775, "modified": "2023-05-01"}, {"cve": "CVE-2021-25122", "epss": 0.00335, "percentile": 0.66895, "modified": "2023-05-01"}, {"cve": "CVE-2021-25329", "epss": 0.00045, "percentile": 0.12507, "modified": "2023-05-01"}, {"cve": "CVE-2021-26117", "epss": 0.00163, "percentile": 0.51484, "modified": "2023-05-01"}, {"cve": "CVE-2021-26271", "epss": 0.0013, "percentile": 0.46513, "modified": "2023-05-01"}, {"cve": "CVE-2021-26272", "epss": 0.00144, "percentile": 0.48936, "modified": "2023-05-01"}, {"cve": "CVE-2021-27568", "epss": 0.00312, "percentile": 0.65616, "modified": "2023-05-01"}, {"cve": "CVE-2021-27807", "epss": 0.00069, "percentile": 0.28161, "modified": "2023-05-01"}, {"cve": "CVE-2021-27906", "epss": 0.00069, "percentile": 0.28161, "modified": "2023-05-01"}, {"cve": "CVE-2021-28041", "epss": 0.00137, "percentile": 0.4779, "modified": "2023-05-01"}, {"cve": "CVE-2021-29921", "epss": 0.00609, "percentile": 0.75498, "modified": "2023-05-01"}, {"cve": "CVE-2021-30640", "epss": 0.00205, "percentile": 0.56933, "modified": "2023-05-01"}, {"cve": "CVE-2021-3156", "epss": 0.94383, "percentile": 0.98743, "modified": "2023-05-01"}, {"cve": "CVE-2021-3177", "epss": 0.00924, "percentile": 0.80647, "modified": "2023-05-01"}, {"cve": "CVE-2021-31811", "epss": 0.00074, "percentile": 0.30182, "modified": "2023-05-01"}, {"cve": "CVE-2021-33037", "epss": 0.94713, "percentile": 0.98801, "modified": "2023-05-01"}, {"cve": "CVE-2021-3345", "epss": 0.00054, "percentile": 0.1971, "modified": "2023-05-01"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64497, "modified": "2023-05-01"}, {"cve": "CVE-2021-3450", "epss": 0.00198, "percentile": 0.56154, "modified": "2023-05-01"}, {"cve": "CVE-2021-3520", "epss": 0.00122, "percentile": 0.45064, "modified": "2023-05-01"}, {"cve": "CVE-2021-3560", "epss": 0.00086, "percentile": 0.35101, "modified": "2023-05-01"}], "vulnersScore": 7.7}, "_state": {"dependencies": 1695265058, "score": 1695265356, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "93f9a9fe7cc944c342080cee2a78d1b6"}, "affectedSoftware": [{"version": "23.1", "operator": "le", "name": "big data spatial and graph"}, {"version": "2.0", "operator": "le", "name": "big data spatial and graph"}, {"version": "11.1.2.4", "operator": "le", "name": "essbase analytic provider services"}, {"version": "21.2", "operator": "le", "name": "essbase analytic provider services"}, {"version": "11.1.2.4", "operator": "le", "name": "hyperion essbase administration services"}, {"version": "21.2", "operator": "le", "name": "hyperion essbase administration services"}, {"version": "21.2", "operator": "le", "name": "essbase"}, {"version": "11.2.0", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.0.0", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.1.0", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce guided search"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce guided search / oracle commerce experience manager"}, {"version": "11.3.1.5", "operator": "le", "name": "oracle commerce guided search / oracle commerce experience manager"}, {"version": "11.2.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.1.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "11.2.0", "operator": "le", "name": "oracle commerce service center"}, {"version": "11.0.0", "operator": "le", "name": "oracle commerce service center"}, {"version": "11.1.0", "operator": "le", "name": "oracle commerce service center"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce service center"}, {"version": "11.3.0.9.0", "operator": "le", "name": "oracle communications brm - elastic charging engine"}, {"version": "12.0.0.3.0", "operator": "le", "name": "oracle communications brm - elastic charging engine"}, {"version": "7.3.5", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.0", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.3.2", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.3.4", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.1", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "12.0.0.3.0", "operator": "le", "name": "oracle communications offline mediation controller"}, {"version": "12.0.0.3.0", "operator": "le", "name": "oracle communications pricing design center"}, {"version": "10.0.1.4.0", "operator": "le", "name": "oracle communications instant messaging server"}, {"version": "7.5.0.23.0", "operator": "le", "name": "oracle communications billing and revenue management"}, {"version": "12.0.0.3.0", "operator": "le", "name": "oracle communications billing and revenue management"}, {"version": "12.0.4.0.0", "operator": "le", "name": "oracle communications convergent charging controller"}, {"version": "12.0.4.0.0", "operator": "le", "name": "oracle communications network charging and control"}, {"version": "6.0.1.0", "operator": "le", "name": "oracle communications network charging and control"}, {"version": "12.0.1.0", "operator": "le", "name": "oracle communications network charging and control"}, {"version": "7.4.2", "operator": "le", "name": "oracle communications design studio"}, {"version": "1.7.0", "operator": "le", "name": "oracle communications cloud native core security edge protection proxy"}, {"version": "1.5.2", "operator": "le", "name": "oracle communications cloud native core service communication proxy"}, {"version": "8.0.0", "operator": "le", "name": "oracle communications diameter signaling router (dsr)"}, {"version": "46.6.0", "operator": "le", "name": "oracle communications eagle software"}, {"version": "8.2", "operator": "le", "name": "oracle sd-wan aware"}, {"version": "9.0", "operator": "le", "name": "oracle sd-wan aware"}, {"version": "8.2", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "9.1", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "9.0", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "7.0", "operator": "le", "name": "oracle communications services gatekeeper"}, {"version": "3.9", "operator": "le", "name": "oracle communications application session controller"}, {"version": "1.7.0", "operator": "le", "name": "oracle communications cloud native core network function cloud native environment"}, {"version": "1.4.0", "operator": "le", "name": "oracle communications cloud native core network function cloud native environment"}, {"version": "1.5.0", "operator": "le", "name": "oracle communications cloud native core policy"}, {"version": "1.9.0", "operator": "le", "name": "oracle communications cloud native core policy"}, {"version": "1.4.0", "operator": "le", "name": "oracle communications cloud native core unified data repository"}, {"version": "1.6.0", "operator": "le", "name": "oracle communications cloud native core unified data repository"}, {"version": "7.1", "operator": "le", "name": "oracle communications evolved communications application server"}, {"version": "1.4.0", "operator": "le", "name": "oracle communications cloud native core console"}, {"version": "1.2.1", "operator": "le", "name": "oracle communications cloud native core network slice selection function"}, {"version": "18.8.0", "operator": "le", "name": "primavera gateway"}, {"version": "20.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "19.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "17.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "17.1", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "17.3", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "17.2", "operator": "le", "name": "instantis enterprisetrack"}, {"version": "17.12.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "20.12.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "19.12.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "18.8.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "17.7", "operator": "le", "name": "primavera unifier"}, {"version": "20.12", "operator": "le", "name": "primavera unifier"}, {"version": "19.12", "operator": "le", "name": "primavera unifier"}, {"version": "18.8", "operator": "le", "name": "primavera unifier"}, {"version": "12.1.1", "operator": "le", "name": "oracle marketing"}, {"version": "12.2.3", "operator": "le", "name": "oracle marketing"}, {"version": "12.1.1", "operator": "le", "name": "oracle common applications"}, {"version": "12.2.3", "operator": "le", "name": "oracle common applications"}, {"version": "12.1.1", "operator": "le", "name": "oracle advanced inbound telephony"}, {"version": "12.2.3", "operator": "le", "name": "oracle advanced inbound telephony"}, {"version": "12.1.1", "operator": "le", "name": "oracle advanced outbound telephony"}, {"version": "12.2.3", "operator": "le", "name": "oracle advanced outbound telephony"}, {"version": "12.1.1", "operator": "le", "name": "oracle approvals management"}, {"version": "12.1.1", "operator": "le", "name": "oracle collaborative planning"}, {"version": "12.1.1", "operator": "le", "name": "oracle e-records"}, {"version": "12.2.3", "operator": "le", "name": "oracle e-records"}, {"version": "12.2.3", "operator": "le", "name": "oracle engineering"}, {"version": "12.1.1", "operator": "le", "name": "oracle field service"}, {"version": "12.1.1", "operator": "le", "name": "oracle human resources"}, {"version": "12.1.1", "operator": "le", "name": "oracle isupplier portal"}, {"version": "12.2.3", "operator": "le", "name": "oracle isupplier portal"}, {"version": "12.1.1", "operator": "le", "name": "oracle public sector financials (international)"}, {"version": "12.1.1", "operator": "le", "name": "oracle time and labor"}, {"version": "12.2.3", "operator": "le", "name": "oracle time and labor"}, {"version": "12.2.3", "operator": "le", "name": "oracle web applications desktop integrator"}, {"version": "12.1.3", "operator": "le", "name": "oracle web applications desktop integrator"}, {"version": "12.2.3", "operator": "le", "name": "oracle applications framework"}, {"version": "12.1.3", "operator": "le", "name": "oracle applications framework"}, {"version": "12.2.3", "operator": "le", "name": "oracle workflow"}, {"version": "12.1.3", "operator": "le", "name": "oracle workflow"}, {"version": "13.4.0.0", "operator": "le", "name": "enterprise manager base platform"}, {"version": "12.1.2.0.8", "operator": "le", "name": "oracle configuration manager"}, {"version": "13.3.0.1", "operator": "le", "name": "oracle application testing suite"}, {"version": "2.12.0", "operator": "le", "name": "oracle banking enterprise default management"}, {"version": "2.10.0", "operator": "le", "name": "oracle banking enterprise default management"}, {"version": "2.7.1", "operator": "le", "name": "oracle banking platform"}, {"version": "2.4.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.9.0", "operator": "le", "name": "oracle banking platform"}, {"version": "2.12.0", "operator": "le", "name": "oracle banking platform"}, {"version": "14.2", "operator": "le", "name": "oracle banking liquidity management"}, {"version": "14.3", "operator": "le", "name": "oracle banking liquidity management"}, {"version": "14.5", "operator": "le", "name": "oracle banking liquidity management"}, {"version": "12.1.0", "operator": "le", "name": "oracle flexcube private banking"}, {"version": "12.0.0", "operator": "le", "name": "oracle flexcube private banking"}, {"version": "14.4", "operator": "le", "name": "oracle banking treasury management"}, {"version": "8.1.1", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.1.0", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.0.6", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "2.7.0", "operator": "le", "name": "oracle financial services revenue management and billing analytics"}, {"version": "2.8.0", "operator": "le", "name": "oracle financial services revenue management and billing analytics"}, {"version": "8.0.9.6.3", "operator": "le", "name": "oracle financial services regulatory reporting with agilereporter"}, {"version": "2.7.0", "operator": "le", "name": "oracle banking party management"}, {"version": "14.0", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.3", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.0", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.4", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "14.1.0", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "20.1.2", "operator": "le", "name": "oracle financial services crime and compliance investigation hub"}, {"version": "9.1.0", "operator": "le", "name": "oracle hospitality reporting and analytics"}, {"version": "310", "operator": "le", "name": "micros compact workstation 3"}, {"version": "400", "operator": "le", "name": "micros es400 series"}, {"version": "210", "operator": "le", "name": "micros kitchen display system hardware"}, {"version": "5A", "operator": "le", "name": "micros workstation 5a"}, {"version": "610", "operator": "le", "name": "micros workstation 6"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle bam (business activity monitoring)"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle data integrator"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle data integrator"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle jdeveloper"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.1.3.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "10.3.6.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "11.1.1.9.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "5.5.0.0.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle enterprise data quality"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle enterprise data quality"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle coherence"}, {"version": "3.7.1.0", "operator": "le", "name": "oracle coherence"}, {"version": "12.1.3.0.0", "operator": "le", "name": "oracle coherence"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle coherence"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle coherence"}, {"version": "11.1.2.3.0", "operator": "le", "name": "identity manager"}, {"version": "12.2.1.3.0", "operator": "le", "name": "identity manager"}, {"version": "12.2.1.4.0", "operator": "le", "name": "identity manager"}, {"version": "11.1.2.2.0", "operator": "le", "name": "identity manager"}, {"version": "19.1.0.0.0", "operator": "le", "name": "oracle goldengate application adapters"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle managed file transfer"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle managed file transfer"}, {"version": "3.2.0.0", "operator": "le", "name": "real-time decisions (rtd) solutions"}, {"version": "8.5.5", "operator": "le", "name": "oracle outside in technology"}, {"version": "11.1.1.7.0", "operator": "le", "name": "oracle enterprise repository"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle fusion middleware mapviewer"}, {"version": "11.1.2.3.0", "operator": "le", "name": "oracle access manager"}, {"version": "8.13", "operator": "le", "name": "oracle hospitality suite8"}, {"version": "8.14", "operator": "le", "name": "oracle hospitality suite8"}, {"version": "11.2.5.0", "operator": "le", "name": "hyperion infrastructure technology"}, {"version": "11.1.2.4", "operator": "le", "name": "hyperion infrastructure technology"}, {"version": "11.2.5.0", "operator": "le", "name": "hyperion financial reporting"}, {"version": "11.1.2.4", "operator": "le", "name": "hyperion financial reporting"}, {"version": "11.2.5.0", "operator": "le", "name": "oracle hyperion bi+"}, {"version": "11.1.2.4", "operator": "le", "name": "oracle hyperion bi+"}, {"version": "11.2.0", "operator": "le", "name": "oracle insurance policy administration"}, {"version": "11.0.2", "operator": "le", "name": "oracle insurance policy administration"}, {"version": "11.1.0", "operator": "le", "name": "oracle insurance policy administration"}, {"version": "11.3.0", "operator": "le", "name": "oracle insurance policy administration"}, {"version": "11.0.2", "operator": "le", "name": "oracle insurance policy administration j2ee"}, {"version": "11.0.2", "operator": "le", "name": "oracle insurance rules palette"}, {"version": "11.1.0", "operator": "le", "name": "oracle insurance rules palette"}, {"version": "20.3.2", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "21.1.0", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "16.0.1", "operator": "le", "name": "java se, oracle graalvm enterprise edition"}, {"version": "11.0.11", "operator": "le", "name": "java se, oracle graalvm enterprise edition"}, {"version": "7u301", "operator": "le", "name": "java se, oracle graalvm enterprise edition"}, {"version": "8u291", "operator": "le", "name": "java se, oracle graalvm enterprise edition"}, {"version": "21.1.0", "operator": "le", "name": "java se, oracle graalvm enterprise edition"}, {"version": "7u301", "operator": "le", "name": "java se"}, {"version": "9.2.5.3", "operator": "le", "name": "jd edwards enterpriseone orchestrator"}, {"version": "9.2.5.3", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "8.0.25", "operator": "le", "name": "mysql cluster"}, {"version": "8.0.25", "operator": "le", "name": "mysql server"}, {"version": "8.0.23", "operator": "le", "name": "mysql server"}, {"version": "5.7.34", "operator": "le", "name": "mysql server"}, {"version": "8.0.21", "operator": "le", "name": "mysql server"}, {"version": "8.0.23", "operator": "le", "name": "mysql enterprise monitor"}, {"version": "8.0.23", "operator": "le", "name": "mysql connectors"}, {"version": "8.57", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.58", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.59", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.58.", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise cs campus community"}, {"version": "9.0", "operator": "le", "name": "peoplesoft enterprise cs campus community"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise hcm candidate gateway"}, {"version": "9.2", "operator": "le", "name": "peoplesoft enterprise hcm shared components"}, {"version": "8.57", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "8.59", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "8.58", "operator": "le", "name": "peoplesoft enterprise pt peopletools"}, {"version": "12.2.0", "operator": "le", "name": "oracle policy automation"}, {"version": "20.0.1", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "16.0.6", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "18.0.3", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "17.0.4", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "19.0.2", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "16.0", "operator": "le", "name": "oracle retail customer management and segmentation foundation"}, {"version": "19.0", "operator": "le", "name": "oracle retail customer management and segmentation foundation"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "16.0.3.0", "operator": "le", "name": "oracle retail financial integration"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail financial integration"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail financial integration"}, {"version": "16.0.3.0", "operator": "le", "name": "oracle retail integration bus"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail integration bus"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail integration bus"}, {"version": "15.0", "operator": "le", "name": "oracle retail order broker"}, {"version": "16.0", "operator": "le", "name": "oracle retail order broker"}, {"version": "14.1", "operator": "le", "name": "oracle retail back office"}, {"version": "14.1", "operator": "le", "name": "oracle retail central office"}, {"version": "14.1", "operator": "le", "name": "oracle retail point-of-service"}, {"version": "14.1", "operator": "le", "name": "oracle retail returns management"}, {"version": "16.0.3.0", "operator": "le", "name": "oracle retail service backbone"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail service backbone"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail service backbone"}, {"version": "15.0", "operator": "le", "name": "oracle retail price management"}, {"version": "14.1", "operator": "le", "name": "oracle retail price management"}, {"version": "16.0", "operator": "le", "name": "oracle retail price management"}, {"version": "14.0", "operator": "le", "name": "oracle retail price management"}, {"version": "16.0", "operator": "le", "name": "oracle retail customer engagement"}, {"version": "19.5", "operator": "le", "name": "oracle retail order management system cloud service"}, {"version": "21.5", "operator": "le", "name": "siebel core - server framework"}, {"version": "21.5", "operator": "le", "name": "siebel core - automation"}, {"version": "21.5", "operator": "le", "name": "siebel apps - marketing"}, {"version": "21.5", "operator": "le", "name": "siebel crm"}, {"version": "6.2.1.0", "operator": "le", "name": "oracle agile engineering data management"}, {"version": "6.4.3", "operator": "le", "name": "oracle transportation management"}, {"version": "9.3.3", "operator": "le", "name": "oracle agile plm"}, {"version": "9.3.6", "operator": "le", "name": "oracle agile plm"}, {"version": "9.3.5", "operator": "le", "name": "oracle agile plm"}, {"version": "2.12.41", "operator": "le", "name": "oss support tools"}, {"version": "2400", "operator": "le", "name": "fujitsu m10-1, m10-4, m10-4s, m12-1, m12-2, m12-2s servers"}, {"version": "3100", "operator": "le", "name": "fujitsu m10-1, m10-4, m10-4s, m12-1, m12-2, m12-2s servers"}, {"version": "8.8", "operator": "le", "name": "oracle zfs storage appliance kit"}, {"version": "2.3", "operator": "le", "name": "storagetek tape analytics sw tool"}, {"version": "4.4", "operator": "le", "name": "oracle solaris cluster"}, {"version": "11", "operator": "le", "name": "oracle solaris"}, {"version": "5.6", "operator": "le", "name": "oracle secure global desktop"}, {"version": "6.1.24", "operator": "le", "name": "oracle vm virtualbox"}]}
{"nessus": [{"lastseen": "2023-05-18T15:31:30", "description": "The versions of Oracle Database Server installed on the remote host are affected by multiple vulnerabilities as referenced in the July 2021 CPU advisory.\n\n - Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions that are affected are 12.1.0.2 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Advanced Networking Option, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Advanced Networking Option. (CVE-2021-2351)\n\n - Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected are 12.1.0.2 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Procedure, Alter Any Table privilege with network access via Oracle Net to compromise Oracle Text.\n Successful attacks of this vulnerability can result in takeover of Oracle Text. (CVE-2021-2328)\n\n - Vulnerability in the Oracle XML DB component of Oracle Database Server. Supported versions that are affected are 12.1.0.2 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any Procedure, Create Public Synonym privilege with network access via Oracle Net to compromise Oracle XML DB. Successful attacks of this vulnerability can result in takeover of Oracle XML DB.\n (CVE-2021-2329)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-07-23T00:00:00", "type": "nessus", "title": "Oracle Database Server Multiple Vulnerabilities (Jul 2021 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-21010", "CVE-2019-12415", "CVE-2019-12973", "CVE-2019-17545", "CVE-2019-17566", "CVE-2020-10543", "CVE-2020-10878", "CVE-2020-11987", "CVE-2020-11988", "CVE-2020-12723", "CVE-2020-13956", "CVE-2020-15389", "CVE-2020-25649", "CVE-2020-26870", "CVE-2020-27193", "CVE-2020-27814", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845", "CVE-2020-28196", "CVE-2020-7760", "CVE-2020-8908", "CVE-2021-2326", "CVE-2021-2328", "CVE-2021-2329", "CVE-2021-2330", "CVE-2021-2333", "CVE-2021-23336", "CVE-2021-2334", "CVE-2021-2335", "CVE-2021-2336", "CVE-2021-2337", "CVE-2021-2351", "CVE-2021-2438", "CVE-2021-2460"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:oracle:database_server"], "id": "ORACLE_RDBMS_CPU_JUL_2021.NASL", "href": "https://www.tenable.com/plugins/nessus/152026", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152026);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2018-21010\",\n \"CVE-2019-12415\",\n \"CVE-2019-12973\",\n \"CVE-2019-17545\",\n \"CVE-2019-17566\",\n \"CVE-2020-7760\",\n \"CVE-2020-8908\",\n \"CVE-2020-10543\",\n \"CVE-2020-10878\",\n \"CVE-2020-11987\",\n \"CVE-2020-11988\",\n \"CVE-2020-12723\",\n \"CVE-2020-13956\",\n \"CVE-2020-15389\",\n \"CVE-2020-25649\",\n \"CVE-2020-26870\",\n \"CVE-2020-27193\",\n \"CVE-2020-27814\",\n \"CVE-2020-27841\",\n \"CVE-2020-27842\",\n \"CVE-2020-27843\",\n \"CVE-2020-27844\",\n \"CVE-2020-27845\",\n \"CVE-2020-28196\",\n \"CVE-2021-2326\",\n \"CVE-2021-2328\",\n \"CVE-2021-2329\",\n \"CVE-2021-2330\",\n \"CVE-2021-2333\",\n \"CVE-2021-2334\",\n \"CVE-2021-2335\",\n \"CVE-2021-2336\",\n \"CVE-2021-2337\",\n \"CVE-2021-2351\",\n \"CVE-2021-2438\",\n \"CVE-2021-2460\",\n \"CVE-2021-23336\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0330-S\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0004\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0001\");\n\n script_name(english:\"Oracle Database Server Multiple Vulnerabilities (Jul 2021 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is running a database server which is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The versions of Oracle Database Server installed on the remote host are affected by multiple vulnerabilities as\nreferenced in the July 2021 CPU advisory.\n\n - Vulnerability in the Advanced Networking Option component of Oracle Database Server. Supported versions\n that are affected are 12.1.0.2 and 19c. Difficult to exploit vulnerability allows unauthenticated attacker\n with network access via Oracle Net to compromise Advanced Networking Option. Successful attacks require\n human interaction from a person other than the attacker and while the vulnerability is in Advanced\n Networking Option, attacks may significantly impact additional products. Successful attacks of this\n vulnerability can result in takeover of Advanced Networking Option. (CVE-2021-2351)\n\n - Vulnerability in the Oracle Text component of Oracle Database Server. Supported versions that are affected\n are 12.1.0.2 and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Any\n Procedure, Alter Any Table privilege with network access via Oracle Net to compromise Oracle Text.\n Successful attacks of this vulnerability can result in takeover of Oracle Text. (CVE-2021-2328)\n\n - Vulnerability in the Oracle XML DB component of Oracle Database Server. Supported versions that are\n affected are 12.1.0.2 and 19c. Easily exploitable vulnerability allows high privileged attacker having\n Create Any Procedure, Create Public Synonym privilege with network access via Oracle Net to compromise\n Oracle XML DB. Successful attacks of this vulnerability can result in takeover of Oracle XML DB.\n (CVE-2021-2329)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/a/tech/docs/cpujul2021cvrf.xml\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2021.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate patch according to the July 2021 Oracle Critical Patch Update advisory.\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27844\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2019-17545\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:database_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"oracle_rdbms_query_patch_info.nbin\", \"oracle_rdbms_patch_info.nbin\");\n\n exit(0);\n}\n\ninclude('vcf_extras_oracle.inc');\n\nvar app_info = vcf::oracle_rdbms::get_app_info();\n\nvar constraints = [\n # RDBMS:\n {'min_version': '19.0', 'fixed_version': '19.10.3.0.210720', 'missing_patch':'32923627', 'os':'unix', 'component':'db'},\n {'min_version': '19.0', 'fixed_version': '19.12.0.0.210720', 'missing_patch':'32832237', 'os':'win', 'component':'db'},\n {'min_version': '19.11', 'fixed_version': '19.11.1.0.210720', 'missing_patch':'32844504', 'os':'unix', 'component':'db'},\n {'min_version': '19.12', 'fixed_version': '19.12.0.0.210720', 'missing_patch':'32904851', 'os':'unix', 'component':'db'},\n \n {'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.210720', 'missing_patch':'32916808', 'os':'unix', 'component':'db'},\n {'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.210720', 'missing_patch':'32775037', 'os':'win', 'component':'db'},\n\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.210720', 'missing_patch':'32768233, 32917362', 'os':'unix', 'component':'db'},\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.210720', 'missing_patch':'32774982', 'os':'win', 'component':'db'},\n \n # OJVM:\n {'min_version': '19.0', 'fixed_version': '19.12.0.0.210720', 'missing_patch':'32876380', 'os':'unix', 'component':'ojvm'},\n {'min_version': '19.0', 'fixed_version': '19.12.0.0.210720', 'missing_patch':'32876380', 'os':'win', 'component':'ojvm'},\n\n {'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.210720', 'missing_patch':'32876409', 'os':'unix', 'component':'ojvm'},\n {'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.210720', 'missing_patch':'32905896', 'os':'win', 'component':'ojvm'},\n\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.210720', 'missing_patch':'32876425', 'os':'unix', 'component':'ojvm'},\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.210720', 'missing_patch':'32905878', 'os':'win', 'component':'ojvm'}\n];\n\nvcf::oracle_rdbms::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE\n);\n\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:27:04", "description": "Multiple security vulnerabilities were found in Jackson Databind.\n\nCVE-2020-24616\n\nFasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).\n\nCVE-2020-24750\n\nFasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.\n\nCVE-2020-25649\n\nA flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.\n\nCVE-2020-35490\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.\n\nCVE-2020-35491\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.SharedPoolDataSource.\n\nCVE-2020-35728\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).\n\nCVE-2020-36179\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36180\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36181\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36182\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36183\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.\n\nCVE-2020-36184\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.\n\nCVE-2020-36185\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.\n\nCVE-2020-36186\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.\n\nCVE-2020-36187\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.\n\nCVE-2020-36188\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDICS.\n\nCVE-2020-36189\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DMCS.\n\nCVE-2021-20190\n\nA flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing.\nThe highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.\n\nFor Debian 9 stretch, these problems have been fixed in version 2.8.6-1+deb9u9.\n\nWe recommend that you upgrade your jackson-databind packages.\n\nFor the detailed security status of jackson-databind please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/jackson-databind\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-04-27T00:00:00", "type": "nessus", "title": "Debian DLA-2638-1 : jackson-databind security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24616", "CVE-2020-24750", "CVE-2020-25649", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2021-20190"], "modified": "2022-12-06T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libjackson2-databind-java", "p-cpe:/a:debian:debian_linux:libjackson2-databind-java-doc", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DLA-2638.NASL", "href": "https://www.tenable.com/plugins/nessus/149019", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-2638-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(149019);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/06\");\n\n script_cve_id(\"CVE-2020-24616\", \"CVE-2020-24750\", \"CVE-2020-35490\", \"CVE-2020-35491\", \"CVE-2020-35728\", \"CVE-2020-36179\", \"CVE-2020-36180\", \"CVE-2020-36181\", \"CVE-2020-36182\", \"CVE-2020-36183\", \"CVE-2020-36184\", \"CVE-2020-36185\", \"CVE-2020-36186\", \"CVE-2020-36187\", \"CVE-2020-36188\", \"CVE-2020-36189\", \"CVE-2021-20190\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0004\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"Debian DLA-2638-1 : jackson-databind security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Multiple security vulnerabilities were found in Jackson Databind.\n\nCVE-2020-24616\n\nFasterXML jackson-databind 2.x before 2.9.10.6 mishandles the\ninteraction between serialization gadgets and typing, related to\nbr.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).\n\nCVE-2020-24750\n\nFasterXML jackson-databind 2.x before 2.9.10.6 mishandles the\ninteraction between serialization gadgets and typing, related to\ncom.pastdev.httpcomponents.configuration.JndiConfiguration.\n\nCVE-2020-25649\n\nA flaw was found in FasterXML Jackson Databind, where it did not have\nentity expansion secured properly. This flaw allows vulnerability to\nXML external entity (XXE) attacks. The highest threat from this\nvulnerability is data integrity.\n\nCVE-2020-35490\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.commons.dbcp2.datasources.PerUserPoolDataSource.\n\nCVE-2020-35491\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.commons.dbcp2.datasources.SharedPoolDataSource.\n\nCVE-2020-35728\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\ncom.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka\nembedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).\n\nCVE-2020-36179\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\noadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36180\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36181\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36182\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.\n\nCVE-2020-36183\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.\n\nCVE-2020-36184\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.\n\nCVE-2020-36185\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp2.datasources.SharedPoolDataSource.\n\nCVE-2020-36186\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.\n\nCVE-2020-36187\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\norg.apache.tomcat.dbcp.dbcp.datasources.SharedPoolDataSource.\n\nCVE-2020-36188\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.JNDICS.\n\nCVE-2020-36189\n\nFasterXML jackson-databind 2.x before 2.9.10.8 mishandles the\ninteraction between serialization gadgets and typing, related to\ncom.newrelic.agent.deps.ch.qos.logback.core.db.DMCS.\n\nCVE-2021-20190\n\nA flaw was found in jackson-databind before 2.9.10.7. FasterXML\nmishandles the interaction between serialization gadgets and typing.\nThe highest threat from this vulnerability is to data confidentiality\nand integrity as well as system availability.\n\nFor Debian 9 stretch, these problems have been fixed in version\n2.8.6-1+deb9u9.\n\nWe recommend that you upgrade your jackson-databind packages.\n\nFor the detailed security status of jackson-databind please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/jackson-databind\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/jackson-databind\"\n );\n # https://security-tracker.debian.org/tracker/source-package/jackson-databind\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?61134ddf\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libjackson2-databind-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libjackson2-databind-java-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/08/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/04/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/04/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"libjackson2-databind-java\", reference:\"2.8.6-1+deb9u9\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"libjackson2-databind-java-doc\", reference:\"2.8.6-1+deb9u9\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:31:51", "description": "The remote Ubuntu 18.04 LTS / 20.04 LTS / 21.04 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5022-1 advisory.\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). (CVE-2021-2340)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2342)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2354)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-2356)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2357, CVE-2021-2367, CVE-2021-2383, CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427, CVE-2021-2437, CVE-2021-2441)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2370, CVE-2021-2440)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2372)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N). (CVE-2021-2374)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-2385)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2389, CVE-2021-2390)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2402)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H). (CVE-2021-2417)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2422)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2424)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2429)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-07-26T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS / 21.04 : MySQL vulnerabilities (USN-5022-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2342", "CVE-2021-2352", "CVE-2021-2354", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2367", "CVE-2021-2370", "CVE-2021-2372", "CVE-2021-2374", "CVE-2021-2383", "CVE-2021-2384", "CVE-2021-2385", "CVE-2021-2387", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2399", "CVE-2021-2402", "CVE-2021-2410", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2422", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2429", "CVE-2021-2437", "CVE-2021-2440", "CVE-2021-2441"], "modified": "2023-01-17T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "cpe:/o:canonical:ubuntu_linux:21.04", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient20", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient21", "p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev", "p-cpe:/a:canonical:ubuntu_linux:mysql-client", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-router", "p-cpe:/a:canonical:ubuntu_linux:mysql-server", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-source-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-source-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-8.0"], "id": "UBUNTU_USN-5022-1.NASL", "href": "https://www.tenable.com/plugins/nessus/152081", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5022-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152081);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/17\");\n\n script_cve_id(\n \"CVE-2021-2339\",\n \"CVE-2021-2340\",\n \"CVE-2021-2342\",\n \"CVE-2021-2352\",\n \"CVE-2021-2354\",\n \"CVE-2021-2356\",\n \"CVE-2021-2357\",\n \"CVE-2021-2367\",\n \"CVE-2021-2370\",\n \"CVE-2021-2372\",\n \"CVE-2021-2374\",\n \"CVE-2021-2383\",\n \"CVE-2021-2384\",\n \"CVE-2021-2385\",\n \"CVE-2021-2387\",\n \"CVE-2021-2389\",\n \"CVE-2021-2390\",\n \"CVE-2021-2399\",\n \"CVE-2021-2402\",\n \"CVE-2021-2410\",\n \"CVE-2021-2417\",\n \"CVE-2021-2418\",\n \"CVE-2021-2422\",\n \"CVE-2021-2424\",\n \"CVE-2021-2425\",\n \"CVE-2021-2426\",\n \"CVE-2021-2427\",\n \"CVE-2021-2429\",\n \"CVE-2021-2437\",\n \"CVE-2021-2440\",\n \"CVE-2021-2441\"\n );\n script_xref(name:\"USN\", value:\"5022-1\");\n script_xref(name:\"IAVA\", value:\"2021-A-0333\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 LTS / 21.04 : MySQL vulnerabilities (USN-5022-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 18.04 LTS / 20.04 LTS / 21.04 host has packages installed that are affected by multiple\nvulnerabilities as referenced in the USN-5022-1 advisory.\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions\n that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker\n with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2339, CVE-2021-2352, CVE-2021-2399)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported\n versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of\n MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). (CVE-2021-2340)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Easily exploitable vulnerability\n allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently\n repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS\n Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2342)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported\n versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2354)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported\n versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability\n allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently\n repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to\n some of MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS\n Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-2356)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2357, CVE-2021-2367, CVE-2021-2383,\n CVE-2021-2384, CVE-2021-2387, CVE-2021-2410, CVE-2021-2418, CVE-2021-2425, CVE-2021-2426, CVE-2021-2427,\n CVE-2021-2437, CVE-2021-2441)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions\n that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker\n with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2370, CVE-2021-2440)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high\n privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable\n crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2372)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with\n logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of\n this vulnerability can result in unauthorized access to critical data or complete access to all MySQL\n Server accessible data. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N). (CVE-2021-2374)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported\n versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability\n allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.\n Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently\n repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to\n some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS\n Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2021-2385)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows\n unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable\n crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2389, CVE-2021-2390)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions\n that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker\n with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2402)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions\n that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker\n with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server\n accessible data and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base\n Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H). (CVE-2021-2417)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that\n are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL\n Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2422)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported\n versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2424)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL\n Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2021-2429)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5022-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2417\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:21.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient21\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-router\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-source-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-source-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-8.0\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2021-2023 Canonical, Inc. / NASL script (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('ubuntu.inc');\ninclude('misc_func.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/Ubuntu/release');\nif ( isnull(release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04|20\\.04|21\\.04)$\", string:release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04 / 20.04 / 21.04', 'Ubuntu ' + release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\n\npkgs = [\n {'osver': '18.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'libmysqlclient20', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'libmysqld-dev', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-client', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-client-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-client-core-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-server', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-server-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-server-core-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-source-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-testsuite', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '18.04', 'pkgname': 'mysql-testsuite-5.7', 'pkgver': '5.7.35-0ubuntu0.18.04.1'},\n {'osver': '20.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'libmysqlclient21', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client-core-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-router', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server-core-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-source-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-testsuite', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-testsuite-8.0', 'pkgver': '8.0.26-0ubuntu0.20.04.2'},\n {'osver': '21.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'libmysqlclient21', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-client', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-client-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-client-core-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-router', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-server', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-server-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-server-core-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-source-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-testsuite', 'pkgver': '8.0.26-0ubuntu0.21.04.3'},\n {'osver': '21.04', 'pkgname': 'mysql-testsuite-8.0', 'pkgver': '8.0.26-0ubuntu0.21.04.3'}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n osver = NULL;\n pkgname = NULL;\n pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libmysqlclient-dev / libmysqlclient20 / libmysqlclient21 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-06T16:06:44", "description": "Oracle reports :\n\nThis Critical Patch Update contains 41 new security patches for Oracle MySQL. 10 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials. The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle MySQL is 8.8.\n\nMariaDB is affected by CVE-2021-2372 and CVE-2021-2389 only.", "cvss3": {}, "published": "2021-07-21T00:00:00", "type": "nessus", "title": "FreeBSD : MySQL -- Multiple vulnerabilities (38a4a043-e937-11eb-9b84-d4c9ef517024)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17543", "CVE-2021-22884", "CVE-2021-22901", "CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2342", "CVE-2021-2352", "CVE-2021-2354", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2367", "CVE-2021-2370", "CVE-2021-2372", "CVE-2021-2374", "CVE-2021-2383", "CVE-2021-2384", "CVE-2021-2385", "CVE-2021-2387", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2399", "CVE-2021-2402", "CVE-2021-2410", "CVE-2021-2411", "CVE-2021-2412", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2422", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2429", "CVE-2021-2437", "CVE-2021-2440", "CVE-2021-2441", "CVE-2021-2444", "CVE-2021-3450"], "modified": "2022-12-05T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:mariadb103-server", "p-cpe:/a:freebsd:freebsd:mariadb104-server", "p-cpe:/a:freebsd:freebsd:mariadb105-server", "p-cpe:/a:freebsd:freebsd:mysql57-server", "p-cpe:/a:freebsd:freebsd:mysql80-server", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "href": "https://www.tenable.com/plugins/nessus/151899", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151899);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2019-17543\",\n \"CVE-2021-2339\",\n \"CVE-2021-2340\",\n \"CVE-2021-2342\",\n \"CVE-2021-2352\",\n \"CVE-2021-2354\",\n \"CVE-2021-2356\",\n \"CVE-2021-2357\",\n \"CVE-2021-2367\",\n \"CVE-2021-2370\",\n \"CVE-2021-2372\",\n \"CVE-2021-2374\",\n \"CVE-2021-2383\",\n \"CVE-2021-2384\",\n \"CVE-2021-2385\",\n \"CVE-2021-2387\",\n \"CVE-2021-2389\",\n \"CVE-2021-2390\",\n \"CVE-2021-2399\",\n \"CVE-2021-2402\",\n \"CVE-2021-2410\",\n \"CVE-2021-2411\",\n \"CVE-2021-2412\",\n \"CVE-2021-2417\",\n \"CVE-2021-2418\",\n \"CVE-2021-2422\",\n \"CVE-2021-2424\",\n \"CVE-2021-2425\",\n \"CVE-2021-2426\",\n \"CVE-2021-2427\",\n \"CVE-2021-2429\",\n \"CVE-2021-2437\",\n \"CVE-2021-2440\",\n \"CVE-2021-2441\",\n \"CVE-2021-2444\",\n \"CVE-2021-3450\",\n \"CVE-2021-22884\",\n \"CVE-2021-22901\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"FreeBSD : MySQL -- Multiple vulnerabilities (38a4a043-e937-11eb-9b84-d4c9ef517024)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Oracle reports :\n\nThis Critical Patch Update contains 41 new security patches for Oracle\nMySQL. 10 of these vulnerabilities may be remotely exploitable without\nauthentication, i.e., may be exploited over a network without\nrequiring user credentials. The highest CVSS v3.1 Base Score of\nvulnerabilities affecting Oracle MySQL is 8.8.\n\nMariaDB is affected by CVE-2021-2372 and CVE-2021-2389 only.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2021.html\");\n # https://vuxml.freebsd.org/freebsd/38a4a043-e937-11eb-9b84-d4c9ef517024.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?953cbc62\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2417\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-22901\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb103-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb104-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mariadb105-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql57-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql80-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"mysql57-server<5.7.35\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mysql80-server<8.0.26\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mariadb103-server<10.3.31\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mariadb104-server<10.4.21\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"mariadb105-server<10.5.12\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:31:10", "description": "The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2021:1840-1 advisory.\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21341)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21342)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21343)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. (CVE-2021-21344, CVE-2021-21346, CVE-2021-21347)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. (CVE-2021-21345)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21348)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. (CVE-2021-21349)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21350)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21351)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-07-16T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : xstream (openSUSE-SU-2021:1840-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21341", "CVE-2021-21342", "CVE-2021-21343", "CVE-2021-21344", "CVE-2021-21345", "CVE-2021-21346", "CVE-2021-21347", "CVE-2021-21348", "CVE-2021-21349", "CVE-2021-21350", "CVE-2021-21351"], "modified": "2022-05-09T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:xstream", "p-cpe:/a:novell:opensuse:xstream-benchmark", "p-cpe:/a:novell:opensuse:xstream-javadoc", "p-cpe:/a:novell:opensuse:xstream-parent", "cpe:/o:novell:opensuse:15.3"], "id": "OPENSUSE-2021-1840.NASL", "href": "https://www.tenable.com/plugins/nessus/151746", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2021:1840-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151746);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-21341\",\n \"CVE-2021-21342\",\n \"CVE-2021-21343\",\n \"CVE-2021-21344\",\n \"CVE-2021-21345\",\n \"CVE-2021-21346\",\n \"CVE-2021-21347\",\n \"CVE-2021-21348\",\n \"CVE-2021-21349\",\n \"CVE-2021-21350\",\n \"CVE-2021-21351\"\n );\n\n script_name(english:\"openSUSE 15 Security Update : xstream (openSUSE-SU-2021:1840-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe openSUSE-SU-2021:1840-1 advisory.\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is vulnerability which may allow a remote attacker to allocate 100% CPU time on the target system\n depending on CPU type or parallel execution of such a payload resulting in a denial of service only by\n manipulating the processed input stream. No user is affected who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. If you rely on\n XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21341)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability where the processed stream at unmarshalling time contains type information to\n recreate the formerly written objects. XStream creates therefore new instances based on these type\n information. An attacker can manipulate the processed input stream and replace or inject objects, that\n result in a server-side forgery request. No user is affected, who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. If you rely on\n XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21342)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability where the processed stream at unmarshalling time contains type information to\n recreate the formerly written objects. XStream creates therefore new instances based on these type\n information. An attacker can manipulate the processed input stream and replace or inject objects, that\n result in the deletion of a file on the local host. No user is affected, who followed the recommendation\n to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely\n on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21343)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a\n remote host only by manipulating the processed input stream. No user is affected, who followed the\n recommendation to setup XStream's security framework with a whitelist limited to the minimal required\n types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least\n version 1.4.16. (CVE-2021-21344, CVE-2021-21346, CVE-2021-21347)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands\n of the host only by manipulating the processed input stream. No user is affected, who followed the\n recommendation to setup XStream's security framework with a whitelist limited to the minimal required\n types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least\n version 1.4.16. (CVE-2021-21345)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability which may allow a remote attacker to occupy a thread that consumes maximum CPU\n time and will never return. No user is affected, who followed the recommendation to setup XStream's\n security framework with a whitelist limited to the minimal required types. If you rely on XStream's\n default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21348)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability which may allow a remote attacker to request data from internal resources that\n are not publicly available only by manipulating the processed input stream. No user is affected, who\n followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal\n required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use\n at least version 1.4.16. (CVE-2021-21349)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating\n the processed input stream. No user is affected, who followed the recommendation to setup XStream's\n security framework with a whitelist limited to the minimal required types. If you rely on XStream's\n default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21350)\n\n - XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16,\n there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host\n only by manipulating the processed input stream. No user is affected, who followed the recommendation to\n setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on\n XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.\n (CVE-2021-21351)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184372\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184373\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184375\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184376\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184377\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184378\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184379\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184380\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184796\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1184797\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APETSNTGJFG76V7J5X4K4LWA77F5743O/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?aed25093\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21341\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21346\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21347\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21348\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21349\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21350\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-21351\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected xstream, xstream-benchmark, xstream-javadoc and / or xstream-parent packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21350\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-21345\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-benchmark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-parent\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.3\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/SuSE/release');\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nos_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\nos_ver = os_ver[1];\nif (release !~ \"^(SUSE15\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.3', release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + os_ver, cpu);\n\npkgs = [\n {'reference':'xstream-1.4.16-3.8.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-benchmark-1.4.16-3.8.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-javadoc-1.4.16-3.8.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-parent-1.4.16-3.8.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n cpu = NULL;\n rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'xstream / xstream-benchmark / xstream-javadoc / xstream-parent');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T15:12:12", "description": "The version of Oracle E-Business Suite installed on the remote host is affected by multiple vulnerabilities as referenced in the July 2021 CPU advisory.\n\n - Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized access to critical data or complete access to all Oracle Marketing accessible data. (CVE-2021-2355)\n\n - Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications accessible data. (CVE-2021-2436)\n\n - Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. (CVE-2021-2359)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-07-23T00:00:00", "type": "nessus", "title": "Oracle E-Business Suite Multiple Vulnerabilities (July 2021 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-2343", "CVE-2021-2355", "CVE-2021-2359", "CVE-2021-2360", "CVE-2021-2361", "CVE-2021-2362", "CVE-2021-2363", "CVE-2021-2364", "CVE-2021-2365", "CVE-2021-2380", "CVE-2021-2393", "CVE-2021-2398", "CVE-2021-2405", "CVE-2021-2406", "CVE-2021-2415", "CVE-2021-2434", "CVE-2021-2436"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/a:oracle:e-business_suite"], "id": "ORACLE_E-BUSINESS_CPU_JUL_2021.NASL", "href": "https://www.tenable.com/plugins/nessus/152040", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(152040);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-2343\",\n \"CVE-2021-2355\",\n \"CVE-2021-2359\",\n \"CVE-2021-2360\",\n \"CVE-2021-2361\",\n \"CVE-2021-2362\",\n \"CVE-2021-2363\",\n \"CVE-2021-2364\",\n \"CVE-2021-2365\",\n \"CVE-2021-2380\",\n \"CVE-2021-2393\",\n \"CVE-2021-2398\",\n \"CVE-2021-2405\",\n \"CVE-2021-2406\",\n \"CVE-2021-2415\",\n \"CVE-2021-2434\",\n \"CVE-2021-2436\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0332-S\");\n\n script_name(english:\"Oracle E-Business Suite Multiple Vulnerabilities (July 2021 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Oracle E-Business Suite installed on the remote host is affected by multiple vulnerabilities as\nreferenced in the July 2021 CPU advisory.\n\n - Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing\n Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily\n exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise\n Oracle Marketing. Successful attacks of this vulnerability can result in unauthorized creation, deletion\n or modification access to critical data or all Oracle Marketing accessible data as well as unauthorized\n access to critical data or complete access to all Oracle Marketing accessible data. (CVE-2021-2355)\n\n - Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User\n Management Framework). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily\n exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise\n Oracle Common Applications. Successful attacks require human interaction from a person other than the\n attacker and while the vulnerability is in Oracle Common Applications, attacks may significantly impact\n additional products. Successful attacks of this vulnerability can result in unauthorized access to\n critical data or complete access to all Oracle Common Applications accessible data as well as unauthorized\n update, insert or delete access to some of Oracle Common Applications accessible data. (CVE-2021-2436)\n\n - Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing\n Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily\n exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise\n Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and\n while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products.\n Successful attacks of this vulnerability can result in unauthorized access to critical data or complete\n access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to\n some of Oracle Marketing accessible data. (CVE-2021-2359)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2021.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/a/tech/docs/cpujul2021cvrf.xml\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate patch according to the July 2021 Oracle Critical Patch Update advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2415\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-2355\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:e-business_suite\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"oracle_e-business_query_patch_info.nbin\");\n script_require_keys(\"Oracle/E-Business/Version\", \"Oracle/E-Business/patches/installed\");\n\n exit(0);\n}\n\nvar fix_date = '202107';\n\nvar app_name = 'Oracle E-Business';\nvar version = get_kb_item_or_exit('Oracle/E-Business/Version');\nvar patched_versions = get_kb_item('Oracle/E-Business/patched_versions');\n\n# check if patched\nvar version_regex = \"(^|[^0-9])\" + version + \"\\.\" + fix_date + \"([^0-9]|$)\";\nif (!empty_or_null(patched_versions) && patched_versions =~ version_regex)\n audit(AUDIT_INST_VER_NOT_VULN, app_name, version);\n\n# set report fixed version and patches\nvar fix_patches;\nvar fix_version = version;\nif (version =~ \"^12\\.1\\.[123]($|\\.)\") fix_patches = '32841266';\nelse if (version =~ \"^12\\.2.([0-3])($|\\.)\")\n{\n fix_version = '12.2.3';\n fix_patches = '32841270';\n}\nelse if (version =~ \"^12\\.2.4($|\\.)\") fix_patches = ['32841270', '32979944'];\nelse if (version =~ \"^12\\.2.5($|\\.)\") fix_patches = ['32841270', '32979959'];\nelse if (version =~ \"^12\\.2.6($|\\.)\") fix_patches = ['32841270', '32979890'];\nelse if (version =~ \"^12\\.2.7($|\\.)\") fix_patches = ['32841270', '32980025'];\nelse if (version =~ \"^12\\.2.[89]($|\\.)\") fix_patches = ['32841270', '32946859', '32980025'];\nelse if (version =~ \"^12\\.2.10($|\\.)\") fix_patches = ['32841270', '32946878', '32980025'];\nelse\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version);\n\nvar report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix_version +\n '\\n Required Patches : ' + join(sep:', ', fix_patches);\n\nsecurity_report_v4(port:0,extra:report,severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-06T16:07:38", "description": "The version of MySQL running on the remote host is 8.0.x prior to 8.0.26. It is, therefore, affected by multiple vulnerabilities, including the following, as noted in the July 2021 Critical Patch Update advisory:\n\n - curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. (CVE-2021-22901)\n\n - LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) (CVE-2019-17543)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\n (CVE-2021-2372)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-07-22T00:00:00", "type": "nessus", "title": "MySQL 8.0.x < 8.0.26 Multiple Vulnerabilities (Jul 2021 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-17543", "CVE-2021-22884", "CVE-2021-22901", "CVE-2021-2339", "CVE-2021-2340", "CVE-2021-2342", "CVE-2021-2352", "CVE-2021-2354", "CVE-2021-2356", "CVE-2021-2357", "CVE-2021-2367", "CVE-2021-2370", "CVE-2021-2372", "CVE-2021-2374", "CVE-2021-2383", "CVE-2021-2384", "CVE-2021-2385", "CVE-2021-2387", "CVE-2021-2389", "CVE-2021-2390", "CVE-2021-2399", "CVE-2021-2402", "CVE-2021-2410", "CVE-2021-2411", "CVE-2021-2417", "CVE-2021-2418", "CVE-2021-2422", "CVE-2021-2424", "CVE-2021-2425", "CVE-2021-2426", "CVE-2021-2427", "CVE-2021-2429", "CVE-2021-2437", "CVE-2021-2440", "CVE-2021-2441", "CVE-2021-25122", "CVE-2021-3450", "CVE-2021-35537", "CVE-2021-35583", "CVE-2021-35629"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/a:oracle:mysql"], "id": "MYSQL_8_0_26.NASL", "href": "https://www.tenable.com/plugins/nessus/151968", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151968);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2019-17543\",\n \"CVE-2021-2339\",\n \"CVE-2021-2340\",\n \"CVE-2021-2342\",\n \"CVE-2021-2352\",\n \"CVE-2021-2354\",\n \"CVE-2021-2356\",\n \"CVE-2021-2357\",\n \"CVE-2021-2367\",\n \"CVE-2021-2370\",\n \"CVE-2021-2372\",\n \"CVE-2021-2374\",\n \"CVE-2021-2383\",\n \"CVE-2021-2384\",\n \"CVE-2021-2385\",\n \"CVE-2021-2387\",\n \"CVE-2021-2389\",\n \"CVE-2021-2390\",\n \"CVE-2021-2399\",\n \"CVE-2021-2402\",\n \"CVE-2021-2410\",\n \"CVE-2021-2411\",\n \"CVE-2021-2417\",\n \"CVE-2021-2418\",\n \"CVE-2021-2422\",\n \"CVE-2021-2424\",\n \"CVE-2021-2425\",\n \"CVE-2021-2426\",\n \"CVE-2021-2427\",\n \"CVE-2021-2429\",\n \"CVE-2021-2437\",\n \"CVE-2021-2440\",\n \"CVE-2021-2441\",\n \"CVE-2021-3450\",\n \"CVE-2021-22884\",\n \"CVE-2021-22901\",\n \"CVE-2021-25122\",\n \"CVE-2021-35537\",\n \"CVE-2021-35583\",\n \"CVE-2021-35629\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0333\");\n script_xref(name:\"IAVA\", value:\"2021-A-0487\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"MySQL 8.0.x < 8.0.26 Multiple Vulnerabilities (Jul 2021 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote database server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of MySQL running on the remote host is 8.0.x prior to 8.0.26. It is, therefore, affected by multiple\nvulnerabilities, including the following, as noted in the July 2021 Critical Patch Update advisory:\n\n - curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being\n used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate\n circumstances to potentially reach remote code execution in the client. (CVE-2021-22901)\n\n - LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting\n applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.)\n (CVE-2019-17543)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected\n are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result\n in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\n (CVE-2021-2372)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2021.html#AppendixMSQL\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/a/tech/docs/cpujul2021cvrf.xml\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to MySQL version 8.0.26 or later.\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-2417\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-22901\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:mysql\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"mysql_version.nasl\", \"mysql_login.nasl\", \"mysql_version_local.nasl\", \"mysql_win_installed.nbin\", \"macosx_mysql_installed.nbin\");\n script_require_keys(\"installed_sw/MySQL Server\");\n\n exit(0);\n}\n\ninclude('vcf_extras_mysql.inc');\n\nvar app_info = vcf::mysql::combined_get_app_info();\n\nvar constraints = [{ 'min_version' : '8.0.0', 'fixed_version' : '8.0.26'}];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:23:30", "description": "The remote host is affected by the vulnerability described in GLSA-202101-29 (OpenJPEG: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in OpenJPEG. Please review the CVE identifiers referenced below for details.\n Impact :\n\n Please review the referenced CVE identifiers for details.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {}, "published": "2021-01-26T00:00:00", "type": "nessus", "title": "GLSA-202101-29 : OpenJPEG: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-21010", "CVE-2019-12973", "CVE-2020-15389", "CVE-2020-27814", "CVE-2020-27841", "CVE-2020-27842", "CVE-2020-27843", "CVE-2020-27844", "CVE-2020-27845"], "modified": "2022-12-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:openjpeg", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-202101-29.NASL", "href": "https://www.tenable.com/plugins/nessus/145436", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 202101-29.\n#\n# The advisory text is Copyright (C) 2001-2022 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(145436);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/06\");\n\n script_cve_id(\"CVE-2018-21010\", \"CVE-2019-12973\", \"CVE-2020-15389\", \"CVE-2020-27814\", \"CVE-2020-27841\", \"CVE-2020-27842\", \"CVE-2020-27843\", \"CVE-2020-27844\", \"CVE-2020-27845\");\n script_xref(name:\"GLSA\", value:\"202101-29\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"GLSA-202101-29 : OpenJPEG: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote host is affected by the vulnerability described in GLSA-202101-29\n(OpenJPEG: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in OpenJPEG. Please review\n the CVE identifiers referenced below for details.\n \nImpact :\n\n Please review the referenced CVE identifiers for details.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/202101-29\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"All OpenJPEG 2 users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=media-libs/openjpeg-2.4.0:2'\n Gentoo has discontinued support OpenJPEG 1.x and any dependent packages\n should now be using OpenJPEG 2 or have dropped support for the library.\n We recommend that users unmerge OpenJPEG 1.x:\n # emerge --unmerge 'media-libs/openjpeg:1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-27844\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:openjpeg\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/01/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"media-libs/openjpeg\", unaffected:make_list(\"ge 2.4.0\"), vulnerable:make_list(\"lt 2.4.0\", \"lt 1.5.2-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"OpenJPEG\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:30:14", "description": "This update for xstream fixes the following issues :\n\n - Upgrade to 1.4.16\n\n - CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)\n\n - CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)\n\n - CVE-2021-21350: arbitrary code execution (bsc#1184380)\n\n - CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)\n\n - CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)\n\n - CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)\n\n - CVE-2021-21342: server-side forgery (bsc#1184379)\n\n - CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)\n\n - CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)\n\n - CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)\n\n - CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "cvss3": {}, "published": "2021-06-04T00:00:00", "type": "nessus", "title": "openSUSE Security Update : xstream (openSUSE-2021-832)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21341", "CVE-2021-21342", "CVE-2021-21343", "CVE-2021-21344", "CVE-2021-21345", "CVE-2021-21346", "CVE-2021-21347", "CVE-2021-21348", "CVE-2021-21349", "CVE-2021-21350", "CVE-2021-21351"], "modified": "2022-05-09T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:xstream", "p-cpe:/a:novell:opensuse:xstream-benchmark", "p-cpe:/a:novell:opensuse:xstream-javadoc", "p-cpe:/a:novell:opensuse:xstream-parent", "cpe:/o:novell:opensuse:15.2"], "id": "OPENSUSE-2021-832.NASL", "href": "https://www.tenable.com/plugins/nessus/150248", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2021-832.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(150248);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-21341\",\n \"CVE-2021-21342\",\n \"CVE-2021-21343\",\n \"CVE-2021-21344\",\n \"CVE-2021-21345\",\n \"CVE-2021-21346\",\n \"CVE-2021-21347\",\n \"CVE-2021-21348\",\n \"CVE-2021-21349\",\n \"CVE-2021-21350\",\n \"CVE-2021-21351\"\n );\n\n script_name(english:\"openSUSE Security Update : xstream (openSUSE-2021-832)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote openSUSE host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"This update for xstream fixes the following issues :\n\n - Upgrade to 1.4.16\n\n - CVE-2021-21351: remote attacker to load and execute\n arbitrary code (bsc#1184796)\n\n - CVE-2021-21349: SSRF can lead to a remote attacker to\n request data from internal resources (bsc#1184797)\n\n - CVE-2021-21350: arbitrary code execution (bsc#1184380)\n\n - CVE-2021-21348: remote attacker could cause denial of\n service by consuming maximum CPU time (bsc#1184374)\n\n - CVE-2021-21347: remote attacker to load and execute\n arbitrary code from a remote host (bsc#1184378)\n\n - CVE-2021-21344: remote attacker could load and execute\n arbitrary code from a remote host (bsc#1184375)\n\n - CVE-2021-21342: server-side forgery (bsc#1184379)\n\n - CVE-2021-21341: remote attacker could cause a denial of\n service by allocating 100% CPU time (bsc#1184377)\n\n - CVE-2021-21346: remote attacker could load and execute\n arbitrary code (bsc#1184373)\n\n - CVE-2021-21345: remote attacker with sufficient rights\n could execute commands (bsc#1184372)\n\n - CVE-2021-21343: replace or inject objects, that result\n in the deletion of files on the local host (bsc#1184376)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update\nproject.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184372\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184373\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184375\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184376\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184377\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184378\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184379\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184380\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184796\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1184797\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected xstream packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21350\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-21345\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/06/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/06/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-benchmark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-parent\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xstream-1.4.16-lp152.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xstream-benchmark-1.4.16-lp152.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xstream-javadoc-1.4.16-lp152.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xstream-parent-1.4.16-lp152.2.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xstream / xstream-benchmark / xstream-javadoc / xstream-parent\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:27:56", "description": "In XStream there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream.\n\nThe type hierarchies for java.io.InputStream, java.nio.channels.Channel, javax.activation.DataSource and javax.sql.rowsel.BaseRowSet are now blacklisted as well as the individual types com.sun.corba.se.impl.activation.ServerTableEntry, com.sun.tools.javac.processing.JavacProcessingEnvironment$NameProcessI terator, sun.awt.datatransfer.DataTransferer$IndexOrderComparator, and sun.swing.SwingLazyValue. Additionally the internal type Accessor$GetterSetterReflection of JAXB, the internal types MethodGetter$PrivilegedGetter and ServiceFinder$ServiceNameIterator of JAX-WS, all inner classes of javafx.collections.ObservableList and an internal ClassLoader used in a private BCEL copy are now part of the default blacklist and the deserialization of XML containing one of the types will fail. You will have to enable these types by explicit configuration, if you need them.\n\nFor Debian 9 stretch, these problems have been fixed in version 1.4.11.1-1+deb9u2.\n\nWe recommend that you upgrade your libxstream-java packages.\n\nFor the detailed security status of libxstream-java please refer to its security tracker page at:\nhttps://security-tracker.debian.org/tracker/libxstream-java\n\nNOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2021-04-05T00:00:00", "type": "nessus", "title": "Debian DLA-2616-1 : libxstream-java security update", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21341", "CVE-2021-21342", "CVE-2021-21343", "CVE-2021-21344", "CVE-2021-21345", "CVE-2021-21346", "CVE-2021-21347", &q