Description
A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [“Critical Patch Updates, Security Alerts and Bulletins”](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories.
**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**
This Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ July 2022 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2880220.1>).
**Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business Suite [CVE-2022-21500 (May 19, 2022)](<https://www.oracle.com/security-alerts/alert-cve-2022-21500.html>). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.**
Affected Software
Related
{"id": "ORACLE:CPUJUL2022", "vendorId": null, "type": "oracle", "bulletinFamily": "software", "title": "Oracle Critical Patch Update Advisory - July 2022", "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches address vulnerabilities in Oracle code and in third-party components included in Oracle products. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update Advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security patches. Refer to [\u201cCritical Patch Updates, Security Alerts and Bulletins\u201d](<https://www.oracle.com/security-alerts/>) for information about Oracle Security advisories. \n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released security patches. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update security patches without delay.**\n\nThis Critical Patch Update contains 349 new security patches across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ July 2022 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2880220.1>).\n\n**Please note that since the release of the April 2022 Critical Patch Update, Oracle has released a Security Alert for Oracle E-Business Suite [CVE-2022-21500 (May 19, 2022)](<https://www.oracle.com/security-alerts/alert-cve-2022-21500.html>). Customers are strongly advised to apply the July 2022 Critical Patch Update for Oracle E-Business Suite, which includes patches for this Alert as well as additional patches.**\n", "published": "2022-07-19T00:00:00", "modified": "2022-10-31T00:00:00", "epss": [{"cve": "CVE-2018-1259", "epss": 0.00366, "percentile": 0.69319, "modified": "2023-12-03"}, {"cve": "CVE-2018-1273", "epss": 0.97498, "percentile": 0.99976, "modified": "2023-12-03"}, {"cve": "CVE-2018-1274", "epss": 0.00422, "percentile": 0.71328, "modified": "2023-12-03"}, {"cve": "CVE-2018-18074", "epss": 0.00581, "percentile": 0.7553, "modified": "2023-12-03"}, {"cve": "CVE-2018-25032", "epss": 0.00278, "percentile": 0.64666, "modified": "2023-12-03"}, {"cve": "CVE-2018-8032", "epss": 0.00322, "percentile": 0.67278, "modified": "2023-12-03"}, {"cve": "CVE-2019-0219", "epss": 0.0032, "percentile": 0.67219, "modified": "2023-12-03"}, {"cve": "CVE-2019-0220", "epss": 0.0051, "percentile": 0.73845, "modified": "2023-12-03"}, {"cve": "CVE-2019-0227", "epss": 0.89205, "percentile": 0.98443, "modified": "2023-12-03"}, {"cve": "CVE-2019-10082", "epss": 0.00814, "percentile": 0.79767, "modified": "2023-12-03"}, {"cve": "CVE-2019-10086", "epss": 0.00331, "percentile": 0.67774, "modified": "2023-12-03"}, {"cve": "CVE-2019-17495", "epss": 0.01764, "percentile": 0.86563, "modified": "2023-12-03"}, {"cve": "CVE-2019-17571", "epss": 0.79382, "percentile": 0.97973, "modified": "2023-12-03"}, {"cve": "CVE-2019-20916", "epss": 0.00254, "percentile": 0.63078, "modified": "2023-12-03"}, {"cve": "CVE-2019-9636", "epss": 0.00573, "percentile": 0.75333, "modified": "2023-12-03"}, {"cve": "CVE-2019-9740", "epss": 0.00433, "percentile": 0.71664, "modified": "2023-12-03"}, {"cve": "CVE-2020-0404", "epss": 0.00044, "percentile": 0.08252, "modified": "2023-12-03"}, {"cve": "CVE-2020-10683", "epss": 0.00645, "percentile": 0.76873, "modified": "2023-12-03"}, {"cve": "CVE-2020-11022", "epss": 0.02634, "percentile": 0.89183, "modified": "2023-12-03"}, {"cve": "CVE-2020-11023", "epss": 0.00675, "percentile": 0.77498, "modified": "2023-12-03"}, {"cve": "CVE-2020-11987", "epss": 0.00173, "percentile": 0.54235, "modified": "2023-12-03"}, {"cve": "CVE-2020-13974", "epss": 0.00077, "percentile": 0.31987, "modified": "2023-12-03"}, {"cve": "CVE-2020-14343", "epss": 0.0027, "percentile": 0.64172, "modified": "2023-12-03"}, {"cve": "CVE-2020-1747", "epss": 0.00489, "percentile": 0.73321, "modified": "2023-12-03"}, {"cve": "CVE-2020-17521", "epss": 0.00067, "percentile": 0.27676, "modified": "2023-12-03"}, {"cve": "CVE-2020-1927", "epss": 0.00189, "percentile": 0.56177, "modified": "2023-12-03"}, {"cve": "CVE-2020-25649", "epss": 0.00405, "percentile": 0.7074, "modified": "2023-12-03"}, {"cve": "CVE-2020-26137", "epss": 0.00432, "percentile": 0.71619, "modified": "2023-12-03"}, {"cve": "CVE-2020-26184", "epss": 0.00136, "percentile": 0.48658, "modified": "2023-12-03"}, {"cve": "CVE-2020-26185", "epss": 0.00072, "percentile": 0.30027, "modified": "2023-12-03"}, {"cve": "CVE-2020-26237", "epss": 0.00203, "percentile": 0.57926, "modified": "2023-12-03"}, {"cve": "CVE-2020-27619", "epss": 0.00523, "percentile": 0.74179, "modified": "2023-12-03"}, {"cve": "CVE-2020-27820", "epss": 0.00045, "percentile": 0.12178, "modified": "2023-12-03"}, {"cve": "CVE-2020-28052", "epss": 0.00553, "percentile": 0.74889, "modified": "2023-12-03"}, {"cve": "CVE-2020-28491", "epss": 0.0011, "percentile": 0.43707, "modified": "2023-12-03"}, {"cve": "CVE-2020-28500", "epss": 0.00231, "percentile": 0.60996, "modified": "2023-12-03"}, {"cve": "CVE-2020-29396", "epss": 0.00258, "percentile": 0.633, "modified": "2023-12-03"}, {"cve": "CVE-2020-29505", "epss": 0.00158, "percentile": 0.5198, "modified": "2023-12-03"}, {"cve": "CVE-2020-29506", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-29507", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-29508", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-29651", "epss": 0.00314, "percentile": 0.66812, "modified": "2023-12-03"}, {"cve": "CVE-2020-35163", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-35164", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-35166", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-35167", "epss": 0.00192, "percentile": 0.56556, "modified": "2023-12-03"}, {"cve": "CVE-2020-35168", "epss": 0.00257, "percentile": 0.63229, "modified": "2023-12-03"}, {"cve": "CVE-2020-35169", "epss": 0.00257, "percentile": 0.63229, "modified": "2023-12-03"}, {"cve": "CVE-2020-35490", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-35491", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-35728", "epss": 0.00674, "percentile": 0.77482, "modified": "2023-12-03"}, {"cve": "CVE-2020-36179", "epss": 0.00357, "percentile": 0.68923, "modified": "2023-12-03"}, {"cve": "CVE-2020-36180", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36181", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36182", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36183", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36184", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36185", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36186", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36187", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36188", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36189", "epss": 0.00262, "percentile": 0.63598, "modified": "2023-12-03"}, {"cve": "CVE-2020-36518", "epss": 0.00218, "percentile": 0.59544, "modified": "2023-12-03"}, {"cve": "CVE-2020-4788", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2020-5258", "epss": 0.00236, "percentile": 0.61462, "modified": "2023-12-03"}, {"cve": "CVE-2020-5397", "epss": 0.00128, "percentile": 0.47169, "modified": "2023-12-03"}, {"cve": "CVE-2020-5398", "epss": 0.65681, "percentile": 0.97585, "modified": "2023-12-03"}, {"cve": "CVE-2020-7656", "epss": 0.00224, "percentile": 0.60442, "modified": "2023-12-03"}, {"cve": "CVE-2020-7712", "epss": 0.01604, "percentile": 0.85965, "modified": "2023-12-03"}, {"cve": "CVE-2020-9484", "epss": 0.8836, "percentile": 0.98389, "modified": "2023-12-03"}, {"cve": "CVE-2020-9492", "epss": 0.02008, "percentile": 0.8757, "modified": "2023-12-03"}, {"cve": "CVE-2021-20322", "epss": 0.00272, "percentile": 0.64323, "modified": "2023-12-03"}, {"cve": "CVE-2021-21781", "epss": 0.00045, "percentile": 0.12524, "modified": "2023-12-03"}, {"cve": "CVE-2021-22118", "epss": 0.00046, "percentile": 0.14057, "modified": "2023-12-03"}, {"cve": "CVE-2021-22119", "epss": 0.00429, "percentile": 0.71521, "modified": "2023-12-03"}, {"cve": "CVE-2021-22931", "epss": 0.01326, "percentile": 0.8444, "modified": "2023-12-03"}, {"cve": "CVE-2021-22939", "epss": 0.00316, "percentile": 0.66969, "modified": "2023-12-03"}, {"cve": "CVE-2021-22940", "epss": 0.00214, "percentile": 0.59121, "modified": "2023-12-03"}, {"cve": "CVE-2021-22946", "epss": 0.00296, "percentile": 0.65848, "modified": "2023-12-03"}, {"cve": "CVE-2021-22947", "epss": 0.00136, "percentile": 0.48623, "modified": "2023-12-03"}, {"cve": "CVE-2021-23337", "epss": 0.00606, "percentile": 0.76062, "modified": "2023-12-03"}, {"cve": "CVE-2021-23450", "epss": 0.00712, "percentile": 0.78195, "modified": "2023-12-03"}, {"cve": "CVE-2021-2351", "epss": 0.01027, "percentile": 0.82072, "modified": "2023-12-03"}, {"cve": "CVE-2021-23926", "epss": 0.00372, "percentile": 0.69552, "modified": "2023-12-03"}, {"cve": "CVE-2021-26291", "epss": 0.00135, "percentile": 0.48452, "modified": "2023-12-03"}, {"cve": "CVE-2021-29154", "epss": 0.00045, "percentile": 0.12178, "modified": "2023-12-03"}, {"cve": "CVE-2021-29425", "epss": 0.00266, "percentile": 0.63942, "modified": "2023-12-03"}, {"cve": "CVE-2021-29505", "epss": 0.03355, "percentile": 0.90308, "modified": "2023-12-03"}, {"cve": "CVE-2021-29921", "epss": 0.00609, "percentile": 0.76118, "modified": "2023-12-03"}, {"cve": "CVE-2021-30129", "epss": 0.00485, "percentile": 0.7319, "modified": "2023-12-03"}, {"cve": "CVE-2021-31684", "epss": 0.00832, "percentile": 0.79999, "modified": "2023-12-03"}, {"cve": "CVE-2021-3177", "epss": 0.05609, "percentile": 0.92453, "modified": "2023-12-03"}, {"cve": "CVE-2021-31805", "epss": 0.11237, "percentile": 0.94614, "modified": "2023-12-03"}, {"cve": "CVE-2021-31811", "epss": 0.00074, "percentile": 0.30557, "modified": "2023-12-03"}, {"cve": "CVE-2021-31812", "epss": 0.00074, "percentile": 0.30557, "modified": "2023-12-03"}, {"cve": "CVE-2021-33560", "epss": 0.00151, "percentile": 0.50965, "modified": "2023-12-03"}, {"cve": "CVE-2021-33813", "epss": 0.00403, "percentile": 0.70687, "modified": "2023-12-03"}, {"cve": "CVE-2021-34141", "epss": 0.00088, "percentile": 0.36875, "modified": "2023-12-03"}, {"cve": "CVE-2021-34429", "epss": 0.45742, "percentile": 0.97059, "modified": "2023-12-03"}, {"cve": "CVE-2021-3449", "epss": 0.00307, "percentile": 0.66426, "modified": "2023-12-03"}, {"cve": "CVE-2021-3450", "epss": 0.00239, "percentile": 0.61676, "modified": "2023-12-03"}, {"cve": "CVE-2021-35043", "epss": 0.00086, "percentile": 0.35789, "modified": "2023-12-03"}, {"cve": "CVE-2021-35515", "epss": 0.0313, "percentile": 0.89995, "modified": "2023-12-03"}, {"cve": "CVE-2021-35516", "epss": 0.04387, "percentile": 0.91413, "modified": "2023-12-03"}, {"cve": "CVE-2021-35517", "epss": 0.02402, "percentile": 0.88698, "modified": "2023-12-03"}, {"cve": "CVE-2021-3572", "epss": 0.00057, "percentile": 0.21507, "modified": "2023-12-03"}, {"cve": "CVE-2021-35940", "epss": 0.00079, "percentile": 0.32881, "modified": "2023-12-03"}, {"cve": "CVE-2021-36090", "epss": 0.01774, "percentile": 0.86591, "modified": "2023-12-03"}, {"cve": "CVE-2021-3612", "epss": 0.00043, "percentile": 0.07746, "modified": "2023-12-03"}, {"cve": "CVE-2021-36373", "epss": 0.00103, "percentile": 0.4156, "modified": "2023-12-03"}, {"cve": "CVE-2021-36374", "epss": 0.00071, "percentile": 0.29236, "modified": "2023-12-03"}, {"cve": "CVE-2021-3672", "epss": 0.00157, "percentile": 0.51944, "modified": "2023-12-03"}, {"cve": "CVE-2021-37136", "epss": 0.00329, "percentile": 0.67657, "modified": "2023-12-03"}, {"cve": "CVE-2021-37137", "epss": 0.00329, "percentile": 0.67657, "modified": "2023-12-03"}, {"cve": "CVE-2021-37159", "epss": 0.00076, "percentile": 0.31284, "modified": "2023-12-03"}, {"cve": "CVE-2021-3737", "epss": 0.01559, "percentile": 0.85725, "modified": "2023-12-03"}, {"cve": "CVE-2021-3743", "epss": 0.00043, "percentile": 0.07746, "modified": "2023-12-03"}, {"cve": "CVE-2021-3744", "epss": 0.00075, "percentile": 0.30893, "modified": "2023-12-03"}, {"cve": "CVE-2021-3749", "epss": 0.01349, "percentile": 0.84565, "modified": "2023-12-03"}, {"cve": "CVE-2021-3752", "epss": 0.0012, "percentile": 0.45872, "modified": "2023-12-03"}, {"cve": "CVE-2021-37714", "epss": 0.006, "percentile": 0.75928, "modified": "2023-12-03"}, {"cve": "CVE-2021-3772", "epss": 0.00372, "percentile": 0.69549, "modified": "2023-12-03"}, {"cve": "CVE-2021-3773", "epss": 0.008, "percentile": 0.79601, "modified": "2023-12-03"}, {"cve": "CVE-2021-37750", "epss": 0.00268, "percentile": 0.64021, "modified": "2023-12-03"}, {"cve": "CVE-2021-38153", "epss": 0.00173, "percentile": 0.54285, "modified": "2023-12-03"}, {"cve": "CVE-2021-38296", "epss": 0.0005, "percentile": 0.16272, "modified": "2023-12-03"}, {"cve": "CVE-2021-38604", "epss": 0.01348, "percentile": 0.8456, "modified": "2023-12-03"}, {"cve": "CVE-2021-39139", "epss": 0.03494, "percentile": 0.90473, "modified": "2023-12-03"}, {"cve": "CVE-2021-39140", "epss": 0.01773, "percentile": 0.86585, "modified": "2023-12-03"}, {"cve": "CVE-2021-39141", "epss": 0.25418, "percentile": 0.96208, "modified": "2023-12-03"}, {"cve": "CVE-2021-39144", "epss": 0.96272, "percentile": 0.99397, "modified": "2023-12-03"}, {"cve": "CVE-2021-39145", "epss": 0.01927, "percentile": 0.87269, "modified": "2023-12-03"}, {"cve": "CVE-2021-39146", "epss": 0.27391, "percentile": 0.96311, "modified": "2023-12-03"}, {"cve": "CVE-2021-39147", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-39148", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-39149", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-39150", "epss": 0.01058, "percentile": 0.82354, "modified": "2023-12-03"}, {"cve": "CVE-2021-39151", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-39152", "epss": 0.01242, "percentile": 0.83865, "modified": "2023-12-03"}, {"cve": "CVE-2021-39153", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-39154", "epss": 0.02458, "percentile": 0.88826, "modified": "2023-12-03"}, {"cve": "CVE-2021-4002", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2021-40690", "epss": 0.00153, "percentile": 0.51339, "modified": "2023-12-03"}, {"cve": "CVE-2021-4083", "epss": 0.00043, "percentile": 0.07746, "modified": "2023-12-03"}, {"cve": "CVE-2021-4104", "epss": 0.09716, "percentile": 0.94191, "modified": "2023-12-03"}, {"cve": "CVE-2021-4115", "epss": 0.00106, "percentile": 0.42636, "modified": "2023-12-03"}, {"cve": "CVE-2021-41182", "epss": 0.00311, "percentile": 0.6669, "modified": "2023-12-03"}, {"cve": "CVE-2021-41183", "epss": 0.00262, "percentile": 0.63609, "modified": "2023-12-03"}, {"cve": "CVE-2021-41184", "epss": 0.00292, "percentile": 0.6564, "modified": "2023-12-03"}, {"cve": "CVE-2021-41303", "epss": 0.33667, "percentile": 0.96618, "modified": "2023-12-03"}, {"cve": "CVE-2021-41495", "epss": 0.00074, "percentile": 0.30564, "modified": "2023-12-03"}, {"cve": "CVE-2021-41496", "epss": 0.00042, "percentile": 0.0573, "modified": "2023-12-03"}, {"cve": "CVE-2021-4157", "epss": 0.00108, "percentile": 0.43241, "modified": "2023-12-03"}, {"cve": "CVE-2021-4160", "epss": 0.00272, "percentile": 0.64288, "modified": "2023-12-03"}, {"cve": "CVE-2021-41617", "epss": 0.00055, "percentile": 0.20672, "modified": "2023-12-03"}, {"cve": "CVE-2021-41771", "epss": 0.00392, "percentile": 0.70346, "modified": "2023-12-03"}, {"cve": "CVE-2021-41772", "epss": 0.00249, "percentile": 0.62596, "modified": "2023-12-03"}, {"cve": "CVE-2021-4197", "epss": 0.00043, "percentile": 0.07746, "modified": "2023-12-03"}, {"cve": "CVE-2021-4203", "epss": 0.00162, "percentile": 0.52679, "modified": "2023-12-03"}, {"cve": "CVE-2021-42340", "epss": 0.01434, "percentile": 0.85044, "modified": "2023-12-03"}, {"cve": "CVE-2021-42575", "epss": 0.00581, "percentile": 0.7553, "modified": "2023-12-03"}, {"cve": "CVE-2021-42739", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2021-43389", "epss": 0.00075, "percentile": 0.30893, "modified": "2023-12-03"}, {"cve": "CVE-2021-43396", "epss": 0.00288, "percentile": 0.65342, "modified": "2023-12-03"}, {"cve": "CVE-2021-43797", "epss": 0.00119, "percentile": 0.45661, "modified": "2023-12-03"}, {"cve": "CVE-2021-43818", "epss": 0.00335, "percentile": 0.67971, "modified": "2023-12-03"}, {"cve": "CVE-2021-43859", "epss": 0.01232, "percentile": 0.83791, "modified": "2023-12-03"}, {"cve": "CVE-2021-43976", "epss": 0.00097, "percentile": 0.3986, "modified": "2023-12-03"}, {"cve": "CVE-2021-44531", "epss": 0.00166, "percentile": 0.53038, "modified": "2023-12-03"}, {"cve": "CVE-2021-44532", "epss": 0.00444, "percentile": 0.71999, "modified": "2023-12-03"}, {"cve": "CVE-2021-44533", "epss": 0.0038, "percentile": 0.69854, "modified": "2023-12-03"}, {"cve": "CVE-2021-44832", "epss": 0.02602, "percentile": 0.89118, "modified": "2023-12-03"}, {"cve": "CVE-2021-45485", "epss": 0.00094, "percentile": 0.39203, "modified": "2023-12-03"}, {"cve": "CVE-2021-45486", "epss": 0.00048, "percentile": 0.1482, "modified": "2023-12-03"}, {"cve": "CVE-2021-45943", "epss": 0.00135, "percentile": 0.48355, "modified": "2023-12-03"}, {"cve": "CVE-2022-0001", "epss": 0.00046, "percentile": 0.12839, "modified": "2023-12-03"}, {"cve": "CVE-2022-0002", "epss": 0.00046, "percentile": 0.12839, "modified": "2023-12-03"}, {"cve": "CVE-2022-0286", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2022-0322", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2022-0778", "epss": 0.01342, "percentile": 0.84513, "modified": "2023-12-03"}, {"cve": "CVE-2022-0839", "epss": 0.00697, "percentile": 0.77924, "modified": "2023-12-03"}, {"cve": "CVE-2022-1011", "epss": 0.00043, "percentile": 0.07746, "modified": "2023-12-03"}, {"cve": "CVE-2022-1154", "epss": 0.00181, "percentile": 0.55132, "modified": "2023-12-03"}, {"cve": "CVE-2022-1271", "epss": 0.00742, "percentile": 0.78677, "modified": "2023-12-03"}, {"cve": "CVE-2022-1292", "epss": 0.10475, "percentile": 0.94419, "modified": "2023-12-03"}, {"cve": "CVE-2022-21428", "epss": 0.0008, "percentile": 0.33365, "modified": "2023-12-03"}, {"cve": "CVE-2022-21429", "epss": 0.00422, "percentile": 0.7132, "modified": "2023-12-03"}, {"cve": "CVE-2022-21432", "epss": 0.00047, "percentile": 0.14285, "modified": "2023-12-03"}, {"cve": "CVE-2022-21439", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21455", "epss": 0.00053, "percentile": 0.18624, "modified": "2023-12-03"}, {"cve": "CVE-2022-21500", "epss": 0.26417, "percentile": 0.96263, "modified": "2023-12-03"}, {"cve": "CVE-2022-21508", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21509", "epss": 0.001, "percentile": 0.40584, "modified": "2023-12-03"}, {"cve": "CVE-2022-21510", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21511", "epss": 0.00149, "percentile": 0.50734, "modified": "2023-12-03"}, {"cve": "CVE-2022-21512", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21513", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21514", "epss": 0.00092, "percentile": 0.38653, "modified": "2023-12-03"}, {"cve": "CVE-2022-21515", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21516", "epss": 0.00082, "percentile": 0.34042, "modified": "2023-12-03"}, {"cve": "CVE-2022-21517", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21518", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21519", "epss": 0.00092, "percentile": 0.38653, "modified": "2023-12-03"}, {"cve": "CVE-2022-21520", "epss": 0.00069, "percentile": 0.28699, "modified": "2023-12-03"}, {"cve": "CVE-2022-21521", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21522", "epss": 0.00064, "percentile": 0.26419, "modified": "2023-12-03"}, {"cve": "CVE-2022-21523", "epss": 0.00053, "percentile": 0.18624, "modified": "2023-12-03"}, {"cve": "CVE-2022-21524", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21525", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21526", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21527", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21528", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21529", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21530", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21531", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21532", "epss": 0.00053, "percentile": 0.18624, "modified": "2023-12-03"}, {"cve": "CVE-2022-21533", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21534", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21535", "epss": 0.00049, "percentile": 0.16116, "modified": "2023-12-03"}, {"cve": "CVE-2022-21536", "epss": 0.00422, "percentile": 0.7132, "modified": "2023-12-03"}, {"cve": "CVE-2022-21537", "epss": 0.00069, "percentile": 0.28679, "modified": "2023-12-03"}, {"cve": "CVE-2022-21538", "epss": 0.00044, "percentile": 0.1068, "modified": "2023-12-03"}, {"cve": "CVE-2022-21539", "epss": 0.00047, "percentile": 0.14285, "modified": "2023-12-03"}, {"cve": "CVE-2022-21540", "epss": 0.00117, "percentile": 0.45343, "modified": "2023-12-03"}, {"cve": "CVE-2022-21541", "epss": 0.00117, "percentile": 0.45343, "modified": "2023-12-03"}, {"cve": "CVE-2022-21542", "epss": 0.00047, "percentile": 0.14285, "modified": "2023-12-03"}, {"cve": "CVE-2022-21543", "epss": 0.00817, "percentile": 0.79804, "modified": "2023-12-03"}, {"cve": "CVE-2022-21544", "epss": 0.00088, "percentile": 0.37005, "modified": "2023-12-03"}, {"cve": "CVE-2022-21545", "epss": 0.00069, "percentile": 0.28699, "modified": "2023-12-03"}, {"cve": "CVE-2022-21547", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21548", "epss": 0.00077, "percentile": 0.3175, "modified": "2023-12-03"}, {"cve": "CVE-2022-21549", "epss": 0.00085, "percentile": 0.3526, "modified": "2023-12-03"}, {"cve": "CVE-2022-21550", "epss": 0.01456, "percentile": 0.85168, "modified": "2023-12-03"}, {"cve": "CVE-2022-21551", "epss": 0.00149, "percentile": 0.50734, "modified": "2023-12-03"}, {"cve": "CVE-2022-21552", "epss": 0.00069, "percentile": 0.28699, "modified": "2023-12-03"}, {"cve": "CVE-2022-21553", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21554", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21555", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21556", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21557", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21558", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21559", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21560", "epss": 0.00077, "percentile": 0.3175, "modified": "2023-12-03"}, {"cve": "CVE-2022-21561", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21562", "epss": 0.00069, "percentile": 0.2864, "modified": "2023-12-03"}, {"cve": "CVE-2022-21563", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21564", "epss": 0.00077, "percentile": 0.3175, "modified": "2023-12-03"}, {"cve": "CVE-2022-21565", "epss": 0.00053, "percentile": 0.18624, "modified": "2023-12-03"}, {"cve": "CVE-2022-21566", "epss": 0.00154, "percentile": 0.51419, "modified": "2023-12-03"}, {"cve": "CVE-2022-21567", "epss": 0.00154, "percentile": 0.51419, "modified": "2023-12-03"}, {"cve": "CVE-2022-21568", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21569", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21570", "epss": 0.00092, "percentile": 0.38653, "modified": "2023-12-03"}, {"cve": "CVE-2022-21571", "epss": 0.00043, "percentile": 0.07849, "modified": "2023-12-03"}, {"cve": "CVE-2022-21572", "epss": 0.00053, "percentile": 0.18624, "modified": "2023-12-03"}, {"cve": "CVE-2022-21573", "epss": 0.00053, "percentile": 0.19081, "modified": "2023-12-03"}, {"cve": "CVE-2022-21574", "epss": 0.00082, "percentile": 0.34042, "modified": "2023-12-03"}, {"cve": "CVE-2022-21575", "epss": 0.00079, "percentile": 0.32858, "modified": "2023-12-03"}, {"cve": "CVE-2022-21576", "epss": 0.00079, "percentile": 0.32858, "modified": "2023-12-03"}, {"cve": "CVE-2022-21577", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21578", "epss": 0.0008, "percentile": 0.33365, "modified": "2023-12-03"}, {"cve": "CVE-2022-21579", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21580", "epss": 0.00079, "percentile": 0.32858, "modified": "2023-12-03"}, {"cve": "CVE-2022-21581", "epss": 0.00048, "percentile": 0.14822, "modified": "2023-12-03"}, {"cve": "CVE-2022-21582", "epss": 0.0008, "percentile": 0.33365, "modified": "2023-12-03"}, {"cve": "CVE-2022-21583", "epss": 0.00079, "percentile": 0.32858, "modified": "2023-12-03"}, {"cve": "CVE-2022-21584", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21585", "epss": 0.0008, "percentile": 0.33365, "modified": "2023-12-03"}, {"cve": "CVE-2022-21586", "epss": 0.00062, "percentile": 0.24328, "modified": "2023-12-03"}, {"cve": "CVE-2022-21824", "epss": 0.0041, "percentile": 0.70927, "modified": "2023-12-03"}, {"cve": "CVE-2022-22720", "epss": 0.01143, "percentile": 0.83066, "modified": "2023-12-03"}, {"cve": "CVE-2022-22721", "epss": 0.00356, "percentile": 0.68845, "modified": "2023-12-03"}, {"cve": "CVE-2022-22946", "epss": 0.00045, "percentile": 0.12389, "modified": "2023-12-03"}, {"cve": "CVE-2022-22947", "epss": 0.97487, "percentile": 0.99969, "modified": "2023-12-03"}, {"cve": "CVE-2022-22963", "epss": 0.97523, "percentile": 0.99988, "modified": "2023-12-03"}, {"cve": "CVE-2022-22965", "epss": 0.97451, "percentile": 0.99947, "modified": "2023-12-03"}, {"cve": "CVE-2022-22968", "epss": 0.00065, "percentile": 0.27048, "modified": "2023-12-03"}, {"cve": "CVE-2022-22969", "epss": 0.00081, "percentile": 0.33531, "modified": "2023-12-03"}, {"cve": "CVE-2022-22970", "epss": 0.00127, "percentile": 0.46999, "modified": "2023-12-03"}, {"cve": "CVE-2022-22971", "epss": 0.00752, "percentile": 0.78831, "modified": "2023-12-03"}, {"cve": "CVE-2022-22976", "epss": 0.00146, "percentile": 0.50271, "modified": "2023-12-03"}, {"cve": "CVE-2022-22978", "epss": 0.01158, "percentile": 0.83196, "modified": "2023-12-03"}, {"cve": "CVE-2022-23181", "epss": 0.00043, "percentile": 0.0772, "modified": "2023-12-03"}, {"cve": "CVE-2022-23218", "epss": 0.00455, "percentile": 0.72359, "modified": "2023-12-03"}, {"cve": "CVE-2022-23219", "epss": 0.00455, "percentile": 0.72359, "modified": "2023-12-03"}, {"cve": "CVE-2022-23302", "epss": 0.00781, "percentile": 0.7929, "modified": "2023-12-03"}, {"cve": "CVE-2022-23305", "epss": 0.00443, "percentile": 0.71965, "modified": "2023-12-03"}, {"cve": "CVE-2022-23307", "epss": 0.00797, "percentile": 0.79567, "modified": "2023-12-03"}, {"cve": "CVE-2022-23308", "epss": 0.00409, "percentile": 0.70895, "modified": "2023-12-03"}, {"cve": "CVE-2022-23437", "epss": 0.00539, "percentile": 0.74564, "modified": "2023-12-03"}, {"cve": "CVE-2022-23457", "epss": 0.00294, "percentile": 0.65719, "modified": "2023-12-03"}, {"cve": "CVE-2022-23632", "epss": 0.00085, "percentile": 0.35192, "modified": "2023-12-03"}, {"cve": "CVE-2022-23772", "epss": 0.00368, "percentile": 0.69395, "modified": "2023-12-03"}, {"cve": "CVE-2022-23773", "epss": 0.00081, "percentile": 0.33621, "modified": "2023-12-03"}, {"cve": "CVE-2022-23806", "epss": 0.00339, "percentile": 0.68124, "modified": "2023-12-03"}, {"cve": "CVE-2022-24329", "epss": 0.00077, "percentile": 0.31788, "modified": "2023-12-03"}, {"cve": "CVE-2022-24407", "epss": 0.0029, "percentile": 0.65503, "modified": "2023-12-03"}, {"cve": "CVE-2022-24728", "epss": 0.00158, "percentile": 0.52057, "modified": "2023-12-03"}, {"cve": "CVE-2022-24729", "epss": 0.00302, "percentile": 0.66122, "modified": "2023-12-03"}, {"cve": "CVE-2022-24735", "epss": 0.00217, "percentile": 0.5943, "modified": "2023-12-03"}, {"cve": "CVE-2022-24736", "epss": 0.00064, "percentile": 0.2638, "modified": "2023-12-03"}, {"cve": "CVE-2022-24801", "epss": 0.00743, "percentile": 0.78701, "modified": "2023-12-03"}, {"cve": "CVE-2022-24823", "epss": 0.00044, "percentile": 0.08257, "modified": "2023-12-03"}, {"cve": "CVE-2022-24839", "epss": 0.00194, "percentile": 0.57019, "modified": "2023-12-03"}, {"cve": "CVE-2022-24891", "epss": 0.00184, "percentile": 0.55438, "modified": "2023-12-03"}, {"cve": "CVE-2022-25169", "epss": 0.00067, "percentile": 0.2768, "modified": "2023-12-03"}, {"cve": "CVE-2022-25636", "epss": 0.00044, "percentile": 0.10518, "modified": "2023-12-03"}, {"cve": "CVE-2022-25647", "epss": 0.00234, "percentile": 0.61253, "modified": "2023-12-03"}, {"cve": "CVE-2022-25762", "epss": 0.00858, "percentile": 0.80304, "modified": "2023-12-03"}, {"cve": "CVE-2022-25845", "epss": 0.0136, "percentile": 0.84649, "modified": "2023-12-03"}, {"cve": "CVE-2022-27778", "epss": 0.00148, "percentile": 0.50614, "modified": "2023-12-03"}, {"cve": "CVE-2022-29577", "epss": 0.0014, "percentile": 0.49383, "modified": "2023-12-03"}, {"cve": "CVE-2022-29824", "epss": 0.00149, "percentile": 0.50676, "modified": "2023-12-03"}, {"cve": "CVE-2022-29885", "epss": 0.05259, "percentile": 0.92172, "modified": "2023-12-03"}, {"cve": "CVE-2022-30126", "epss": 0.00113, "percentile": 0.4445, "modified": "2023-12-03"}, {"cve": "CVE-2022-34169", "epss": 0.00166, "percentile": 0.53075, "modified": "2023-12-03"}], "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 6.0}, "href": "https://www.oracle.com/security-alerts/cpujul2022.html", "reporter": "Oracle", "references": [], "cvelist": ["CVE-2018-1259", "CVE-2018-1273", "CVE-2018-1274", "CVE-2018-18074", "CVE-2018-25032", "CVE-2018-8032", "CVE-2019-0219", "CVE-2019-0220", "CVE-2019-0227", "CVE-2019-10082", "CVE-2019-10086", "CVE-2019-17495", "CVE-2019-17571", "CVE-2019-20916", "CVE-2019-9636", "CVE-2019-9740", "CVE-2020-0404", "CVE-2020-10683", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11987", "CVE-2020-13974", "CVE-2020-14343", "CVE-2020-1747", "CVE-2020-17521", "CVE-2020-1927", "CVE-2020-25649", "CVE-2020-26137", "CVE-2020-26184", "CVE-2020-26185", "CVE-2020-26237", "CVE-2020-27619", "CVE-2020-27820", "CVE-2020-28052", "CVE-2020-28491", "CVE-2020-28500", "CVE-2020-29396", "CVE-2020-29505", "CVE-2020-29506", "CVE-2020-29507", "CVE-2020-29508", "CVE-2020-29651", "CVE-2020-35163", "CVE-2020-35164", "CVE-2020-35166", "CVE-2020-35167", "CVE-2020-35168", "CVE-2020-35169", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-36518", "CVE-2020-4788", "CVE-2020-5258", "CVE-2020-5397", "CVE-2020-5398", "CVE-2020-7656", "CVE-2020-7712", "CVE-2020-9484", "CVE-2020-9492", "CVE-2021-20322", "CVE-2021-21781", "CVE-2021-22118", "CVE-2021-22119", "CVE-2021-22931", "CVE-2021-22939", "CVE-2021-22940", "CVE-2021-22946", "CVE-2021-22947", "CVE-2021-23337", "CVE-2021-23450", "CVE-2021-2351", "CVE-2021-23926", "CVE-2021-26291", "CVE-2021-29154", "CVE-2021-29425", "CVE-2021-29505", "CVE-2021-29921", "CVE-2021-30129", "CVE-2021-31684", "CVE-2021-3177", "CVE-2021-31805", "CVE-2021-31811", "CVE-2021-31812", "CVE-2021-33560", "CVE-2021-33813", "CVE-2021-34141", "CVE-2021-34429", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-35043", "CVE-2021-35515", "CVE-2021-35516", "CVE-2021-35517", "CVE-2021-3572", "CVE-2021-35940", "CVE-2021-36090", "CVE-2021-3612", "CVE-2021-36373", "CVE-2021-36374", "CVE-2021-3672", "CVE-2021-37136", "CVE-2021-37137", "CVE-2021-37159", "CVE-2021-3737", "CVE-2021-3743", "CVE-2021-3744", "CVE-2021-3749", "CVE-2021-3752", "CVE-2021-37714", "CVE-2021-3772", "CVE-2021-3773", "CVE-2021-37750", "CVE-2021-38153", "CVE-2021-38296", "CVE-2021-38604", "CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154", "CVE-2021-4002", "CVE-2021-40690", "CVE-2021-4083", "CVE-2021-4104", "CVE-2021-4115", "CVE-2021-41182", "CVE-2021-41183", "CVE-2021-41184", "CVE-2021-41303", "CVE-2021-41495", "CVE-2021-41496", "CVE-2021-4157", "CVE-2021-4160", "CVE-2021-41617", "CVE-2021-41771", "CVE-2021-41772", "CVE-2021-4197", "CVE-2021-4203", "CVE-2021-42340", "CVE-2021-42575", "CVE-2021-42739", "CVE-2021-43389", "CVE-2021-43396", "CVE-2021-43797", "CVE-2021-43818", "CVE-2021-43859", "CVE-2021-43976", "CVE-2021-44531", "CVE-2021-44532", "CVE-2021-44533", "CVE-2021-44832", "CVE-2021-45485", "CVE-2021-45486", "CVE-2021-45943", "CVE-2022-0001", "CVE-2022-0002", "CVE-2022-0286", "CVE-2022-0322", "CVE-2022-0778", "CVE-2022-0839", "CVE-2022-1011", "CVE-2022-1154", "CVE-2022-1271", "CVE-2022-1292", "CVE-2022-21428", "CVE-2022-21429", "CVE-2022-21432", "CVE-2022-21439", "CVE-2022-21455", "CVE-2022-21500", "CVE-2022-21508", "CVE-2022-21509", "CVE-2022-21510", "CVE-2022-21511", "CVE-2022-21512", "CVE-2022-21513", "CVE-2022-21514", "CVE-2022-21515", "CVE-2022-21516", "CVE-2022-21517", "CVE-2022-21518", "CVE-2022-21519", "CVE-2022-21520", "CVE-2022-21521", "CVE-2022-21522", "CVE-2022-21523", "CVE-2022-21524", "CVE-2022-21525", "CVE-2022-21526", "CVE-2022-21527", "CVE-2022-21528", "CVE-2022-21529", "CVE-2022-21530", "CVE-2022-21531", "CVE-2022-21532", "CVE-2022-21533", "CVE-2022-21534", "CVE-2022-21535", "CVE-2022-21536", "CVE-2022-21537", "CVE-2022-21538", "CVE-2022-21539", "CVE-2022-21540", "CVE-2022-21541", "CVE-2022-21542", "CVE-2022-21543", "CVE-2022-21544", "CVE-2022-21545", "CVE-2022-21547", "CVE-2022-21548", "CVE-2022-21549", "CVE-2022-21550", "CVE-2022-21551", "CVE-2022-21552", "CVE-2022-21553", "CVE-2022-21554", "CVE-2022-21555", "CVE-2022-21556", "CVE-2022-21557", "CVE-2022-21558", "CVE-2022-21559", "CVE-2022-21560", "CVE-2022-21561", "CVE-2022-21562", "CVE-2022-21563", "CVE-2022-21564", "CVE-2022-21565", "CVE-2022-21566", "CVE-2022-21567", "CVE-2022-21568", "CVE-2022-21569", "CVE-2022-21570", "CVE-2022-21571", "CVE-2022-21572", "CVE-2022-21573", "CVE-2022-21574", "CVE-2022-21575", "CVE-2022-21576", "CVE-2022-21577", "CVE-2022-21578", "CVE-2022-21579", "CVE-2022-21580", "CVE-2022-21581", "CVE-2022-21582", "CVE-2022-21583", "CVE-2022-21584", "CVE-2022-21585", "CVE-2022-21586", "CVE-2022-21824", "CVE-2022-22720", "CVE-2022-22721", "CVE-2022-22946", "CVE-2022-22947", "CVE-2022-22963", "CVE-2022-22965", "CVE-2022-22968", "CVE-2022-22969", "CVE-2022-22970", "CVE-2022-22971", "CVE-2022-22976", "CVE-2022-22978", "CVE-2022-23181", "CVE-2022-23218", "CVE-2022-23219", "CVE-2022-23302", "CVE-2022-23305", "CVE-2022-23307", "CVE-2022-23308", "CVE-2022-23437", "CVE-2022-23457", "CVE-2022-23632", "CVE-2022-23772", "CVE-2022-23773", "CVE-2022-23806", "CVE-2022-24329", "CVE-2022-24407", "CVE-2022-24728", "CVE-2022-24729", "CVE-2022-24735", "CVE-2022-24736", "CVE-2022-24801", "CVE-2022-24823", "CVE-2022-24839", "CVE-2022-24891", "CVE-2022-25169", "CVE-2022-25636", "CVE-2022-25647", "CVE-2022-25762", "CVE-2022-25845", "CVE-2022-27778", "CVE-2022-29577", "CVE-2022-29824", "CVE-2022-29885", "CVE-2022-30126", "CVE-2022-34169"], "immutableFields": [], "lastseen": "2023-12-03T20:11:47", "viewCount": 935, "enchantments": {"score": {"value": 7.7, "vector": "NONE"}, "dependencies": {"references": [{"type": "adobe", "idList": ["APSB19-38", "APSB23-50"]}, {"type": "aix", "idList": ["LIBXML2_ADVISORY3.ASC", "OPENSSH_ADVISORY14.ASC", "OPENSSL_ADVISORY35.ASC", "OPENSSL_ADVISORY36.ASC", "POWER9_ADVISORY.ASC", "ZLIB_ADVISORY.ASC"]}, {"type": "akamaiblog", "idList": ["AKAMAIBLOG:8B6AA3E3035869AEAE3021AB3F1EFE32"]}, {"type": "almalinux", "idList": ["ALBA-2019:3693", "ALSA-2019:0981", "ALSA-2019:3335", "ALSA-2020:1605", "ALSA-2020:4432", "ALSA-2020:4641", "ALSA-2020:4654", "ALSA-2020:4670", "ALSA-2020:4751", "ALSA-2020:4847", "ALSA-2021:1024", "ALSA-2021:1631", "ALSA-2021:1633", "ALSA-2021:1761", "ALSA-2021:1846", "ALSA-2021:1879", "ALSA-2021:2583", "ALSA-2021:3576", "ALSA-2021:3623", "ALSA-2021:3666", "ALSA-2021:4059", "ALSA-2021:4142", "ALSA-2021:4151", "ALSA-2021:4160", "ALSA-2021:4162", "ALSA-2021:4409", "ALSA-2021:4455", "ALSA-2022:0290", "ALSA-2022:0658", "ALSA-2022:0896", "ALSA-2022:0899", "ALSA-2022:1049", "ALSA-2022:1065", "ALSA-2022:1537", "ALSA-2022:1546", "ALSA-2022:1550", "ALSA-2022:1552", "ALSA-2022:1642", "ALSA-2022:1763", "ALSA-2022:1764", "ALSA-2022:1819", "ALSA-2022:1821", "ALSA-2022:1932", "ALSA-2022:1986", "ALSA-2022:1988", "ALSA-2022:2013", "ALSA-2022:2043", "ALSA-2022:2201", "ALSA-2022:4940", "ALSA-2022:4991", "ALSA-2022:5242", "ALSA-2022:5326", "ALSA-2022:5683", "ALSA-2022:5695", "ALSA-2022:5696", "ALSA-2022:5709", "ALSA-2022:5736", "ALSA-2022:5818", "ALSA-2022:6224", "ALSA-2022:6590", "ALSA-2022:7119", "ALSA-2022:7541", "ALSA-2022:7647", "ALSA-2022:7813", "ALSA-2022:7830", "ALSA-2022:8067", "ALSA-2022:8096", "ALSA-2022:8420", "ALSA-2022:9073", "ALSA-2023:2312"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2018-25032", "ALPINE:CVE-2019-0220", "ALPINE:CVE-2019-10082", "ALPINE:CVE-2019-18348", "ALPINE:CVE-2019-9636", "ALPINE:CVE-2020-11022", "ALPINE:CVE-2020-11023", "ALPINE:CVE-2020-14343", "ALPINE:CVE-2020-1747", "ALPINE:CVE-2020-1927", "ALPINE:CVE-2020-26137", "ALPINE:CVE-2021-22931", "ALPINE:CVE-2021-22939", "ALPINE:CVE-2021-22946", "ALPINE:CVE-2021-22947", "ALPINE:CVE-2021-26291", "ALPINE:CVE-2021-29921", "ALPINE:CVE-2021-3177", "ALPINE:CVE-2021-33560", "ALPINE:CVE-2021-3449", "ALPINE:CVE-2021-3450", "ALPINE:CVE-2021-35940", "ALPINE:CVE-2021-36373", "ALPINE:CVE-2021-36374", "ALPINE:CVE-2021-3672", "ALPINE:CVE-2021-37750", "ALPINE:CVE-2021-41182", "ALPINE:CVE-2021-41183", "ALPINE:CVE-2021-41617", "ALPINE:CVE-2021-41771", "ALPINE:CVE-2021-41772", "ALPINE:CVE-2021-43818", "ALPINE:CVE-2021-44531", "ALPINE:CVE-2021-44532", "ALPINE:CVE-2021-44533", "ALPINE:CVE-2022-0538", "ALPINE:CVE-2022-0778", "ALPINE:CVE-2022-1154", "ALPINE:CVE-2022-1271", "ALPINE:CVE-2022-1292", "ALPINE:CVE-2022-2068", "ALPINE:CVE-2022-21540", "ALPINE:CVE-2022-21541", "ALPINE:CVE-2022-21549", "ALPINE:CVE-2022-21554", "ALPINE:CVE-2022-21571", "ALPINE:CVE-2022-21824", "ALPINE:CVE-2022-22720", "ALPINE:CVE-2022-22721", "ALPINE:CVE-2022-22970", "ALPINE:CVE-2022-22971", "ALPINE:CVE-2022-23308", "ALPINE:CVE-2022-23772", "ALPINE:CVE-2022-23773", "ALPINE:CVE-2022-23806", "ALPINE:CVE-2022-24407", "ALPINE:CVE-2022-24735", "ALPINE:CVE-2022-24736", "ALPINE:CVE-2022-24801", "ALPINE:CVE-2022-25647", "ALPINE:CVE-2022-27778", "ALPINE:CVE-2022-29824", "ALPINE:CVE-2022-34169"]}, {"type": "altlinux", "idList": ["02626BC9B0E35FF39AB513996E79FAE0", "129D64193BADB99BE3EB01906C15376E", "15E430DB0371118ABB5ED01F37EFD919", "19A41B49C654395EDF4589CA89C934E4", "19D9D4CF9E621238B64E7009C574A2B2", "28340433AB5B58C94A1D269C71CEDAF6", "2E3004A50A511D456BFC8F01DA1B9584", "326958EC22BCB9E863C5A4B081B24B54", "39CFFB87AFC9A591CD6C901CBB002174", "462FD49112FE85163EF025EFB6E6CCFC", "4636D2B913915197381B9E5A8DFDA814", "4AB33817542FC0443AA20D2033C7C500", "62AF6788D180EC77B4FE1C5EF7CF062E", "633C03BED556A2D4B1647FF17E152F8E", "6577D8D0F88D936281F7B860EAF0D081", "66FDECF6B8734FD9561C58C1CD83E3E9", "6A171AADF701CDBC64AEF0AC3686A12A", "6D171D9D87DD482190183EAC929F4F7F", "6EC8FAA29341B4528CA0E835AAD021FE", "7304FA6A92BBC9DC45DFC1846E5141EC", "85D536AEF8389247AABBC716567F9334", "8C90D83B5D9A49E5E6E07F21936774EE", "9B8FBA6662B95E41A8BCCB5F346C028E", "A53966B4C9ED4C2C9B5D5AAE3C9142B6", "AAD79B2B598B10CCD7EF2E0B10857EEE", "B0664AAC61BC569C35AA9EED702C667A", "B85C8F73B16A47F96ABD5E5F7F645891", "BF075169DAD9B6200F60D7B701FBB437", "C6F0755DEC8B215198E848115574C670", "CB464A102C2B06580323D14B2A69C4B5", "DC52777AA2FD41A330B63B883159C7F5", "E726564F545433F40EC28960D69846C3", "E7C1A0F273592010E8FD27973A4D47A8", "F1B72EF26202C71B2ADF4ABFE01E93B3", "FEBB327D54BEB4D7815863E2E1629573"]}, {"type": "amazon", "idList": ["ALAS-2019-1189", "ALAS-2019-1202", "ALAS-2019-1204", "ALAS-2019-1230", "ALAS-2019-1242", "ALAS-2019-1243", "ALAS-2019-1258", "ALAS-2019-1259", "ALAS-2019-1311", "ALAS-2019-1324", "ALAS-2020-1370", "ALAS-2020-1375", "ALAS-2020-1389", "ALAS-2020-1390", "ALAS-2020-1428", "ALAS-2020-1429", "ALAS-2021-1484", "ALAS-2021-1491", "ALAS-2021-1493", "ALAS-2021-1503", "ALAS-2021-1545", "ALAS-2021-1546", "ALAS-2021-1549", "ALAS-2022-1562", "ALAS-2022-1563", "ALAS-2022-1565", "ALAS-2022-1571", "ALAS-2022-1572", "ALAS-2022-1574", "ALAS-2022-1575", "ALAS-2022-1576", "ALAS-2022-1578", "ALAS-2022-1583", "ALAS-2022-1584", "ALAS-2022-1590", "ALAS-2022-1591", "ALAS-2022-1593", "ALAS-2022-1597", "ALAS-2022-1598", "ALAS-2022-1602", "ALAS-2022-1605", "ALAS-2022-1626", "ALAS-2022-1627", "ALAS-2022-1631", "ALAS-2022-1633", "ALAS-2022-1640", "ALAS-2022-1749", "ALAS-2023-1685", "ALAS-2023-1688", "ALAS-2023-1695", "ALAS-2023-1709", "ALAS-2023-1717", "ALAS-2023-1718", "ALAS-2023-1743", "ALAS-2023-2317", "ALAS2-2019-1189", "ALAS2-2019-1204", "ALAS2-2019-1230", "ALAS2-2019-1247", "ALAS2-2019-1258", "ALAS2-2019-1259", "ALAS2-2019-1334", "ALAS2-2020-1395", "ALAS2-2020-1413", "ALAS2-2020-1427", "ALAS2-2020-1449", "ALAS2-2020-1519", "ALAS2-2021-1611", "ALAS2-2021-1622", "ALAS2-2021-1626", "ALAS2-2021-1627", "ALAS2-2021-1639", "ALAS2-2021-1668", "ALAS2-2021-1670", "ALAS2-2021-1698", "ALAS2-2021-1719", "ALAS2-2021-1724", "ALAS2-2021-1727", "ALAS2-2021-1729", "ALAS2-2022-1734", "ALAS2-2022-1738", "ALAS2-2022-1739", "ALAS2-2022-1742", "ALAS2-2022-1748", "ALAS2-2022-1749", "ALAS2-2022-1750", "ALAS2-2022-1758", "ALAS2-2022-1761", "ALAS2-2022-1766", "ALAS2-2022-1767", "ALAS2-2022-1769", "ALAS2-2022-1772", "ALAS2-2022-1776", "ALAS2-2022-1782", "ALAS2-2022-1783", "ALAS2-2022-1793", "ALAS2-2022-1801", "ALAS2-2022-1802", "ALAS2-2022-1805", "ALAS2-2022-1811", "ALAS2-2022-1815", "ALAS2-2022-1822", "ALAS2-2022-1823", "ALAS2-2022-1824", "ALAS2-2022-1826", "ALAS2-2022-1827", "ALAS2-2022-1830", "ALAS2-2022-1831", "ALAS2-2022-1832", "ALAS2-2022-1835", "ALAS2-2022-1836", "ALAS2-2022-1848", "ALAS2-2022-1880", "ALAS2-2023-1936", "ALAS2-2023-1956", "ALAS2-2023-1966", "ALAS2-2023-2045", "ALAS2-2023-2059"]}, {"type": "androidsecurity", "idList": ["ANDROID:ANDROID-14"]}, {"type": "apple", "idList": ["APPLE:63081AE5B69AA7BDB8335C6FB30CCAE2", "APPLE:63CA0F4232480C58A7826938831F5D5B", "APPLE:9A4969F10DDA950938D09FB74CC40FF8", "APPLE:A95E7412240FFF6EACC98CE0311A5EE5", "APPLE:C9EF751487C406A634B9CBD013ECD410", "APPLE:DCF97E625A2F1F327AB03D7CEBDBE265", "APPLE:E82A2A3D978FD519CBF58A36F587B070"]}, {"type": "archlinux", "idList": ["ASA-201904-3", "ASA-201906-17", "ASA-201911-4", "ASA-202004-14", "ASA-202006-5", "ASA-202006-6", "ASA-202006-7", "ASA-202102-37", "ASA-202103-10", "ASA-202103-14", "ASA-202103-27", "ASA-202107-43", "ASA-202107-48", "ASA-202107-49", "ASA-202107-50", "ASA-202107-51", "ASA-202108-13", "ASA-202110-5", "ASA-202110-6", "ASA-202204-12", "ASA-202204-13", "ASA-202204-2", "ASA-202204-3", "ASA-202204-7", "ASA-202204-8"]}, {"type": "arista", "idList": ["ARISTA:0070", "ARISTA:0075"]}, {"type": "atlassian", "idList": ["ATLASSIAN:BSERV-12196", "ATLASSIAN:CONFSERVER-60004", "ATLASSIAN:CONFSERVER-65577", "ATLASSIAN:CONFSERVER-69322", "ATLASSIAN:CWD-5683", "ATLASSIAN:FE-7344", "ATLASSIAN:FE-7346", "ATLASSIAN:JRASERVER-71221", "ATLASSIAN:JRASERVER-71321", "ATLASSIAN:JRASERVER-72052", "ATLASSIAN:JRASERVER-72609", "ATLASSIAN:JRASERVER-72669", "ATLASSIAN:JRASERVER-72914", "BAM-21603", "BAM-21696", "BAM-21697", "BAM-21769", "BAM-25151", "BSERV-12196", "BSERV-13449", "BSERV-18793", "BSERV-18830", "BSERV-18986", "CONFSERVER-59549", "CONFSERVER-60004", "CONFSERVER-65577", "CONFSERVER-69322", "CONFSERVER-78991", "CONFSERVER-79940", "CONFSERVER-93169", "CRUC-8529", "CRUC-8540", "CWD-5683", "CWD-5802", "CWD-5811", "CWD-5903", "FE-7344", "FE-7346", "FE-7368", "FE-7400", "FE-7409", "JRASERVER-70993", "JRASERVER-71221", "JRASERVER-71321", "JRASERVER-72052", "JRASERVER-72609", "JRASERVER-72669", "JRASERVER-72914", "JRASERVER-73070", "JRASERVER-73223", "JRASERVER-73580", "JRASERVER-73739", "JRASERVER-73885", "JRASERVER-74420", "JRASERVER-74776", "JSDSERVER-14007", "JSDSERVER-14748", "JSDSERVER-14749", "JSWSERVER-25406", "JSWSERVER-25410", "JSWSERVER-25412"]}, {"type": "attackerkb", "idList": ["AKB:0B6C144F-2E5A-4D5E-B629-E45C2530CB94", "AKB:22C3A43F-3CEE-464A-9C77-FEE26DBE757A", "AKB:2B7B662B-EDD1-4BFA-978A-6AE63790F8A5", "AKB:353D9D87-631E-4F2A-B130-5678B79BBCB4", "AKB:38F76C83-56D0-4112-A583-4513CC15B1B3", "AKB:3F7EB772-577A-4EE4-BCBB-6DA9F0EC50F6", "AKB:50E4E788-F15C-4987-B8E9-F024A7BA059C", "AKB:5BDFACBD-4722-492A-AAA8-EBCC3C6403C4", "AKB:7651D6FA-BDFA-4A6E-81F2-E5CF545CD088", "AKB:93D7F9FF-1F51-45C7-8172-B3E45415E966", "AKB:98773293-D092-495A-AD61-3E5439225950", "AKB:9AE1A02C-AB77-47D3-925D-16F61A76B572", "AKB:A02484C9-B238-4884-AAE1-2045A4DD7C7E", "AKB:C7CA7D31-2CA2-496D-AC9E-3641874012FF", "AKB:CB02764B-566F-4540-ACA2-C9DDEE8D1496", "AKB:F05BE8C2-C144-45BE-BF46-5867A2CAAF15", "AKB:F26993D0-C6C1-455F-991A-83A5CB45BB19", "AKB:F4BF02AE-B090-4307-89AA-47E57C92EC8F", "AKB:FB2F65B2-D10B-4622-AEE6-41AAD3C1E6E7"]}, {"type": "avleonov", "idList": ["AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987", "AVLEONOV:D75470B5417CEFEE479C9D8FAE754F1C"]}, {"type": "broadcom", "idList": ["BSA-2021-1658", "BSA-2022-1839", "BSA-2022-1983", "BSA-2022-2011", "BSNSA21251", "BSNSA22340", "BSNSA22342", "BSNSA22346", "BSNSA22350", "BSNSA22351", "BSNSA22352", "BSNSA22356", "BSNSA22396", "BSNSA22450", "BSNSA22459", "BSNSA22463"]}, {"type": "cbl_mariner", "idList": ["CBLMARINER:10133", "CBLMARINER:10308", "CBLMARINER:10309", "CBLMARINER:10371", "CBLMARINER:10811", "CBLMARINER:10819", "CBLMARINER:10957", "CBLMARINER:10961", "CBLMARINER:11139", "CBLMARINER:11165", "CBLMARINER:1935", "CBLMARINER:26086", "CBLMARINER:26087", "CBLMARINER:26089", "CBLMARINER:26092", "CBLMARINER:26116", "CBLMARINER:26118", "CBLMARINER:26131", "CBLMARINER:26135", "CBLMARINER:26156", "CBLMARINER:26164", "CBLMARINER:31782", "CBLMARINER:31783", "CBLMARINER:3516", "CBLMARINER:3691", "CBLMARINER:3693", "CBLMARINER:3694", "CBLMARINER:3706", "CBLMARINER:3812", "CBLMARINER:4061", "CBLMARINER:4164", "CBLMARINER:4347", "CBLMARINER:4437", "CBLMARINER:4438", "CBLMARINER:4639", "CBLMARINER:5384", "CBLMARINER:5422", "CBLMARINER:5423", "CBLMARINER:5424", "CBLMARINER:5936", "CBLMARINER:5943", "CBLMARINER:5944", "CBLMARINER:5995", "CBLMARINER:6103", "CBLMARINER:6170", "CBLMARINER:6176", "CBLMARINER:6177", "CBLMARINER:6229", "CBLMARINER:6243", "CBLMARINER:6365", "CBLMARINER:6366", "CBLMARINER:6442", "CBLMARINER:6443", "CBLMARINER:6451", "CBLMARINER:6452", "CBLMARINER:6544", "CBLMARINER:6578", "CBLMARINER:6601", "CBLMARINER:6604", "CBLMARINER:6606", "CBLMARINER:6608", "CBLMARINER:6743", "CBLMARINER:6744", "CBLMARINER:6745", "CBLMARINER:7021", "CBLMARINER:7025", "CBLMARINER:7036", "CBLMARINER:7045", "CBLMARINER:7050", "CBLMARINER:7056", "CBLMARINER:7065", "CBLMARINER:7074", "CBLMARINER:7091", "CBLMARINER:7098", "CBLMARINER:7102", "CBLMARINER:7109", "CBLMARINER:7253", "CBLMARINER:7482", "CBLMARINER:7486", "CBLMARINER:7491", "CBLMARINER:7533", "CBLMARINER:7805", "CBLMARINER:8471", "CBLMARINER:8472", "CBLMARINER:8510", "CBLMARINER:8511", "CBLMARINER:8512", "CBLMARINER:8513", "CBLMARINER:8521", "CBLMARINER:8524", "CBLMARINER:8673", "CBLMARINER:8674", "CBLMARINER:8794", "CBLMARINER:8795", "CBLMARINER:8812", "CBLMARINER:8813", "CBLMARINER:8818", "CBLMARINER:8819", "CBLMARINER:8837", "CBLMARINER:8840", "CBLMARINER:8851", "CBLMARINER:8852", "CBLMARINER:8862", "CBLMARINER:8864", "CBLMARINER:8879", "CBLMARINER:8917", "CBLMARINER:8921", "CBLMARINER:8956", "CBLMARINER:8988", "CBLMARINER:8995", "CBLMARINER:9006", "CBLMARINER:9007", "CBLMARINER:9016", "CBLMARINER:9017", "CBLMARINER:9049", "CBLMARINER:9051", "CBLMARINER:9084", "CBLMARINER:9087", "CBLMARINER:9138", "CBLMARINER:9140", "CBLMARINER:9141", "CBLMARINER:9143", "CBLMARINER:9182", "CBLMARINER:9189", "CBLMARINER:9264", "CBLMARINER:9266", "CBLMARINER:9267", "CBLMARINER:9273", "CBLMARINER:9339", "CBLMARINER:9340", "CBLMARINER:9598", "CBLMARINER:9599", "CBLMARINER:9616", "CBLMARINER:9617", "CBLMARINER:9623", "CBLMARINER:9624", "CBLMARINER:9627", "CBLMARINER:9628", "CBLMARINER:9649", "CBLMARINER:9654", "CBLMARINER:9867", "CBLMARINER:9876"]}, {"type": "centos", "idList": ["CESA-2017:2423", "CESA-2019:0710", "CESA-2019:1467", "CESA-2019:1587", "CESA-2019:2030", "CESA-2019:2035", "CESA-2019:2343", "CESA-2020:0194", "CESA-2020:0850", "CESA-2020:0851", "CESA-2020:2530", "CESA-2020:3936", "CESA-2020:3958", "CESA-2021:2683", "CESA-2021:3327", "CESA-2021:4782", "CESA-2021:4788", "CESA-2021:5206", "CESA-2022:0063", "CESA-2022:0442", "CESA-2022:0620", "CESA-2022:0666", "CESA-2022:1045", "CESA-2022:1066", "CESA-2022:2191", "CESA-2022:2213", "CESA-2022:4930", "CESA-2022:5052", "CESA-2022:5234", "CESA-2022:5235", "CESA-2022:5687", "CESA-2022:5698"]}, {"type": "cert", "idList": ["VU:930724", "VU:970766"]}, {"type": "cgr", "idList": ["CHAINGUARD:CVE-2018-25032", "CHAINGUARD:CVE-2021-40690"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2018-0323", "CPAI-2019-0388", "CPAI-2019-0539", "CPAI-2019-1720", "CPAI-2020-1183", "CPAI-2020-3205", "CPAI-2020-3581", "CPAI-2021-1011", "CPAI-2021-1090", "CPAI-2021-1163", "CPAI-2021-1171", "CPAI-2021-1288", "CPAI-2021-1341", "CPAI-2022-0088", "CPAI-2022-0096", "CPAI-2022-0104", "CPAI-2022-0107", "CPAI-2022-0807"]}, {"type": "checkpoint_security", "idList": ["CPS:SK172983", "CPS:SK176865", "CPS:SK178411", "CPS:SK178605", "CPS:SK179649"]}, {"type": "cisa", "idList": ["CISA:6CCB59AFE6C3747D79017EDD3CC21673", "CISA:BD324839F36411F4FA7E1148D119E368", "CISA:FE8DC06D4609CF6B91DE778FC96E4ECD"]}, {"type": "cisa_kev", "idList": ["CISA-KEV-CVE-2018-1273", "CISA-KEV-CVE-2021-39144", "CISA-KEV-CVE-2022-22947", "CISA-KEV-CVE-2022-22963", "CISA-KEV-CVE-2022-22965"]}, {"type": "cisco", "idList": ["CISCO-SA-APACHE-LOG4J-QRUKNEBD", "CISCO-SA-JAVA-SPRING-RCE-ZX9GUC67", "CISCO-SA-JAVA-SPRING-SCF-RCE-DQRHHJXH", "CISCO-SA-OPENSSL-2021-GHY28DJD"]}, {"type": "citrix", "idList": ["CTX335705"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:021E06997683B74BFB351B722EBA5743", "CFOUNDRY:1B101FB251EDFB9515B6EABF00F1012E", "CFOUNDRY:1D6373C6C34B7DC575670E6C5020D261", "CFOUNDRY:21B35C0D976E5B0E31872BF9E79110BB", "CFOUNDRY:287D8485D09A10BA4937B4029A19783B", "CFOUNDRY:3B00E04C67EFB83F5D044A76DD92B52C", "CFOUNDRY:431A5FEB07A8E937BEDFD31D7F1BE817", "CFOUNDRY:451456E80A3A64E506E6D4333659CD7B", "CFOUNDRY:4523CAD43FD7AB1B2F9A08A0884F2F56", "CFOUNDRY:459C5235E42487C896B70FD98A96BFCE", "CFOUNDRY:53F8A02950D1071788BF2E23EFF823EF", "CFOUNDRY:59152B1A416D353D5CC80A97383D433B", "CFOUNDRY:5C1685BF1F8BCC0EFD4A80083950136F", "CFOUNDRY:6BFE4778EE08B8FDF49AB030FE4D7D65", "CFOUNDRY:70C0DF354249F21661B099AF1892C892", "CFOUNDRY:70F6C83FE70C685FC734A73A63029F17", "CFOUNDRY:73F8C8B872786F9D1C6842EE16AD1519", "CFOUNDRY:7CCE0B0CA4C32E297BEADD4E79F7EBE9", "CFOUNDRY:812295820B55CAF926A01271C929014A", "CFOUNDRY:82DF14FC7487619119F0BE4E5983B231", "CFOUNDRY:873D4C50CDC37566272A2CA3925ADB7A", "CFOUNDRY:89587F3ED65C323B89E14DDACE9BA27F", "CFOUNDRY:8CFF4A0AF748B0C857C01324EB35B6D4", "CFOUNDRY:9170AF39C296B9726CD7B93B3A36EC22", "CFOUNDRY:99F85A76DBA2EB60ADE2605D3A2C733F", "CFOUNDRY:A9FC68450FD5C662826D59FF602CBEE5", "CFOUNDRY:AC02087E8D08333A794B0ABB1DCAAA75", "CFOUNDRY:AEFE1E0FB78D2D1BC82159C0749C81D8", "CFOUNDRY:B87EBBA926F297275C749C19024B4E07", "CFOUNDRY:BA928B762FCFF84DEA12F332F6921B6F", "CFOUNDRY:BD43D191F1913B0416A737C28EAC643D", "CFOUNDRY:C1D2F4D8A3F0384C89F6C8D93A4DCF97", "CFOUNDRY:C7BE92CF45CB8F4FCBCEA8F043427BCF", "CFOUNDRY:CA59E47D163A4BA004268B3A03AC59D4", "CFOUNDRY:D1800B931E71999DC3B721FFDBB42636", "CFOUNDRY:D24EF96EB1845EA8878001F85C1C2C75", "CFOUNDRY:D8A5533B956044B61CB60F396BC77D39", "CFOUNDRY:DBB07350F947C0F70F7FE502A4A24A35", "CFOUNDRY:E504C95A1FDEC99C8FA5C726FB6DEA76", "CFOUNDRY:EDF9B83EB83E197F691D5842752D4768", "CFOUNDRY:EFCCA8E89849350B3F5BDC16FFE250F8", "CFOUNDRY:F235619808A6A396B8499C51931147B1", "CFOUNDRY:F7BE43D4B690F1512EC69A20AE237158", "CFOUNDRY:FD7245C3742F24986DE3C2791BDAC899"]}, {"type": "cloudlinux", "idList": ["CLSA-2021:1629395067", "CLSA-2021:1632262269", "CLSA-2021:1632262296", "CLSA-2021:1632401716", "CLSA-2021:1633442879", "CLSA-2021:1636389306", "CLSA-2021:1637583639", "CLSA-2022:1642429400", "CLSA-2022:1643818516", "CLSA-2022:1643918500", "CLSA-2022:1644500972", "CLSA-2022:1646060797", "CLSA-2022:1647255880", "CLSA-2022:1647550273", "CLSA-2022:1647958513", "CLSA-2022:1648136177", "CLSA-2022:1649869347", "CLSA-2022:1652706231", "CLSA-2022:1653004535", "CLSA-2022:1653005178", "CLSA-2022:1655843011", "CLSA-2022:1657817606", "CLSA-2022:1659638796", "CLSA-2022:1661176564"]}, {"type": "cnvd", "idList": ["CNVD-2021-101180", "CNVD-2021-101680", "CNVD-2021-101681", "CNVD-2021-58699", "CNVD-2021-60526", "CNVD-2021-67817", "CNVD-2021-67818", "CNVD-2021-67819", "CNVD-2021-67820", "CNVD-2021-67821", "CNVD-2021-67822", "CNVD-2021-67823", "CNVD-2021-67824", "CNVD-2021-67825", "CNVD-2021-67826", "CNVD-2021-67827", "CNVD-2021-67828", "CNVD-2021-67829", "CNVD-2021-67830", "CNVD-2021-70093", "CNVD-2021-70094", "CNVD-2021-83785", "CNVD-2021-92964", "CNVD-2021-93367", "CNVD-2021-94150", "CNVD-2022-01775", "CNVD-2022-05535", "CNVD-2022-05785", "CNVD-2022-05852", "CNVD-2022-06900", "CNVD-2022-08354", "CNVD-2022-08370", "CNVD-2022-09810", "CNVD-2022-13371", "CNVD-2022-14709", "CNVD-2022-14712", "CNVD-2022-16402", "CNVD-2022-20541", "CNVD-2022-21487", "CNVD-2022-21492", "CNVD-2022-21546", "CNVD-2022-21823", "CNVD-2022-53246", "CNVD-2022-53247", "CNVD-2022-53248", "CNVD-2022-53249", "CNVD-2022-54310", "CNVD-2022-54311", "CNVD-2022-54312", "CNVD-2022-54313", "CNVD-2022-54314", "CNVD-2022-54315", "CNVD-2022-54316", "CNVD-2022-54317", "CNVD-2022-54318", "CNVD-2022-54319", "CNVD-2022-54629", "CNVD-2022-54630", "CNVD-2022-54631", "CNVD-2022-54632", "CNVD-2022-54633", "CNVD-2022-54634", "CNVD-2022-54635", "CNVD-2022-54636", "CNVD-2022-54637", "CNVD-2022-54638", "CNVD-2022-54910", "CNVD-2022-54961", "CNVD-2022-55217", "CNVD-2022-62075", "CNVD-2022-62077", "CNVD-2022-68560", "CNVD-2022-68576", "CNVD-2022-68614", "CNVD-2022-68889", "CNVD-2022-68890", "CNVD-2022-69198", "CNVD-2022-69201", "CNVD-2022-69203", "CNVD-2022-70079", "CNVD-2022-70612", "CNVD-2022-71401", "CNVD-2022-72205", "CNVD-2022-73491", "CNVD-2022-84612", "CNVD-2022-84613", "CNVD-2022-84616", "CNVD-2022-84618", "CNVD-2022-84619", "CNVD-2022-84620", "CNVD-2022-84621", "CNVD-2022-84622", "CNVD-2022-88288", "CNVD-2023-02478", "CNVD-2023-08442", "CNVD-2023-08443", "CNVD-2023-08444", "CNVD-2023-08445", "CNVD-2023-08446", "CNVD-2023-08447", "CNVD-2023-11170", "CNVD-2023-86064"]}, {"type": "cve", "idList": ["CVE-2018-1259", "CVE-2018-1273", "CVE-2018-1274", "CVE-2018-18074", "CVE-2018-25032", "CVE-2018-8032", "CVE-2019-0219", "CVE-2019-0220", "CVE-2019-0227", "CVE-2019-10082", "CVE-2019-10086", "CVE-2019-10160", "CVE-2019-17495", "CVE-2019-17571", "CVE-2019-18348", "CVE-2019-20916", "CVE-2019-9636", "CVE-2019-9740", "CVE-2019-9947", "CVE-2020-0404", "CVE-2020-10683", "CVE-2020-11022", "CVE-2020-11023", "CVE-2020-11987", "CVE-2020-13974", "CVE-2020-14343", "CVE-2020-1747", "CVE-2020-17521", "CVE-2020-1927", "CVE-2020-25649", "CVE-2020-26137", "CVE-2020-26184", "CVE-2020-26185", "CVE-2020-26237", "CVE-2020-27619", "CVE-2020-27820", "CVE-2020-28052", "CVE-2020-28491", "CVE-2020-28500", "CVE-2020-29396", "CVE-2020-29505", "CVE-2020-29506", "CVE-2020-29507", "CVE-2020-29508", "CVE-2020-29651", "CVE-2020-35163", "CVE-2020-35164", "CVE-2020-35166", "CVE-2020-35167", "CVE-2020-35168", "CVE-2020-35169", "CVE-2020-35490", "CVE-2020-35491", "CVE-2020-35728", "CVE-2020-36179", "CVE-2020-36180", "CVE-2020-36181", "CVE-2020-36182", "CVE-2020-36183", "CVE-2020-36184", "CVE-2020-36185", "CVE-2020-36186", "CVE-2020-36187", "CVE-2020-36188", "CVE-2020-36189", "CVE-2020-36518", "CVE-2020-4788", "CVE-2020-5258", "CVE-2020-5397", "CVE-2020-5398", "CVE-2020-7656", "CVE-2020-7712", "CVE-2020-9484", "CVE-2020-9492", "CVE-2021-20322", "CVE-2021-21781", "CVE-2021-22118", "CVE-2021-22119", "CVE-2021-22931", "CVE-2021-22939", "CVE-2021-22940", "CVE-2021-22946", "CVE-2021-22947", "CVE-2021-23337", "CVE-2021-23450", "CVE-2021-2351", "CVE-2021-23926", "CVE-2021-25329", "CVE-2021-26291", "CVE-2021-29154", "CVE-2021-29425", "CVE-2021-29505", "CVE-2021-29921", "CVE-2021-30129", "CVE-2021-31684", "CVE-2021-3177", "CVE-2021-31805", "CVE-2021-31811", "CVE-2021-31812", "CVE-2021-33560", "CVE-2021-33813", "CVE-2021-34141", "CVE-2021-34429", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-35043", "CVE-2021-3542", "CVE-2021-35515", "CVE-2021-35516", "CVE-2021-35517", "CVE-2021-3572", "CVE-2021-35940", "CVE-2021-36090", "CVE-2021-3612", "CVE-2021-36373", "CVE-2021-36374", "CVE-2021-3672", "CVE-2021-37136", "CVE-2021-37137", "CVE-2021-37159", "CVE-2021-3737", "CVE-2021-3743", "CVE-2021-3744", "CVE-2021-3749", "CVE-2021-3752", "CVE-2021-37714", "CVE-2021-3772", "CVE-2021-3773", "CVE-2021-37750", "CVE-2021-38153", "CVE-2021-38296", "CVE-2021-38604", "CVE-2021-3896", "CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154", "CVE-2021-4002", "CVE-2021-40690", "CVE-2021-4083", "CVE-2021-4104", "CVE-2021-4115", "CVE-2021-41182", "CVE-2021-41183", "CVE-2021-41184", "CVE-2021-41303", "CVE-2021-41495", "CVE-2021-41496", "CVE-2021-4157", "CVE-2021-4160", "CVE-2021-41617", "CVE-2021-41771", "CVE-2021-41772", "CVE-2021-4197", "CVE-2021-4203", "CVE-2021-42340", "CVE-2021-42575", "CVE-2021-42739", "CVE-2021-43389", "CVE-2021-43396", "CVE-2021-43797", "CVE-2021-43818", "CVE-2021-43859", "CVE-2021-43976", "CVE-2021-44531", "CVE-2021-44532", "CVE-2021-44533", "CVE-2021-44832", "CVE-2021-45485", "CVE-2021-45486", "CVE-2021-45943", "CVE-2022-0001", "CVE-2022-0002", "CVE-2022-0286", "CVE-2022-0322", "CVE-2022-0538", "CVE-2022-0778", "CVE-2022-0839", "CVE-2022-1011", "CVE-2022-1154", "CVE-2022-1271", "CVE-2022-1292", "CVE-2022-2068", "CVE-2022-21428", "CVE-2022-21429", "CVE-2022-21432", "CVE-2022-21439", "CVE-2022-21455", "CVE-2022-21500", "CVE-2022-21508", "CVE-2022-21509", "CVE-2022-21510", "CVE-2022-21511", "CVE-2022-21512", "CVE-2022-21513", "CVE-2022-21514", "CVE-2022-21515", "CVE-2022-21516", "CVE-2022-21517", "CVE-2022-21518", "CVE-2022-21519", "CVE-2022-21520", "CVE-2022-21521", "CVE-2022-21522", "CVE-2022-21523", "CVE-2022-21524", "CVE-2022-21525", "CVE-2022-21526", "CVE-2022-21527", "CVE-2022-21528", "CVE-2022-21529", "CVE-2022-21530", "CVE-2022-21531", "CVE-2022-21532", "CVE-2022-21533", "CVE-2022-21534", "CVE-2022-21535", "CVE-2022-21536", "CVE-2022-21537", "CVE-2022-21538", "CVE-2022-21539", "CVE-2022-21540", "CVE-2022-21541", "CVE-2022-21542", "CVE-2022-21543", "CVE-2022-21544", "CVE-2022-21545", "CVE-2022-21547", "CVE-2022-21548", "CVE-2022-21549", "CVE-2022-21550", "CVE-2022-21551", "CVE-2022-21552", "CVE-2022-21553", "CVE-2022-21554", "CVE-2022-21555", "CVE-2022-21556", "CVE-2022-21557", "CVE-2022-21558", "CVE-2022-21559", "CVE-2022-21560", "CVE-2022-21561", "CVE-2022-21562", "CVE-2022-21563", "CVE-2022-21564", "CVE-2022-21565", "CVE-2022-21566", "CVE-2022-21567", "CVE-2022-21568", "CVE-2022-21569", "CVE-2022-21570", "CVE-2022-21571", "CVE-2022-21572", "CVE-2022-21573", "CVE-2022-21574", "CVE-2022-21575", "CVE-2022-21576", "CVE-2022-21577", "CVE-2022-21578", "CVE-2022-21579", "CVE-2022-21580", "CVE-2022-21581", "CVE-2022-21582", "CVE-2022-21583", "CVE-2022-21584", "CVE-2022-21585", "CVE-2022-21586", "CVE-2022-21824", "CVE-2022-22720", "CVE-2022-22721", "CVE-2022-22946", "CVE-2022-22947", "CVE-2022-22963", "CVE-2022-22965", "CVE-2022-22968", "CVE-2022-22969", "CVE-2022-22970", "CVE-2022-22971", "CVE-2022-22976", "CVE-2022-22978", "CVE-2022-23181", "CVE-2022-23218", "CVE-2022-23219", "CVE-2022-23302", "CVE-2022-23305", "CVE-2022-23307", "CVE-2022-23308", "CVE-2022-23437", "CVE-2022-23457", "CVE-2022-23632", "CVE-2022-23772", "CVE-2022-23773", "CVE-2022-23806", "CVE-2022-24329", "CVE-2022-24407", "CVE-2022-24728", "CVE-2022-24729", "CVE-2022-24735", "CVE-2022-24736", "CVE-2022-24801", "CVE-2022-24823", "CVE-2022-24839", "CVE-2022-24891", "CVE-2022-25169", "CVE-2022-25636", "CVE-2022-25647", "CVE-2022-25762", "CVE-2022-25845", "CVE-2022-27778", "CVE-2022-28366", "CVE-2022-29577", "CVE-2022-29824", "CVE-2022-29885", "CVE-2022-30126", "CVE-2022-30973", "CVE-2022-33879", "CVE-2022-34169", "CVE-2022-43712"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1748-1:696C5", "DEBIAN:DLA-1748-1:F732A", "DEBIAN:DLA-1834-1:7FA17", "DEBIAN:DLA-1835-1:96F0B", "DEBIAN:DLA-1835-2:87B43", "DEBIAN:DLA-1896-1:572E2", "DEBIAN:DLA-1896-1:853E6", "DEBIAN:DLA-2065-1:517F5", "DEBIAN:DLA-2065-1:5EEFC", "DEBIAN:DLA-2139-1:B7645", "DEBIAN:DLA-2139-1:BE12E", "DEBIAN:DLA-2191-1:6C344", "DEBIAN:DLA-2191-1:AF8DE", "DEBIAN:DLA-2209-1:84C77", "DEBIAN:DLA-2209-1:D154F", "DEBIAN:DLA-2217-1:0ED90", "DEBIAN:DLA-2279-1:771F3", "DEBIAN:DLA-2279-1:AB3FB", "DEBIAN:DLA-2280-1:96280", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2337-1:70801", "DEBIAN:DLA-2370-1:AC2B8", "DEBIAN:DLA-2370-1:DF2B1", "DEBIAN:DLA-2406-1:00733", "DEBIAN:DLA-2406-1:5CA04", "DEBIAN:DLA-2511-1:CE4FC", "DEBIAN:DLA-2596-1:25D69", "DEBIAN:DLA-2608-1:50303", "DEBIAN:DLA-2619-1:8192B", "DEBIAN:DLA-2638-1:5B442", "DEBIAN:DLA-2638-1:AB692", "DEBIAN:DLA-2686-1:2EED1", "DEBIAN:DLA-2689-1:31A23", "DEBIAN:DLA-2690-1:EA198", "DEBIAN:DLA-2691-1:57A3E", "DEBIAN:DLA-2693-1:27573", "DEBIAN:DLA-2696-1:E06B2", "DEBIAN:DLA-2696-1:E71CD", "DEBIAN:DLA-2704-1:90273", "DEBIAN:DLA-2706-1:666FB", "DEBIAN:DLA-2712-1:691FD", "DEBIAN:DLA-2712-1:79853", "DEBIAN:DLA-2713-1:19730", "DEBIAN:DLA-2713-2:9968E", "DEBIAN:DLA-2738-1:F3B74", "DEBIAN:DLA-2741-1:6E441", "DEBIAN:DLA-2751-1:5F8DA", "DEBIAN:DLA-2767-1:B89E0", "DEBIAN:DLA-2769-1:123CF", "DEBIAN:DLA-2771-1:D1964", "DEBIAN:DLA-2773-1:5DA4A", "DEBIAN:DLA-2785-1:A6280", "DEBIAN:DLA-2808-1:24976", "DEBIAN:DLA-2808-1:907E7", "DEBIAN:DLA-2821-1:A72F4", "DEBIAN:DLA-2843-1:AB8E9", "DEBIAN:DLA-2870-1:54673", "DEBIAN:DLA-2871-1:F8459", "DEBIAN:DLA-2877-1:2E87E", "DEBIAN:DLA-2889-1:E0D6C", "DEBIAN:DLA-2891-1:8649E", "DEBIAN:DLA-2892-1:1F462", "DEBIAN:DLA-2905-1:3AD13", "DEBIAN:DLA-2919-1:698BE", "DEBIAN:DLA-2924-1:0A9D0", "DEBIAN:DLA-2931-1:4C581", "DEBIAN:DLA-2940-1:FB71D", "DEBIAN:DLA-2941-1:96084", "DEBIAN:DLA-2952-1:7651B", "DEBIAN:DLA-2953-1:551CB", "DEBIAN:DLA-2960-1:2BD3E", "DEBIAN:DLA-2968-1:DFF4C", "DEBIAN:DLA-2972-1:3A4A8", "DEBIAN:DLA-2976-1:67F64", "DEBIAN:DLA-2977-1:FE1F7", "DEBIAN:DLA-2985-1:0C7A2", "DEBIAN:DLA-2986-1:6E1E6", "DEBIAN:DLA-2990-1:36C2F", "DEBIAN:DLA-2991-1:47D2B", "DEBIAN:DLA-2993-1:EB800", "DEBIAN:DLA-3001-1:8543B", "DEBIAN:DLA-3008-1:E2717", "DEBIAN:DLA-3011-1:59A88", "DEBIAN:DLA-3012-1:209F3", "DEBIAN:DLA-3065-1:C1710", "DEBIAN:DLA-3085-1:091D8", "DEBIAN:DLA-3100-1:10D28", "DEBIAN:DLA-3114-1:9A50E", "DEBIAN:DLA-3129-1:8AA1A", "DEBIAN:DLA-3137-1:3E6D2", "DEBIAN:DLA-3152-1:9B676", "DEBIAN:DLA-3155-1:7F32C", "DEBIAN:DLA-3160-1:77FDA", "DEBIAN:DLA-3182-1:FC9F7", "DEBIAN:DLA-3207-1:3251A", "DEBIAN:DLA-3230-1:233EC", "DEBIAN:DLA-3268-1:F6EEB", "DEBIAN:DLA-3289-1:F8BE0", "DEBIAN:DSA-4422-1:16F13", "DEBIAN:DSA-4422-1:5F32A", "DEBIAN:DSA-4509-1:7B58D", "DEBIAN:DSA-4509-1:D6C70", "DEBIAN:DSA-4627-1:1B266", "DEBIAN:DSA-4686-1:A3244", "DEBIAN:DSA-4686-1:EDCC0", "DEBIAN:DSA-4693-1:F5786", "DEBIAN:DSA-4757-1:5C812", "DEBIAN:DSA-4757-1:83F60", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4875-1:AE1B0", "DEBIAN:DSA-4954-1:16A46", "DEBIAN:DSA-4954-1:DE8B8", "DEBIAN:DSA-4978-1:4EC47", "DEBIAN:DSA-4978-1:98A5E", "DEBIAN:DSA-5004-1:7D2F1", "DEBIAN:DSA-5004-1:912EF", "DEBIAN:DSA-5004-1:999C3", "DEBIAN:DSA-5009-1:0CE0C", "DEBIAN:DSA-5010-1:C30C9", "DEBIAN:DSA-5043-1:79E25", "DEBIAN:DSA-5087-1:5B805", "DEBIAN:DSA-5092-1:463D4", "DEBIAN:DSA-5095-1:31FF6", "DEBIAN:DSA-5096-1:B47F5", "DEBIAN:DSA-5103-1:C47DD", "DEBIAN:DSA-5111-1:D8F18", "DEBIAN:DSA-5122-1:1D944", "DEBIAN:DSA-5123-1:202C2", "DEBIAN:DSA-5127-1:B6959", "DEBIAN:DSA-5139-1:0E208", "DEBIAN:DSA-5142-1:ACFFF", "DEBIAN:DSA-5170-1:EDFB9", "DEBIAN:DSA-5173-1:5A28E", "DEBIAN:DSA-5188-1:A22C9", "DEBIAN:DSA-5192-1:4B3DB", "DEBIAN:DSA-5197-1:EFC47", "DEBIAN:DSA-5227-1:C66D3", "DEBIAN:DSA-5239-1:67A72", "DEBIAN:DSA-5256-1:A51E5", "DEBIAN:DSA-5265-1:55805", "DEBIAN:DSA-5283-1:B4F9D", "DEBIAN:DSA-5316-1:4E3C8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-18074", "DEBIANCVE:CVE-2018-25032", "DEBIANCVE:CVE-2018-8032", "DEBIANCVE:CVE-2019-0220", "DEBIANCVE:CVE-2019-0227", "DEBIANCVE:CVE-2019-10082", "DEBIANCVE:CVE-2019-10086", "DEBIANCVE:CVE-2019-10160", "DEBIANCVE:CVE-2019-17571", "DEBIANCVE:CVE-2019-18348", "DEBIANCVE:CVE-2019-20916", "DEBIANCVE:CVE-2019-9636", "DEBIANCVE:CVE-2019-9740", "DEBIANCVE:CVE-2019-9947", "DEBIANCVE:CVE-2020-0404", "DEBIANCVE:CVE-2020-10683", "DEBIANCVE:CVE-2020-11022", "DEBIANCVE:CVE-2020-11023", "DEBIANCVE:CVE-2020-11987", "DEBIANCVE:CVE-2020-13974", "DEBIANCVE:CVE-2020-14343", "DEBIANCVE:CVE-2020-1747", "DEBIANCVE:CVE-2020-17521", "DEBIANCVE:CVE-2020-1927", "DEBIANCVE:CVE-2020-25649", "DEBIANCVE:CVE-2020-26137", "DEBIANCVE:CVE-2020-26237", "DEBIANCVE:CVE-2020-27619", "DEBIANCVE:CVE-2020-27820", "DEBIANCVE:CVE-2020-28052", "DEBIANCVE:CVE-2020-28491", "DEBIANCVE:CVE-2020-28500", "DEBIANCVE:CVE-2020-29396", "DEBIANCVE:CVE-2020-29651", "DEBIANCVE:CVE-2020-35490", "DEBIANCVE:CVE-2020-35491", "DEBIANCVE:CVE-2020-35728", "DEBIANCVE:CVE-2020-36179", "DEBIANCVE:CVE-2020-36180", "DEBIANCVE:CVE-2020-36181", "DEBIANCVE:CVE-2020-36182", "DEBIANCVE:CVE-2020-36183", "DEBIANCVE:CVE-2020-36184", "DEBIANCVE:CVE-2020-36185", "DEBIANCVE:CVE-2020-36186", "DEBIANCVE:CVE-2020-36187", "DEBIANCVE:CVE-2020-36188", "DEBIANCVE:CVE-2020-36189", "DEBIANCVE:CVE-2020-36518", "DEBIANCVE:CVE-2020-4788", "DEBIANCVE:CVE-2020-5258", "DEBIANCVE:CVE-2020-5397", "DEBIANCVE:CVE-2020-5398", "DEBIANCVE:CVE-2020-7656", "DEBIANCVE:CVE-2020-9484", "DEBIANCVE:CVE-2021-20322", "DEBIANCVE:CVE-2021-21781", "DEBIANCVE:CVE-2021-22118", "DEBIANCVE:CVE-2021-22931", "DEBIANCVE:CVE-2021-22939", "DEBIANCVE:CVE-2021-22940", "DEBIANCVE:CVE-2021-22946", "DEBIANCVE:CVE-2021-22947", "DEBIANCVE:CVE-2021-23337", "DEBIANCVE:CVE-2021-23450", "DEBIANCVE:CVE-2021-23926", "DEBIANCVE:CVE-2021-25329", "DEBIANCVE:CVE-2021-26291", "DEBIANCVE:CVE-2021-29154", "DEBIANCVE:CVE-2021-29425", "DEBIANCVE:CVE-2021-29505", "DEBIANCVE:CVE-2021-29921", "DEBIANCVE:CVE-2021-31684", "DEBIANCVE:CVE-2021-3177", "DEBIANCVE:CVE-2021-31811", "DEBIANCVE:CVE-2021-31812", "DEBIANCVE:CVE-2021-33560", "DEBIANCVE:CVE-2021-33813", "DEBIANCVE:CVE-2021-34141", "DEBIANCVE:CVE-2021-34429", "DEBIANCVE:CVE-2021-3449", "DEBIANCVE:CVE-2021-3450", "DEBIANCVE:CVE-2021-35043", "DEBIANCVE:CVE-2021-35515", "DEBIANCVE:CVE-2021-35516", "DEBIANCVE:CVE-2021-35517", "DEBIANCVE:CVE-2021-3572", "DEBIANCVE:CVE-2021-35940", "DEBIANCVE:CVE-2021-36090", "DEBIANCVE:CVE-2021-3612", "DEBIANCVE:CVE-2021-36373", "DEBIANCVE:CVE-2021-36374", "DEBIANCVE:CVE-2021-3672", "DEBIANCVE:CVE-2021-37136", "DEBIANCVE:CVE-2021-37137", "DEBIANCVE:CVE-2021-37159", "DEBIANCVE:CVE-2021-3737", "DEBIANCVE:CVE-2021-3743", "DEBIANCVE:CVE-2021-3744", "DEBIANCVE:CVE-2021-3749", "DEBIANCVE:CVE-2021-3752", "DEBIANCVE:CVE-2021-37714", "DEBIANCVE:CVE-2021-3772", "DEBIANCVE:CVE-2021-37750", "DEBIANCVE:CVE-2021-38604", "DEBIANCVE:CVE-2021-39139", "DEBIANCVE:CVE-2021-39140", "DEBIANCVE:CVE-2021-39141", "DEBIANCVE:CVE-2021-39144", "DEBIANCVE:CVE-2021-39145", "DEBIANCVE:CVE-2021-39146", "DEBIANCVE:CVE-2021-39147", "DEBIANCVE:CVE-2021-39148", "DEBIANCVE:CVE-2021-39149", "DEBIANCVE:CVE-2021-39150", "DEBIANCVE:CVE-2021-39151", "DEBIANCVE:CVE-2021-39152", "DEBIANCVE:CVE-2021-39153", "DEBIANCVE:CVE-2021-39154", "DEBIANCVE:CVE-2021-4002", "DEBIANCVE:CVE-2021-40690", "DEBIANCVE:CVE-2021-4083", "DEBIANCVE:CVE-2021-4104", "DEBIANCVE:CVE-2021-4115", "DEBIANCVE:CVE-2021-41182", "DEBIANCVE:CVE-2021-41183", "DEBIANCVE:CVE-2021-41184", "DEBIANCVE:CVE-2021-41303", "DEBIANCVE:CVE-2021-41495", "DEBIANCVE:CVE-2021-41496", "DEBIANCVE:CVE-2021-4157", "DEBIANCVE:CVE-2021-4160", "DEBIANCVE:CVE-2021-41617", "DEBIANCVE:CVE-2021-41771", "DEBIANCVE:CVE-2021-41772", "DEBIANCVE:CVE-2021-4197", "DEBIANCVE:CVE-2021-4203", "DEBIANCVE:CVE-2021-42340", "DEBIANCVE:CVE-2021-42739", "DEBIANCVE:CVE-2021-43389", "DEBIANCVE:CVE-2021-43396", "DEBIANCVE:CVE-2021-43797", "DEBIANCVE:CVE-2021-43818", "DEBIANCVE:CVE-2021-43859", "DEBIANCVE:CVE-2021-43976", "DEBIANCVE:CVE-2021-44531", "DEBIANCVE:CVE-2021-44532", "DEBIANCVE:CVE-2021-44533", "DEBIANCVE:CVE-2021-44832", "DEBIANCVE:CVE-2021-45485", "DEBIANCVE:CVE-2021-45486", "DEBIANCVE:CVE-2021-45943", "DEBIANCVE:CVE-2022-0001", "DEBIANCVE:CVE-2022-0002", "DEBIANCVE:CVE-2022-0286", "DEBIANCVE:CVE-2022-0322", "DEBIANCVE:CVE-2022-0778", "DEBIANCVE:CVE-2022-1011", "DEBIANCVE:CVE-2022-1154", "DEBIANCVE:CVE-2022-1271", "DEBIANCVE:CVE-2022-1292", "DEBIANCVE:CVE-2022-2068", "DEBIANCVE:CVE-2022-21455", "DEBIANCVE:CVE-2022-21509", "DEBIANCVE:CVE-2022-21515", "DEBIANCVE:CVE-2022-21517", "DEBIANCVE:CVE-2022-21522", "DEBIANCVE:CVE-2022-21525", "DEBIANCVE:CVE-2022-21526", "DEBIANCVE:CVE-2022-21527", "DEBIANCVE:CVE-2022-21528", "DEBIANCVE:CVE-2022-21529", "DEBIANCVE:CVE-2022-21530", "DEBIANCVE:CVE-2022-21531", "DEBIANCVE:CVE-2022-21534", "DEBIANCVE:CVE-2022-21537", "DEBIANCVE:CVE-2022-21538", "DEBIANCVE:CVE-2022-21539", "DEBIANCVE:CVE-2022-21540", "DEBIANCVE:CVE-2022-21541", "DEBIANCVE:CVE-2022-21547", "DEBIANCVE:CVE-2022-21549", "DEBIANCVE:CVE-2022-21553", "DEBIANCVE:CVE-2022-21554", "DEBIANCVE:CVE-2022-21556", "DEBIANCVE:CVE-2022-21569", "DEBIANCVE:CVE-2022-21571", "DEBIANCVE:CVE-2022-21824", "DEBIANCVE:CVE-2022-22720", "DEBIANCVE:CVE-2022-22721", "DEBIANCVE:CVE-2022-22965", "DEBIANCVE:CVE-2022-22968", "DEBIANCVE:CVE-2022-22970", "DEBIANCVE:CVE-2022-22971", "DEBIANCVE:CVE-2022-23181", "DEBIANCVE:CVE-2022-23218", "DEBIANCVE:CVE-2022-23219", "DEBIANCVE:CVE-2022-23302", "DEBIANCVE:CVE-2022-23305", "DEBIANCVE:CVE-2022-23307", "DEBIANCVE:CVE-2022-23308", "DEBIANCVE:CVE-2022-23437", "DEBIANCVE:CVE-2022-23457", "DEBIANCVE:CVE-2022-23772", "DEBIANCVE:CVE-2022-23773", "DEBIANCVE:CVE-2022-23806", "DEBIANCVE:CVE-2022-24329", "DEBIANCVE:CVE-2022-24407", "DEBIANCVE:CVE-2022-24728", "DEBIANCVE:CVE-2022-24729", "DEBIANCVE:CVE-2022-24735", "DEBIANCVE:CVE-2022-24736", "DEBIANCVE:CVE-2022-24801", "DEBIANCVE:CVE-2022-24823", "DEBIANCVE:CVE-2022-24839", "DEBIANCVE:CVE-2022-24891", "DEBIANCVE:CVE-2022-25169", "DEBIANCVE:CVE-2022-25636", "DEBIANCVE:CVE-2022-25647", "DEBIANCVE:CVE-2022-25762", "DEBIANCVE:CVE-2022-27778", "DEBIANCVE:CVE-2022-28366", "DEBIANCVE:CVE-2022-29577", "DEBIANCVE:CVE-2022-29824", "DEBIANCVE:CVE-2022-29885", "DEBIANCVE:CVE-2022-30126", "DEBIANCVE:CVE-2022-30973", "DEBIANCVE:CVE-2022-33879", "DEBIANCVE:CVE-2022-34169"]}, {"type": "drupal", "idList": ["DRUPAL-SA-CONTRIB-2022-004", "DRUPAL-SA-CORE-2020-002", "DRUPAL-SA-CORE-2022-001", "DRUPAL-SA-CORE-2022-002", "DRUPAL-SA-CORE-2022-005"]}, {"type": "dsquare", "idList": ["E-651", "E-654"]}, {"type": "exploitdb", "idList": ["EDB-ID:46682", "EDB-ID:49766", "EDB-ID:49767", "EDB-ID:50478", "EDB-ID:51262", "EDB-ID:51577"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:A8C8424AAD98145F43A2AF9734E0BCF4"]}, {"type": "f5", "idList": ["F5:K00322972", "F5:K00994461", "F5:K01311313", "F5:K02349370", "F5:K02453220", "F5:K03121171", "F5:K11510688", "F5:K12492858", "F5:K12705583", "F5:K13559191", "F5:K14122652", "F5:K20451100", "F5:K21037322", "F5:K21548854", "F5:K21600298", "F5:K22113693", "F5:K23153696", "F5:K24554520", "F5:K24608264", "F5:K25511825", "F5:K27053426", "F5:K28023545", "F5:K28409053", "F5:K29042031", "F5:K30184101", "F5:K31323265", "F5:K32760744", "F5:K34002344", "F5:K35802610", "F5:K42795243", "F5:K44591505", "F5:K46604804", "F5:K47096851", "F5:K49622415", "F5:K50455702", "F5:K51585448", "F5:K52171694", "F5:K52308021", "F5:K52379673", "F5:K53225395", "F5:K57542514", "F5:K59563964", "F5:K61529042", "F5:K62444703", "F5:K64348180", "F5:K66544153", "F5:K67090077", "F5:K70052353", "F5:K72118410", "F5:K73648110", "F5:K82200103", "F5:K82896488", "F5:K85932552", "F5:K93419216", "F5:K97120268"]}, {"type": "fedora", "idList": ["FEDORA:0035030A605C", "FEDORA:022E330946D2", "FEDORA:03AF930BDE13", "FEDORA:03B9730C1CAB", "FEDORA:07F6A31C0D06", "FEDORA:098FE30871BC", "FEDORA:0AB743093F65", "FEDORA:0BF24309C5AE", "FEDORA:0C9763072633", "FEDORA:0FA6430AF85A", "FEDORA:122743072F09", "FEDORA:12C83309E79F", "FEDORA:132956044E67", "FEDORA:13314305D426", "FEDORA:163EB313ED0F", "FEDORA:16D3E3076E49", "FEDORA:180E930E766E", "FEDORA:190E631AD8E6", "FEDORA:1AA6630C8346", "FEDORA:1B4F83067EC9", "FEDORA:1F076314BE6F", "FEDORA:2047030A5E9E", "FEDORA:21CDE306EA30", "FEDORA:2223F3052746", "FEDORA:26B3630E766E", "FEDORA:2873C310660B", "FEDORA:2997130BDE89", "FEDORA:2A1363108D8D", "FEDORA:2C8BA30B7889", "FEDORA:2DA133143789", "FEDORA:2E6A13094DC7", "FEDORA:32BAF31086A8", "FEDORA:32C1132189C5", "FEDORA:33F1C30BA750", "FEDORA:33F853184440", "FEDORA:34D5930F2474", "FEDORA:3A7E83096295", "FEDORA:3AA1530B13C7", "FEDORA:3ACF7305E4DA", "FEDORA:3AEB830B2656", "FEDORA:3BDE031381DA", "FEDORA:3C09731DC971", "FEDORA:3CB7960A4420", "FEDORA:3D5E8602DBD2", "FEDORA:3F9753052E9C", "FEDORA:3FEE7311CDD5", "FEDORA:41B6B6005555", "FEDORA:42A953052BBE", "FEDORA:448466076F61", "FEDORA:455E83148598", "FEDORA:4788E309FF20", "FEDORA:47BE23070D89", "FEDORA:4840930CA036", "FEDORA:48D7A3098BA2", "FEDORA:495F130B9B1C", "FEDORA:4B77660C7BDE", "FEDORA:4BDE230A1CF5", "FEDORA:4C28730B9880", "FEDORA:4CD1C3084032", "FEDORA:4E99B304C825", "FEDORA:4EA9B30FC826", "FEDORA:4ED1D30964A5", "FEDORA:4EE84305D41F", "FEDORA:4EE8E309D3ED", "FEDORA:4F8A23067746", "FEDORA:4FB2130691D9", "FEDORA:4FE7A30C79D4", "FEDORA:52DEC31381E4", "FEDORA:533533112D94", "FEDORA:55B76304C3CC", "FEDORA:55CC430B13F2", "FEDORA:57D6C304C758", "FEDORA:5A2CB301DFC5", "FEDORA:5B059609AE6F", "FEDORA:5B9703257D9C", "FEDORA:5F36E6079A0D", "FEDORA:61ACF309F4BF", "FEDORA:61ED7309CECD", "FEDORA:659033221693", "FEDORA:67A9D305F84D", "FEDORA:69B8A30B8B4D", "FEDORA:6BA62603EB7A", "FEDORA:6D74B30AE7EB", "FEDORA:6D78C301D3F7", "FEDORA:6E524310A486", "FEDORA:6ED3730946F6", "FEDORA:6EE37309D30F", "FEDORA:6EEE330609B8", "FEDORA:6F8003055F54", "FEDORA:6FE4431092F5", "FEDORA:71CB730B3C94", "FEDORA:764EE30C99A3", "FEDORA:77A873096A19", "FEDORA:783AC609A69C", "FEDORA:794E6304C690", "FEDORA:7A9826076A12", "FEDORA:7A99560A8F88", "FEDORA:7C20C304C264", "FEDORA:7D6AB6133B32", "FEDORA:7DC2630AEB07", "FEDORA:81628313BD04", "FEDORA:81DE83083D2A", "FEDORA:81E9830A6E1C", "FEDORA:853AD608EC23", "FEDORA:8558B30C122C", "FEDORA:86D5D3097097", "FEDORA:870A9309D31B", "FEDORA:8911B6380F06", "FEDORA:8C83E30BAD02", "FEDORA:8D07E3095785", "FEDORA:8D8003052744", "FEDORA:9067D317C62A", "FEDORA:90A7630A2C09", "FEDORA:9408B30E7B01", "FEDORA:94A7030C9952", "FEDORA:956DE30B8B74", "FEDORA:95EFE30A071C", "FEDORA:978EE3068B61", "FEDORA:97A66309CD91", "FEDORA:9848360648DC", "FEDORA:9A5D5309FF1B", "FEDORA:9A9A730B7020", "FEDORA:9B455301E446", "FEDORA:9BA73312EC38", "FEDORA:9BFED31347B3", "FEDORA:9C4D36076D01", "FEDORA:9F764605D68D", "FEDORA:A17AE3056A55", "FEDORA:A250E305D429", "FEDORA:A46793091C12", "FEDORA:A65BD30BAD03", "FEDORA:A6B0530AF205", "FEDORA:A7F053096A3A", "FEDORA:AA920305E2ED", "FEDORA:AB30161793DD", "FEDORA:AB6C43059B3B", "FEDORA:AF45530AA447", "FEDORA:AF47B304C5D7", "FEDORA:AF4D13074290", "FEDORA:B0E00301FECB", "FEDORA:B0F9260499C1", "FEDORA:B0FEC30C5629", "FEDORA:B1BFC302A933", "FEDORA:B277830C1CAB", "FEDORA:B43FE30447AF", "FEDORA:B459630CC2D1", "FEDORA:B4B9B605A29D", "FEDORA:B52EF60A8F8C", "FEDORA:B61A36076D27", "FEDORA:B6B8A309BA5B", "FEDORA:B7EBC30957D8", "FEDORA:B8ABF3057181", "FEDORA:B95F63083D20", "FEDORA:BC02830CCAB7", "FEDORA:BC81A30CC0CE", "FEDORA:BF65760525B8", "FEDORA:C02213137D30", "FEDORA:C0A2E30B00AE", "FEDORA:C337330A46EA", "FEDORA:C3D293095AFD", "FEDORA:C65B2630FBA5", "FEDORA:C69B164550D8", "FEDORA:C798F309DE1C", "FEDORA:C7AFE309727E", "FEDORA:C7E413533E64", "FEDORA:C87E3313E321", "FEDORA:CBC7D305D426", "FEDORA:CD32F604D3FD", "FEDORA:D37956047C92", "FEDORA:D3A2830AA053", "FEDORA:D3F2430C67AF", "FEDORA:D4D0A3067095", "FEDORA:D990930C713B", "FEDORA:DB135310F7D6", "FEDORA:DBDE4606041A", "FEDORA:DBF7C3092516", "FEDORA:DC7DF3111B2E", "FEDORA:DD01230A6E06", "FEDORA:DD853617087D", "FEDORA:E245930ACCAB", "FEDORA:E31D830DFF2D", "FEDORA:E468830AF07B", "FEDORA:E51866176380", "FEDORA:E5FD830AAF2E", "FEDORA:E627160A4090", "FEDORA:E9B1430CC2C0", "FEDORA:EA23E62567AD", "FEDORA:EA85730AFE74", "FEDORA:EAD003056B3D", "FEDORA:EAE35306E5C6", "FEDORA:EC676304C5DE", "FEDORA:ECB8530BC708", "FEDORA:EF5B36120D8F", "FEDORA:F015D61278C8", "FEDORA:F11B9312BA8F", "FEDORA:F12FB31404B0", "FEDORA:F3F93606FD7F"]}, {"type": "fortinet", "idList": ["FG-IR-21-116", "FG-IR-22-059", "FG-IR-22-072"]}, {"type": "freebsd", "idList": ["01823528-A4C1-11ED-B6AF-B42E991FC52E", "022DDE12-8F4A-11EC-83AC-080027415D17", "096AB080-907C-11EC-BB14-002324B2FBA8", "0B0AD196-1EE8-4A98-89B1-4D5D82AF49A9", "11E36890-D28C-11EC-A06F-D4C9EF517024", "18ED9650-A1D6-11E9-9B17-FCAA147E860E", "1AAAA5C6-804D-11EC-8BE6-D4C9EF517024", "1FB13175-ED52-11EA-8B93-001B217B3468", "20006B5F-A0BC-11EB-8AE6-FC4DD43E2B6A", "27C822A0-ADDC-11ED-A9EE-DCA632B19F10", "2A1B931F-2B86-11EC-8ACD-C80AA9043978", "36D10AF7-248D-11ED-856E-D4C9EF517024", "38A4A043-E937-11EB-9B84-D4C9EF517024", "38F2E3A0-B61E-11EC-9EBC-1C697AA5A594", "43E9FFD4-D6E0-11ED-956F-7054D21A9E2A", "50AD9A9A-1E28-11E9-98D7-0050562A4D7B", "53CAF29B-9180-11ED-ACBE-B42E991FC52E", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "5A668AB3-8D86-11EB-B8D6-D4C9EF517024", "6601C08D-A46C-11EC-8BE6-D4C9EF517024", "676CA486-9C1E-11EA-8B5E-B42E99A1B9C3", "70E71A24-0151-11EC-BF0C-080027EEDC6A", "7262F826-795E-11EC-8BE6-D4C9EF517024", "8E150606-08C9-11ED-856E-D4C9EF517024", "930DEF19-3E05-11EC-9BA8-002324B2FBA8", "972BA0E8-8B8A-11EC-B369-6C3BE5272ACD", "A449C604-A43A-11E9-B422-FCAA147E860E", "AAE8FECF-888E-11EA-9714-08002718DE91", "ADD683BE-BD76-11EC-A06F-D4C9EF517024", "B019585A-BFEA-11EC-B46C-B42E991FC52E", "B092BD4F-1B16-11EC-9D9D-0022489AD614", "B360B120-74B1-11EA-A84A-4C72B94353B5", "B51CFAEA-E919-11EC-9FBA-080027240888", "C0C1834C-9761-11EB-ACFD-0022489AD614", "C7EC6375-C3CF-11EB-904F-14DAE9D5A9D2", "C9221EC9-17A2-11EC-B335-D4C9EF517024", "C9387E4D-2F5F-11EC-8BE6-D4C9EF517024", "CAF545F2-C0D9-11E9-9051-4C72B94353B5", "CC42DB1C-C65F-11EC-AD96-0800270512F4", "CD2DC126-CFE4-11EA-9172-4C72B94353B5", "CF2105C6-551B-11E9-B95C-B499BAEBFEAF", "DC49F6DC-99D2-11ED-86E9-D4C9EF517024", "E1387E95-08D0-11ED-BE26-001999F8D30B", "EA05C456-A4FD-11EC-90DE-1C697AA5A594", "FCEB2B08-CB76-11EC-A06F-D4C9EF517024"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-21:07.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-22:03.OPENSSL", "FREEBSD_ADVISORY:FREEBSD-SA-22:08.ZLIB"]}, {"type": "gentoo", "idList": ["GLSA-201909-04", "GLSA-202003-26", "GLSA-202006-21", "GLSA-202007-03", "GLSA-202101-18", "GLSA-202103-03", "GLSA-202208-02", "GLSA-202208-06", "GLSA-202208-20", "GLSA-202208-24", "GLSA-202208-32", "GLSA-202208-34", "GLSA-202208-36", "GLSA-202209-01", "GLSA-202209-02", "GLSA-202209-17", "GLSA-202210-02", "GLSA-202210-03", "GLSA-202210-13", "GLSA-202210-15", "GLSA-202210-42", "GLSA-202212-01", "GLSA-202305-02", "GLSA-202305-16", "GLSA-202310-16"]}, {"type": "github", "idList": ["GHSA-2363-CQG2-863C", "GHSA-269Q-HMXG-M83Q", "GHSA-288C-CQ4H-88GQ", "GHSA-29MW-WPGM-HMR9", "GHSA-2F88-5HG8-9X2X", "GHSA-2H63-QP69-FWVW", "GHSA-2Q8X-2P7F-574V", "GHSA-2QP4-G3Q3-F92W", "GHSA-2QRG-X229-3V8Q", "GHSA-344F-F5VG-2JFJ", "GHSA-34WX-X2W9-VQM3", "GHSA-35JH-R3H4-6JHM", "GHSA-36P3-WJMG-H94X", "GHSA-3C6G-PVG8-GQW2", "GHSA-3CCQ-5VW3-2P6X", "GHSA-3GX9-37WW-9QW6", "GHSA-3J6G-HXX5-3Q26", "GHSA-3W6P-8F82-GW8R", "GHSA-3W73-FMF3-HG5C", "GHSA-4FC4-4P5G-6W89", "GHSA-4FQ3-MR56-CG6R", "GHSA-4JRV-PPP4-JM57", "GHSA-5545-2Q6W-2GH6", "GHSA-55X5-FJ6C-H6M8", "GHSA-57J2-W4CX-62H2", "GHSA-5Q8M-MQMX-PXP9", "GHSA-5R5R-6HPJ-8GG9", "GHSA-5V34-G2PX-J4FW", "GHSA-5XP3-JFQ3-5Q8X", "GHSA-64XX-CQ4Q-MF44", "GHSA-65FG-84F6-3JQ3", "GHSA-6757-JP84-GXFX", "GHSA-6PHF-73Q6-GH87", "GHSA-6Q8V-2HVM-FX37", "GHSA-6V73-FGF6-W5J7", "GHSA-6W62-HX7R-MW68", "GHSA-6WF9-JMG9-VXCC", "GHSA-73XV-W5GP-FRXH", "GHSA-7CHV-RRW6-W6FC", "GHSA-7GRW-6PJH-JPC9", "GHSA-7HFM-57QF-J43Q", "GHSA-7PM4-G2QJ-J85X", "GHSA-7QCQ-XP2F-56F6", "GHSA-83MX-573X-5RW9", "GHSA-8489-44MV-GGJ8", "GHSA-89QR-369F-5M5X", "GHSA-8C4J-34R4-XR8G", "GHSA-8HFJ-XRJ2-PM22", "GHSA-8JRJ-525P-826V", "GHSA-8M5H-HRQM-PXM2", "GHSA-8P5Q-J9M2-G8WR", "GHSA-8Q59-Q68H-6HV4", "GHSA-8W26-6F25-CM9X", "GHSA-8WX2-9Q48-VM9R", "GHSA-9279-7HPH-R3XW", "GHSA-9339-86WC-4QGF", "GHSA-9654-PR4F-GH6M", "GHSA-96JQ-75WH-2658", "GHSA-9849-P7JC-9RMV", "GHSA-9C8W-JRW3-Q2C3", "GHSA-9F3J-PM6F-9FM5", "GHSA-9GJ3-HWP5-PMWC", "GHSA-9GPH-22XH-8X98", "GHSA-9M6F-7XCQ-8VF8", "GHSA-9RR6-JPG7-9JG6", "GHSA-9VJP-V76F-G363", "GHSA-C28R-HW5M-5GV3", "GHSA-C2CP-3XJ9-97W9", "GHSA-C2JG-HW38-JRQQ", "GHSA-C427-HJC3-WRFW", "GHSA-C58J-88F5-H53F", "GHSA-C6PW-Q7F2-97HV", "GHSA-CGX6-HPWQ-FHV5", "GHSA-CPH5-M8F7-6C5X", "GHSA-CQCC-MM6X-VMVW", "GHSA-CRV7-7245-F45F", "GHSA-CVM9-FJM9-3572", "GHSA-CXFM-5M4G-X7XP", "GHSA-F6JP-J6W3-W9HM", "GHSA-F7C7-J99H-C22F", "GHSA-F7VH-QWP3-X37M", "GHSA-F8VC-WFC8-HXQH", "GHSA-F9XH-2QGP-CQ57", "GHSA-FG2V-W576-W4V3", "GHSA-FG3J-Q579-V8X4", "GHSA-FP5R-V3W9-4333", "GHSA-FPFV-JQM9-F5JM", "GHSA-FQ42-C5RG-92C2", "GHSA-G5MM-VMX4-3RG7", "GHSA-G5W6-MRJ7-75H2", "GHSA-GFWJ-FWQJ-FP3V", "GHSA-GPQQ-952Q-5327", "GHSA-GPVV-69J7-GWJ8", "GHSA-GRG4-WF29-R9VV", "GHSA-GW42-F939-FHVM", "GHSA-GWRP-PVRQ-JMWV", "GHSA-GX8X-G87M-H5Q6", "GHSA-GXR4-XJJ5-5PX2", "GHSA-H3CH-5PP2-VH6W", "GHSA-H65F-JVQW-M9FJ", "GHSA-H7V4-7XG3-HXCC", "GHSA-H9GJ-RQRW-X4FQ", "GHSA-HH26-6XWR-GGV7", "GHSA-HH32-7344-CG2F", "GHSA-HJ5V-574P-MJ7C", "GHSA-HPH2-M3G5-XXV4", "GHSA-HRHX-6H34-J5HC", "GHSA-HWJ3-M3P6-HJ38", "GHSA-J7QV-PGF6-HVH4", "GHSA-J8WC-GXX9-82HX", "GHSA-J9H8-PHRW-H4FH", "GHSA-JC36-42CF-VQWJ", "GHSA-JGWR-3QM3-26F3", "GHSA-JPCQ-CGW6-V4J6", "GHSA-JVFV-HRRC-6Q72", "GHSA-JXFH-8WGV-VFR2", "GHSA-M6X4-97WX-4Q27", "GHSA-M72M-MHQ2-9P6C", "GHSA-M8GW-HJPR-RJV7", "GHSA-M929-7FR6-CVJG", "GHSA-MC84-PJ99-Q6HH", "GHSA-MW3R-PFMG-XP92", "GHSA-P8PQ-R894-FM8F", "GHSA-PV7H-HX5H-MGFJ", "GHSA-Q4M3-2J7H-F7XW", "GHSA-Q5R4-CFPX-H6FH", "GHSA-Q77Q-VX4Q-XX6Q", "GHSA-Q95J-488Q-5Q3P", "GHSA-QRX8-8545-4WG2", "GHSA-QW3F-W4PF-JH5F", "GHSA-R3GR-CXRF-HG25", "GHSA-R695-7VR9-JGC2", "GHSA-RCJJ-H6GH-JF3R", "GHSA-RMR5-CPV2-VGJF", "GHSA-RPJM-422R-95MH", "GHSA-RQPH-VQWM-22VC", "GHSA-V57X-GXFJ-484Q", "GHSA-V585-23HC-C647", "GHSA-V6GP-9MMM-C6P5", "GHSA-V73W-R9XG-7CR9", "GHSA-V8J6-6C2R-R27C", "GHSA-VFQX-33QM-G869", "GHSA-VFRC-7R7C-W9MX", "GHSA-VJV5-GP2W-65VM", "GHSA-VP37-2F9P-3VR3", "GHSA-W9JG-GVGR-354M", "GHSA-W9P3-5CR8-M3JJ", "GHSA-WH8G-3J2C-RQJ5", "GHSA-WPH7-X527-W3H5", "GHSA-WQVQ-5M8C-6G24", "GHSA-WX54-3278-M5G4", "GHSA-WX5J-54MM-RQQQ", "GHSA-X3MH-JVJW-3XWX", "GHSA-X84V-XCM2-53PG", "GHSA-XMC8-26Q4-QJHX", "GHSA-XQFJ-VM6H-2X34", "GHSA-XW4P-CRPJ-VJX2", "GHSA-XXX9-3XCR-GJJ3", "GITHUB:070AFCDE1A9C584654244E41373D86D8"]}, {"type": "githubexploit", "idList": ["0018F9FA-176E-52D1-B790-5C67C302BC74", "00F5B330-30A9-5854-B811-41A3DCE5A4F8", "0126EBDA-4ED9-50FA-BDE5-873011FCD9B6", "01EF49BE-F69D-52BF-B4C3-3DC0FAAD5CD8", "02390955-9697-5950-8297-164CBB7695F0", "0273F07C-E2F1-5454-85F6-6B58CCA854A3", "050B5540-E4D4-523F-A821-852F4E2CCDD8", "0A299930-C365-5428-95BA-8E8D40BB77DC", "0B1484CA-22A0-50C8-9FDE-1E07AD2BBF96", "0C866B2A-86E3-5C5A-AA62-622683A9A0DA", "0DAA0EC3-9C98-5DF2-99ED-821582596409", "0DAD2A7F-FA26-53F7-AB9D-7850BD9C666E", "0E679B3E-C2C3-5C8B-94E1-FC6EDCBB08F0", "10247571-B332-5BEB-BEDA-E9B11C9E79CC", "1234F8B4-672C-58D6-96FB-87B780B9CDDA", "13878B3B-FB04-5CE3-9B74-E27EB76E916B", "13B098A9-7171-5D73-BDE6-148CAB4F8F28", "14CD7401-C309-52B2-B4EE-AD54900F0455", "159F2FD0-B230-5CB7-B1E6-E7A0ABD62FDE", "16067E19-368D-5FF5-895D-9BA9E14921CE", "1713E8B5-FB61-5B95-8337-AC6691ECF711", "17C63238-7AC4-5195-8FAC-88F0AB4E8F77", "18E406F3-7737-558F-9993-BD12421447B4", "1960C98A-289F-51BE-A556-7E603B53D820", "19D93D49-F907-5A3B-9FA2-ED9EFE3A45E0", "1A36437B-B0EE-58F5-B697-1EF2282390D5", "1C1E0F3C-2472-5BC6-A967-B71B63F51BE9", "1D19AD6A-2CD7-5B56-BFFD-86EE929786D0", "1F4670D2-70D1-5F68-B5BB-2674FB754D26", "20B5E925-0925-5D3D-A3A8-C49AA73BF6D2", "215EF040-369B-5FBF-A9F5-F81833E29553", "21A6C8CA-CA60-5265-8DE4-CD23E0ADB7B3", "21FA1164-A4AD-57B4-8CFE-6B9B5EE9D199", "2351C71F-EB0C-5CD1-A11A-4267F7CF31CC", "25B0D3BA-0039-5AAB-97E1-07A88FE23CC1", "260A09F0-4562-5ECD-A0DE-5055D7DC07E8", "28AFA2F1-D4AE-5810-BB8D-23EDEADE7794", "2A4F88C2-35A7-5185-ABC0-90D0A5396D8F", "2AF7350D-AB79-5AB5-8AF9-0F351CE13D30", "2DA0FD9C-9E20-5C51-A357-EB46391407F7", "2EBB728F-8FCC-57DB-8AC5-50BB5C51500E", "33186A5F-0C7E-5542-AEC3-BEC940C50B5C", "3389F104-810F-5B22-8F78-C961A94A8C27", "339D1CBF-E58E-5E4D-B5CF-25DA36057634", "342CC1B7-6E24-5767-A7B1-90B95A91B503", "36B8C1D8-41AC-5238-B870-2254AE996A4C", "372EBCFC-580D-50E0-8CB9-D107EF1C938C", "3754EBB9-751D-5EC2-A94B-4926B171EA05", "37DBE88A-3249-51AF-8021-8619CFD56A4B", "38D4A58E-3B24-5D5E-AE07-5568C6A571C4", "397046C4-338E-5CCC-AD0A-687CA3551B7C", "3B4FEC21-04C2-5299-BFD8-3F9AA518E694", "3D40E0AE-D155-5852-986D-A5FF3880E230", "3DB87825-2C58-5ABC-8BA3-E1CB80AFB11E", "3DFE8091-03AE-565B-A198-BD509784502C", "3E0978AA-B510-55A3-A1C8-E122CB347507", "4012995B-2E6C-5B0B-A5D0-B0B4278FDFF8", "402AA694-D65B-59F0-9CAC-8D4AA40893B4", "404D6E8E-0255-5C32-ABE3-7BD16A827348", "40B1BD3D-722E-5B72-A0D3-98A5729214D3", "4278B435-D22E-57E8-ABC4-639BAAFA6FC9", "429EEEBB-0204-5B44-AA0F-42A7D4511867", "44463794-7940-582A-AFFF-676628A86A72", "453E372C-9914-57AC-8703-E5C770B9BA54", "458891C6-0BE7-5AC1-8119-7DD6B0884A9A", "461FCF6D-F08B-5C1B-8AA0-0280EF31F86E", "4776E147-A67B-5C01-AD10-4958D8D40007", "4A3B5C53-2CB2-5006-B0EC-6228432CF4CF", "4A5CE074-5AD9-5FFA-BA3C-E78DD01450FF", "4CF56666-BB73-546A-960C-A8AF10581233", "4D8FAD9B-E605-5A77-AF14-BC9793B37991", "4DA31A90-F020-5BDC-81C8-514159FAEB82", "4E9E5EA5-ED60-5372-A45E-E4EB3EACD761", "4F0237BC-ABC7-5137-BF74-6CA614369115", "504D019A-423C-50A0-9677-93192F0ECDFC", "52AD8D8E-65ED-5B49-A85D-202C43107E6B", "5311844C-6D6C-5939-8B20-911F0C6E1486", "54E7D93D-9216-5EDE-A4AD-8324A367E67B", "552E4AC2-693D-5E49-B56E-E5473F4241E9", "55AD2857-E50A-5F7B-8FE5-19678211E97A", "5602A60A-886A-598C-99B3-EE2E820506AD", "571017BF-5A13-5AE0-991E-5676C236A65F", "586E2EC2-B05B-5F0D-A479-7B6D7C88312C", "588C33E5-7CDF-5EC7-9294-74B308DC6535", "5ACB7D6C-CC90-52D8-BFB9-C783C3ACA5FA", "5B69D6E3-B8F0-5B31-85EA-FB6183EF2F63", "5C2C6487-F3F5-580A-9A8C-34ABC1C16EB7", "5C9561BE-D9BB-58D0-8E51-09DDD257BC72", "5CD875BA-A337-5F27-A564-14CED5C59575", "5D705C67-17AA-5E5C-A72D-A1ED6F4DEDA7", "604A7B15-2D0B-5F0D-A311-7E13B31EB232", "6083DCC3-CA9C-58A4-9FBC-983DF1E52584", "608612F7-69E9-5491-B453-5DE098B798CA", "61FC770E-836A-5901-B2CF-CE7181FEBED9", "6256CA70-58E5-5DE4-AB28-000166517607", "6278B542-9BD2-5DE4-B950-A60CEBEE6DB1", "658B3734-0DA9-5332-A307-23C1967D9C0A", "661FCFFE-E5C3-5CF9-9CD5-68869CEDED1E", "66903BCE-DCE3-5FB9-B078-75CC2AD46662", "679F3E9E-1555-5391-86FF-CD3D67D80BDD", "69C8078C-1B8D-5B51-8951-4342A675A93D", "69F70907-9D15-5164-A021-4F7FE0E68921", "6A9484BA-BE10-5232-91F4-678892E7E6DD", "6D4C4841-374D-5EAC-B46A-3D900E02EEDB", "6D6C4503-DBCD-574F-AFFF-A5B58CC302A1", "6D93189D-E2D8-5571-88D5-D778E1CB9C23", "6DA59A94-0CD1-5357-8F01-2BF3230F9017", "6E5C078B-B2FA-520B-964A-D7055FD4EB0A", "701F758F-BBA0-582C-AE23-AA3C515F6A9F", "7072D83E-3183-5CFC-ABEB-1C5F5932A217", "7191AA24-D888-57E0-8B35-41D35E255E6F", "72294700-E478-5397-A47A-6098D06CA60A", "723B41AF-E5A8-5571-BA74-FA8924B88606", "72ACBBC1-E9FB-5A12-8614-06BEF5F96394", "73395497-EF2F-5E2B-B145-700BEECCF730", "743F51FB-8BF4-5425-AEFA-10B2A14C8F3B", "75235F83-D7F4-570F-B966-72159CCBA5CB", "759E062A-0520-564A-8473-82BC4E09CCCA", "7883CC8E-9B35-5C0F-AE2E-271FAC17648B", "7899779A-3EFB-5F5A-A490-9D1DEB77503A", "79D5BEFA-C5B9-56B6-B78E-4C663DB2A6C9", "7B3BB597-E614-57D3-8CDF-2091D33EB709", "7B9BDDBA-81E8-5739-B3F7-419C0D6E2316", "7C6A25CE-E02A-57D4-B020-A998CFA24D76", "7D29AFE9-2E1C-597D-80A3-49E03F52D903", "7D874F81-FBEE-512F-B206-D7CED2BA80B0", "7EBB252B-ED12-585F-86E9-BE348721984E", "81DFF6A6-4518-543A-B06C-E7A6466ACB88", "828F0AAC-BDB5-5EE1-97AB-C7AB61B3EFCD", "82AB8274-DF0B-58B4-8C3C-3CE19E21A0C3", "85BCA050-E6D6-55FF-A843-F49E52F30346", "866A8BD8-7D36-53DA-AA66-A0064438E2A5", "88781F74-2AD2-5F17-870A-6CB932998CA9", "89B78640-ACE2-5A00-845E-1CEFFFDD4A2E", "8AE63777-720A-5FEB-9A8B-B7A6577008DA", "8CC9F057-0254-57E7-A1D3-905863289BDA", "8D79D09C-1FB6-5C99-89C0-D839A4817791", "8E0D4DF9-029A-59C5-B3A1-50166EA449CB", "8E7595A3-22D3-53BC-A49E-8C148D00701A", "8EB751A4-B8A2-5393-AA52-266560429527", "8EE64370-D41C-59EC-9CC5-AFA1252E74D0", "8F6023E7-6C8D-522F-85DC-E473562EA637", "90D0B73F-6288-58DF-893E-AE5DD3207FA3", "915DAB75-3A6F-57CC-824E-106D6ACD652D", "91C0D03D-8468-59A7-B3B7-F6B118A62FFB", "92652D10-0053-5EC5-BEE7-CDD2141C7525", "92CE6110-40F8-5FE5-909B-BE6B59186578", "93611D7A-3405-55F6-A543-E1691042CC2D", "93CA136A-0D64-5328-8220-EEBB9F01C2B5", "94FA0473-BF7E-567A-BCBB-3DAD20F38627", "9529CA86-8F3A-503D-9D02-94AC19D0CDD4", "9538B7BA-979F-523C-9913-4FE62CF77C5C", "958E6CA0-04A6-50FD-B7DC-4BC25760440E", "968DBE0A-CC05-5F47-B348-E8E33AA33F6C", "96C34A34-563E-5A78-8547-79EC2646169D", "9762BA59-813F-50C2-94CB-842DFAE750D5", "9A68A65E-1A3C-5F85-BC5B-D3B9AF89FD8F", "9ABC13CF-FB35-5B18-B3C4-C40087AA9CA9", "9B3AD93D-3EB7-516A-8F64-439D6260F866", "9BA7DD91-CA4C-5195-B7A3-C78E108A7B74", "9CF2FA1F-CCCB-52FA-A320-267788DB4B93", "9D092BED-AC51-5759-B59E-E74D989AD5E5", "9E63B0B5-5583-5FC0-85B1-048296D9FC6A", "9FAEDEC8-43AD-592A-A17C-BAF6F67FBF44", "A0648F78-7165-5CA8-82DC-B34350E2DDC6", "A1211768-5E91-56CF-ABBE-375C101C8987", "A1656477-2AD0-5B09-B359-576D08CBF918", "A46721A6-23E8-5E16-B9CA-0C887A66551D", "A4BF4F4E-CCDE-55B8-B08B-B8F25BE163D7", "A6262D7C-E486-57FA-BFE3-D7774CB085C9", "A73A6F1F-C457-59E2-8BDC-BDC9A5EEC2FB", "A8866ED4-A944-571F-8135-6138A2E9B568", "AD1045B7-6DFA-557C-81B2-18F96F0F68A2", "AE9F0F3B-00DE-5B73-87A1-BA592FA6E616", "AF11EF27-730D-5BA1-8B1D-7676A6FFCEAF", "B02C7B49-750E-513B-86BC-56D7CE31383D", "B0B4203D-0831-5405-9970-9B8EEE171BE6", "B0BA17F5-F171-5C97-9F6C-D5F38B5B64F5", "B0EA173F-FDE3-5401-BE03-BEF429622CF2", "B158F1AE-13DF-5F49-88D5-73B5B6183926", "B71645C4-F039-552B-A3E1-C7376EB2DF53", "B9B4FADB-2546-5DFD-A26E-B1FC4C07FCE7", "B9EB8E0F-C53A-5795-92FA-1994F120A1CF", "B9F78DFB-D2B3-54BE-AF98-69D2F32FC6C6", "BAD2432C-C81D-5EF9-865B-2F4E12B34558", "BB8E49AC-D000-5024-B48A-FCB247968D9A", "BD7F2851-5090-5010-8C27-4B3CCF48ADE1", "BDDB5B64-68C0-57EF-B41D-44F283D0C7E3", "BEC31AE7-B839-564C-9541-59368931D558", "BEFCD594-3E6F-5A25-BB86-667B5FB11FA0", "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "C062CD6F-6EDD-54FA-843D-2937B25F48EB", "C2D99D6A-1A8C-5D55-BBB7-34A978AAC642", "C4845BA2-1E07-5E0D-AFF4-D608A325EB8B", "C4EB8052-6E91-5327-87BE-51E8490B0A4E", "C4EDB405-454C-5160-9A99-21A930740C3F", "C6653FFB-B7A6-54D8-83C9-300A13AC41F4", "C68080B0-3163-5E76-AD65-2B454DBB95EE", "C76F7089-967B-5A7F-B8DA-629452876A2A", "C772DCBB-20D0-51DD-A580-F96689E65773", "CAD3F237-9F09-5818-ADE3-DF36E8350D41", "CB4B727A-DC5A-5BD9-84C9-782301F87004", "CB56CEFA-343E-5B20-9D5B-C076205FBF6F", "CC4175EB-3B91-5ABB-A700-84FC1105AAD5", "CC545F18-210E-5AB5-A927-503D6F3EC956", "CF10F7D9-0F6C-5F99-9352-17EDDD646D3B", "CF1FBB67-3983-5C00-A2EC-53123FE985EE", "CFF7A226-3523-52E0-8A6C-0D0E6A7BEBD6", "D088978F-AFD3-56B5-A461-39DCB022A11E", "D09EAEC3-7B66-5E76-BF91-64C048C7D58D", "D1A30248-63E3-5F72-9EDD-1779A6F23FA7", "D298A3C8-E215-5549-B1A0-D01215070203", "D30073F4-9BB7-54D9-A5F6-DCCA5A005D4D", "D5CBA0E2-A4B0-52CE-B93B-F433CE8662DA", "D71757FD-E7A3-525B-8B2B-FB1D6DC37D11", "D8833A47-C03D-5D09-A449-DF19AB0A9258", "DD445CDD-3049-55A7-BD3E-344AC2FD85BC", "DECBAC7B-9235-5E00-81C1-142CD41306FB", "DF61600D-38EB-5DD1-862B-290A1B4D1019", "E00EE482-CF1E-5781-9A57-928FFA18D762", "E2F42E8D-F9F8-538C-A8E0-E122A923038E", "E95D9A0E-E9DE-5D95-9879-E07C0257318C", "EA6CBE17-9E5A-5E96-8381-75C6EA75423B", "EA74F876-4376-5A5F-B6EE-1AA5B4690A29", "EA9501F7-CC4E-5C60-ACF3-F636E7F54C6F", "EAE84183-EEEC-5C93-AB4F-725AD31987F9", "EBD1ED76-3887-570C-86DD-EC9C7ADB1880", "ED9D4BD6-7385-5547-B924-5FFC865CFA69", "EE4B4CDB-5690-556D-9581-E198CF03A9BE", "EE6F9847-0C12-588E-BA63-6DD573963EFC", "EEA12A00-A397-5497-AFD6-3427AD52C0BF", "EF08F582-5E5C-506D-B223-26A7028B4A16", "EF55EC2D-994E-5971-8941-B595536F5992", "EF9B393E-84B6-5A0D-B8D2-6759E5970758", "F09161EA-B10D-5DBF-B548-6F9BE7EE20B2", "F153A1C0-8116-5071-908F-9BCC68E9E042", "F30ACAD3-0FC4-58C8-84CF-A8FFF2BE55B4", "F340F3AE-7288-5EF0-85A3-DAB6576064D5", "F46FFDD3-4C3B-5BD6-A69D-43F2CA80D469", "F60737C1-A24B-51C1-AE8D-73A65C778FFF", "F6DAC821-341C-5097-BC37-E8180E188563", "F72C0887-8889-5677-AB4E-15C4E99F77F3", "F7C2EA22-B929-56C5-81EC-916AD38EE791", "F95C4865-A269-5A59-9AD3-3D000443E6FF", "FACAC290-D83E-5B87-B534-640F9C566696", "FBA7DE43-C816-5C81-9D69-0C4F1469B382", "FCB41C86-C31E-58AE-9055-459DC713CABD", "FD75018B-E9E5-5053-8E81-F0E287C5C60F", "FE14C1D9-37CA-5446-B354-C8299FC7FAAC", "FF2EF58E-53AA-5B60-9EA1-4B5C29647395", "FF4B608A-EAF3-5EFC-921B-248F48F14720"]}, {"type": "gitlab", "idList": ["GITLAB-0A7CAAE853D9B82CBC8508F8E8BD2DBE", "GITLAB-3FC9C3A557A1C3ECA66B75BE807FBBD2", "GITLAB-948CD10BE05881C6F3EECB4B53AB242F", "GITLAB-CC6777114B33811C883E524A780C4E45", "GITLAB-F3664DEA7C9C3BD1A6B7E11EF6D6F9D2"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:72DAB7B2D17DB4009F02A3C0AEC8A7AE", "GOOGLEPROJECTZERO:F6A0481A189F0EAF78293E746E3C9083"]}, {"type": "hackerone", "idList": ["H1:1084342", "H1:1178337", "H1:1188128", "H1:1278254", "H1:1334111", "H1:1334763", "H1:1429694", "H1:1431042", "H1:1553598", "H1:1565623", "H1:1812768", "H1:680415", "H1:816888"]}, {"type": "hivepro", "idList": ["HIVEPRO:0D02D133141B167E9F03F4AC4CA5579A", "HIVEPRO:205916945365E4C9EB9829951A82295A", "HIVEPRO:21EBEC4DE35422B57481E3DF94E6EA07", "HIVEPRO:41D5BC8D50B4CA10D9CCDA18E6528C27", "HIVEPRO:6328173E0F6C3AA0EDD0FC979058CEAB", "HIVEPRO:6447122B5EA2A5B40445A46A664EF345", "HIVEPRO:8D1D94F11C7163E6C0DF10B434A7BBDD", "HIVEPRO:9C6CEB2A89436A8E8258183E6D6830FB", "HIVEPRO:B772F2F7B4C9AE8452D1197E2E240204", "HIVEPRO:C037186E3B2166871D34825A7A6719EE", "HIVEPRO:C224B728F67C8D1703A8BF2411600695"]}, {"type": "hp", "idList": ["HP:C06911998", "HPSBHF03842", "HPSBHF03876"]}, {"type": "httpd", "idList": ["HTTPD:2C227652EE0B3B961706AAFCACA3D1E1", "HTTPD:3512E3F62E72F03B59F5E9CF8ECB3EEF", "HTTPD:5FF2D6B51D8115FFCB653949D8D36345", "HTTPD:C072933AA965A86DA3E2C9172FFC1569", "HTTPD:FCCF5DB14D66FA54B47C34D9680C0335"]}, {"type": "huntr", "idList": ["1E8F07FC-C384-4FF9-8498-0690DE2E8C31", "7B9EF50A-3D1D-490A-8FA4-F1EC5E3D3BBF", "7CF2BF90-52DA-4D59-8028-A73B132DE0DB", "7F0EC6BC-EA0E-45B0-8128-CAAC72D23425", "82B8FEB2-2ADB-4D99-9AAF-3D5BEE80B19A", "DB31E05B-FF10-4057-81A3-37445BF161CD", "F076D76A-661C-4484-A4C3-0712869E43E1", "F1AE5779-B406-4594-A8A3-D089C68D6E70"]}, {"type": "ibm", "idList": ["0071D7109D190F08AF61415C42966955F5A2F20ACA252B48C89119BEDBFE4DE2", "007E1AC1E4228B8135E45C63FCEF82799BD02C157157F082CD8D3E0F0D61C361", "00B8BFFFE9EC2CDB467AF3D17608DB7C5E49C98591131C859F8ADA15204371EB", "00DD5060E6124BE4F25A4AF7DA83D15A52360F89A1F6A84F1ED9C6E28CD62833", "00E427FDE1ED2FCC942B37A9297706D3A726FAC519A340420CCF652F75075CF5", "014D42A4B1AF0BC556DD624E07D6BCF5E9F2F23FCE02471BB3F58278DF2FF765", "0175067D1E20C37D47290868BB1BA4D42F2E3D445758992463ED2309564CB1CD", "01EB17D4B2EFCDFF9CCC4246DE32A531B02D3EFA07D6B09990C0B16360BD7F23", "021D73BA7F81AE9ECA981B8E5BCD2B83F967D63970C29E0AD98D46119BE5A6A3", "02208B95DC0377482AA2F9D9C05755BE90534C1B3F7475FC805AC14769FE9106", "022A2D60DD1C4A293CF52F8F73A53B3FC2E53AEC5EA7FFEDF9C4763EF2B5B80A", "023C54E1D297D5AA9E7F44F8089DE35CB079281FA1776467BF8B7A7AD4FE252E", "02B45A4F0737B5EA27ABCC5E6A85126998115FD2F957E97BE285E1497BC95E60", "02FD10030B8366010758D75673B2286A0CD064A8561853F6F314CF7B7BC8B298", "037DC92C3964B9BE83FE00549FB0CE6C44ACB2D76406400ED57CA4D310EF3538", "03BD9C6A634D56977256D0EB02550574DC21A677D8E08EEB57FD8C5F206D469F", "03D00591019CE34D0FD78640476E184E6CD4E23765A0C7A13539B6B78161E1A6", "0402EC8AB4EAC3CD4AE3D765E8C24F6683BD7CA1335A81B6D3B0950A4801A470", "0465751AC2B09E6749CD032D525B17660008B7BDE693E1A430E27B2E32A33438", "04866C40DA66C7EF943E6D6B852B332B0C018E04648D39E5DDA31CC0D74F01DD", "04870652CD3948470489F2A7409F2A56C93E2AC37776816BED9621DEFC07CE10", "04D3658F043D6F4A2AA1B2F519A7E89C112641C7C4E2E58E14BEC11BA66E803D", "053134070CB8D6609B7F157DC74146FFBCB3EBE941406A677E889C3CAF773364", "054558DC9CF59741DB8F92782AB69F01D68281F52C85F0F6E6448CBC2E7F8FAA", "05A1D58708802BF8C1674EE32BEC4344254929330218CAD68AA838AA7F549BF7", "05BBDE1FB03AC43275CE3464D408E5E21E63D250E7B0CF0E90D314FBD5991752", "05BC797FA6DE395BD404A4F786157060F1D9F2A7B475078E13A5B858C1706A2D", "05DD55F06CD1ACDCA3A66B68F19E31E9EE14931A03B4A21FEE7FF44FFE26B2DD", "0640B969009F4949540096B6BCAB401C92F393BD37C329262A55A3CC03A3A43A", "064FD556C4762AE8E89F37889FD34F9616BE42AFD5AC481AFEE2D3E4FE61094B", "0665925DF5F067ECF5E297BA3C90127DB89591002C77E6A2724DF5A757C0156C", "06940A19A234A9FB37F15FB92DA4CE3E9912560FB6FD2DD27A68170DF327FEDE", "06D6FF9BF7B39015A7C2A9086CA1736D9B28FD1BFED11D60E1FB275F243C4224", "07988475CE9095B9471700FFB4FFB199A58AB32837E3178BE094D53E97B8461A", "07B0248B3BD4D9C211F92809800D29F6323D74D4D24B0AD7DE45454B76DA398F", "07E45E00FAEDBEBB9C3B5228FDE4F037AB49330B78E5D2384363A5E796231963", "07FEC8A129A779FAB145D3092FB4D733884D03DF23AA13470BF539F0AAE36C84", "08139CE06A8A5B4E6DECA1C19593AB1C2B019BD2AB5CC530089313FD991614D7", "081D2A6225D3F8981334E15D117D445052DC062BBC7963BD9A0768C3A1E47C1F", "0873F460B0C56BEFFB7C20248A3B9104F79891FA48CE8B004739684341A51D1D", "087CD3B8800A1EB017C933808D8D5E610496ED972CA8243894CB2435705F3CAF", "08803B708D4CA95FF8DD68A4DE7FBE7DEAA67387194E25D8CD693B135E7332D9", "089B564037CD6CBF124F570A0074A8E6C37E90240BCF8C5297D2EBD444E34F18", "08B92D9A359AA2182A33A02394264D846CF74792C1490396DF12E0FFBB6DC869", "08C5ED1F3E47E1FABE2752DAE40446E385D6C5EB30C70D7C739509CE04B06788", "08CA215DA4723C38799F9660F7D75091345A288B82A51DC0E9E4FD79547268EC", "08E4652A35B12E43E70CAFEE0E9ECB0CABA8ABFA2E3FE408B255CB631BEDAABC", "08FF14BF18D2D8DEA2BCD9900A4BED9C481C9700F7CF99B6CD1B3F7EDA9C3865", "091D253C3C5F4EDDB1A7482046BA793909C45D2702BF1CCF8D674C8DF0ACEA59", "092A5FFF63DF2D24AE105A3D4A7EFA1386A4FF9DBF7D2F354A30991E0CB4C671", "0947A467F149411F5A737E1AD20967E441ABD5EA2D9B0D3D50EEA147D4326416", "09993152537DB18B6B73F9E58420D98A3D0C17E0305940B21E7AA2BD353E4B96", "09D62F6EB38939F288760A8230DAA61BAD9E615D4B5ACACCCBE904A8EB9EDC76", "09F9A4A7E2C86FBCBD84600DBE2802FEF7651907D28D08AEA2C91F65692FAEFD", "0A02CE8F8480935E6DF427BB57D104E85B5FC8B8CBB9B30D41DA61284FC0C04F", "0A198E04B0E285E31B51A3A5F1CB3EF699E84BB16BA8A041719073300ED48D7C", "0A425AE154320282FF38ABB3C8BA8D3AD10793B88A3CFCA031B295F986453B12", "0AB88FA1BA9F4B3BD14275985B23E53577C278963878E2CBA53AD9C0D4A67860", "0AE80E7D1B92F5584C0652988A6BC58F1CE1E37349CB543C23A7BCE8C2445CCD", "0AFBC1D7F97C5C9E0F0CC49EE02F2CC41F95432701D1E857EC1AF635A6E339A4", "0B62A979A39E5FDD103EF50E44280DC84E1DA4B8937991D39D2F70B94DE5CDC6", "0B7F1766DD3CE3949F4E1333514E60D51C49D73929587D59B198FAACAA9FA1A2", "0B841A25DD5089B54804EEE177963CE7CA3A23E107F528BF4D4DE12B41D18A16", "0B878F5D9824E894676260088D1B44F3EEACB4DFCA20BC99A6BB6ECFC75A7972", "0BC017C730A770E349E300089D6DB71D200CA299BDBFA58821787583FA3F9DB1", "0BC76EEB65523D395F4DA742FB52689780638A43870F5C4EC44A6261A2CCA67B", "0C4B79BFF88AACC358B813B5EBF57229B26D0400A39D0FA7687D92FEE890BC8B", "0C6D510B96C1921840EB548081CBEE07051F107440F8CDE29CC80CC2DBA0285D", "0C73E239B7507EA87A84E5699D3481C10F71C405C6E86EB8A6F80FC3DC73AA13", "0C779E30A41077563FA5AF76F75E9EC214F8A1B1EFC21AA9E8EA78A7B4833570", "0C8E06A8D7C8A317EC9DCB3FC6E82453314622553B78ED06DDB7A31DD15F465E", "0CF13F8FB4FD77C6593C265FA8F397D0C4324FC1F07F86C436B4937E98B25DBF", "0D1CD2F0F6466904E8614A55941F9674CA10DEEEC78000ED7F7FCCDB2BDCF1F8", "0D3AC1653A7CFC61981BECC263BCD833E5441240DF62D2E529CB279D31CBD069", "0D4B20C744466115DE835E52E37DD4A530EABD3932B1BB246AFC9B474D4C777D", "0D5D9C62E3772E12A0A361D23CC8D2FE21F9AD572A09912E906D408ED2270FAA", "0D85E5287523B83245752DC2E09287130E098DCDD6446DA2E1DF6BC26D74E767", "0DA372315D9C9CE495D2D8AED74F69FEB6E2DA01B2A69C7B4F02788E611CCB66", "0E0E7B18D99C2EC8E29EE4877EE2BCDB492FE609EBADF3B5D9C1C38BABE89E03", "0E139C6B78E05C5FB31297130E7D8182F37C6EEE164FAB0E33CFAB3DCEE481D0", "0E22AD4DB4FBFF481E10BE36FA9BBAA603C5BE63B78293C6BB97366AC5077A40", "0E52D1672D07EE18EAA03609925823099E77BFBCBCA0962EA3C956E7DF6379E1", "0E8555641D8CDA8EC9035ED3EB5F648F408D4DF211176B6798C8D8C65318F3F5", "0E90BE57477FF48A1B6656796E64B27DD2F0FD10BE811D20B98E904E94B3762E", "0E9CB2FF4881771F372D07171695D0F9F9EC65784DB65C62AE83724CACDC1D27", "0F3C107148CEF8AFE3042F3396B057B5EBE06884CDF101C47C3B58161ED5DCEE", "0FEF4738C59C97322DBD25A9806D1EE3E131F117AF9CA9C33F3A6098A981AE66", "0FF78AF1C487DE3B1A92548681C12BB71F6CB2B0B453E94F828CDEF3248FE0FD", "102DE7B07E2C763A08E3117F8BAFADC95832E666C453110C7D4275D703394EF5", "103EA163CE6BA94C3571086A36BDAD92915A4BF88B6551DD1CF420092CAEB0CD", "10435D282B7850CEC2BF0C603FD80422C4D44BBAE142D5D668326E97EB3F47F8", "10FBEBB14A30BC73B75E0DF3E1AC14E07BC218A2AAE122217F23444AA2EEB55D", "1184F34A8BB7F52562A68801DE6ABC021E03D5BBF810D28882A9FB9E51F1A74B", "119BB4293F5E4BCA6CFBB0134EAECC5DB1B354D477DA439D539EA8CDC1BD0692", "119CECCEFDE70646119DD7521398162DB4527F17D79DC46F5852AD60ADE965F6", "11A720D6CEE42BEC7B427E5FEAEDB21B8A8C1404BC4506025147A835335D8344", "11AF1EBF11801C3B0AC27DD2420D4EFC6BECF3D238C0BCFAE0F7B3EFE88FB0A1", "11CF4631DBE6B658A508429E589E135C8DF8945F214E1A5F66CB372FF4056326", "11EBEE4A93AED07933C98D05FABE73699737B63A59AFEDFD66484B41489486F0", "126E1024546918D07264839DD88F2FF75D58789A0F611D0689966886112B533B", "128F7619270E45426908D3A0D5CF9235240E41834C49B599A1930D3142C84EED", "12D6D8D7F99A3B7D0C4D8EF9EACD0CBFC5BFAF207DEEAB323ECC16AD5DD105C4", "12EFB707E056F27AA11980D2F9CC90B6739FAC22EC63709581DBBBA13033E1C9", "133379EBF1506E0E356F58A2F882A938C12C601959C068582635E9DC9E997C82", "1360BEF97E01B87A4E58CA581A1F32ECD385845F24783D4980B6E64F68F389FB", "1360ED7E00C9B650B6FB3893EE967BD541AA6CCC441052EB1ED29FD7673413C4", "1378324B26B4E7BDC93373980A4620FD738C8144E1187E83A11421110D2E9651", "13D304C5ACF220AC3F41E70458AC17D55F8A27FD84BAED8B1D9A1C34BD9DCBAC", "1409CD05A45669BF88F7CEAB610D65B1F84FD0522659550C3AD802B5214CCF7A", "14108283F9157C4F2A38313CFBD3F47CFDC207CBE84809E04B7E197DA546B8D3", "142B1BA6B62A94740D651FE3E4D0F0F6D477022D6F17F392FBFC30D1D4D904E2", "147BF90F853EF0170D8C4ECBBC4703F10E9521CD033D937B4A5ECB9A47FEA3BD", "1481DAF4C699DC048E77546A032C22E8B4F22C9CD2DD05E5F3423E026EF90E95", "14849B70FB8D1FD1B1485C3A35CC1AC4707F86D18C75B440EBA32375A28C39FA", "14A3992D6AEAB49B53E2E2EC2A0DB3A1D7491212EF4BFF3A48607684815FD89F", "14D5845326705FBAAD23A23263B727D1734C312F54ACC3B31B0CD4B44040B7F7", "1537402AEBCA58A04823B2BD9283E713BDBDA32FC5EB538F962BEC65B5EA0627", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "157046E0EEB3720EFC5656B898B001D97706CE8C9B45C0609067A6EF62853A30", "1581A32F1B584B51FF02BECA01D9BDEF635D6686BA710EA3BB5BFE756956948A", "1657BF6406E7BEEC2F294F65B40F7FF5A51DF9737173E7634E109E2031E0AE1E", "16736BDC76D22C21547E48EFB8CDDC62FDD5AB41955327A05DD047CB18A3DEDC", "167951D4CB6682B161C7C63B81A840E45EF18CAE83E9A3ED32C423308A35D68F", "168A8FB4B77E0D72FB2C81FB2A52C7E161409377AAA2A6195B1BB5D9683693CA", "16BD53FF8D4AF4008A6B9480C8D62C5AECEF46E4F486EC150D2D9BBC2C7349FC", "17004B2BEE599051CEB1168F5AAD7C62C20F2FB68C2E07E3469E201636C01C96", "17179127276D2C8BCC739D66B23A070D5DCF232A120A9E4EF31DA0C49E8077B9", "177FC3D2C27E098B63D88E6DE8DFBAF174F78910392D5DC199FFD090E0F5CDC5", "178747CFB8042E516CF1AB34F6D530ACE1CD919FFD0DA372792B07A5E23A36DD", "17D62DC0F30A960DF01D26D277DC85881571449133E027068700A2AE91F203A5", "17D807157AE85FF3E12475E26C42C266072688E69F2D7B363DFB2920E4737A6A", "18093683E84B728958E0F281A825617C8CB9BDD8849E82D9F8BE38883660CB4C", "18114071C39219F80111C17DB1672BE5A7A36C17C47E86ED7161AB53EE3A2916", "1827A1B8985F4A2B91EE262D4C17EF01B71CFEA86DB0A386BD1C1B098E2F4B69", "182ABCECEC608BADE96BCE85E39885F9C426570CF16077D455A1277D9CC3649A", "1841E92577ACD6AADDBB49C1995A398D151CBC9679F1BA2B9C77425F2E40A55C", "185BBC212EB199C45233D6B9DC3039EA09F782A9A618E54D0204B7259290E45D", "186B70A46AA8E0019EA1FA3AD7C84BE2123190D3E9ECBD8080B8E32748EE5D8E", "18969A045543BBF5D0F3EDF29D8D6E0C52DD2741A006A58FFCC5CA0831DFC315", "18A47CF24DAFF468D1B3E48E56A7C723BAAB5077F0C1ED2DC22653DD05320A38", "19063608A127602C0D17DA38222B195DE08E5600CC0FA38235ABBF40D8FC7F9F", "195918D2F5091119FF3B0CC5A9585BC7AC11F2FEC79E28813AEF279874757FC8", "1999DB7DA98AE073A34DD83F5547894F0F8C1DC9FB860A963E2002A469B5FC74", "19C4C882864E6146FC051FFD0D6639DA7D33478F602126A11F952529D4692F5D", "19E39A755865FEB54142F6B8F38AFB6BC8A149FB5D8FB18F5A3FEC41C127B75E", "19E6F6BF59A10C956F5C8D810D4B516674147E88F5FC3EC5B22031456700CB08", "19FC2C39014EED648C0A6D9F7F9D260C28D73DE658FD34F4EEC23ABD59034BC8", "1A058CDBF068B93BE796D90012FA3CBC288A7ABC6E0BDCF3CF31BDE0C188694F", "1A226F41CCEE49F182D2CE6E2913B939C921267EC05F27A8773B9DAF87654A6F", "1A7E30D90F7CA1CCD8FA511DAF5DAF7164060364FD5BC0A067341EC18387D005", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1A98F50E1E735698FFAC4C9A1C23F5B7F50E375BE7EE85508BB03FE656980855", "1AEC66B946906A8F4682C35B7C619499014756DEA99B2673B7DD17DB8DFF256D", "1B0ED4A3526A4957AFA5966EC1D954AC93826AA8F95F1EF2E8A3A6657E73F691", "1B99BE15EF0865EC7D6CAAD98E1510DF110D3FC32411F14658640A57804FCBB5", "1BD589A2EFA871129365AA28211FAACF45DF2612E504EA283F22F4A22491789B", "1BD9E77317AA34F53E8E7F76D5E406CB1F9735EA495D3E32C3558519A1F21922", "1C1678518312F18585D48228E2C4D89CBF458CAF1277708839EA38E32D0F11E3", "1C64C60FF7E1CBFCD884E71E282165D5AEB9D101B67656191098837D1F4D170F", "1C79629B0EA849594AAB96F4B2BD5BDBEFE873FB9963CC88E55D7E138431F67B", "1CBB3850C5774C7EF01617A98C0603053597EB9E84A0DF64C201094FAB392754", "1CD24D9BB6CC6131994412DB4971F1CBCAE6B1BCF0242694237661B1E8308C5A", "1CEBE5719DDCDEE0CE5C8E7073130153D5805F73149CCAC28EE85FCF1AE8E2C8", "1D0962C2DB9E45A67BD8161410DDF953960E39C9E80BC2FCF317962372317FA7", "1D375703477B8434B33880D4C2BC54C4F52207A530C550AD113F53DC33F805E9", "1D58139EE8E4B7EBF966E04A3481F7E3158581B7050B64797149C45F8E953D84", "1DA3D6D706ECAAEAD6DA37D47F841CF74690B2BC39CF2D0F990E5E369E062074", "1DC1593D1836D1525D6F440ACE74DA3A15D40CF4DB29276718503CD58BB74D54", "1E1D5459FA30D3861530E28D1E1AC437754A27CFED729D3827A64AC283710736", "1E236D9F26350B681A529BCA89C1DD7A00E417E70E5D0AE5428703E999445FCD", "1E239D8C4813C8FA705CBB86F01F323B29B73D1086FDF65021C9CB4B0146A272", "1E3D2EA1F1DC4C649D606C67B0E6A75D48A875A0956C0348E361CA3B2CB89899", "1E8EB664DDC627C3309FB200921E9D61D835AF04A5F675805F93C64918337FD4", "1EB9F8573A9E928E14652E6C4EA6633663E35B33C744263304C0A5C14EC87569", "1EBB97317E1D1951C7DD5EF5D9163FCBCED2812B16998C3A05B362263E23E420", "1F707BCFF7B87B9F76A41F8C24CF01CE9AF5A20146DFADFAD12F1F209431504F", "1F74C18809B4642477D9BFB857B02CDCE5F1FD17731A7F1BB3FE3345BB84EBC5", "1FEF4B25F870CF814735A38118457F007D958810ADCF7C8C553468619FF1337F", "20372756D0D4D41E4530AE121905256C2AF155E987D21A7B2CC7D85274A6AE1D", "204ADCCC258487D6D5F8C848C95DAB38413055F4AFD05DFCF56FD7435CBF7C69", "205D8E291F00D69928AE2777BC3A52CC5094D59B30AB5BF479F77703C17C0EBE", "2085C8FDF3BE35D33F48C6CDA6219B6289C941C1BED2B6E4F7DA6ACFBF476EC6", "208A6D915E59D5D8B25DCBC2C18DE5A71EEAE9DF71151D92114CA3D94AAE362C", "209DDCAB6F475A868DA84DD19D31132027FF62B259B6541CA0C9859AD7CF6ED3", "20A54B74208181C902EAC3D4B247A0279E152B4350C6DCE63F0CFB3E857F9575", "210BE5BCF995033D93AD152A3413E946C87FA9E242CD051D6228488AC0FD790C", "210E846B804F49660D8B31302CE4B40ED51AFCA74132908CA88497EFC59F683D", "2111955F2AA016CDE9E98C0F42BF600D3DD2BEA5694E99735DD169E4E8ADD920", "217BB6C17A6FD504F278CE0259F71540873D9ACBEC02EC2F580CED3F0A79FB4A", "21F9791E24CDB0086C2569FA0A63417AD5C9A6CA13D33D246ED6E10B78FE7DC5", "22244F29B6D6A86B5E0E250329E323E3A9106F6468C2C42364FB6E572C51A458", "2250BDD62582CBC2AEE58E4DEB24B0A2987C0E5702CBAE4C4DE33412D61DB60A", "2259FC019879056C784A9706984925EAF8C4DCD6C77F153D449075FA3A5A1E25", "226444D26451741A120880149A9CA946711043C9063C8B5E2B0A7FB4B06432D9", "226FFFCDF94FA8471AA279C7EA3B887FAA510E3463B5ABDBC303B7D6583EE6BE", "229F5B8DEEBC7E6B8123115484A337EC73726CF3AD90C1680ADD1973F6D8B9AB", "22A3084E2002F23895BAE53AE66469749F21716FF3B8CF15A58E6BBC0C953322", "22F3632F9800C8C7D12EDA0C85AC627F2AABCAA068D310065EEF12F9F4A345C4", "22FE69B31A10A2D1A4C8753B638EBDDDA55E81977EC4563B990767DDEB64861F", "2317B63F9B053CE76F1D936DB5288531851264E0A0B7CBCF7C27C90D007568F4", "23258712AF0C6FF3D199FB0C84691351D550E3A4E86DEF3F1A107BF53AC16647", "2375B096FBEE7CCFA7E679D0B0BE297ACDD7F28CA997EE8D8B387DE01C6989F2", "23980F37EDFBF5DFA892E9152EBD5E349FBE79FB2A858C312C9DC9251022F872", "23AB1359D15EC31DAFC79976B5B3C7BFD81BAADFED3A90DBE20CA2C4142B9E15", "2404E42A6AEF9D8505CDF5F29071088D46DB039426A35293F5767A7820D62316", "24164D63138835E26730B5EFF1F67A08E2F3A742BD391B31B667B1309546FC6C", "24788EE0E98DD110216E44ED965A5D9F543670037D32B049BA08AB2FCE99954B", "2494FA18EBA69E49E0C9B21340A86FBCE7BF93F9CB851C89E87B389A942B8EB4", "24998913BBA24560DF90F23DACB1EE1AF91DAA3212C9A03EEBBD3A5EFE2155E0", "24B1AE073C3E8B032429754E1E35B7D96539587DDA275F7A13183F44D07B88D2", "24D080F145E24AB6D38669372587B6847DE04AD7178607EA587E3A4CDF27A289", "24D6B6BF7C1929D18570FC4893B61C1863403B6466BEC3BA72BBB217CAF54A1E", "24F8EA7EB04EFC7BD25A64FD77684DB61778B7EC6FF4B522D3D85CC6C84A7071", "25397404A49A13F607BAB2C3AB213E098E878D383B3AD1E6FA8C841C89EA04A7", "254982B133AF87964C8EDFD23D188B5AC76FD0D3823194E367660BA1FDE55EFC", "254D1A9833B5A712D167DA421085DA46FD1673E87E814D7DBF09A4A94EF99EFE", "256D7977365CD514F903FC0D0240FD89D47444B078D35EB3DA4DD54AAC8C8661", "2577C6B2C3CA14375F88C090A6131204B50E6A837557E782C8F0899ADE13E13E", "25DE8BF64C58EFD9DD2C92C9D544C32FD6567CEC26CF6C9D70956F831B66255A", "25E389B8AC7393F53CD395DAA8343A4DAFD32AA0F027FAB25DDFA3D7B55FDFE6", "261D21204C9E2060DE70CAB5932236C5EFB2EE37E8BD5A2C64CC6F1DFE9C5D11", "263C5D7B9C563798EF6F16FB48B508474CF7C5D6DC733506446F9C3E6FC9103A", "2641B803CC5B6F698F27A4349942ABEEE0A931F1864DAEF1CB72FDFD279085E2", "265D1B6C4A3FAAA6603A120CE1D705D05BDC2BDAD6FFBD61AC5A18B875B14E1F", "2684EC1A3FA7C8A3962B41FBE20CEBE6B7426C6FDB0A1DA590A8F561906C4F51", "26D0EEB4AE42158F08AD0ED3C642FAFF87E4BE43DB62DF2B476D5BB67415841F", "26DFDDEA8EB90F9881D2DF1DF2281A85874E3DEDC9CAEBB69B263FC6408C7D49", "276311EA26EA41FBAE81DFB3042788416A0F2799192780CD6BCD5F7081C47F5C", "277AB899B314D74186E754815AF566FB51BD4C4F002CE06840E502A7867F360E", "278B33580333ED28E55DD7063E392BB225BBFB1BB954C108D12E110FCDE077BE", "27B11849CE393237ADE7F7AFB1B4BECD78159FDF9951E5E30FB407F9DFA93273", "27BC70E2EA08EE1D00F1DC696806FF0E8D5E261D13D8DFE4629529B49DBE187D", "27D05CF3EFA4803263C8E1208A1231E86FFB57D4B4143C21D96897480161D556", "28096632A2EE8D76EE4412D2018C5560BA444C91C51C2E1E7B2E7415160C1581", "28932A2B46E12EA86EB64762E53A114C7EAE97254E4818FFBB7E3706DCBD4C0F", "28AF07FA415EFB4C0600E47198E77EFE267BF4907EB58703528CAAFC4FB07FDE", "28E0CA77F7A7668CB077A05B3BAA03D074FA5DBFEC4AC1F57240C382A289D07D", "28E1A34D8B7AACAE238760E03EC7DC2D0E6A35DCA936AE45B1D6CE580679D06C", "291E96DE0C078D60C883AD45A64007F1377458CD24943A8A17D903204D52EF0E", "292F5BAC93F853B8BBA2A930CAE27FA661DE46B781E89708C9F85D54E38DEFC3", "29816DC5DEAFD9DD7EEDE78288B861CE30DA2C416CAA710FF5725EDE67736A9B", "29881CAABE3871D33EBEDBE6887DB4A966C14780C9866438970F45CE0E08C5F0", "29A04E28DC01A835A2A8458E3625C31130AEA1B27B0498C7914E37FCE5F272AD", "29F555FE0C007641F374A2C889492591D81568655082EAB6C7D0BA3A429C7001", "29FE721AD7A4963438359EC095572AFEF72FE29D59BAFE257194EF35A48CEB4C", "29FEB4BC243AF3979A9988871B7F5C155C9D2A35DC7B74A7FF221E6D9E7BEA57", "2A1F60D6E016AD0691A7DA81AA442A40F8ACA37731E424EE3AA5A0D1DB7A4FD6", "2A203D8BF52DCAFF8B5E95996A1B55C43D9BF20BC5F58B0B4D388698819D6CF7", "2A7A7E36601C6E4D31E8BA0D7AAC60D5687103E89CE9D3C6A19F73E786347129", "2A83B3B6C8F86D2832BAF4B218796934EA8A574FC6B9DC5AF80AD714A86A00BE", "2AB31A2452F1029931921EB5550E825A48628AEC211877653233AD2750800450", "2AD0AE0323037B0B0C26CD8A979BC7FE985F13BC496190D41AB05E59E9CEECFA", "2AD1F86BAC93366F89BAA6BECFE551E5D80A650C29A4222CD9BF66F9689BF3F3", "2B3126C519F1EEBCFAF60B8A7984264B2BD18218B4503E0CC01FC68E3418641B", "2B4BFF0D4D521D5012752D32EC9AED8D7B42C9CCDA58A0989CACAC0FE91E3799", "2B7CAB672A3D14F28B37025DAF7AF7905FCAD232175EDD9CA63A7478D2B797C6", "2BB3C8004E1BE7B6685F06647AE6C9D2DDB7E23C1ADF387683986B3217D061F7", "2BD451F728498A459873394799F530D4D51F43311EBB3F67033751E1E24230B4", "2BD4C17835FEE75B5DD82D43E16DF6D6AFA1DE77CB24213DFD8CE6D73C92BEDD", "2BE1B762E9F077419A696E0C1B88E2D3F236BE3549BFC2182468480E071BF032", "2BF718F14FF19DE8D51FB2B6D6FB57B7CEDA39B7415BAE84A63B5263E7D5C5A4", "2CE77B4160EBFD2BED97809CE15EBFFD32F5E48045C65040BF0F1EDBB3388D3C", "2CEF62C50CDD94A991768F05F02F6E909CA28C3D65E1DDC9FE44EB80961223F7", "2D1C0AA1418FBF47302662148F950E7C026FF064EF3B9F6614CBF0F8FA30BD0A", "2D1E0AF86890024DCD58C335D3F87CC6F19FEB1FAF93A7135042D81C1A434957", "2D313E61C8DDD54F55567321F7E7638E346F11C56DF4960FF32482A9F20F2D09", "2D3DC06839E79212C6976A32C9AF0E9350A0C2F6825BC56588D87941F357C252", "2D4A629BF42D9385520135B854D485D8005CDA4EA1988E548243E0BD1C05E639", "2E3576FC9DB523E4FB2CBA935633AE28BB3DCBE18A90FB77A0F3E1112A899144", "2E3F141A4B294D03EC4CB1F469D59BE509E7140ACF227A84270A99AD5764AD59", "2E4AE144A0CE46F0B21DDCD0E57D2F32B9242E6EA360EE8F749F9D2219693213", "2E58B569B4DB4763709C8CD7E2753A53378BB27D938664EE87B306305B546DAA", "2ECE3B786054F61CA595AAF0F84D1E826CED90F49FBAEFF05CE55C1F8F413D29", "2EF9066BA5F11D9986048F871CB871CE5CBCDF5603AD3266C94B320BA0759BAD", "2F2115F5724B651AC6B9F0B28265F93BC7C9AB2AC6ADC0181AFF86004B79A417", "2F4BAE09DDC968B54378720622CC42A34228109494DD0EADFC1A7F899DBA0F6A", "2F6D6F1C528741F14485F042B34A95DE694B60A3181908A18D87FD341EB6EA6C", "2F810DF5129E61B7AECC07F3698A4E88FEDD4A1E7CA3A999FA93E04C4733C72C", "2FB703AAD3FC5C2BE7EED7EC7E69FEBE209E6C70177FEA76C552605DF83D85ED", "2FBA7B492A5C24BD9F6ACD9877C59684BF6AD527B8EC87BCDD8C0BB482DA8D16", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "303CC17CDB88F2B5C4A7C91575329C973AC7ABB20BE29027BAC6426E80C194F7", "30495EE9B3C48AB51AC589D2A5956D977474A3BCCB9A67B54801DEE7685C5573", "3092B1C0BAC8BA0F65979D37C5545C23B95C45DF35290A26827618ACF0E8B4E8", "30A0E9F889B3548B9BD0339A7DD9F4F3D51821FE906234D247C17BB05B831873", "30DC450AABD11109A70A2AFC8BA5DC8E8DEFDC385B32C17C4EE2BE3BF55721AB", "30E9FB4250193CA2C5AB02F5095C96F34F2044E06280324E18E38EEFD7C1490E", "30F8418FBF2DA3BFE0D1F690EB572F50DEEF0CF24562EA042776CB5E92074F83", "3155E4C578E235596C383461692E605196F27EF7EBE1510C68AECA994099E83C", "3182625767F77414E4F551A3C35D21062B444542453E79F9D8C2AE1D16DA1DD8", "3191525DB6432D2C37BA8DE4D02917E706B2F101B27CE20750119C3AA79176A8", "31988A64B432846FAECF3D2D44F21A7A70DDA856ADC1A02810560151B1C9396E", "3198DEC4E9D947362AF3768731656BD9FBF79E754C34F560CE23FD3D14F37BC8", "31B1064DCFEBEFEAF97006340D2D1FE860DC4B79040635ADA444CFFBCDBEA67B", "31D774CF733E3311087AF9DBF776C5768E99CD088E058FFAFD8CB6ADDEE91194", "31F68B7BB58984A435894E3513751A284D142799EBE999CBA3ECA2FAA67E6C16", "32899B6047FBFF28B427CE61C2D6723F075F80767724F31E8E7087630D7F7EDA", "32A552C9D601D5556D9E77A4710C33359E9E59554828DF5DF32E88FA7D8B12FD", "32A60A9C1BA6A62100EB71CDFA36BDD4A97E492CAF4EC2F477EF0C0B4B0BBA9B", "32B20434710D4CE2D9F48A3DF5BB5D8CEAA637E619A2F59A623867C3064BC74E", "330AEC48CC3C4D6D0571BCFF4F46F80B8B8300E288E40954485D292947FD965D", "3321BE5F35DE64654BDC1D5E9969E4021A6DF87C4FFFBE9992DB789C33FDE231", "333C119D3A0437BF92826DA551039CEEC4C96ACBE2B033BC949AB1809D25154B", "3377752E14891E5A442DF0DA38E0021D9F4E99031F28898352E2D80466B51A2F", "33B4112FD28368E6028E9CA4E2A1EAAE53DC2967388F1AF51A1AD75861041785", "33D4121C24315EBC2149A61597C95EC5AA26609607D06600AA66FC2197320064", "33D52690CF67BEDA26DA787A9BA95FECB14C1C5CDD50D95C3B9E4E228EA253F8", "343B482806A4CB17CBA03E354F08EE8E4C18A41A9FAC2667001ED32A7345597B", "34554239639E7BE30D7E2FF3E60FCF35C97429B34CA07D7E3B7EDA735A843CF5", "345E18824B2D52AC690EC1671AC686DBE3FAFA93EBB7C3F153996741410FF314", "3488E915423ECEBD3018203FEB042F8318BC4BC8817DD4B6762443657F27D739", "349283D3DCAD691B0E28663BEF96B07FFAB52B7CFD0110A242C55C9A9630A07C", "349AB443AFC0F9A0DCBBC79503DAD80FA9D227155C9781FACDB7620738CF7EA8", "34C62F8C9BA8A3F48C2C371F5DC178D685A81D56716C94C7C68D95273F0299F6", "34E92615DEA7EEB534443A478FE7324FF1E532020BDA914F779701A3E0067CAB", "354F2A6471BEE4CED51706BB642672B83ADCF320EE2401C7C84197080BA6099F", "354F5CCF9C02C32A81D20FAC6EAAF1D180FEADECB61A006AADC88A2E3A104D8F", "35774A12657731256610BEB1ACB2AE99C105060354AA560F82DED28AE65A8B24", "359D81A32B636B6B41B26FA1EB195DCDD898364CBE4C284C377BC53F3B665B24", "35CAC5896337E626E05E1CD02F2076F56C9DB49D964D1F9CBB92AD13760F199B", "35D1658B50B1DF871973AE8A02D1A74521DE0D267F62FA250BF5C8484CE8E442", "36006A3CBC2B6ED4FC8763C3659F749848C9FDC3A7A23F5C510E43FC3EADFED4", "364F8FB9BA353F400B4546D33999F70FA4F7E3F35D42B5932DC73C08163112D3", "3669E45D7FE2AA83192FF44FAA60FB349B5D39469F2B30F7D69463B2868B4908", "36720FFDEFBA88D8CF256C1B4D4ECB09B8381E40C351896B61FBE58DBFB48197", "36C75FADF4BB755DEB760E756FA4AD6017C66236541D08AD4625CA9293F1517B", "370CF55655D0DCE5B827E549AA74D877B1D4BA2D531AAEFFDF0A6CA27218326F", "3751D59918B26EEDBAC0FEE1886D1A118A9D2105E993222B09C299A55F5D8424", "375A8173C92CAA0D545A6D77854E2CCCF69D43D0B43E721AC9ED5859FB92084F", "375F993925076109F4ED4A2246256503830844B0B6CD8891257D937104088390", "376BF79A42FDC2B79EA0ACE3299D7D2BC084C5F6732575256A96FE46F43D836F", "37B1C13D57560AD2D5EFC78D9765E406257D9DEC561AC751A89056CBB0B78CDF", "37C10C2D0E7D2BFB4BB1A32B884A646EE86AC573C6ABC320C9FB60A8F1A3ECB6", "37DEA24D462A4FBAFF5F635701ADD4D7975920B040324F41A7D2C11D55FA659E", "37E104987DDBCB98288C981D0121D7E0E9C8345C5AF2BCE774DAAE155427E747", "37EB0FBFC18EAA8CBA405BA4A0486007287891F661D591E70F8DFD893065763F", "38230E519D378DE2DC75E630BBE3083E23728897D6DA217E2FF09CC4976D9E4A", "382BA49B00CFBFCD3523D31968C57DB65C23CA38C3F8BBEB694B1F37AE70DAA1", "38673841651CC84F9C5F463EBAA4FCB1CD8DB260C4DB4DE5C5EB13515B8DE043", "386787210638336CC8A4D4477798C39C1093AF9F1749D0FFC4352CD55B67EECC", "389FF3B6A2E82A9E25B25BDC36D35080ACFCADCB6E9C2CBC82F68681AF48BCA2", "38E9D19E599F3030C0CD46433651CF865C4B527111ACFEC3878040F5AD7B1AA0", "38FAB199DF9F4E39A65615F1E108853EF74C41252303325B3AE91FF543CD105A", "390281289B3F4343A1E1F6452AD13173E9D0CC35AEA58C89794C77A0CF60DD5B", "390ADE3893D47B00F5FE2567013BE4A37123E2B659BE5E1598AD7EA5696741E2", "39104B54F5C4237FB05664C0CDAA7B85966DC25744CB7F77796A970C5B19D7A7", "391497C0561245DDD642355186334454720532967F235718B715C33BDAC8C78A", "3927523B342B9F3D286D7EEC26CD5ACC39CC64B05C6D4250D8027DCBFB907830", "39C214FD5E5504CD5F6F1D889575FBD4E81A443FEF59E6207CD831893A63CFFE", "39C354245E58DEA5508935346917841B7B505E810D13B316B0E6615AD25C04D2", "39D96B14EB572D15D163E89AF8FFEB5DBC072EF6E833A83F8DA3B89A5DBB7F82", "39D99E781AB24AE1D03E03AC8CAA35D38ED4984F636199FBE2A8C528D9A1BF44", "3A0AF20F09C0B2979253C90E84B995F8CD1F83152C1ABF4731B75885693E258C", "3A2C45FC089B97738B4142A731D273066B0798A0C173D7D7F17A05990695F735", "3A9B55763C1C0473228A4D4C82FC501C0EAAF3C51E020F75A80CE6CD65CC662F", "3AAC421D0DF5831B3220FCCBA6EA78CC01A191BC68D1B4BF16F97C53C8358B64", "3AE8B7045D3F6049DF983F14126D0E4FAAF567E5AEA283E61BDCAB7EE7E255EF", "3B5CA39475D73EB1F673FE6D208449037B7B188E0C5761C0C18099C77DD55CC2", "3BA65632D2C38CB6B2155205BEF7E978F1A0061EDF59190756A9E0B8A31E73D6", "3BF2E5B5DC96CFF6560CACA72BDEFBC18C7F886DCC73DD4BC3A493BD7B4647F1", "3C1A78B2884463FDD0373C1C8B938DC6B62E78494896694E30B6E9004C4B927F", "3C5C2DC0C6FC28CCC7819C9A096664A68AA7EC71D69523DC99D44FC54A9CDBBE", "3C693BF47D2367F3C1CF6B98F168404F18252E17EC96EACA6324028EDD5B52B5", "3C757E6C207C325B90893148C70649850957A2F8AB27DE4E6D68D3EA4F71D013", "3C97F4FCDC49A94A4DB2B097951AF0FB96BAC70BFAB9E075648D73A9D641F9EF", "3CB30C8574DE8D5F34355815FB0383BB232E9B8E00023D3BF864AF8BB39FC132", "3CBFD550ACC21F55BA277385D55E9A5728E39670190F73721EF53E5BD91FBBBF", "3D1271D447D8C9B8B4A09CE14FCB0D0A1C30B01772BE3C485E5303C63B850DA0", "3D44B41FEB67A37C1F1602DF3E14EAB1A680D6DE2E68AAD59DBA34352E7EEAF6", "3D6A53BF2F8D85AD3592C809BDA95728833F2DCDE74B841F4EBFB788E5542E3C", "3D80D3D5637052324AE469A23FF1235B9DCB271897EC1731A6209B86FD702442", "3D9460762BEB782D6B5E477D8ECA6BEEF59220ECB17AE91199910655895BA3EC", "3D9AAEB2ACB3350759E75E6E77EE66B3F76A15FD2917B88DF9C42E0A45117905", "3E3303B68AD69EEACF82ACAE7832B3EB80FCEFF6E312A77EB5DADFBEBDBE7282", "3E90D8B117724A689CF205EB148C972A5AC679705260655DC0A260183EE9C99E", "3EBB045E0C6CBB4DBD65314AE92231C7C08D4E6FF07827902487061E2F3B01BA", "3F14338CF5893CE4D24AD3EA652BF863BF887AD4702C8D62827FAF3B7BA35B48", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "3F66B118E3B6B7E1EBE2EC99A71451F7516A3E38666F1982D3A6D9CCCDD07FA2", "3F96A633CE7ED35C5DCB16407F6DA5B42A94D92B87D9F35134C90B90A6E664ED", "3FFCB8C857007F3C79B27E410D1A065BE955D22321B8DC1B4F06D58DF3CACFFC", "4011B6F36DEBD9C43CFA930BA646A07167A3C49E7B0C92A0732645741514CCE4", "401F21678376C80B276AF0614D770A3AD8E3D24723155CD0D9EBD1E19DB56B7D", "401FA1E96064CFBC19434D7F7032BC4432F48EDCF088C08E803109D2EEC9C2FC", "407328EFCB60260BBAE25BB1BD13B5839E71760477D3641EC86379112A1E7EE1", "40793F706E8E7D40E73D53F66523BA8AE8718C40C00FCEF117CE8DEAC4566FD6", "40AB54AD406F2338CEDC99E69986ECDC190917A9D711E806EACC78563FDDE00D", "40F7CBCFB58A3B19B3D79CA6DAD7B6DC2BDC641FF8B170D51B354FDEBE613E4B", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "414613E561E1B60E03F0924041A02D9673AB905D4B5056569779860DA34A6088", "416BC17BA6BA1684970041353DE39F726D0B612241FA52360B4BF1D64F76C607", "417B78DA055B353E1C4296014B7B196E84BCD416F841687102400D42FF10C754", "418A4C8D1E8F2E8A923DFE2C36570B4A5EF7B515E050C0F19513AF3DAE7D2628", "41A67BFA80F0E0DB568476BA44B0CDA69EE9A445B03D143D0BAA8F085154C987", "41A7E60233680CA9184B8E9D67180468646049DEF874B71844D07894BD303B67", "41BB6A57FAD3A6133AC798B9A434DFE0BA0E9AC64CD3258AAECCEAD5451AF287", "41CB9666A88AE67D4A0558674B8CFDA62F160B6DDCBA3C10576515447887CF12", "41E5114A4BDDC5721ED193477AF4D7766B975DA049CA337ACB35DD35514BD892", "42199350A15ECD574A4263D0A6005F41F9E7F2D6CBDAFC538A9528C9803327A0", "42A7699BD79726841BD735409219308CE1AD54C02D5D0B2A566D2F097029BF40", "42E2A358194D10969A587E1619263DAF26CB9ED7B107D2DF24882326792073A6", "433744F7B50577E4E46D54B9A405F6F7ED39A2F243030CE813BFEBBB813E34E4", "433DE0092D030E14A71A2FA1BA9CEFA42E20E0192C794E75B0C1FF4CE223EEE8", "437A657A3D847EE9A36A79BD9DC41D36B68EF34B9B112B35BD280CA5BB574D64", "437D7B7D5396727335BEAB09B5F82B3429C6A5BBB6878396ACA5D407743FF61B", "4392547B785774FE9AE5A632B4118A241B21ACF551AB83B4051CA1A5B728E58F", "4395DB4E66F99889DAFD2A4877F5DD63D932E1BAF718AD9DFD8050BE89AE7B39", "43D189034742AFDBA97C60C95ED92A12F537D1C8AAE14A136CC4A601508E6470", "441A6459C1CBE843EDD7F5C4D862AA7C6F90584EA901F82EF1B6D31B418078EB", "443E59BD3E379FB80131CF48832E591C736EC385E8608E398529BDD9BE2C95BA", "44AFDEAFD41860F69D32A81AF82FFCC07CB70BCD09283311989298641C60901F", "44CD3AEFDF5FFF68A09F6EBDA434179DD5E83DBFFEDD0F62CC5D5B1F7E9127F8", "44ECC6376BE6908ED72D0D1C4854E08448004B7DFFD837E0DA6D246EAB8D5151", "44F758CF50615D6423B5252CCDE483B13BFAA1C220750C2CA4ADC6F324F9C560", "4528C1A282A390ACA5FEC2B60AF3BC04387B861825F886E634BAEC0E8C529CC8", "45A5CEFDC4D7BAF7DD3A35BE14090A435BBD4BEEFCC6A8B34291DE21F9BE02CD", "45AB5E52C7049D43AF510E3D9B3484D6A8452798F85D470CA860CB100D7BE1ED", "45F290647D7A4EBF1F245A22873DA3258113639A5595D4F08D5206EB9D79EBCF", "4613F5FBE822E46EFBDE0BEFB9DFF932DFF57574FD8ADDAA8B5EB509A776A53B", "46408A14D896F2590474D3B129B44EA3EC035B71D283468445233579BDC6BEE8", "4683877528DBB6CD75D32A8E47D1D949FA795D85C79179DE4C33DCC5EA21D684", "46D17052F3251C0B3D153FDD5D0771739B636DF3179C7B0E07B10BDA68CED334", "46FAA835435B75C9ACF0355A61E51FB1D066AB3F9C5269FB30BFFF04C2C7D336", "472865983742C1C6173FE6ACE963E8C25C5E1115B0BD5C825677DB404B8DA847", "474B454CE14F48184FFFBE9836C638748240552C06E57398A3CEEBFD2B4CB966", "4777AA656AFE2A7E99CB0D93F8BE73D4229AC1A8C767E59363E711B828FD7059", "478179A4FF7D7F88209674CCCA14AA5E28599D1CB2F8DECF2A69F98F78B27118", "478D539053FCDD73C5A8373E16979758B81C985D8E7BF025D07D04F9628EF459", "4799E621AAC3B2F147ABA50C4B1BDDD086D1674BCB8D390C130E00A00C814DF6", "4831008AAD7ECEB15BCC2AF6CA0B235A90580284A36262D069AC3AB661CBEA80", "4836323F140F5C6D88883F2A098C5531EA1D0196B52BD5DA1D2D5BDAF8A68C4A", "488DB87E4D3C81B7E74DE606C38F39FCFF97474D4F2931354B52CC01006F867B", "4896EEF1CAFED615B0AF81AE94FC495A15A2C6E04EEB7706D39250D72F162E2D", "48FC2B265B2E403968C81F2B4EC8CC3724526A187D994466D35F64DB40DF5E55", "4952085F3BD03E7CC52280C0BE2E118F3008773DB8D56BED9FC98936BED85E5C", "4965914EA684669AE6CE95176E662D0E850C5F8E91EDF50BA5AB79DE717058B1", "49901ECEEAD43A7B78DB4958F32F55FA5CC90F26DA4A3A18C04B7A04C3B6FBA6", "49E9B57EAAE5DF04272F156A9A5D46D3528D39E3F7210693B629967CD349833A", "4AB0975E08BC56107FE408EAB5B5BE88E706B439236C7F566A37398C9C1E0CCB", "4AC4A277585C8E58ECFCFB5B1EA35BC1AC5F6C92ED5986E4069A360133F16A1A", "4AD144393663479BB64C875B7B04C97712BE791D19F2EDC082CA6236DF4F9F71", "4AE85817FDF881B1EF788F57A79BBF7A045D535013663BA8613CCB5B6F1B061B", "4AE8D4D4D79E1CF928CD25F3F52EA4E8DC5289208092E1D6F1000839FC68D950", "4AF3DEB82989B4E6746A3E3F13D975DBE8BF4FDB968286C60FFA2743AA829CC4", "4AF3F2925FA2FAC4247303F748E1EABFA2DFEF4045F7C3DA1E06B8C833F40639", "4B368485BFA6ADA7A8F198258CDD04752B4DE77DE562AA584131224F23C92F1E", "4B42017EB6796AC3B9DF4B9FF6A5EB17C9C8E6021968F72DF6D50BCB04F77325", "4B5F807E31A15D407C9BF25DF122E3434713ABE31B456A9F1B5453022433CDC2", "4B7C6723D18E0DFA9F2B469E2F6D9E9E97BAC6728DDB3BA15F40ACE66F684EF5", "4BEC8E9463E4B27C09D4E3ECF5C98A9E0D6D193C06E6EFC3DEDB9F41368D7DC0", "4BF7A5E750431865636D92E71393396C252B3F778FB89C0C3E599627DCB87306", "4C098F2F4DD25A03B6FD67587B106604BA4957943FBB7B66868AD8F6F9AEAA0C", "4C10A98BEE68D0B96F2823756EDF99AFABFD6558C7AACA794EB853BCFD69F5B6", "4C149E6F2A02DE48EF008D908A63161BF93C07DD6B16401AC765C3B64D274497", "4C79E288BC340613D1B1B84DD16C4C5D8F508A64A400E10BDCB88A06FA574EDF", "4CE1B2F6454C1BD94457E47D668B97B231076132166B23B18741F946099CC719", "4D266A154A3DA31DCA059F3C44F85045C1027D42EEAD68DA8098C2A3E0994AF2", "4D3E05EDA2524AFDAA13FDBA1258E5A134CE75E1F8655CACCFB3EBB02674AC66", "4D64B63A4F0E352D01AE83B8439314D9AB2CE9D2A7C6840F1B20FFB4E0BD61A3", "4D7D6CE6B9BA698BFB9B758C15E38ED5972AE720478AC2AAD2A202C6748BA969", "4DD54EB57E9DF205C5F9D3D60D4B8C1CC0F98C2122968EDA122349CD56107B7A", "4DD5D3CC0219293B9D9372E7F3521DE5C5C8537003D51999A85956C9A525CD8E", "4DFE5A6ED234327248E8451B57200F8C7A68429EC3CCCB0DFECC6728217B38C9", "4E6A04B12CD0B1B6DEFA7C6ABF7649A38727A95A07B1BD211B03B0BDF4022C04", "4E77D6807CCB5F39F0079A9612FD44F47C18AEBAF1D9AA7EBBCB816C3FD025B9", "4EFC83BBFE952B5A30622818E7241DB8A09B971E9B7ACADE5BA7D19EF0AEA021", "4F064831320AB374B0F04032973159DC46D8DA9E8046784C26688BD3BF94F17A", "4F29CA11215A2F90E9FDDE62F2C0660CD088F4BCEFA24FE3E6EBF3BF031566D7", "4F2CDD9267D1E81E3068DF3DD0F16BCA9F756FE7398D2AFA3835153DD0B27E76", "4F2F1CEC21593E14CFA5185766BAB1A3ACE3CE7606D9506EA35A0E0677085BC7", "4F441F1EC2D2D7EA1D9033E689E8C62FE264F17CF627C618EF574955EF8C49D0", "4F71F08A18DE979CBA9EF8A64B6D4189BACF7F0351098B7B44A9ADFE80516F8A", "4F83742D4D9E3F03A6481F27A21969D4333962D309ACFDC2D174BF09D63F0F8A", "4FD968142D565415C56FBFCE7828888BA009D4EA45B430D32ED1CED4313992C2", "5032F5D8F23CCDF7B1D1B61ECDBB7D86070F015EF979BF92355474F77B29D4C9", "5041F3D5141A619380512BA58DDE4E2250632BFCFF26D7B947F0A03A7FFC021B", "505713AF61FDF76F5D3E69B7F9CDB4CDA463F51989B5A6296EADEE1CFB8961D0", "506E8C92E0B76D834A33E4AE02E5206A0ABF28570630F6E4A780D13A5238D647", "50F054E398D9C2FEC6804DE8873031657002656851BE150871B2800BAA7C2644", "51036564FFC2834C5C0AEA3B9E457B929AAC861C25125D8BC0F6986E3A684E88", "511182968CEDB172B8730661A03A2F4C78BA383091EEAD7D8936E457AE6A6443", "516C78282E257BAD924E6FC3088367963BA15FCD8305B1B9C4978CA225F03D64", "5174A18600752EC5211DE3F84DEE9C3C36957FADB21A761C4CD96F5AD69154D9", "51CE44C1C7A51E763D9A0FB6E6C7DB8CC2B8221BC5B619DC1E6EA5956B868D7E", "51D76932A5074CEFE166544E71EEFE076AC2B628BC8BB22ADB147946546F595D", "5211C36AA0148B9ADF5D9940C02B22BA5A5A5905E1BCFFAF96AEE933332F0DC2", "52F1AA440EAF2E0C6FDFA61BD566BC1EDE644CA8D2298715354061284841EC5E", "5303EB56B374789D2F25DD42CDE200B10A36458869D3BC5FB7882728637FFBF5", "53225ED171748DA6921F770A3958A41B21BADCDE197EE42BAF16F914E9B4CE5D", "534BE42CCFEBF334619AFF9C2FB1955CE0C058A0559E49A3D0C26AB6F743C73E", "536C25C1EF194D407FC939B41616989F78C65BF969F3C6180D43BD166F97FB5E", "537163AF6A43E9635AC6244334A6987334AAAED355BDEC033C662E7748C0C124", "53728EF49CBD2D57C5A7DFD396D80D633E1B2698B544552FBD73673F671BDD9A", "5373C123BD5452F3F195025B11A997E533EBB69D09485702AD149909222F566C", "5386FE1271B599B35C07E4CE74602B34BFA6835496174DF0B19F0F6517DF425D", "53F32964A2275244A5F7A1D6BE61A50BA12236B3F5CF9F259D3080CEA722858F", "545AC965386CBD88C15F17713DFA5989FAD35C50D3ECB83F0F38BDF6E6AF857A", "54DEE5B28B70A72DBC151E487924F7E4B09D44EEE1A0EA43598D017249A25E66", "54E686FBB2E60A0BDEAB59EFECEB36D61C77A784661FD44124BD8864158EE317", "551EA8A24F834AC5B54D10C68A8308B7F65017542B991248D58588B2D9AB020B", "55283B08D88C232381BB1E9484F194601EF856C8DCA2C424DC5AB95FB216AC5F", "557FEAA9FD49A623B36AA794CBD78D1D6EA826F1C2AEA89A3A506E39C9747F0D", "55839214411417A2AFB018FDF4D19D29C2EC9218038EB311ABEF9AC0DC9B2637", "55B26E0461C3762CE34B9A024103EA4D7F7AB0CCFFF0990F7B7E24F913809384", "55BD84BAE8C7A14BA43B1D5F808B6528E4FBEF810015A85F798847837C477C2F", "55F965177D0FDBAFC93D2D5192178D55E13ED48EC0BAA93F60AB1C52EDA0DB76", "562B3296B65EEE48B89C52E45E3E44C3E4662D41EC24729D7F1F51C55A2ED718", "56556DC3F311515B25FF2D5351265C6E4E1386C59F4D8C0B1CE6331B086BCB46", "5662007982BBB6B88D91C6C7393CC2022D9415D2290FD0DA76D55E99204FFF35", "567625FF8DF333D5C563E40EDFFF9516FF13EA40EAFE9A2E68635850284A1A44", "568AA33A54F544C33B47E72CB2B8EC6F2AAD967505BB0CD7D062CB3E321408FF", "568E2B368CFD084DD70521225DC70F9B7FE2C3CFA4EC7D0BB5941865FBD96921", "56B633B0AF755EA9F1452A4939019292728AB0BA5A0FD834F10A76DCEA522091", "56CD6AE6D0DF3EA40055F52FCE3D2A173AAC3373E3B34A2E44FC4EEB4D56D289", "56D177DAE57235B901582E7A9C8B02337D37FFFB7BC7EEC5F14CBE0A9A1900F1", "56D5C4D9B33C1F45EC0E3A48B1E1AB84BC4291F8AFD78D9A30A0AC38C27FE216", "570AF6CDC4F7E864E6852EBD03923041C13A884B424AC254820AD0EEB73694DF", "573F294E16A1C9B7682B48604209232E9D20CDAD4F9D09F633AA855F804E24CD", "57440D2D38A4EFD867D94A37CA8A965863A9C6C7588E019523B9978B5913B21C", "574FC031AF9B64FDFC8B0BF65E22355456EDFA4CF1ECE74E592CA6972407F30F", "5753BCF8D3E58BA98B786E7D82A4D7028BD7EE3797E22ED22EFA0BEBCE54A125", "576451C691E99CBD657120E18B50F45E7636A2C94E1A56B9AAEF35853605DFD7", "57C8014122573615025590EC2ECB0090790833D51A381D781A55C4F43EDA278D", "57F982DDC8E03D61C084B264B2F96B821210E01A5741363B87BC4BC12601EF3E", "58C1DFD540547AB60466B1F4F820D3217038C6F41CEA4FCA665F19DF97CB0815", "5933EF8E3015054BC951DB682E9526300B741E8D2A0F7151692088DF8A1C8A68", "594454EFA3E9D7FC46D98FD80F976AEBA0747FB84090F8155C070264B55C92E8", "59908A18326C0B2735E4B8559B62E2A702B100E3976A18E7090E45555AAFA05D", "59E5991099B2A939DAA8152AFA3514EE5F1BC1E9CC1E0C8D98275C7C4A061174", "59E669B8BB67D676E7382F77EAD621E08DFCFBF626C52F337A77A33EF6F33748", "5A02E2AE9C78A273A23E84ACFAC20DD8FC038A5A63F8443CDFCBD49FB1F39FD4", "5A2425933E89E2C50FE1F3B1903983FFF1089EEE55483682712FA0DB9D6A700B", "5AB7C5317E6E4D84174BB8C187F10FDCA16906834043D64981ED07D790312C85", "5B334294B044C0ACACF432F81982EE7B36C316C5E4DACB843750BFD06F7F7764", "5B63337BED8D1831437D9E9CDA230341D96CD4E72BF44B64671DD96E2E83D164", "5B92E3CF623F85994FBB7DD1E70A16A9AB35B271844ECF2A1D403BFC34CC7BA5", "5B94B82BCC3B58026270D02D14DED2CA94DC002273698034F1BF4731A17FCD56", "5B9FE3466C6709549936B7AF9F0C0D4DCFCB7C692D0EEFEE7E0A64D8C6798193", "5BAEA8719A164C4764C5CF92756824F3925085DBA8F40E33625279389703186E", "5BB3B8EF53C6357C441C8592F64A284C30E9C1D6F5379087C40684A770A870AA", "5BE414B193D5007099D3374FA8DA8D1C67CE7C4D4ACDE8278A64CA69A7AA6961", "5BE52962678849208DBB78075A36D8D5B485DEC707628BB3A9D37D4AA01BC678", "5BF8A9DC926143E23508F6210FE0B532543FD24EDC5C7CD6C44B29877B6C8DDE", "5C55844CADEBECD837AA331F971C7E964338AFF22322C4EDA224B5C2642A1A70", "5C562A8B9EE6F8140582D44530977F0DEA3EFB52F7ACF87EFAA39CE6862AA47A", "5C7F4FA69211291876224CC5E5EF38063BA255404681592C01B44130CDCF968B", "5C84EE90836D63B05BD8D61CDE089A39BB0BF0FC1D82D10897E9D6EDC4884684", "5CF5E501F33F27E00550D56AF2E8B4DD49ABBF9F37122E58BF4BBEBB4CE88ECC", "5CFA2CCBFE05295C7186239383AF12E6EC68C33A3ED0A1976150849CCB589A37", "5CFEB53CCF9B2DBB0C3EDFEC78B2EC1A09942B6E59FF485336E1578CE071254C", "5D661EA5B801079F3B7AF6D31A8566154E3150C1E3398EC1CFA32E9398BF38D3", "5D7B9C32ADDEC5820C2B88A1E661434F8E24A1888CE3125477B6824FF3D8DA5B", "5D920E9D5E204CFD2E98E2C7018611E5EB64DCF6A6E438058868CC33565AFED5", "5D979AFFDF974F2910D0CF8FD15D323A264B0745C0ACF5B78092630C5EB271CE", "5E20752A27AB58A1F4D84B7E14AE23C5DC19B3C161E9CA4ED5DA50124F63AEC0", "5E515191EECA02B1DF418694EBE346A88E886182E3BF92879657EDDCAF8C3BCD", "5E68991E1F6ED5D0C2EC92BCBB5F6ECBBC7D64A31D290F284E68A449C797E09D", "5EA911A52931619D9DAB8C1664C2291A4B990D6687B3AD2CCCDF6E3868563D11", "5EB2EF02E634D1E359DD6A4601AEC530DE4DEB31B9F3BBEF88114B9BCCFA1DAC", "5EB805FBA32A419246DDD86FFCA6C34246C092FCBCD8608B3ABC4B0A77FFDAA2", "5EBDDE4F23BDE648A3D8ACD5EF59DF70B5EA28E4307897A3AD81A01D099D7AEA", "5ED570DDC2DC18EDBE3A6F896450F75892C392B6E12D967BD6C8F6E5EB0809E5", "5F1A8E5DEF8C5B0BD8A337785BC9EC92521E4E1FC191BC80CFB2E92B4BEB7686", "5F3C4B37776986C5B6E57B0D357C4691B07BBE4E0615968E249EC3225A3DAC12", "5F4A0C2884928132058FB1F6A2A491E93E6AD59F7652C09398215C3B1702DA1D", "5F63ABEFB797143F56BA76FEE84E3501E931CCBDCCE79A4A8D534956DD75AF3B", "600CAD8E5BC0BC9CE4A6825FFDFF753A26F12819987DF1A297DDDC54B132D993", "604DC0ECFCEBDB8618D623C67ED5D879296265C2CF589AC1F94F6883D4020955", "609EFFAACF6D4D4E3F051F3F223C8D65A6BA5C62F2A8CD13C34E4E67C76EDF93", "60DB7F5346C5B9A16FA72AD40E93F7504EC85787EA9E05A8A2B66219C25CEE88", "612826ACDC4F1AE43E7EEC7503FA074199FC7FCAEF6D2B8B9FA97C838F00F305", "6137CA688C891413F0689149C983EA31FBA87F4C104EEF74658D6F747C2CE707", "61576C38D67F4C2AE3402398226DBE2A75A936DBD3C76DE52E71371EE31E9787", "6195FD892AA154A172FA62D1C3179F1BED3A69333139BC056B6242D7A468E832", "61B4E445A0F5A78F102006270381D716303602D81DEE17CDF7FBA3BB9F7660E8", "61E997F047F5D718D130F0304D30D3107153F1FBC61B69ABA3AB266E23714E8D", "61FF6F10F0D76277F85A8A525D2C9989283AB04F3D830BEC0894CE78DF0624A3", "624EC50571DDA528048438572DF31F565C12E5D78AC4A7054EB0C733BB3DA3C4", "626E04CCE194B5D09C44B27ED4D75809B63FC59C477B6BCF9DEF9C1044778E93", "6276DBA59ED42176EC7E2927F0A75BDBAC09FF340317BE665F741C4CDC851A7B", "62E1DAE28BF4327B66827B9B702999E9AFB8ED9D12B76498EF4B37DEDA821D20", "62F7E670E9937CF08834AF99C4FE4811047CFEFA67F43D6318EF50DE27C3A8A8", "6315BCD34C8C355838C0212224247FC63820216EAC8A4B53DCAED96087DE7EE9", "63491DD97F4B72DF4482AA5603DAEAA0D11ECBD12741689992C14929BBC91CB7", "635E714DA56A0FFA8A22BFDD7DFA750905703B4E553FE2435190846F7AB29ABA", "63617DA52BC3DA586C5288D29FCD365559DCCA7090AEDC93D422E80323F4ABEE", "6386F8948DEE250045178259A022D70BD9E8E6003BDBD116F95FAADC25DB23C2", "638BC9B9F1B860264859BBA0AE04F262C584B383B8D229DBFD85404C0046EBA0", "63B793AD243CE7D3FAC3AEA2C5D79ED72692B006368575857D5B461836610456", "63BFB44F5176AE9CA2A42C60349986E2E0DE79C4290BC4C19CB8C0D33F79EF3F", "63C0560C61FE9A9777F6402C4988E794A31F66C8118AFA944D2596065F5D0454", "63C8B1DC63A3A0D366B1AA0E3DB24BD123F14B4EB29B74139B4FE1590E5E48A3", "643467CC62A4AA0827E72D95EDF8439DE29D565BBC4287107E15278272180D23", "6473C7788923283F01B09B56E980E6BA387FEBB5AD805CB7A0466F8AB7CF3F52", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "64F46116161B7EA4A9E777A8E2BD1859E5EF47F726AA460A54D05FEA170579E5", "651FC6C43CFDB4526EFE8A1D3CEE61C57B4A3336B9A1E33A1FC8E787A7B5B69A", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "65575758CE6E879BDCFD17ADB708B2448CDF9C00E078AEFB1967358BF519C078", "656937FA945DE5E58B9B5C0431A830AA521D479596EA01ACED0A20A166C4E3B3", "656B7B6A212C96902F7D8B743A5E824353F6D2B81D84F05905CE35269CB6FD8F", "65A4508C1DA395549FBC79488B5AB49FD1318D5EA8060FECE10A480701CC6CD1", "65A8186C2C8977929AF35D5602314B8018A488990BBF80CB537C3CBEB0B7BEC3", "65BD85EEA82480E1B72752A89B63F7195DADE7DA278B8231BA598F7B6F47D289", "65E58FE78D9BC9B49C29104372B428872244DF2679E9C387DEFEB8C9273577C3", "65EC64A753CE4A7F6C9FBB3047D29A2833F1E56F4AB452D779D8436BA19B01F0", "65FD8B34226EC777D11D14977EFD4CBA1E4D8568AB599BC0C0CEE63C0E4684D4", "661E58A060EF9C8F748FA7ED6419C170D5C3494BB737AE7F8E89C2FAA010E787", "661EF6C7BBF8AD251228707DD8EDA4B08D9235BFBAA6C9BCAC49A5F4CECDE3DD", "662D2612392C122C804D26AEC201E3811C98DB9211142384D96CC125BAB4048F", "6631C04F89A8D2ED4BC1256E62C3AB820EB5DE675CE6766AA9AFAB238EA92F40", "6633AEA14C5B5430B41209886E7739DD57F4002A86E88200DD915838C1355A84", "6647C84D569E525A3BE5A01C7CF900C4F97D7F8CB890FF615902B7E8292680DA", "6655F0CA454D34B530E468D672328E7DE915E373D5DF7A2E41376F7E2B588F5F", "666E4FBDA68F1376E7E84944B116ED00320BF80162EF68755AD1CD31AE358231", "66886B86D22AD162D05F9B987C32085ED4A1AA2754E87D356E718DE087B7313A", "66F47B429A445B2847BDA40A4CF2E251248DFE5BD4B9282C03A9E125C08ABD2A", "67101C01C0A86209D9921850042EAF57B3DF03011AF513E21EC5D8AC221178BB", "6741052F2A7BCCF76F84825C9FE706D98BCF279A0C055A783796DC802C323E13", "674DDEB58033DAB9D03ED4483C0C1118FD09DBE69E73AD0AAC428EBFC61E2474", "677B50D118494C17178E83DB6E0C50351EE6636792748E40043E3B9FBFAD274E", "67888E8EA83126B823C64DF445FE590186D22B46F294306313C37B870873F831", "67A6DAD4F7DB5EFA4D058E5FA0886E6D1185C31EE7AFA1B194E5CA4D0F4A3F5C", "67AFE8257A8F5CA32ADE6C83C3A2186FBD379BBBF1049A235EA4EE0C4D67742A", "681632DB937D8710D504BF7DCA3C2076B9C8ED4D143CFC32EE98411B96F2B0DF", "6834E3905AADC819DB5BF4042B617F874AC24BCB0AC2F484A2275161173B7A89", "68365A7819A74536B5588A3E26D0CC2DF19BB6FCCDE541B4A01E76E4E619F115", "6840E382EE942A9397B675871CFE07C9D9D7C263A5C99161F984424E4BA0BB61", "68C9A924DE162BF93100DE379E651BE25F0603409D7A4401BB7E28C5F636BDB3", "68CBF727C8EF5456458B2504A21BC4A8C5D69369E847DE24B58B0481A4C43133", "68F0C3AC29EEC11A1B3683CC670DBB84880DD11F8968A7B69BF67C664E520FCE", "68F256DC5E144D5A2404101E56A66160645897F9BB7E8600047077C626B2FE43", "6922C90D32E66570378B8441C546DC68BBE0CFE06896E9F2C63163B94E9E2292", "693E0AD85F6E19F2CA7356E03CABE34515DA0B593F3C3F3144F6F403F3141066", "6949963E8F8CDBBF076CCA42C1B972D8C4F8D8949B9544DFC6B3726DC3985FF2", "697411C1D0B6EAAD03E8D2A5EB53C7D54B1A12C31BE0CB63F6EA92666FE7AECA", "69A39D35FF9374902BEB26D9183E47ADA8A9F6E73B9981D10DC5E13E014BE244", "69A7BBE7E184D381227C71421482BE6C273D970A393395AD8328BF4E6942595B", "69C147CB642B39AA3250947FC1868ED542CC9C2C3BED4BA821CAD9BA0F178E84", "69C4BA7EBA2FBED8F26777795FD33E6380CFCB2F86DF70D928F147B0F1622932", "69CEDB807D1C0D9F27AC657B4487708A70B9D8CCCC2110C93D716B74BE31E087", "6A211412F2D10EF21E599E5E233A8338C185096623353D79DC919935D1D1ED5B", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6A69ACF0EE1811481AE8E3F5E1758736876A6CCE84E1581A12FFCCD1B7CD4F30", "6A6E39DD491635EAA208C18F7248C78C78878F6B4E00DDE6172488639667CAB9", "6B07EC2CEE9D774C5DCEF9784F488AA719A2EB6E87BF1077C165272835083BE0", "6B0EA5EC8A444AC10EC1F200C7B61DAF5E4F6E89E5C2943D1BA5016D81598440", "6B49A184800A9CFA119ADEB7160989F175237F4BB8CB449625CCFAB345025D0B", "6B543690A90E292F8431281EAF7C8B61CA43BDF8462824FA9587CA14A4287518", "6B675D260AE7C5C141E994CA9DE786539B59D64EBCDAD302FE4E6B5F7BD18B3D", "6B6CE9F202E660300CE36E02212419B587FED63C787599626A5A346895CA72E3", "6B7E183EC35674B746DB7086B6A65F4C3CF3F256A6A5F607AE65074E1355241E", "6B9D154BCE10DADDC28B259A53CDE7ADF906DBCB05E8EF0696407EACF7A37CB7", "6BA70D78F086D07D5D04D35657C565B766597C9DE86C3B8D586D271713B4D89A", "6BA96613CB9284A12C5C7BA5B1AF346C52C407C3784639F8A63CA5F6E90563C2", "6BC9040B51F3B0282E132873A0D807E58D8450D20237A38329B62B37AB7F1BD6", "6BEA9F84DC62EEF2F81452A495EE058F7071A48DAFE4BA729BEFD2D5AB77F224", "6BFC2C71A9A22BAF8C951EE579AAF489494ECD085E0977EEDA196AB4922E464A", "6C6D0940826336DDE7832D99EA3E6BDC3CE6950B9638280B5C586B4770666429", "6C8567DF72CA8A25F4328377A9D305D3ACCAE181160B03E595CB767274D3C083", "6CAE2D44529EB3ACB88F1CD69BAC17D0CEAF1019A014DB789505665B46AF09B8", "6CF54383181D4A87B6BD3304D4AC07D210DBF7B9E7BA65808947733FCB7CB46A", "6D0C6316636CD5C1C20D3618A6FC50B6D5B50DF90FF9082E343717C1B250444F", "6D2D8D71D69D8461F2745DEFFD034354BC044D7FD0B5D5FBFE539BAF7E45610E", "6D306799B99F3589A7EC7C7F4974A3631F7D2EC4A6235A8EEBDBFC6E98A9F757", "6D4BC30FC7D54719CC8531DD40CAEF904411E8A769D791119C3658B78C353F56", "6D72F5E2F90CAC5A4D151DD3483103FAB60A4A6FCD9FF4EB47E5E45ACF7A4129", "6DF2E72D03F9AA8435A0A58D154D82EDF5203309F8C81C42E35CBC71D2A79BDD", "6DFE02E47206439339CF69003DED7C6A339BE8A9FDA6611EA300ACF64BDB9DD1", "6E40DDCBEC654A7829306510074B291211F91ADCC0F6835AB58383A7E7D77585", "6E896C3EA4E119BB94E79619FA7DDA4DD85C924131CFD25FA41D57AE7BF850C4", "6ED6AB071FF278905E27EAB23B71E701DE6BB6552A58CBDC6C3ACD27D51AB470", "6EE64696FDA9665AA0F54B4FB93057230ED3464327A74367561AE8FE0E2653CA", "6F20904FE511CD3681D86086F079C27E41F83597333D2800D08AEA4F1DB34CAE", "6F4E5F0514046C4DFF7589304AC388DE078407580FB80C083E9C6EEB1EF34EAA", "6F77F80EE3AB09F7D1E3FF7C55920CDAC0C2065B8D946835C616112F8BE43DEE", "6F94CB870CE7DC12A208FB074AC37486943B72F8EBC740A0D213FC32A09D224D", "6F9C6903CD7D8203D4E82C06723CA4FB1AB9B0D048230D4EE8B7B6CCAE5D8671", "6FBF074F8D8E8E6000FCF6488B84CA43AEFB7DEF10B2CEFF0E7D0AE1140ADA41", "6FFC375CD72AD31762891798EB1A8CCEC70A16B5DCADFD771BCA6788C83571A7", "700973DB1C0B5FBE751BA9F1B6AF32C7F25F98D790B93A9C9D2DE61EB734BD58", "7018EA10DE2465F2CED3EBD20C60B0C8CF98504CD285795F73CA24A2863F5465", "702EA7A7270B22201B759E4304BBA64A08CC2B2DB9B31A65BFE5F7B8EE68A000", "70427712BA5BC5CC0FCAD9F41BE90E49714240938954BF076BBFB058FA595319", "7052097C8A813B817BCF9C22A3D2A8E9BAAF400B05DB9E3D58C1734874D1A72D", "705D1AA8DC1EFC5A25852EAE8F70114AEDB618E07145B676E2B502DEDBEBA92D", "7061882A844BC1B159CD9483EEA32DBAF5175CB9800976F7DD1F381723E88538", "7070BA75AD9272268135D5A4C79AF1BE8BF2BD1AD2A057457ACAA7D349BC9AAB", "7074F9C58C33D10D30180CDD30AAD93111AB1A1454E19FE590792EA8F883680A", "70A9E006601471831C111535E5AEE0524C324100C2852ADCCA9ECFE67BDDCA0D", "7147B72B0537A00393FB808533C114E94C4EC044FE8F06504C604464F1FBA696", "71704339C499506FBD9AD5216F79BE8D641A0F781BEF936B7F7E67FCCE6E79FA", "71ACC821294C80E8F3B99B72E48078130FBD6C877B71E1CB158D6280A8292D99", "71AE0D5024D39B08B24A7182D24ED9015A9DA203851A438D5EF30F80E1A05C50", "71B2E5A93BAD65EDC8828AD648152A6133B0A6F1A9CD3EC0D973BAFD3EE16900", "71FF34DEA30E5EC74405EC816589CBAB2E2166AEE79DBC2DA5C40DAB9AD5D973", "724A5424620D59DD613442B81EA46C9D7AC2EF90FEA8E8B3577A6A5325EA50FA", "72597ACEC84876B6861E6981291A99E0C6273105D954512F7AF48D2CA0420BB6", "72AD5D71FF571D991FCA51BDAC7D0D303109A868FA89340C6F8CD492F9F038E3", "72BEF1DE6C096CA1A77CFEA8D1B834B5612F6412419E8D6725B5C7CB15CE9B1B", "72C30FE470EEA1CC04FBE49891995EAB1894E6F174D79130762FF51E702BB6FA", "72D56C2D6ECCCE5CAEC9556F2A00971AF70E7C4E03F9B43659290A9073E9234F", "735F09E8DCB7611158B10620052B6DC619504F6C2DD143C4F7A15667EBB2C996", "738000B8445D724BA90A3721AA90AF1E32A31E66429EC83FA370C038A4CDE8ED", "73991C0A000640EABCBA0EED7E80693D4FC67F702A5886CA7D7CD7015EA76A82", "73A0E3B8972417A5C5268EE0E3803B9B8C2E0463C9659C6C828573AC1D00D1AB", "73C56B324A2080FA9C0CB45D26C0A4523AA2C160E0E404D5B47EF65512D83AFF", "73CCC72B9947E013F4772BEFCFDE5819CCA7971C691FF4D3E69400404D464E2F", "73DEE30800CCC9325D5F1586487B2795A5B59E4F564CA3DF38C3A192975E9546", "73EAFB98AF656367DD4CBD6C4D9BDB98FBF39B358F625D93589F37D52771AA8D", "741153628EF3B0375D8A886633F5FA07668F8B150D8171925DAF2833530B50F3", "742165674E677DC9026C3F2D2245AFC118A59A752987D90E7AA7D17B911AC473", "745004E6A8DD36244AE3AE2E238FB3CA9F40B885C5F912CA9FBBD7A9FEE76248", "7463232BD9391B70113F6779133DEEDF82C2F9FB5E2F9C9C4D0363B332E72184", "7473C0056DBBEF7C541ECDFB31E947DC1520282F5E0172B7C965A9DECA661856", "74767FAF408C31EF10FD36E87F8FF06644380251DEDF0B8DF0EAD56F9291B3E7", "747C7023F8D283A88FE9778F37629C7BF2E2A7E5268A695905F9F28590BF76D3", "74D207E44BA8F3D0CDE259969FD5CF5C2AC88C0FB9B816B32E1F0AAA065DF0A9", "74F2A94336E51B0E3062906A1A2B7FB8CDE35DFD901789C840E3CE1DA62E9EF6", "7518149B47C708BC85C48E7DCC6C884A795B049BDA62763731929AE94A2D74B5", "751CB6A9BF687409CFB218778DB37C20DA4DA2EC6316F9E59110746F3B88B073", "75292E3923B26B0E2E5FF96584620DDCD8E3FA9B1B48381C5BCAA4B6590D82C7", "757696CF6B25D861147516A0233F27AA8ED63CE44EC3D079E6265FF809DBCB35", "75C113431E513074D4D209CC5AC455FE9F61680A636C3E65E4D9B0CCFE8418FE", "7620E02400EA7318200FB3A200B9985CC4DC8B190B011619C240A970C7250E37", "762B934E108817D7EC500735D49B8383A3D66B67FECEE7DB94420501348B7A66", "764D43B19DB882B179B2481514054E45C07FF586B99F1C4000C1226C3914117B", "766340AFDCA95E3272150E01DE0CF631FCD6DA67C85BA4E6499910ECCBB67F1D", "766578EB2C7BE8A81F504B4989C22C31CF802D03B94649D36D4712AB13F788F0", "7673ECA7C26C82F326589C66582D68F7F87357B4FB250AD73DE7E7F5EC924344", "76B01C700B7A9969E144FA162870FFC8338414AB1EFF04BAAE06CE410BA1399B", "76DF1C005AA6FDE0DB8060605E0DE67643E2C3EE7E972688052F7C21D207612D", "77486B8B5BB16D0AE922BE517509C1AEDA2019428A2A23BADFAE5682D363F74A", "7771FE6D91C897E261DFFE90D4B71A07A8204D5FE1F09024EB2E678D7CA63297", "77749493A2DBD6936C13EAA63911F6136F55AE09D2D48DC2785E79841B40FED4", "777EB533D5BEA1C32E0486E7AE4845B84A52FBB7EBCDEB8E44BAF79F3C9EEAC6", "77972D63681B5C5CF5A756975D81048480CF1445F8B84D8F700DE1C7A1F2B459", "77A5CD46FD3C6940EFC34DE8C8AA831927106A12E0E3EAC862A5D46723F4092E", "77E3C17864071E6772CDF6C8E252ACF8E77FD5D30AB4631D569A5A980B8C27A1", "78237A70A4C8348648BB4A3686F06CF0F1987731A211674993E062C9973CD452", "78AC818528F1ED5E96DF9765AA477784E752DB03E5EC0169C89AD690326E3F5F", "790AEE8158E5072311EE0B1D8C1CACC2CAE27CA8C7B75F39AD990B40790CFB8C", "793EC9D82C662DC6F51E61D95C762DCB0A3B0E2B338F38333062D836D5E624A4", "799E22A0B313A80AA913F26586384A61E5E0908C4DC4366D683B19D6B359930D", "79B056938798BE5CBF6001D33E8976C1E6C6CA8B6305687E00EAC57A2CE7FE14", "79F27EA8D0C27492E095D11A78FA60F4F4AF9FD3E6253C90F069133418B26369", "7A0B9FC7B50012B9BBB7C5F0AE9B0CE8DFD76DA5615F72F6922730410A94AED1", "7A15561A661077715EF75EA0FE463B9D5E57F9A3D952C6DDFC8D7C8FD995FEE1", "7A1D4AFC62D444E93951F6A46CA35876DD42680BFCB9DD562AE0F80A2C338D67", "7A2AB93E7F0DDAB709E04C2A3083F01A78EB3403F2956781D7C650C866D62D59", "7A34C5EA3878227646136480AF345DCC5DF882B26F65D3380EC0064BCCA45485", "7A4AFD1BE9A50524DAF7608F419D48BD995FB5D2B34699E4BD6C92C226B15726", "7A5D06FC83CE548E248CDD530BC5A56C3F62BCEE15025F146EBA10FDDB0A228E", "7AA351B847C7732E8B7AE01A83A77CC863325C3B53A57FDDE54F4DF8D16D14C1", "7AABFFD7EDE8A56FF3E63014903A8533BF0F07389F0D81F452A4D9AFF5CEB90B", "7AE4383D619D418CABE7152FB7E807377BEB422FC2E2543F14B7926B017944EA", "7B1F807414220F3532A128DB7A0F22545E6A098D1C584D2D752DB88B285DAA29", "7B614296DA3E2724AE6DAB84E18EEDD256F0912D1BCD8AD522657BCB05C688CF", "7B935CEF070C56F0B9370BE7DD77AF18288530E45CE6C8D7F1D9FD4F06222069", "7BE11F93427DE2496C264310F6C3E92E19016A048F64608DB74BA4A182CBE343", "7BE38BC9D9063F34BE9B8AEC73F5518E1D7B0EC8F35109DB2E64EBA48061A6DB", "7C01AFE6E64B43031575F0102FF010954F3B02AB92048869BDE2D0610503F56C", "7C0C1B9C91F187A3B3103241169E1CDEC8BDE27A306F7430D8C3F1F7EA2D70E4", "7C0C88F0755A8291F3846B90FA3FBE0CD28BDC54A3A45E11BF0C5F753D97A4A9", "7C5451969551322B10C02D39A8205047791F77289C2CE11B04A515BC58230E66", "7C687A5C4DA5F147CCB651C24229AA31D311EBB13BB2DF3508D7A6085EF3DD7D", "7CC29EC0FEC5AE2795B41685E99747E5F4622427116C32A61EDA1A96E00FB35D", "7CE0B3947D8196985B00E6EB61ED45938560312360058DDC3063CF3D7BE03A81", "7CFF760ED43EACB85DD304FEF6EEAD9D89C48ADE6361641E84EF811056B6811F", "7D41EC7322B1884F1456683D61F0429C832EB63621E340A85374D62A5B50036A", "7D4A2B8204853C2F9D7609FF18BDA1CA6FACC39361487DB8DDF6D40FB6E92420", "7D54DEDCB070F04D196472839D45289A985D90E09E6691D23E4F07B99E304644", "7DAA1079EC80CD5A34A54CC4F091B8B38553BE4A9A89DC95810848A4E4B45568", "7DB6F911B9E7035DD6E1EB898B3C46FAEC2CE6E894587513346BE35A52B39814", "7DE31DC20B322964CB6C48106E631D9D14B3967BD45EF2F7D2C8FA587E1AB212", "7E0744D5936EDC5F018B0850D801B665D388060D6A81B986BC7AD81C9A78C0EE", "7E120392C6B27EF023444674C7B2E2BB0AF1032844B5941C3D340385D2344B0E", "7E14B22ECA169752ECE98AF6029993D38DAD48CA63B7F7A2541E649258A2178A", "7E18B438D1C420D8FB4F0763D89974D25E4342FB6DD3A5ED861C0784B3F46C2C", "7E1AE785E9F29388D5FA609AE667D42AE9BCB7E8266DED5F69C5615688B7DA00", "7E1CB2FDA212C7A8FC0CCD8803720285F00C1F62F3E2628C7217A85BFA5FFBC8", "7E48E83AB3B599D048D884D2F2A9C830676F7F8EE7EFC2B799BFE4618D5E9A2F", "7E748FB7D2BF3C8C9A65B6AC1E01AE1CF23A69785B2DCE748AB18C63395DC19E", "7F1C012CC641EF0CCDD9BC749B665F263D22200F5DA78D27932DB5F6F0D9433E", "7F26D3B80FE11849EF97380B8F447B4B85426D57FF47B8A6B525B7B6AB52D9C6", "7F428EB227FA824483F24640AA82F464A84148749D37B1AADF17E8A7BBE93B38", "7F469CFC041F0A861570BFF0B2EAA8E27C8745F53E8D1D2E37E215EB01C5CB2D", "7F94C5CDDDC51ECE1C166F6CE37D2771A340AF5113460E54FEB1483857799253", "7FB7DE7BCA20AAE98D0E08ED3EAD9B6388EC52D2E009E95DFF107618AFFFA6BC", "7FF67E7B52DAFF24211DBF2A070CA6F859E1B8F13FEC5BEDB6B3E4A7B2894505", "80001296CD1CD2403232D653FB2E5786B6FC150FD2859C4BD0BF71F79E4AC761", "8029732ED0F09752998510B9F7DF2B4B6A11EE16C2878BAB607F0FDB9C437E82", "8039FB04A2531EB7A8A10709ABE8AF69FCBD24923ADB1607D3008C4B1F055832", "80737D4B4CE626670083B16CA387FEFAC8045ECB16DACD55AD56FFAC544F21A4", "807F02BF5D04D1D709B1D383A56D073A3E2ABB5E058B819FF145C9C80E083AF4", "80AAF4A30BE5F1921DC1F8A0F5E3FCE4216BB1E2506D45A0C54426AE990BED7B", "8100CF1B023272EDAFF88ABDE400B8F52CC64F36BC592F575C4E3520F9EF6702", "8107BB155AFB4DEF24A8F7E9A5B84FB121DF87688100C00C435732A2636A741D", "810B84D30510E1DF553A9851BF1992B1D779D424BC77EFEC4F325FF5888FD93F", "816BF55A9A089E73F8DAC34421450C5C33888FAEC59EDC25458BF1584212DF35", "817B7FFB07801BE45BBA7907DB38E30FA02DAEC38ABDAC204FD15158D630635A", "818B433278D5E2420F4213C71C6036E7BA5EA3C87CB6A3BC405627E0A3B9E898", "81C6A358F17E973E45D7EB18F13FD90C43F11DE4197BCA2FAD44339C44E0E4D6", "81D1ED08236909BE6784EC61A57AFE79E3FD05C9A8202853C0CB4DC397E0AE2A", "81D5F6F41E5617EDA7FF694BBE43496FC48B7577BB4C9C238127ECCCB1D40118", "81F73DF562970E5239B639CE59B471B9D34E39C4A5BDD496165656D76C34B09B", "8204B6AAEB9CA480B2BABF218A0BA53A2F6756B72A886187C55CC06DAD85DF7A", "822A5D5DDFBAB14222D402C61CEAC1259D980506DB6102BD80EB619551AE1961", "822E1A1C2A729D1391289F16CEBC1B291F0AAFF917670750096C9FC6C25ED3C4", "8234A208585254A6CCFB76652D540955DAA75D1E8513D3E0A5C798DC522C580C", "8252E44A34109A3FF009BBFE514754BDBBDA4A863EC3277626019A6C284A3C94", "826A7BFDEE25635CDA17361BC70404515384B43A57F6BE08914A0433166799FA", "82D54F3A8851AB67E2CBD454D01F29A2AC56F14C46626123CC454C01A9D5983A", "82F8BBD304C3AC1475AE424890BE919478BF7AA50216C2335DA22E3F782D3832", "83188B7337A79BED2EE122E55D4C81A473739295B1921C9346E1F37B317DCD40", "837053881E5EA3C6EA980180D7C7511FA7016F0506D6270160A596789757E6E7", "8379030AC78250788BA6A1EC3EE817EC994974E9473C0EECB5D7ACD3FDDA8ED6", "838686EA8660AF45865AC08A8AAF01B25ECE89F900D760F085C235BD477978AE", "8387CADEEB9AD0E38758303B1E6B37B37C256D2B869802656DF93547861A6E7D", "83AD6F5CAFB9C45D9169EC79DAD316AF1A872ADE2380EB094BA1BF97BED4BFDE", "83BEAE016A4ABD4FF346942DB25C3402A9F41C06DCE8690EF6135DC71C501718", "844D4377DE7D11C183AEF7BEEBFF5150237624CCAE269BEC3996C7B05598840C", "845815D9CDB298E2A160DC797D38CC36D2F098B314D8007A4EFC76A7D4FE05E4", "84B9F968C99F1D06D139A9613E0943A5C824556A856DEFE8DEE64E68329DDB5C", "84BCC81810DD6F3095D324DBBB3D00E2A34BEF28F90C89825218AABB1541D0E9", "84C1148DA7C851752C6B47DF81AD513B88C82E9FA2EB9DEA64A0F7C40D684E8C", "84DBA9C22B487B758F6DD24AC62362112C336A69ACC34E9D4BDC4A12E6CAF7E2", "853C199697F98B493E3E37AC5BCB826F855271BD1A7004568C29BE4895EDFE46", "855B4BA1D8689E5499796780BB5F84A821CB5A58C4CA127B1C70F27CEB7E6AFF", "857AE87B33E78932CC62AFF349D86E82AD4482953F6908DA5B3E5FE2692D9478", "857F3B848D65D687064A277C75E27976FB9C796BD65D99964B6236C5E5FA257F", "85A203AE5F731A8A23D151364A5CA4469848689E5B34009D9D63DA579273DAD0", "85A43C6C41FE576C53B5C843A1000693B1568987B2D6E8A8433139503B995ADA", "85B7C56E128E085728B9A6C1907216332D70311005E46352CCC818BD2B282D3E", "86075B9E2A02E79CBD1F591858642BFE044654A853F3F5F3598C54C2E1802DAC", "868BCF589AE48EA963535B60103C986C989EA814CF21EE80F882A9F14F2D0010", "869E11E9BDA088890B2C3128945C65683E3C23837707267F8D0581B4E02EE82A", "86A0B847D48ABE8E582B1C33E6C19AB73FD9D93A80B340CCDC1D166A92F95ED8", "86BC382413D13FEC49BBCF5FC0129F8B83C058E0C0CDD0CFC599911E284C4FA7", "86C605E3543D3B83BA0A25B4F9686B938438FDAB955B33BD0721D21AA9B6A946", "86DEAF24B8C80E3BDE6EA59DF05566E23597EF52D8DF86E6C01C0B9CB75B0C53", "86E9B66D1B9791E7662154179885727EEA322C66F71477234FD2EE8C0F0E5B1A", "870A1DEF76D41D926201E86F390F6EEB281F4C5156CDE1104587F141A47CBCD6", "8719EE0BDFD558D54F982D94642F8764B105A17CBB74D18C3EEF63FBFF25FE50", "873E4E7D31B3D0678D775F72B794EC936D165E1CF0679FF3C31754D430863C36", "876B88FBCD9878574891A0CEE32BD85AC8B426445B58464D8742729E54A8963A", "8789F1A6D596C8A6BC66585DCB6E13DB24951FC43243FD3D7B803A8FF2BEFC44", "879F74712AF34BE6EC4D8C4FE133D1AEA5F4C9D65B94BBFFE57B8ECEAAAA6350", "87DCB77CF764C7235B6473B289E603F21A1588D5812BC1D3022468CF1C8EF03A", "87E69918E25D6751D3DFF28B93E0E32012AA2DB7FA1D0F74175CA8BE7330EFB7", "881B1CEDE402F3C0480FE03E0BABAF4D1360F266E2536C6F6A95FB60E6D759FC", "88B2960ACDA41F47CBFD8BC7C1E9CCA61BDAE7F4F0D0022EF5DD572B5CE173B5", "88BEF8D462F9F45D43371BBC22C02A72C821C23EF01CD835DCD90CD91B6DEFC1", "89170AA222353F9A48D8A118FE03328E07C65970B2FBD60979FC33A65AECC8CB", "8918FD495FF9392365BDBD9D6D26790E8AC7651001B0CB48F49B246A9DCEA911", "891E5F0424A107621BE648D5F1576C607F7834B3BC114E0F945E5010BA70A9F3", "895F4CFDE7BED79352BE28A05DAE6E5D059FA356E0FB142F85559DC4743501F6", "89780D4585A20488FEED7686A5CA76A1831A95DB741EA06511648ED27850EC1B", "89AB891C06E01DF4FE4174C9FB0586E8DE80BF8D31E72EB2EB1B4EAD67600F30", "89E699B806727E33E450302956E4D536B906A5F4CF0C0791EBBC25F005461B6D", "8A4B48E4B7459553A0053A8F8A5C4BD20EA0D8AAA85FE981C90C77CF741BE26A", "8B18A583802DE934D0ABAD4E3B44AE36DEAE634549737EEE9B825D44B47BD7DA", "8B1D9C3BB3CE6364BD0FE7732D06F394D6218ADAB37D1876856BEEE8923DFA4A", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "8B3A7050651CC6061B73CF1E86EE2419DD50F4F27FC07E4130D25ADDF14EFCF8", "8B5BD9969FEA68AF3C45FDA3DB03870CCDA9156F542B0046F1CE349090DB826D", "8B9162F149F78403E19AD86E442A97D5316540BB3C012B863426CBEFFE43815F", "8BA9843CD049A6B3B2568D750B3B848AF7F394867B3914172C3057506982747A", "8BE1E41FC0AA383EF1C0BEB9C552E1C5797FD182D8C73D4CEBA74BD1FEAB46BB", "8BF9E951D2952E5BFD9190BD6EED01A626E5267E6C5A41ABE0F6BDA10ED75439", "8C3C0E9964D5A95A2F931FEBA9B17C8AC4BA9FF457A7F03750A8C994BF2BDAC4", "8C5BD629FA7D39B5BD451BABDDCAC49CF0450777D25DB8D47EA1E7BB29AEC988", "8C5F81E1994499DBB0DE67BE5FE7D15F748FAEF0DB15BBA4651F5D23252455DB", "8C84F9F6803F7B599727F54AFEA8E6241BA3FD1510B15AE2524E912A02E9BC46", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8CD12EF78572A4084B09F1DEB451D5D52F854099E5B1A1A30714B96E6F38483F", "8CEB781B9D2AC04FD985BFAD70ABC5E91AC5A3B5AD49FFA62E58DF0126E7028B", "8CF75CE76A214C8E66E3A8881ED4D041C386151E2AD24B89D0E7F34885082D9F", "8D1076175653373CF0972E3AB3E49C700B9C36E8D89205B4EAF9845AB1E9DC6F", "8D3B55BC79F0B30687542D934A8572E811EA359E895A6EA6E760B9427B444F8B", "8D64F104C14AF2A33552E861AE403F451EDADB214820F820DA429C523DB6D464", "8D902B719598684128A34639AA16F1EDF6856E69A3A9FD47AE77E5043BF92C99", "8DD827D74AF85708EA2C9099D87AA731E017BAE733F136194953C1481A380280", "8DF9A8E408DDD53ACE9BBB12309922440D3663888328A730ADDC42264249FC7B", "8E1256F4D760B64395430790B1FFF7F6484E9B08EA17FCB3BA65F907AAD17C88", "8E53EEED2805B29CC4116AFFB8AEA23A7969D88E6CDFC9CB7E71C03850BE9417", "8E830A705E9625551CC04A65CE871921C56AF78FC9C95A3F3F0004441F342FED", "8EA04F3BA7E174E18EB5C016F081F597A866E670A2B4AC230266086C64E4A140", "8EA98A1ACD7FB64C20AF5E150C5876B7A376F3920E71B4315AC3EAC3F292126E", "8EDC93DA35D9C6EFF30637C4253AC37334E65D3A71F1A7222120AE9F8CB09FCD", "8EFB8A654D3536DD4481500A7680D75E0B2A04D2F63C829CAE130B12A35D7ED3", "8F044D99760CE12240EC174174B9EB8B6F757F869109C84841C76802541B5ED4", "8F313894553377D79CE37F4DCC19E27AD4FD3271C08DF1AC992BCE68E81DC592", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "8F4CAEB4814182DEBFBE7DFCA9FC13E3577204C307181835FA0E1CA012CAD9E1", "8F6D93C2349EA7007BA7604F577A5D631E7B4B7C46622B4AB615F61CD8EFB59C", "8FA99E4D26249E130318CABB55E8B0BFE88E1B434E83757A8F7D6000543E393A", "8FB323EC50EB5CCD3380176BF2571DDA8C7739DBF4BC558C9B57458B912FEEF7", "8FBFE3954A9345184C9C56BA71D87B643BE400E22551A9B009EAFD7D82E9BD57", "900B686502E0C61F1BAA043F9387495F4C4AF282D993D0971AFB618978232651", "90246D34A2A9EC4005A1B788C09D0DF4366E66BC9D5DC5A39EEF5286DE79E161", "90292D88D6F3FB64F49163CE1097952FAB347C6209064E8EFDFA3E73CD335199", "902F7607CB7B0F5850701264764BF02D898EFF65A72CDC73B37E92F64BCCBCDB", "9052D87C0A77FDE9339BE13D5F9E4733073147348EB17E7CF0F5B741C451ECC3", "906B64791AA71F432F14BB58CCAEE6A9622AD741C3E459C5C2594F4C546B7BA9", "90917AA099FCFFEACB18D26DA9CA8C0F1796088FFABBBF65A5814AE731C32BE9", "90CF485116A952ADEC5B5A85E722DF33D1556D18AE9C7D1F5699712F4EB9F66A", "90F59F6A0A1928E0CFA961A91F641CD8DEBEE5B38C41DB9F1A43C519CD6EE003", "914B3D8A3C96750F83A07447B8B437FD19FA6D91185D7E4959ABEC5B8EC2CC0B", "916D4B841A8B0DE3D0A5F2B439D18C6BEA4DF5E660343A205D456A1F9FAD0DE2", "91791263F482BE4327CB96A074DA5FD8EB133EF9DA47BE41713B960DCA5C33B4", "91A961EBB8F14EC5B247B015B7D5F803767C766BB73FFF429F090B7BE9768BFC", "91AAE5641DDA79DB6E7F45E0A34DBB1221E2752ABA3104E41D558D0A095FA937", "91ACCACCF51183B22B704C13615BFD4650511CBD23CDA3DFFC59F6EA4243161F", "91C68A3A81E7952C30AA3A075F77EB8ED22DFC3EBC76ED25A3AE5D91D1D3A332", "91D7C6C9A5739FEE5F42D389A6790AF75591DE3F4B00792DEC9B2F9736C9AA92", "924107D9B02B18393D3A9C581C7A30F6BF2CE559C23EC57F1E3C3A0DD8F4C7FB", "925C7635474D135DFD74A542BB51B1224E1A496F7A9B7CF07F335A4BC30E7E56", "92627E627D103D4038024BCFD810986107E14AF89DB4426C430D1DE63EBADE27", "926EC2BBAF756385F2D7D4C5C98F9F630DFB49737FCEF5BB68A74EB910687527", "92A25ACC7CA97D427DA5F098FEAD958217F50C6C07BA13888E0C08A046DD5DA3", "92C22BB80F005566A9B6BC13CEB85433025D25B49B4109FF79DFC90B8A2B7A4A", "92C2D58DB9DA7102D7F9C515B4EE2CED16C0735F48AA49B707B24837E12E16B9", "92CEEA9B3D8FC06BDAF51ED9A411EE8B513CB482BAE6ADE6212F3C2FED4A225D", "92F0D4CE4518417582FDBB4466704A664944EB0A92B29F392E7AF508F118957A", "92F2A9B7C4EEEC292BB19AAFE8AFF26AD8870C022D98AD670334DBE43D053D61", "92F8956056EF6268D828C1C081F6A6051735CC82E17F4C1676ED7478BA3F90A0", "9308099D073B8B4A5B875ABF63A2A8BA4F4ABCB691E71E14B89B4833B4ED12AD", "93800CB903FCF930D2442012C501177682436E51AEBEA85D7632953A9A31B533", "93877A562B975C91505EC2DDCF1E0F2F75707DBF947F3BE156AF14689DE23283", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "93FB43619692E9A4D81819FDEE2EC14BE9B5E62B4E287FD49E3F7D0FE31D653A", "941A5FB04B6C4DF5F07E2FBC7A84EADD1A839385EC770AAC6BDFEF5BC82847D9", "9485C17C6737EACF77937D851901B067F4440B181E90652E1B22FC3F0E4AE5C0", "94A01D2CF2192721BEC6AADD5AA1F6F77E4160E60A91D15CDDF7AF41661CFFDA", "94B2D11D8B2A3C1556D68D2A82651D2B407EFDC4765439D01B02E9690918B657", "94BDE6E9969FAA2846B7CFD346BCB2F6B62A01961F684586B1AB53CC8BBFF8D9", "94D9B17FF8475C3929AC63020404B660DAD3AE737646DF21353C05E1E76D5E37", "9520C5555BE4C60D30FFBC59D136CE7C4AE83160E37552A2E3759BBA7351262C", "9530EB6ACBF40BF0B043F5EB44A8DF4581A4EF8F0AD4A4B066F908B8510CE360", "954C0DFA3C09FDB996662E30772A8D20D84CFA3664BC8DD04E340E72072BB104", "9559CE1CF845BE27801B9A76018F0E7FFBD3159BCFFEE9D25526E6D24FA5F367", "9568E59FBC9F48E0CA633A74AB406265AC01F813ACFBBF2AC3F70CCAF62213C1", "956982A3E052293F0151836446E11BFC653A802D63CD0248D1D89A3EE15C0636", "956A624E237CD5950CF708D6365F746A4303B7B9542EA80B8178F887BF9CB81B", "9571CC4C328FC49BDE460E3DDB8089A16540E8193A13ACAE69B87BCD550C3EF1", "95B1F80B256487D0B1138355698820E492933E1B787C86EB0300B5F6C159070B", "95F72A00E1A8D6C6435D5EA582DBD8F295F4C86F1D6773A4DD617BAD40C3247F", "95FF532FA151E5145634D33195BD43426168EDA2838846ECC51E9210C5321738", "96004A5F0BCA499E57604F5222E28642F8BB3CC611C03BA8BD6830BAF6767297", "96080ECFBE42CEF2D63B1341838131BE1CCC2B5F08130E2F678CCDCE13FAE376", "964EE2C764F7458340F9E5F9A309885284E9AF6B8CDA79E5C6C2B4DC7B69EFA7", "967E57EB9FB79991C919380A9DC8DFBFBD7BD669CACE09586C2CCF67B0504A90", "968F76B061F639B6B747F38EA0B563E31C681273189E02F178403D72D7E18BAF", "96B400A629016635BE698B4182ED121C51D888226F4491EF114BF41A423A0700", "96EA3FAB46A9992B85A37D32FF04225F7EBAA1E4A838AFAAC04B90A060C0948A", "97D5F772EC68BDCD260FBB9DFB7A322AAAC657E9360305DF11F9C6A6A40D1B85", "97DBA1E30952A387E9FFBBCBC4073EB22E406C0722006EEFFCFE53B1712D7E07", "98283CFA95F6BF8734797F60CE0F1633CDE2F2CFE8B1C29D35562086E63F1486", "987100139CA270FF23DFA94585D6EA5D1E412C9DB15AA039EAD3FAAFC72BAF6F", "990B694F8FEB56054D99331B4B4370CE96BC2A4FD7C4E2B75B5E537A91E83D24", "995F5E76978D4608B874A2D971B720695F0E88D78837491A71B32497C4E691FF", "998E998A37AA40076F35ACE20C7E0016E44B1CC4EFB6AE26D0761C68B7C99657", "99936FAC1F0A73E3167039C2601186519A3F8ED2D368F09EF3B457B2D57462EA", "9A1662E37088C3D1B2E22DD66AE2982EB7005E0D19C54A14067475A2988EF879", "9A20509E1E544EB20A59DA9FC7AF82F400FE5F811F4BF6223A61E0E7FD269C22", "9A36428D0FC14586B1CFD0917D5A540994A007817B22465BD9C03FF64BCF0244", "9A4B42181E5D8A9CEA3178AD3E0CFEA6672BA250DEBDA4E822FCC8B9D4F87CF1", "9AD1011D8B2FB2E4873EF060A3BBEE1AB787EC49FC6C2A6AAF709745990D1F77", "9AD36464B7BFAA6C6A8004130473F7EBCFFB8197512C68559A7AF743D6FEEB09", "9ADBDDE58661CDBE895EF30C5FC7969CE502BC90E9C6CAA210F0E36F82C8B330", "9AF3F8A22A89CE3823B24D221616C606AEF6B33CE6A69E1AD127C6C4155FA722", "9B0F66C4EFFAAF9FDB1B504C2B624740D85D778570BFE202D803740E0C99076C", "9B3468A6E720BE2EA7112EAF3E42DC3CE79363F1557AF6A0EAA63F06B896748C", "9B5E5BC13D4397737B050BD8441A6D224B8904878CC85547639E0E0B26AE58F4", "9B7D3514323721C913B7F4B7440815DE71E19E0CE2EFA7FD71FC9C8ECEE2F069", "9BA7990CC3D9C20113440CD1A4AB058DB6D9EBA8AD303D4021A3D4CAAE12DDA9", "9BBB794BF1DCF8660F8460268754D1A7E827EF26EEF07D631316C9EF5FC3CBDD", "9BCF9EB9E4FE0530005C16DD71B4C279664E4ADAF8E8A25A75DF51EE9FAE6943", "9BDA6E33706D0CA5C43FCD01EF51E48EB25CD2D133A018AEDB2FE563EC3BD7DC", "9C01855DE792DB516073FE7D57766225D3D1F4F50386D124FC6880AE615E0F6A", "9C24209812A5B441A11CEACACB03DEA118F9FC897BF0F2A1976EECBA06E78B91", "9C638946C07968147BC89DE8BAE5211C4767A334F7213E99654F7C02ADD0E910", "9C8E2CED44EE6913A9C5A91D42CC015FCB4317EBE3BC073434C7384497DFD92E", "9C95F0476EE4A00F6E74C77DAD5D0B076F37615CF49BD0440FEC5460D1426DB8", "9CBB47C9849FFFDEAB3FA20B9CDB1D824F6766298B8F87DE9EFE63C180ED7CE0", "9CC035260C611E904F68763BADB082400462C660E435F64473CFB7BE12187BF5", "9CEA1EEC4B78E2277E47E05B0E01C1C25AB8BE737D3DFEF6F8F6063BBBD81D24", "9CF440D80F7C3ADDF67027FEB0B656E02CC2277FA267330BADF00CF32A1D4BEF", "9D474CFA28D8B0313A49C799D05622C172F9872EA0EAE8F12773DAC4E1DEF768", "9D535841DFB625485F828C1AD532A5F722DFDE1766DF97C23C9B7A1E20BF46B4", "9D9A01E02514803E9E0E5DD88830752E1595E1F1CC50F35B26CA6DC44AE2E184", "9DF953BC7DECA4AEB37E6E5B0033CA33D3284BD52F59162C055604134EA029E5", "9E0572E079EE2DB6A69199BA11F43F0108C669D867B07FC456FAC9EE79F813A3", "9E0785F08078A693830D9375FB362720BEF15FAEDDCF6AF11F7E847FC4F2B207", "9E08A11DD23150C79E969A8FA933F7C903468F74CE144600AC32149CD9CCC3CD", "9E122C3147369696EEB22BB3077D52C1A9B149F5FD98D9E64ECA4092528218A8", "9E6FA1F3A9A1191971251B93D23C36DEAAB0788ADEF80DBC0987592BC5E6D5C3", "9E7C3DBA093F5D75EDEF063D16DC5E53B50CA25D7CE85CEA88728AF51E978127", "9F1CABD3527BC3FA5C4B8E3834920B11E7FB3196D76ECD7B9C586F89850BCFCF", "9FD1AC6E7F93ABD6198F576C4AC025E8DFA5007533DBD2FE78CC5BE3497FF3D6", "9FF827E2FD54F19DA755A2B6208A2EC7D3AE8D60BF765D40D030A7C7CEF95C29", "A020D5096FBAA996B4DBC5C9484108C8E3C32D3071E6FA584F8C4E841AD70827", "A06F12F99F7545DFE07CD344050360202C552320F55B7BB3CB0C7A8EBF4E76E4", "A07C9B7C7D5952E2BBD4C0874BEC859D77892E662D993098C91BDFD5CD4FF6ED", "A09018951A0F9F0B9C85455ECAA1455C0E32A9D1AD52716AF4DC1D2F9A4B8983", "A0A938EC1EB3AAFA93FFF3B377183C20B3B0F36B9051CD6EEE436E380EBE9890", "A0B4098936C66E228AC654C663118F5F0E7E0914D4F2BB96A80428BB72E88742", "A0C17B7FA23DBF1DC4FACFA7A00FFB9DEE0554664F67073C8C966AAD62F6C865", "A0DA60B6875AE87AD557CCAE1AAF020757185304D5D1246DA18673A711319E91", "A0E9873CE477AFCDF49EA44C688C2E955608B19AF61940009894ABF7BB1A3C38", "A120E262C5593C5152CA49B0C15618C600CA9D23F99B71D114329100C641C105", "A13D8E66D7296C6851E5FD3A79983B0714CFCBDD4D8CE2D2BA543E342E028FB7", "A13F938AA79D57021B953A77BB7F77514FF334329E0A290840B51BFF3BF61B87", "A150C2E017839DE1F5CBC686332D12515358F881E715C75E1B2D5509C5D5362A", "A1610C4151E05207C2B70F00002FE2069C48E736E5F65C67864C8C78D8372D2B", "A1680316198638EA55AFA837EE37AE44184E9B8BCA2B9FD668F06E417908DF87", "A1D2EE183CE8C9693B1DCADBA6A6AC4E58CAAD746DE6081E211B0D2080D3C3E4", "A1EF9298714E6ED876FC447E879AE4AEF24B3BAE418A5BF1CCD587D6F1B0DF70", "A2924B4DE05BD5A9DE02BD29915404543555C0C4AAE9016A5C570D5EE0CB6EA6", "A2B46117E508F40FE333DBEA962A3B5224FBB63AA3AA2F73C01BB59B016A3261", "A2B7B3BF6FCA39AA75ECAA4E73CA474375D79E4943FB0AA53D4AF9C31A37E9B5", "A2E923A551C0F36BAC84848E053A3A93F2AC1141EB9D1739FE1D48A6684F5352", "A2F7E57DAD21E2D5E4DB804EB652C6CD00E5CDF5B0D67125B95F4E269BA69025", "A30E12F2B88961A3A2DDF78E8F637D42FABAD056F16A2A25EE7CD0751F6D5DF5", "A339910401C1CBEBCD02CB63650E2A2F954071F79CBC8E8EA704AFBB756CF438", "A3752C1A8387F15196CA7D38FEBCF0DB0EFEE9BA80E9F901A057B44A5C47F353", "A37E5717689B00C6C5250CBA163458C6583896012F223709BE3E09BF9944B0DE", "A38725BEA1F37F363C77BF62693D3464AF491FC41BF719970040AF1D7E0565C9", "A49E4964520C445AA1E722204A25D28C53ABC72EDBCB56A43F3F9BF12B574FC8", "A4C7F1899089B546ED394AE8F6988B8EE42E053E0111886BE9FBF60DD7E72474", "A4DED06E2C9F4A28ADEF0AA4C6EEFDDF9D1F431EA3CF997F41E7EA22CA7B12B7", "A4E048A99AAABAA8A8890CB8CC5ACD6AB81B86A38CB268EAC0CD07D87B49917E", "A5ACA9D08DD29AB239109AF58FB6B994D318DCD5424F5180E2376E622C4AE6D3", "A5BA8A613951DB71615997A50576EA856CF6F241F65D49864518CC076EDA448D", "A5CEBAD1E81B18416B50A8382AF2F4A60FF740FEC4D030FAB70ACE0186CFE7BD", "A5D273C4869530B1BDDB415E45BEC7D916490C3278ABAC423D76AA509827EAA0", "A5DAB4283920BD36F510B214D7104C50CC2117790F358D3FB8CAAF66E3EF9568", "A5F102AA90B5BFDB2EE4442DF51659EE282A3C06887BA2EE4F4B5E779799F22B", "A5F646FF4C83A4B1D2C8B47FCAC3D208DF17454D859B9AB5DD63F0E74300162C", "A5FFC24D84B91E33DB47895A98F542C9F12B967B7EDFD2B5A790B492FE2942AC", "A61815FCBAD6685D8419A521197D99420213F8B6A123128AC976479B8897ED42", "A654DFD6FE6FCF2884AC0707849B43D4C36CBD6723597614360CB1EFD332EC39", "A658826ACEFD8281700AA4C5F1D1D4C5E783F73C590631B873055789D4BF0CFD", "A672FAD4D4008E416F01CAC297F94C9CEA100F89F258F6FF67665C7FF6EC35DF", "A674C91B70F53BB84749071CC77C217AB81431CC08244B1275049706D793DBFE", "A67BBEE8D7ACC7113E69EA86A7657D4CC6D510A3407BCB843AB7301624C0D77A", "A67E3A7D088C9805748212563A7F413FB4500AFEC69F2D7F55C967A91BDB4EE6", "A6A112C52CDAC99718BF9E5ED7E1CCFB273A24E89BEB3F4E10C47B550A16F536", "A6A248C23C44B255DACEDEFDA8790A10884E5292179CE57376B4AC3522F7127F", "A6A496B2E032EDA1F9C9B0D3982C6A52B7D925C02D0F2EFE157394C4851AEBA7", "A6D737ADE03B032A42291D50B5DFC8276AA6AB0C24E9163A9958098D0E9747B6", "A6E3C3958F83B87467EB5D004261582078AC9182E0A8B7DD3E0290016D1F3D8A", "A6E76F78199023F3E45B0EABFB47453A685D611163059EF8AFB2422B801840BE", "A6F462701244F836D2D7588BFFF3403D267FCB32C8E237B2D6148230FB181334", "A73494402770EB01D4B4F67482C0CA74EEC59B3AAFFAEE1108B790C771B329F6", "A73551C79FEDFD69705FD8AC3D649F9C09EE89F283EC97131C6969C6114AE546", "A740554B49FF2C28448E8B6CAEB6B5186A59385D0F06901909CFF1DCA81D60FC", "A74B006308C9A5B8978B427A12282CE7740E5A2E6AE2BE9AA3FC87E2CC5147EF", "A7C08E9177A10AC583EA198F89BF0B091ED0697BF42F39DC0B151F7465C9BAF3", "A8080DF589F1BFC2BF6B98ABD8B92D2C07AAE6F3E14977386069111BB800A09C", "A84C2AB3848F76EA9C2546902AC86BB030918DA86963F6AB177F40E10C15D15E", "A871939B5F51CA69B0EDBC21D1816A26D5E84C73FB45D47DF354F899F5F6BB9B", "A8769BC2B0DB66C792D9EFA7CBEF5668B22FB52A475E194FEB169B3B4BC31FD6", "A8EC4F91E2F013791F540F670A3496CAD8D5C16347308AEC3639DD391A2968DD", "A90DD52456233257713133653B224B6D7EF3C02BAF11AB1DD040C49EB074BDAB", "A986F0D7B51C204D69DD897A085F9CB249B65DF7C839AF92D49287ACDEBDA05D", "A9A6A76FC5FE3476D655B4AB62F5D5881AD9A59F2B0B4305AD8296DF32624BA8", "AA4341CCBA4C26885B09D2F1E2A8320B8F40F9DD2D2B4201F7C7E24199579E80", "AA89ECF2E6C94C7BD34D85E5F9E8613D73F7FAA172BD70EA6519616FECF7A88F", "AAB14D78054A85A0638FC4EFD7F09686429CB02C6B45FF1ECAFA55C27A050635", "AAD4F649FF316D5D085050864B96C096EAD1372312D85D3F8B8C14E8A588A7E6", "AAE68AA2EFC385FF3EBD4382FB866664D480CC7F1DD4B169227644E77ADC4B20", "AAF4BDDA7ECF566534F1FC9D951BC20C97D4E89F8F43C5F79B8F6AA13170E4D9", "AB24944DBEBE38F0BC5C45F998163889F0AE20E03F8A7A1E3E7A7BAC40D872C2", "ABBECC2CF1F809CE932B9130A6788B28E3F6228FC5599EA3FB4CD8372D7EA7C8", "AC00E4178E37010468F0B24053B2F581EB19F874CFB94B2DD1DB2FA5B2F608E9", "AC579EF06A63C7679B2D7EC4B67819D5F33EC90E9760AA522990209580D45436", "AC5DE01326AFA37CBA7F799502684F57AF3D9271EC49734648DB7797522AF2E8", "AC6BB375CBDD4E608C8EACDAC98598DBE5AD172D610D0C2D8B39CC50F9580599", "ACA78519DAED0CD6A996922734C96430375BA723D975A22C0DD0A7716D545ABE", "ACAA55025C09DA144288A5D0A5158AF597D978C292D71EF5E2D01DFB8E56A818", "ACBA42A9F266755DB30CE35DBA1907FB61B1687AAD3415499AF5573BC67595AA", "ACC3D76F92FC79CD7A53AF647386A1BA93AE76E3666CDB9200DA82637A52B25B", "ACDFCA5E93908C1CC35E54B4EF854ED57BCD6CD2641A3590CD2418E8BCA917EA", "ACEB831DB775B18663FB8C7ED41AB48BFEC59B9270C9444D8DADE42DF02434E0", "AD5C7F7150FBD846C587F5FAD0D7C7B48F81990F52A351F824E5CBBBAC83F163", "AD6CCE2A1D5A9869BD583668A696E96D5711DC6790008CC35A1991D46E49ABE2", "AD86702782A27B125C52925B01186F115FDFFD74D9D5E408D9B6FF77D740FAF6", "ADE17D6496E5CECE507CE673C79B5E20B40630AADC461C390CF2376570F50564", "AE33D31A0FB7255EF28BE79BC12503CDC31DB9273944374F35C9752D138DD964", "AE395445C7C7240CD17B06CE58A20D98731AA33DE1AAF047F3A02C424CBD3F87", "AE4DDCF77B3A9BFE85227626E129D55C3CDBABF29581F4AA4C5EF3652E3C4424", "AE567113545218823FAE52D3A477168F041C0F35D4EE0A605E4BEBE15225DAAD", "AEC0722767EA21CDE0F10129C001F976425E48E7F302D7C24108AFF251D12D6D", "AEEE199BAF4200AD2BF78A1936E5DD3E8BF41B9EDC1B37E1DC107EB8FFDCC4DF", "AEF7A95EE3DB6896F5C04951844A71B4C94EDDD29868D0C8038CC869982B4892", "AF2A638F83D6BFEFF86D2F4D7BA2ED537C7365098181D50294EBF759BAAD8196", "AFA0CC2FC2C055F26F871E9C21EE0AA3306230ACECF1CBD6D9CD834A07E53935", "AFD7DBF6EEC4522D8263C37017B0864C1F7BAB4FBD23EC03D38B2484DE07311A", "AFF280B78615CE8DE30ABB9D56D6E9B807A4646603CE034B8B2F39DFFCF6575D", "AFF479D95FDAD4900AA4F096E105276FA32246E4CF2C4642D2BFEACB19522885", "AFFC971A929ABC4A5177F4FBA7D32B82C0ACBC71AEFBBD3E440D08B12B022B51", "B00C641639E0C7B6655AECE025DF327791466382D40DFE5A25E69D817593761C", "B07B2DDB76A96BB8480E22188347E3C9EE42A03F24868518880519216E52F154", "B0914B57985F2C98962248985AAF8BEE0B2CFA3D695BFC0ADF576FF0BA1C0D60", "B096767FD8521DD5F479C920E6BE7B0BE0EB6EDE5A4C1EAA614531B15A09AED4", "B0BB2EA7A319BAF5A56BA29C1BB3AB5E703F5A5F8559CC217AF2FBEB02F8A32D", "B0BB62A87437C3256A2423E650B594B0E1BEE577A0150CB73D7A025781EA09D0", "B0FB4CCA6C2AAF4AE7DFA7516AE94640B71BE0BE346F669F7A4393C673251F3D", "B0FB98D09F3AB63566DF3496E722777261EC73210A72EB2A2FAB701E3D4F7054", "B1362A566E4630B377193CF3223367B861D83B9A967370881C2169A6D009F0F5", "B14711FCCE28FBD42E1415D4FA69A18716B176D49881F931260BA9778C11599E", "B17F6EA32217517527CEC9840D03393C5EFC22D03E15D5F135A129A339DB07A0", "B194BE44FBBAF4EF2A21562EB9D9C54350C38B246C99B1261CB35EB0039346A6", "B19B1E8E69CC7FFA12D3B75E392AC68890C697474DCE361FD570BECEB5BFA16A", "B1A68CACAA6679250CA76269F03D20A3A14E734FC434CC8F824869D436C7691E", "B1BA4BC7E745A499101FD9143D2E31C7E6E0F57F30264DD60DCC485E0AD2AA07", "B1CB4F2A0E5AEB4C5A4669E5319B0B50605F31B798EE4E07A4D889EECCAC2AD2", "B1E783E91A97561EE54A4BE33B7D89DFD62A0102849652E6400BEB141CD42469", "B1EA708CCF72B8264EA46A7D99E1616E7334C67D440D87A4F97B2B4087696EFD", "B1F38841711B061F8325E6A13E1E3F81E4E873531F7552A557FA24AA06AA1148", "B208854B100603393ABFE63FA8975A55F6379CCD86BE9A76E5EA76BC92BEB365", "B281A1F9ACEAFD204A3D6FB91BF51E4A654F3C0AFAC59563B1F2C339E68B87C8", "B29949757A6CDAE523547B0D31687449E15B0D5C20F9A32E9F098368496FA7CE", "B2BF691AA266FF88FFAD2044089D57580EE40D4E84146B077C5D55063FF15586", "B2C9749208C570A31B2161F8AD277BE8D13F6F865E3619447CD456C3E8ADBD52", "B2EA2FBA4D280351FEA7F9EC1921C448D44F4D9EC613590A87A15467F7D34153", "B301E3BA36CF8897185EB51E86542B39D3D05EDE0AA3B1DAADFE9F809DDA0C1F", "B315A585CDBD4D516E60AAEBBA49CDD9274D016108F5F855F13CF2FE3AA0F562", "B3795437971BBFF553B6A4E1067F15162BCF6961507ED86899C33084B3A1A74C", "B37FB96EE4FA4B06328DA641D49120233F6F6FC031E87E5A21A71F34BB882B42", "B39CDF48277B5A1E5E74388C6E0EA6AFB8F6FEA1ED51299E44E0AEE4AC404FF6", "B42C7766BD6D792BF0266E15786582D0D78318B74807A7CC5A72B4D0D490AD59", "B431011ABF67E8DD4F4E3E4C9F9FD0B1E6E07733191BA7206314070644F2CAF0", "B439ED893EB4CE954BF190974F19621A42A4A0250549810A9B4136239F0E1BD0", "B43C19A7C3830FE0BD2A0DC67EEA1A869FB4BCDC9E39048C7D25BAD77DC3AA41", "B47B01CFCEE320F0AE033C32D22579706D0B59585EDEDF3D908CA06FA3E92084", "B482C566339EA4699B01CCC8C92DCAE34A664B8704A229FC36B639CE89228173", "B4BE3F04AF173579BE874B8DFA5282038A6973474C2D480A5B843BA6B6B6E038", "B4E820AD02AFA9A6FFF21A8A1E58FC3B4CCBE776135D3A61B5EEFABE2D5E6B0F", "B547E4473646186969A14DFF0C2EB7D3D14D2E03EBA009074D6083D7482CB50F", "B55C78ED054A04D7CF402F9C161B9C4DF1BB709929540DC002FF6E726FE16F65", "B5810DD31544DECD338CCD71F5C05C78B267068FE3FD01928B5545B05BEE5FA0", "B58992EA53B96C8C776B82848FDB98622967C138FC24D243C68CB7F40B73EE4E", "B5B6C4769983441433B811EF3AAED6CFC993849D42BC924ECF1CCA5E34838148", "B5EA75DA45428FA9458348C3D472584E5E61BCCBF9FBE5657A2F537F17C008DD", "B609D685D630C87BB458CB89A66B87A64831A7617912F7856869B7F1B264C40C", "B62071204643E59AD31EF38C3F1DA735EF11A4D940DEE816C67BC98D03AE1325", "B63E6539A425EB5AF33E03949CFE0D4340525E6C4EDC7F84EBBBB8743E8CB569", "B65E10799869808B38D96576AA4BC705E6DCC5744AAC77554C2319CB82A9DE27", "B673694C2888EE95A6BAB04A5C155DEAA18A41E4DF0C4AE45D1C5C2E3FD7151D", "B6AD63732CD23EB3783BEBE65A96853CF122BD7D974D6A2E99CEFBBCE664A170", "B768855E8C738A5B00457C5D1B9A9B414C5E89F585C189FD0169729EDDC79CAD", "B76DC607E6D34377EEE262425D123BE37DE9976C1E8C0C2879E6953C356E7375", "B7A13FB33FCF20165BBA366C8F6B69286BA3919797513F5D1D731C55600F3ADA", "B7B1A8DAB1A897FBFE8F37F46B5A9BAA67F914F715D69E265E2F4E7D8FBB16AF", "B83340B4529723EEA9F866A215AC99571C734651CFCBB6BF0FB4B67B92BC7108", "B880BD2BCB4C8FBFF764F46F4F0228D1B20524FF291C08FD0C5EDC76EE4A2E19", "B8CB582AD4C9B18B3C5CCBAB5234D749FD3D0D9E37A5EF38D599A964E5AE80A1", "B8EBD50D50871C4F9AC7BA82688FE73FCF5FF7BA895AB8F30740BE3A09FB620F", "B94DE57728774DA14635F965E20FAE142AA85C68C5E5D7C8BA2D710B564FCD37", "B97713A9D1C3353360B57D1AD1EC137AB7A100FBE009625EB3FD31558B3B3304", "B984E19D6DCE6BC8573D65FD8734FB5C065D93C954DB3952F116C60D8B4A1236", "B99FB79D872511BA4AC9EFFAE77B4B64B5F836318D8264BACDC3891795B6FB88", "B9C205A670CCF982DD2E5068CA5E013C5A6F7665F6BD1939AFD71C82B054D8FA", "B9C7132D775DE65C4A7C7EA65CB4611218B4F54983B765131C39E74D07EE9525", "B9CDDBBDC26BD902C02876DDDED6A25FC1707A770CE095A7EA03897C2D3D0ACD", "B9D337468C8D61A96DAA164489DCAC972354ACBB61A42843A2B1CECDD07A3725", "B9F14FDA85553B1CFC437ADD80AE8D3308F5F7116C42963946938CBE5C5EA56F", "BA2D0D9B1C88AA8F13B870348943574E037A169844D44BBF01DF458E3C5B564F", "BA4185EFC85E26A08AB57ADBAA3A45DD6AD2DB5D4C5B073C7F980FF5D77C4DE0", "BAC58F310A73AC5E5FAD84D6ECE65ABCF89CB378E0F1092F4F7D09F826B5874A", "BAF43585A5ABFAA551BDE0DDB4AD7ECB0C42E21551DBFD52E1607957FAE4176A", "BB025EE04BCE10DD8391F132BBA8E92CDBAE87B356CB984FD2EFC8860F51DB08", "BBA20026A90E4F85555F0C8BD6248AE07F7DE01D687CD62F0159CF4B22E7DA25", "BBA8B23C6AC0BA1B402D65377C4940B4C427E7639172AFAD9540851E60D68ED8", "BBD4E1F91F30930B076422CB14681BE320827F41F5F6DF095FADE31945995812", "BC4AD41BBC5C4EC5A5CA4863C7BA4A6119A58DC36BA86476A2CB677AFA4570F8", "BCA4DDDC22FE85DAB9D2E5ADDAEAD6563E17D19717B4C182BB170A0C9FFE053A", "BD2428A25CDF59A301746E815BB63D51A58CED4A1661B99FD4945DA5FCFF3BF8", "BD3B63F33CC91118E461E2718F7C98B27F79D4BF4FE7BC717AB3D1F8712CD498", "BD7A73E455E66D5CFA96118AEA67D2D6AE0C4F71C2A687744EE2C74CF48473C8", "BDFA432EA62E6EFDD1DA5F84B4EE926C27FCF1125443F9D0EC5005B0FEE74C89", "BE51B4D7BA3C4A79DE20E3F69DBE84BE8D31F54B22537E29FF188C8E94FD3552", "BE67C0282341D645D5CDC3AD7B83CC309C9EA82F81E2A87A8C9C07C37D4A29BC", "BE82F07FED1BEFB3F4DF7EBB0BCE97E5DC59077685EFFE1755143A8613828BA4", "BEE498D64CA2EADF926E0FE823248FE0159CFE6EC6405F64A375B2DE213482D4", "BFAB1EF8D38F9A76515AD06B662674DF3610CBF2129EE9786EAC5DCA6A2ED028", "BFABACA99AC2CC88C051A7402E5ED0E31702D50B6CE6EBE4BB05EBFE7E597FD8", "BFB72DC5B1963820F27D652027E178E109F46408DBBBD3BD4AE3A37234286521", "BFF89C15B535EBBB3357938F3490EF4BD8E51EFAAA3AD2539FF46CE98385B88B", "BFF9E7158120F8B43A89CEF476D8622AA1DB0E88B693EA0C9A09920DE0FF7A06", "C00CA1FBAB9202E64462B2BF77F0ED60BC785060E001593CB61BA37AB170F2A4", "C054DE525045D4972972C9A7C5876A4C8720E0C0C8D341264A0FEEB56B8EB5DD", "C06037486063080DAF0903578E651F281F08105507F07A61B0292AD4FC96B7DB", "C082626CB575BFA934FE4196087B2CBB2EBE141BF14771DE5FE31BEFA0092682", "C0904FD149C70D8A2835DB923B2BF04803388EF83CB969D07F28836C567C672B", "C0A3ADF9E937781CCB8CA5A595E97F42D65C5CBAFA00CF83086A722272831794", "C0C635C3D1BDFFF4279719843730FED33753DFD9A52C5B43AE4A48433A539739", "C0DA9EAB6E2D9B87CB9524847CA01C2D7A539BC0B9EE1A3B192B5725ECD33897", "C0FB1FFC7503F837D3B7602EA9FF0333F69944CF0D9734D3E7ACD77BF205F607", "C1043F35FF1F630A47D32A8195A08331316B4A0E682E22CCC64ED3A8793D1A86", "C197CFA48A392ED032551EAF7A52941BDFF0E637471A2CF6510D6AA764C7CB3F", "C1CE1FC188A57EBAF9814D4F7E5E6B20BAFB5CC2D6E100F7A0D65547F713D881", "C22253825FA485019FC06565D7E7D6C4103E0C10B6510212859354833FAEB242", "C23DCC9148257FA64991DBAA915D0F26FF1220405B33493B5C4DA79CC6DA13A5", "C247CDADCEBD86F6926A5A03AD862F20EC878D5E1054BCF2C6B70778E3741BB7", "C262810C2EA406AA0C99905582A19B800B7A7F047F4687E7FF7C0DDDF579ABBD", "C2914938F2572486250228ABE329A3096E9532430CB7F8ED7FEA7B9BDEA04188", "C2B52CDB824A19B8448467EFC93E464DA5B9AECD55CD2D289F7D0A3D21EC088F", "C2B903D90B8FF5A036BA5F3170A754535BD0A8E266D9E284808E356D16556514", "C2D7FDE6929D1789B9A1618D087E5DCB3FC2780B2EC1CA3CFF40FDF3AD014A8E", "C38AFDD82BC77228F8D7DDBD5DE927E97F8C97D1E6B1F76B6C890149323EE9E7", "C38D6ABC79203A68FBEFD4AF0550B930A12344E61F2BA7EBD4A32B10F48FF4F4", "C3C5FE937F9B39A4332DECDB77B6C1455F6CC418EFB6C64C1E780755E7FD1E3B", "C3CC9C6067F468B5E8ED9105BE61107CCE29495A0D130C16712741E71E88E9E5", "C43D2CB156B7BD39FC113EAD22568306F95463D3E29CC3A697EB085F142533BB", "C4B2A7F25639B468CB0778EA1E561F435356D460FB4D417EEBDD1C83186B56CD", "C52A0B54A3D89AD8E52D1C2EAE052409889A4834FC03D1FE9CB196057866A5CC", "C52A33BAB2A4A0B89F30897312D22B41011AD928874D2E3426F804DB4A67908E", "C5300EA28DA92FE5400667667270AEE539B4648C41D04FA7B270FB33DE4673B6", "C53D3C47BD4A155045F99C1E4CBF677182A1008DEB57811C876885F82676C572", "C53E4A17B59FE138EBACA71C399669AC512D80E0D95F4A2578B807A669FCED81", "C596338966F1610A28DC01FBB21502CC71651B70DBC8B96D9603EBE432E4D5E6", "C602AE40F6974D4EE4D596F81D007D4F74282F20DC8B4859AE08925E2CE79326", "C633E3F919C9BCD1EAFB625FB054DC01CA44ECB316E9D13E7A22A44BF1FFF391", "C653CBC867105CF4C768835C9EDDEDF60AF058B89DAF4ECE572AC72BEA4EB1D8", "C65722F809C01B5483BEFD48484EDC46960C65030D132C9D08F70EDB8A00D231", "C679D1D8E60A9E461AC1E3647E90EDB312D3FE16D1907DFA07B5CB6A65C3E4CF", "C69647146C8A4405C9EC9ED2FB39442FE3398CC6836DB5B0631585B94D9D4079", "C6A8C2447BF88E0D4461C61E401962D77CBF20913BC12869EED5BF31650D2CCF", "C717E3C358B1EA0AC9E1701DBA722015744796BC3CBA66E7AD79D30CEB45BD60", "C776DF194A40E4A60B567033CD081B6235A102D5945D55AE7CB684299BACCE29", "C786E96DD673C5766A45B6750BE6B879F3CF37718ACD79668ADC1130AF26E274", "C7A6F677E9F0A96D6D4A07B32B68F5C9AD0F2A19F06382024B2473D49DC1BF0D", "C7D4749D45522C5407F869E674374544E27C48913CA6460504CFD68DC1061FB6", "C7D52C1814B09D1DC65D5B9B6B5F88FB60915037830D0A81C5C4B9502371C6A9", "C7FEEF6F968DC83A4BE4F17CE29290349CA7B22F9E4BB9EEACD6E47F47E1BE3B", "C80232268E47B2638A1602C3F974312D284C64B656468B785AFD070887CF6B6B", "C811553D68E6BEC63A2AA4F7918D52F5CC630F29803E60431CC00F8927406ACB", "C815D5BA0527F8CF454767B7D16A6B819AF9B998FAC3AFC2A63E79F6A57AD83A", "C81F2E39823E05878CBE3F0E9B9C04FBB4EE0D76387172E119CF2EFBDEB7C29F", "C880E056FA204218A84A61C31DFC839867B32C5A7A216BBFF825B8013A446E7F", "C88F1D0F2E82F0BAF248BEFD6CE8600095CB7D8242F192906DA3D353C6731D59", "C91C4E43132696FEC4880710887B3C0280455B0F29B0B1FDDFC3F98D4048B4E8", "C95EF271B0237B71243BDA3549504EB22E0DD9DED53FF9746E19657C0AFA1DB6", "C99B3CF5E0C30EDD67EC0E6E4726E2E6DFC139B986DAA387637216BB3413077B", "C9A62458FFCDA7D13068BA51A14F3364875030AD9E3379B54C1EB8EAA4DD8D49", "C9DF9C64EA1901A4A73100734E733E276B2C17AF4A3093D142E5F13C918BC741", "C9DFA3090A9CF83EB10A585295AD519D3DF3E3F13404A532201665714D74FE8F", "C9E850DB690B1A0293E08649CBF2B802B99534172961D7E98006F68C604B9757", "CA09B3DD84B98518F150EBBC1B1545AAE58B4AEC15AEDCF7AD896C3A19E9F554", "CA1E3EFC07D22B2DA86595362931D640F30F757529856481F669DB4619DAD922", "CA3FBFB8EA3EF658E824E595E953CB7D32C79004F37EDF6F4561B92F38A2FF7F", "CA40EA672B6EDDE5021E0ED9BE44895EC2C02F4C29629FDBEBD6E886E97E1455", "CA551F56F3CEF6CBF8A1D1072863467FA8BD89AA42478AE376DF9E9731D5AD60", "CA643463AA3DD27CF347651D7B084BEA39601B3E21A99AD0FE90A4163037F126", "CA6E62CB32AA91296638D9DAB5072711CB69A35615F7FC69D8B55BD25BE71F67", "CA9A93E38186DDC51FC4CE9C96EF7CA0CF0FF94F7AFFFA46B0BD4018D3EF626C", "CB1A96B060B639265D7CCD4E0C186EA367A7C82E1756FDF32E57D9F350AD3873", "CB2FE0501D66CCAFD24272A9B3057D9AF493BB73E63B4F14928A1DCC9D22A51B", "CB6124223B6F8216BA9E92EAD6DAFC187E51AC4BEC28594EAEF38B28FCD5792F", "CBDB352135F35E50D1EDF94C431A5A57B2DE17935CB3F0D6B7B9FF3C9FE7A3B7", "CBE509FEA22A618B4653E456513C3FF93685431FDCB2E718DD0A763823DB62AC", "CC1037BD0D9F0BF18455D3D0CD4FC06D384EB60816EBDE2EEE853DDB99544F8D", "CC243740CD3B53A01DF4E651121A1CF73F8EEFC3E281BC9547CFF72915213611", "CC5089F9744A6B5AF776C8A1234A9BCA32E0798D396B5C631C8D215B02EA08AB", "CC6DB3505939453FB542901C62C95B2A03B3815D8482DF559005310A267A606D", "CC8B5EAED9F16E46FA900651589C00B568FED80DA1BF6B1F0CD9487C5E056E7C", "CCA2C68EF569C58F2CD1B5927035CEFEACBB9429A63AB8C973E5D68208E4AD02", "CCB248CD804132A0475454F67CD950BE6EA465D4FF96EB241B668A2C8B3CE085", "CCBFDD455DD47321F17ABDC0F15C354AC704D17E3872814EB9BFCCCEC7B7CABB", "CCE2284A1DEFC26817EC9BCCD38DA7A3854365480FF9426304A46C0C98F30195", "CCFBBF17D9A696428033DD621D20DBA44A61CCB92DE126AC9B8A8CA1DDE1D0EB", "CD40DD149C78115FC5E14131A8469B7F2D7DDB0549913613CBD15A792ECBBE37", "CD830B69FCF725D31185573C52F166739E409761B2F08F350213C1F2D7933098", "CD9E5691C975B7F8299CAA1C135C2B202F200D1C204C891DD6D87D2A822F0B66", "CDB95A8580AD247B239607B2769A506C10A81055AF8F4063AA0D26A850A33B58", "CDD93933A317B04B50C248F3EB04FC47F3F9FD68CCF07F6CAD56D189A531A84D", "CDDC441D27E108C0C02A93DB9A7C32A887C12C059B5D2279EA48BF038E8D5170", "CDF06F9CE941D8BA4EB50A4537C60963F9E723DC6C21E570A655A0FCA0A6764A", "CE17FB486A383FDA7CA58E6E9EBC670CBD8C99F75AB7AAF454F6CC73755CB8C6", "CE291DB15FB1A7FDE49870DEF70725290D757902B5EB4009CD8DC9710150329D", "CE2C32923110950C9D013D80A09482A5900EB5D3115492E814259A25A326B42D", "CE5C782D5B6A194605FF1969D54D86EA7B4F5A28ADDE4884D6DC86FF22C94536", "CE9673C31D0D5A62B7B7DB43DC860904F84A43924D00B12EF5877209E580BA6B", "CE9B7DAE68B959C5E4A5F965424DF5CB00879B1AB1296B115DB9CB1B8ACD054F", "CEB6532C05E2A4AD727C681E618A7A4D2D8F107B9C3AFE4DAE44C9D446EB795E", "CEBCA68E903EDA603D607844229DFCF4454411F02836A215BCE53BF108AD589B", "CEE16EDAFB404DDF033F95C90CAC7DC93AC2A4F7F086C619B9F25A120A2D62C1", "CEF374057D7807F5D35968E4C55414081A5A0BD61843509DA73FCFE986EFFD24", "CEFB2CDD169330DA5EC688A529952C2E9694D94C3E8E4A50C9011E9A9F7FD71F", "CF1C387E16CABF8D81AAB4B6A53874DE0D663EE059046460B3A0D1EEB8D2E762", "CF2A2B73D233DF26C11999E43E720842632F36DA449C73A40F5A357527666DD8", "CF49D3C68973180FF18BD6C75A4B377A56810C21E28DDDFFBFD24EC340BB8DA8", "CF912B1939850C2F4468B16576142F66148F1B425FD435D9C0BFE5C89E455C1D", "CFD032C6816AA09BC4BFE927259D2C7496159BC447A779769DEB0DECC4952A56", "CFD32D5D08D233E634495728D156121D99CC4AC3A5313209D9B1F3F2ABD21E3F", "CFDD5A9C7B8C9F6AFEAF6B1C68FF8C11BEADF52EE2E731CBCD194CACB1898BD6", "D069D767BFDDACAF36F8AD8149748B1FB801641BF7495317DD2896BA6B1D2E26", "D0934964E9B56702CBED525517F4EA576FF2F33A8BA6C800C34ECA9B7FE90236", "D0AC966B47A61981A892F9169E036EBFC6A6E2BFCBCE87FE987F41AA4365491C", "D0C2BBF5E828BE52CE92F28682B6950B3B526488699E5EB08A2EE2EB5B1D4C35", "D0DB556144F181F0F79EC292BD379E4A0E21B2AE85DA73A1548B00B2070F4BEE", "D10B18EC28A032EFEE6049343ECB3633CC65AE8BDF915EC68181989AB9170F54", "D15F96A6A2133C2CD625057126D31B71488849CB6D471551AF6177AE83F15B0E", "D167041FD67D8E08641B1B8E3E6359DF1D00DDDA6D23BFD8A4633CE1BA364601", "D16BB3B63F820806338161CA1080F3C27550FA2CD017A11E0C7250AB6C05CD77", "D19BF039874127A1A75045837BA8354C97E32FC8DF242171A6D62CADD37949A1", "D1B56895A302CB106810B80548010A8993C467A6D8B6EA61EB430703400A5ED8", "D1C70BE32DEEA561F5BD20121B6CE6B04522C3B0A34D7DF273B2AA52F0E58277", "D1CB08D31563D582A14B8BAD469844B07F189418B4E4BFBAD4EA8BAA6B327659", "D1D43CB4C651EC344A506E76FAFAC5A1C0BA2618CF89E0668701D13B96168171", "D1D78EF63577D0C55A96DE6D230A5F71960A6086FE69C97C7B4BC31A1E4E38C0", "D1EE65B724C053B8C531DB8F905A57DF1D402D875E50E3E22DD86A5856E65A9D", "D1F42AA8CB20DBF23F25294AF1D5952B14F11D54D59A127F5802F150505DD446", "D20F7E6AE94A2056F80F3A0AB0F6BDF35FC37AFB8FC3E50130D7CE0555BFA73B", "D21E913C6ADECF8EF09DE3D9AEE7C0E5E9B0753FDE5C8D754FBFEF41B5821AD7", "D21F7F512A88CA9BDAC1DDEC3EC46B827F8888D53EFBD5E335A27023C7A16EB9", "D259E621EF9ECC71F1E5CA25BD5CC4DDE78CFECBB5FC21F2E4BCB16169E0B602", "D288D5ADF67DE9C3743BE8316D7F496F7CA64A396C1E8E9019178232D17AF15D", "D2F45C96EB49AFC2B652E7D45AA056C9A181453656E766BAD269586E7F2C3CFB", "D314D6F41721859E8D5FEDC60383AB6653E884E8AE9E086A0258F5AA222A6F25", "D31BBFD6A0A5021EB4550D1A719864970BA2A6914CFB3A966A43FDBBFB5835C3", "D3EFB24CDB958FE8DFD2C179A4F15B7E9D09B5F83584D75E88ABFD281830DA37", "D406490E70A52CFB0315F27FCD957BFAE7E7B2887A6C73BE83E3F514F1153348", "D4552FDC70931CD8B4AD1900AAFD91F4395F28D6E61914A873226147AFDAF729", "D4738966309F02D024D49980ED274C4BC5E10C4678D32CA5CEEBC4FCD68CEEE5", "D4E5C893A250FEAE3B156BCBD1DEEF2119A50FFC25619BC8C5AF90EB197582DB", "D4E8B3D5A598938D39607B0ACD41589F4C775C0E97E425D251BA6FBD21083849", "D4F9AE28EA501CF2A176391E0E920E7B7FC3A2D7D8CE5319FAE6CA44DF5B1E04", "D504296C469FF402F73637F620D6BEA70BC5D37426BFD10EC06DDF72B6870292", "D5669E8BD806DAFD5634A46DC91CB3F3DF803505AB2E560048173E1D18CE20EB", "D568FA3B382C6BE9CD6C3F6692E51D4BA042C287F4A6C7DFC1395A1EE4BFA175", "D57A3E71F6F2F299244E3AA2CE230DA960CB6D78FD330B518623979C4E13A300", "D5953B5AA5D620CA09590EAFE9008DB4A5BD219E8F43809D51B746D7643FA0F7", "D5D9507C1AB5847D97F4847D436FAE4191801D1E7B5024E8C368253CAEB62631", "D5ECBBDC568418EFF7397F83F70168665BB4FE519B1ECA21ED8FCE153E7910A1", "D5EE91437C61DB828864546A9877E1F863FE9DDA2D0B0BA7C35A8B9BDD774A7D", "D5FC186AFDC475BF1011609D51599D9F4054E10263C52218648C49E2D757DF13", "D5FC516E557685CDE38A1C2C470F73080C33F28187E749A00C04F0812AFB9842", "D642B106AEF6A0331D5279B5D198C003A15DD599D9D5027FB7E0DDEE76D361BD", "D64BC5FE778E62F52FAF1A558C46AB9C63D2D06A74FDE22CC1A16BB67C6A0E8C", "D677F4DB1390FE714B817B24CE7D654078B51BA146F6C4537E43D85D3A2B0CC2", "D6A278AD53F24F8C2A141B0CE86714271C028E265EA5E488D59254EE85EA8F0B", "D7223669F837AB80390958B899F52861611C307D6B8D138B8989B36879EA3A71", "D72EC6FCB03104DDC64B007D2272B6986C83232153DF7CA357AA4917CECF708F", "D737A8C94C930B47803CAEB6FC01A6B08302D409FE64A0E40960433AFCACF7A4", "D73990C83DCEFEEFD942F2A50AF426AACD4F1D1610F51C8A150202D7B9EF03C6", "D746FCC42AA4EACDC97DAC1D5692FFB0BC18A7F167436F4A8BC474A41F66704A", "D7631ACBA1AF1A9B52812A58BF3AA35ADF9FF7484F93C8ABDF833A2E3543B207", "D76F4980D06F4400991FAE8F98C49106DCF125713B9325635CCA2480D3904342", "D77134C81C99E57B976FD13B327D499D7859624EF6E1B9534595C21A83A1761B", "D77354293ADDF3F8579814EAC2B35D20D0CD45ED626E77A317D6AFE7D4D18A9D", "D77771C02C6376843FB0E711FB076CBE28430C3CA93055946AA808EB2C0F5EEA", "D786761B0B2DB5C7370185F18DFD1990C653F5CA978F07DC85476F6C4C32F95A", "D7AE1C4EB851D09FEF6CF1F7C2C05411671D5DA04485AC441DBCF36EC6BF5613", "D8582663E621E7FA23FD9F12EB4D3E34A5AF5BAA61771775D239C395FB2A8F65", "D8662E21CA6E50B88743F5D6B3386AB0B6516563D0A4CA50F9B7DF41BE9FB2A2", "D86D8C366E2D62A174FC13CC280E324FC50FDC33BE3CAC167AB7E803409C8C2E", "D8F9931E5D5371D32BB24EDF7600942E30D9EF23918F3348364E77DADD5D4565", "D908DDC72AA29C650430DBB0140A05335CA1A6D3BD0D4034C54B4E2D80DB9EB9", "D9172969D61CF2C2B1320CAD15CAF5A2806FCA9580D5A6E5A2E2C98FF12E2386", "D9425756DF631BB7CA03B3451BD1F9C557325B8A2BB0CD34A22102962A0F4213", "D9DA80F42942BF2AE861A25807D73FB3CC5278F385F44A69EDF3332A73B6B7A7", "D9E06E5C382B357DD50008C0D277DB7D1B6D088C158C56C3D022303F1DFC00A4", "DA39104C275021EF88649293DFAF282637E8219443A30527A58A6E25E7ABA491", "DA5693B45D837E9F7AE2D7774F00B89CB743CC916CC5F6FE9C57B7B0840EC498", "DA815A7C4A42ED491F84873B4248BBC6BF0CD175F8AA4219C89E764FB61FECD4", "DACB3E9783156FCD47517FD5E71AA5A2242EAA043F56F2EA75EC325BA052BDDD", "DAD6E642502813DE6B9563D13D4513415BAE90E68BEF31D45DE8D7346CF0EF4B", "DAFB6976639A3A0CD92E6E7C328A7D79DE7ABB5427325AE9867BF17CA6FD2D68", "DB53C7C295FC394865150CA5853523B1FA54709666A98F3C90B7B2FA4539EF15", "DB5B613FF01D85002A99CBECDE5D8BCC843EA6A15897BACD6AE9A5FB2A8C4BE6", "DB793B8F552E5227A3028E673D5E0E2B3B7676384EABB3A296BCEB430AB730D7", "DB866DC8DC23646847AE5E9E25C02B2DF2A195A414B2734DCAA102E637957BAF", "DC0307C89ADC9BDECEC60787C47BEC8B9B8EE78D2B6C0A47849682B1DA27D02F", "DC05F94C20E54530B22A0F7C5D47B16BEB79F796391043B6D8D2F3934DA6C247", "DC103410561C74F2BE482D1DC9D39673C4CA0201FA7430A6DA0052ED558DCC5F", "DC598384160FFCC4F7196BB511E6CD474F036CD26C81C27C5E29EC3E0F1BA6FD", "DCA6C0610E9C45CFF20182F3A5A4D478C784CA78328DEAB4C09C1F518C77F206", "DCE0106A659E699F4DA07533B77646EC0B7E48A052BFB6EFD979F81F848E6509", "DD0EE895B8C1D023C4A9C7DA2726D4CAC8D1495A05DF9FE91915F58FF012245D", "DD34B9BC3B107A1DC572E91FE164C11C4D3B050CFD5A53884C66DA680566DEB4", "DD6273CC27D41DD4131BB087201CE6DB714476DEADC754F0E6CBE0F838D02085", "DD71E3BE311976CFF7FE89F0916C7047300E0A1E779B1D8D85CA991081F0FBC3", "DDD4AB992BDFCF47B1C63583774DFCACB217D68082641AA2E66EEFE336297568", "DDE4AF791505644D82C64486A6D96679963A6094CAD18F4FFEF3390F81B5FCB8", "DE0FD4B46D08CEF1DEAA575A9047B1B4606E41D3DD7B29408B8769EA341B71D5", "DE1F157EBE7E7F006D558032FBBEC2DAE20F24883C6F27F6FD7F815DB04E6D19", "DE3422F091BEAF937A6AAF2F474509A669B7CE95027496E1A397C52DB56CA841", "DE44391C94BB715897A8B583FD2D6C8C328CA1F3159381E81D279354B4654987", "DE4F110A7CB26F3EA8F2ACCB627C82FCB649AEF4CEEF6D8EEC438EFE0B327978", "DE8C5DCB7F07498942725CF8F7905DBA001C7B89D3D36370CC303A274CB9A8EB", "DEAB63B690E03D8E8203ACA19836C2D36A8ED9D5C66A32CCF4F7F6B6C9F8DE84", "DEC494F55ABC80627F9922FA720AAE0C49EC8DE72ED30A9C1A008F0F56CE74CA", "DED899C681C4F01F658F5349E77058BDF8C51E88FADBC17AC63AAD856B4CADE5", "DF10251E3781DB89E977C04275F005CA31E770A1B5E3D3C3549F931A61FC1418", "DF191538C8CFADC9C4FBA779294B9A47AEEFD56EB05A6B7BA858EC03DB26B960", "DF1F3615A0C3950BF1BCF7F7E12370C0F3A7DBD2E12D656DC66F966233BD6A40", "DF4E13C85EACFEE2051B7981ADDB31432F47A19BDF5522096B79CAE0037CA8D9", "DF63783429087B5486C3BD74B359536E1A11AE36CCFF2E12974830FE3C214C0A", "DF84FCF323E024866FDD23E02AEC61C6C6A2158E8837A17D58751EFE1AD29BFB", "DF989094B08F10BFBA2DA2F5ED5CF27B371F00C6520140A5C25FA34A1EEA15E3", "DF9B59BC934C48506F4D68C84F5DEA17D2F08D9BCA7965865D56473802FC2BE8", "DFB2B8A17991C21AA572BC3D0FE7E4D2908FC84F553760CE8368AAFCE6C462AE", "DFB4A89370117A0C76AEBA610891449C199F7498B60521F9612F1A48A7736A6B", "DFF1640DBEB48B8BDF07B3856E1B96CFEE191A513A8879122CB35B6ECF091230", "E01E5A9EEAA961C6342F940CEB3A3C922598EBB771E6363B3C7DD8D9E7EB00FD", "E04842499BA6DBF5423B1C2D99E7E204D6DCA991703C7EF467D56949F4429941", "E04F9DE1174EFB4A26CD756DF59E4C46606A4BD4063992B465E76804515C6833", "E05CC151FBA87195514CB65A3CB00BD8B2697F1C08602EC6A35EBF3E97CE31AB", "E0843A66F8C9DD3021DCEAEAFFE1FDB9DC8A74785B6380C1EE79C5C495C08EEE", "E0AC0F2CEF0686FD5D35D040E442195982E92EF98BDFD841F5F62D37D0337B68", "E0FBFAA940E6865053158882793F5EEC6E51FD044C74FA18C715FAC72CD32647", "E11D1831D193AEF5FF2EB9D7788E4B69929BB9B8080F134F95019007DD6ACC7C", "E1A1D552E78033169678134FE5961F6004062983C1F460B7BF4BC91470F5CDBC", "E1BB387A78EF45ECA68CCA2BB0051D10F9A7562A2470DEE2694CC887B32FFB6F", "E20535CF9A056DC817B60582190FBB4DDCB7E1BFAA691A8A3587856D26D28792", "E2269D81D607742C5A692E0D3385E0A29AEB1965018855BE83E715AB78A81A07", "E227F6C1872E7F9A67C37F74BF85374865A13419EF761CE2F141A77A56686485", "E2381A6E18E2453CE7B305652CBC894FB1DA5C1F14445C38A8D61EB54D2C9A96", "E23F7B0954D8804CF73BA94A1EC50BB525067CF5C982BEE6402F9DE045B28EF2", "E2AA9B11D88890FE4ED3C245CC3A519ACAAD11F11F032D2AE032FE428B8C4012", "E2B86254D720126A86E0D868B69F73304F67BBA828605033D214DA145B7078F4", "E2CA1E7AD2646F35FD854E930E6AF030E58817DBF599A59E49719694B3B46D1F", "E2E1AB8B9E10CF0970D428552F10FD3FEA7D405315E7CCA6431E3F0E8079B159", "E33F6434570AE9B0FA0C3C9527CEB2AE08E8F2632A2EE39779A824516A52B730", "E34369A48BDB40E3444EB1830AC8F91409460E39F5F36FFA5CED77D91880982A", "E3F560319C0EA06228FA2D0D5412CFFD95B8D0963A65CBAC4B6D424BA4B7B434", "E427E577C092D166A5846D52E6B9BACDD0A8FCC7A9523C5303F78450BFDB3801", "E46E249A2A7ED001BEF59F483830A2690EC2B94A16D5E8A1028E94B1AA23DA4C", "E4AA5C802C4C37F77A1DB7FED935F8D3298813C891D2FF1F2BF04199798B3BCD", "E4B907FE5279D8C6CE8330CC79305C67649550BA06CF29D70ABB593E6074803D", "E4CE7479089E915C4B370974E3FF482D5EE842E39F0AB529ACA744F7ED4A4FCC", "E4D093275B3398CF07F3141B553D072C5304E4F560EE4AEFD306FE5B5472E00B", "E4DC5C75AB8DC1EFE3474E65C33B8EED76C2B358258DE3E2C7A0C0EA9FD53126", "E4F82B1EF36905183E848EAEFF844914F58061E9D484E205B7784B8B5BE99E13", "E5029DD7DA3FDCEAB13FDB9D0B634A06F7F47565C556ABBCC97B9CB137EEA1A2", "E5138E231899A09B05DC534B4777976B17A0246B1FA15B8342DBF280F6CFD669", "E55EB8027358DE1AD27E7050230C732BE83AEBE03071BD5119C4B597942CDB65", "E561A98CCA0C37F9632359964F9D54A73A40FE85E43AC2076266F8098DD97EEE", "E570BFBF15ECCE5A74D318A7E9DE630C6BFC61F10E22B6C9C1C7FCAD37BC2054", "E578CE4DAF2FBE99C4203EB828B722486AEC821D6455FE4F5421835E95A445E3", "E5BBCEF719E615994F1B258C759E10E101CC12EE74BBCBA1AFE726D5AFF29509", "E5C9021CFF3428F4B3B0F66CCD3134EB51552CD8CB2E83DF36DD8403ADFA8179", "E648FE893730BFA7050949B16F8159E217D9122952837F128792CC653052A172", "E64A16E1EADC561902F9E2D48B24499BE313FE1050B4F3407F4983B0418C66E1", "E652AD074D4537242E4F6F6865F5497FE3BCB4D68389AAE0D3EB706D9D1DD1ED", "E68E7A32ACB8D778632DAEBB02B9810E67DD8FECF939F0D6F83989B5A619341F", "E6CDADFC7E8DFE7568643BB3E70DE70E20B1F339E747013D400F4AF8B0D1C4CE", "E6EE20198BD4C32711820E67FB3A052C1C4BCF0D11A5A4BBA683215A3FA5825E", "E71653F6C2EC1FC2D0152239B517F704D43825AC89591A339D710904A59C7ECC", "E71855EC48855BE02A16779F38C95DDF6E9480BA43A32DC813AE1E9FCDEB7139", "E741937E3B5774C60F53A6CA045ED9E4F22D4FF1BD6E4E553A2D0AEA6515F89B", "E74C53C459F7FE1C89AE67FEC29B42B1B0BF95AA1A5FE3D3CA36BD71ABE75230", "E7653A5862D76B5A32167F623532FE5567AFABF9A426F06C2CBA21BE4039657F", "E7656AF9CD390F5923F2057D1E129C55B9278BD1872617B38D1DAA13A55E0AE0", "E775C68CA18D51E91E688F1880BD5AF1955B5F4DF7397FA28CC721E37DAFB99A", "E7906322F98FBB29B98E71AD53BEC6A95CEE2591511DD1DF4461873A681910CC", "E7916A39B8F8B202061B3356B641D9B0DF934409579E8BA6EC2F6E7C3BABEB69", "E7B26BFFEBAF5940128604225876F93CFFC27DB258C37295462DEA72EAA99A13", "E7B26F1EAEFB4260D24EE36CC6F4BF7A433546C3ED0AB3E0C2C3FEF44B61DA61", "E7CE2EA6AB2C632B7F613B9D475D4B193944DA0AB55A9BE076C1CA0BE60EF512", "E7E3551B3BD388636A37375B3F6439FA5E8D471B186B7E9F88305EC0A265E5D7", "E7FB5735ADA60C1184A568F1F506520CF55F0E3A61B381ABCF4FF3C5090C8998", "E805A2E822F9F587AC809C6A8CA399694FA0BD883078F64EF001D4B79132B879", "E81A7993ACBB1516F7D6F53AF0BD65493FE3E87E11CC696DB43234F62A8E5303", "E83005894DC89C4AFAB4CC871D11FE9D5401B87941128CA914162F9A5B502D6F", "E8302DECE1CECF16A05E7F8FBA08D33074F30279F18CDDBABA912B9C9DF9F32D", "E86F95B423516140DF23D5DD16D74175F74D96C23CCC412FE50D4D07B828F8A1", "E8825B71ACE31BFAA5662E2357C5EEB425BA842AC21E60C761364799BFD2FEE3", "E897D1A4990203E71258DD5381D3DC4CFBF7C83C9F89FC87BE153CA799182393", "E8B622A20154C0D070D4BFC473B062648A8B30F2DC4928FABC794E27583489A8", "E8BA6A75873A4594BE92FFE48C361848E9581DAA153EABDC1D071E1A59172338", "E8E3D041384B3A1C50DFC8E8DD6B7415911290515C88A2C292DAF367F018B0E7", "E8F51881DAE14FCDADA936B8D5D5F92A4EF77D876EFC3AA37A50B86D7AD4FB8C", "E8F76D937447220B7029E798B0EB262E5709AABE065EAA8B29BBA9D0C1C07EF1", "E90F2758EB55FDBC299EC4F9D774418DBCCC47DB3CE55D154EB978135CCA6896", "E94E3F558B12457990C6237C147DC547868710DA658DAAF391DA1D69F56EA2A1", "E9A8C23824FEB3CF54C07A25B19E265D1905F763E9CC29B4410E2EC85F28EE49", "E9F0B13DD28C1AFA3EA944A83A0281284C2444069758D5085ED5787CB960A8C5", "EA14EC6134110E482A82A70BFDEAD48335455A70FA71C151C62860AACE47AA41", "EA3EEE268E5415412D9A6A66BCC38B1F333B86D0471F632041E1C2D0F0EB6B51", "EA3F9619545419A098A554C6AA49233D406E118A8A2221EEFF0BABB483AAC02B", "EA52924E34BCC16950981552A3FA767720FFB0ABD2C4348121C16E9BA6BD4C80", "EAA151BD20DEF6EC8DADF4A62542E391DD1AEE04EBFFCA9B424F80F67450F7A7", "EAAB3057567AB6F8526CB95E1A63C65959A6EB76CB5C61A5E8F66111A2539F55", "EAC404329213DF471FF757B7F009DD8A087FC2C57793182718799AB73514DB48", "EB1B7991970BC557C564AB01263AD5A909B1D2A0C731464B7E2301EA1DE33653", "EB58ABDFAA1D2A9C4F164D6FC9FD899843DF1F1028ECDA035A0F0C34CD298FAD", "EBCC12197854D7C444B518B80A223576FCB219A088A0CC929C19FF2993DC431A", "EBD6110D65EB41702B40A5795DBF9BE4F150B84442976771BAD2D5EE26847349", "EBF7FAC69068575846327A4CBDC56FA371BCD390746BA7B0C955566A104AD9B3", "EBFB2438D75E8F72CF1C93F67530A33FEEB6EBB40BD3883F85616AFE9252BCE2", "EBFFCC00EDD65F45E051073EAF518CD443503E46CC247513E4B973ECC7C31531", "EC044A02B0E22A7ED1DD2C720609594A00EB70394CDCBBA50C26D4638B96FC53", "EC44FB8E43A4ACE3E70572A9C176DA90A44A471EC4871646DA9BC2ADBCD35F57", "EC86313D6483468E9B47B2CDD996E84DE97ADF5C46523C17EA3354E6CFC4203F", "EC901B4BA3E93B849C03EE9C16D29B47C4E418CBECADD7497DC8980F85AD0AF5", "ECD5F4107F4577D44F48EA90E5DA9B65FCE96715BB21DE2FB949370278F108C8", "ECEED5B9B0AC37EFF59F062DB93D98926977432CCFE14862CCF14B8AA65EE864", "ECF94CD709B61C20F946E5179B30A15F9B41F0F9C28A9FEF40A45A0C7876E1CE", "ED11CF0606100E816592CB9CC87F176EF4BB64094BA5B7978B3810737572EBA4", "ED1E746B4A444761DF86B7BD074E2911879CE51C4CFBB278424F2A23E63071FA", "ED2D628E2B845D710C7283E74DEB57A6ACCF26A841A9E4CC3B811EEE14A28F24", "ED3F9D59555AC4A2875E30DF435F54F0C2E377659E1A8049507303176FF60C39", "ED5CC772C4879175949A026879AB98730A2CB44FA2A70F04E865D49394F0358A", "ED670677BEE7F824FAA4922AD08CFBF43478203FCCB636E589E6854737336228", "ED796DA12F35B849EC739966324C81FE11BDCC6E2DCB25F912D4D4A08B754359", "ED962C022CE6B7157A6A1DC3A2A82F64E0886D5E173F3FA15D86D6E90286EBBF", "EDAF5143E634E5EF55D5C0186ECF166CE8CE37DFE44681979D15F0D7CA2DAFAD", "EDBB640D9C964C319A40ED15C23232FA8D49C6B495D6EF19F248B4A314B7651D", "EDC6276764C331FE5381EE2663A1BD78777530A7E872A848558618A96CEAAD79", "EDD093484D30137351819CC679BCE37DF189A386F2BF2055FD557CA44A4384A5", "EE31BACFE4E2531B3AC2273027A23C49C59978284694658A79B4BC6797F86ACB", "EE481604503D792E94470946F5FFEAF3C5EEA645FEE27DF2E749C3EBAA476D91", "EE6A497E94604BB79DF6958408A4B3526A8046A68E01669E6E70BBCF080D8A50", "EE7D5FC311EDDD74400E79AAECF24A3DE3AC29BFEC231105E6C6DB7D45D4329F", "EE97925BEFF648A4BB6FAEA986B8A0599D52F38858C704DFFB21810047B59404", "EEA62F1E22625DD94DCCB0589595568778E3741F59D9567E915C46B8DCDFA74B", "EEE380D4251EC8087F70E591F9649F8F72DC3CEE1BB76652685094DC3531CA8D", "EEF101D0DDB1D237D21D94B2D88A5874AC0D65BD55AFB7331FBAAB8F36147114", "EF2166DB5EE8BD87E1440D3823C327B8BCA46A3FD349720520FD40C591911F30", "EF6337B3BE8850DC5B93DC33DA6E2610AE8AC00F05BFD07EB43C35AAAB391818", "EF6DDDE67CC12C367CCDE00775111E8D298AFCD89C1584B532293E6AAEF36962", "EFB4DC6EE5BB712BE09DD07EDAB29FA29CFB142A858D307E3EBD0A3593DB79BA", "EFC1B556A22098087C19B5342F262C1D63356C91A618DD58A453DF339E10D8AD", "EFC5081A7337AECE7C7850735C381066039B8C19360377D151B67CB84976030D", "EFD4687D2DC8ADFBEC960932263D6DA222DDFA92899BC72A9B9D62B4331178A6", "EFEF2244E948829C5D18D7E375890D878EF65279FF91004B2295614B4406FAED", "EFF93257A781FCFEECA4963E3054D298CD7E1339647B31047F4642346AF278C5", "F022B1455D4614E425E2D78BC02FFB6A7F2D5B177BF3F93F521E8EFBA5BEE1DE", "F0259373A53F6B73B3C7BD9A2F3F10DB053D9CC563866E61F5A496D33B416EA9", "F02EA1DD204629897DA1861F147A272B72A3FA34A5315D58B896A636EAE341F5", "F089B423DFC492C6D9F82DF4266F782F2A2A4B91E656EBCF4516C6B6412D4684", "F0A55A55FE75D7879ACE84F93E653F8A50B8249B2C7592738EB4BD78485CC785", "F0BEE71D1E1E1F410EAE7CBBF899A463124708682905DE5AB537B39047C97A14", "F0C6BC6B6E0BCD2F79CA2CF94A9D9909AF0E9117B13EA219F0B9C650CC1C6C47", "F10F8D3E795F8FC960C9DE67D3C8A350C036905B85F3908BFE6956BF772DB36B", "F117DBDFED6B212106F9E2337E83226A94DDA2D7BE2380A5E5AACD18D954EB5B", "F1319E2508F5C112B37A4A6D292A000AB7AB824FB75E0C9F8948F655DFA754E6", "F1A3DFA7EB79FE51E9EE40DE7EE818B3181F7D6FFEBD16C7E5DC5676556369E6", "F1E13830189EF724267AE210258121182D99740D98A2D34B36F92619C8D706D7", "F1F4B6471FE5DE046CD2C2806192CD966190888F90B300C9E1616BE3CC7833F1", "F2018DF6B5783A154F66D47CF61A02700B33271E5A9BF9B7EA3DF4AD976BD52B", "F203AF8FB4A9FED8F009C8BF5E3F7D7714130DCBC84CDBF1BE1C83E438B18982", "F20FBF9D136DA66B16B24CC6A66369A721A4C8C12FA296FC3E2278352AA17707", "F243281320AFD7E2710EDC7B3D2DE73901C6546A063CD6DB1074893EA50F7F8E", "F2719E2760E07B98F3971587EEE2002655F8B8F5281074DED92EF416C43F19C8", "F28901CFE45D1D428C63CC881FFA753E9073E21717B6E26FF45848C3370F2142", "F2C4BA36830A3E16E740360966F652EE35893013E62CD8ED626B888522CB35A0", "F2C60EF9E96AA9B7F20810A32ABE6C58279506718A61C2BD9D6A6DF787CD9EA7", "F2C6F73567D1EF939E0A7A3BEABA49374976591C6C10FEBC5058CCA1937D64FE", "F35EB0C55F08CA4C671A4E6D2454A08936C6D1CD868709D0EE04FB71FFC263C1", "F3B0263B2CEB2CD2C7EC6BAC445071D5028F9C2CFB6E00675AFC9760F694A09E", "F3C56D298A167C54BC76431CCC40FC7D20D12B41ABC24DB21359C9199EB6DAE0", "F3F852CA57F1D635AD9D70D1C461917BDB89BE30E041807BC8773FD8BCD92529", "F426BDEEA0109CBE44C73C53461CE7144BDD04ADCF7EC044CE76723EAE672095", "F4692B505BC9E264AA4E55EF77DDB690587AD3D9F6CAEEE155782770E30A551F", "F479B1D4D6CE6F94562BE83AEBC7D30E6633A6727AB24138B99039D7EB3AB70F", "F4FE885A6BC9AEB4C185D8482B3DEF27D6E84C4B6C26D95E30D9B479724E3080", "F50A6F6BA5B32FE7E7B5465ACFA2151CE81FE9DEB6C0E87419E72E0A87BE39EA", "F532C527613357C6A2A49FB79425351FAA7200585028A4FA9898C13802895FB6", "F5EB55E6DBF388E7CB6C76AFCD8A50A86C1FE6B41E6933749DC88EF56B7E408E", "F5F0C3149F7A36CDE1F7DC845FBE96ABC6CBBABF87FBB8F491B35354F0FE2F5A", "F62691A32672AF34E201E6A62FAE9008EDCB052DF3846E1F1D2194C5F194833E", "F626B1C8DFCF6E27BABB7D9FEC40C88828FE8F0BBE4A01EE9B80C86023455567", "F65F1D96E364841337F0770420AA39E180E57CF181628F15C7259D9D9A9E8BDD", "F6697F7B335B13964F9055910F3DE232E816E18DF95389E89281CB35606768FB", "F6890A0BB30FC9732307E597730D53D536A20EAEFE164094FE4FEB652AE43D3E", "F68C384B4760C4C1690DFE2C31AFDBD9A433C970594658799BB7F87D7D1E5B01", "F6BC10354A07CCD87F52BAC1053D9E1403CC47698D49BA1AAD057CE5C0DE00EB", "F6FBAF9F621BE82934F06ACC7BBD0AE681C730C6667D64ED6ADBE291FD89FEA0", "F7232359E6413A274B62C22CB7BF1EF8C428ADFBF22EF7B9B913D63D087BCACB", "F77ECBE728239B27998335805016034242537AEADE19138FD401815CAFC7269A", "F7978EB5DBC47DF445AD3120B44940BF7D9AE28633CDFBDFD3C4B82DA579F0C9", "F79C55C6B12CF25BAF2CE3ADC73540168422054060C93C15743B4B5BFA4653CC", "F7DAE24D8826427DFB2FB253ADFCF734E30DB6F86134C9D39D5331118E6FAFB0", "F7DCAC1590CA0638E69528F99D31F6D4B9A95B8FA4DE1510B3B499200134FE0E", "F7E9A120B073FA97A3F29267E53D0A8DBEB62DA2D27F471D3DA4C91D68B77753", "F80F79BA6DF67B9B276F50883A8B337A4582F3460556D772819BB4B8E40450AB", "F819B5088D56221A67A8DD0AFCD20489D289C9071CDF9233380C06A6CB97CF82", "F893D038A57BA04F8729F3DE38C7BC0A6AFB0E2589EEA9C12CD5C4BB8072ED2F", "F8949F00CDCE086FCFA5F40AFADF9DB9E3B4DD10AB910034C41279EA96313C2A", "F89D3081DA6B5CB2F4FF097D956A1B15C95A11155B2977DE948E9FE8ECD15A28", "F8F03C35A3C8AEA5027E6C01D991D7E1C3A4A0C9EAE0D875ACF760D1D56B8B9C", "F94E2FD93352C1316CE6430308206EAFBBC673CE41B3E1052A98C80E2798D9B0", "F968064DF1D870E093FB1CBB6C9BC42A2AAB61D61095B3E288687BFC31A52BFD", "F96C14C4670BF2970578877304F86FD985860F96EB5A331A5EE62FAA61BA548D", "F9733852E74294E6BF91BFC8E0D7790521726ED7E5FD3358C473AA92D450B69F", "F98BEC356DD90D730B85A69226BDC5C7E4DC1C091DA534EFB69BE5603DE0F98B", "F9CB770C5B8A2294DF8EA0EF427572827C6FA0BB5C5E3EA1766A8830336C32AE", "F9ED99C3F4B2D868A3826BA34135EFCC7EF1978329C535488F23E6CF98DA913D", "FA34AB524DCC0D2202353013017C98ECB94CAA58052F1F0ED148FE18507F5738", "FA90A7911C85ADEB12B865581B20CE95E3F9ECDBBEA139C43CB0A41CA0544B89", "FA9ED968104954EB988C909D0172EDE1820CD4048D551732A9E7225DC2EF29A3", "FAB85B7F13808580670E0DDA61E3FA4A6A4AFA2F01B60BE03DFA6B1BB7EE7932", "FACE47A144B851A6BB630C0FD63FA2BFBE0A19AFE0A7E1A993E530FC0BA6BE90", "FAD5EEE9FD5547B3BC0F26582580EC66DC6193FFFF5B317ECA1DEDB5F001336A", "FAE56F9F0398527C892EF913F65F63AE5F8AE952CC27B9F4B84E792BF2211CE0", "FB1C6D91CB317C2C62AC18BDA4057D5D7A2C364EA011DE23BCA4E0ED0F4993E1", "FB294BF49176D6C142EF1CFE519D56E0B6967174C95D88BDD800F026AD0FBE3B", "FB37F0F7CF6522CCB3B684C95B5F64BEC8DDF83F29BF1BF109AD27B6810731D6", "FB3F70E70F0C903BDF5EDC7C819CEED7E5FAEA29EABA59C2EB291E177063EB61", "FB43C322D859482E6F424163C13881EEC31212B103D2BE6DF6958A5644CEC6E6", "FB73DD29E703B2E5FE969689D0C1C72E123F823CDE33C9FB0AA1F550080057EC", "FB7767D2479CE90F8E41353C5A1CFE5538D8D792872CDAD36296F6141E41513B", "FB7CE089404C4E104BF171B9208D3607A7879A5E9B2FFD4D21234D829EBAD29F", "FBA658AB7258D6E577137D42B1A2D234254671E3792A2242E92F22B44483BD23", "FBDE9BE1DCD3C192C9247062192D5C2056370389FC70704F2A228C20959BB676", "FBEF03A095B8D1E19B9E4037A274023851826F494D85383B4064E73E0E5C4B81", "FC367D3847B3B18A075985BFC8A2A8898C7B9AFE3FE16A6F84968131CD5047B4", "FC6296A9B395EBAE0CB415D0A216FB8D4651AD896A534D3F21A75885E306030C", "FC67824EDEA7266EC4ACC4A9FF987D99A6B7A246B5DEA115F33425EDCEE6D155", "FC8CA79FD2C6CBC557F053DC4CAF87FEB39E7073F9BC87B640242B449D46DEBD", "FCE07050809EDF0FDD5519879C9E4BCB128AC13A84C2716F0B87AC89A1907CD6", "FD2209B7CB15638992B681C2106BFB54C56CAD087AEDD9B4249C0F8E7ADCB3D2", "FD3B6DACCDF2917EDE59BC97EFBE6A2BE91294E55463A289E02F5106FB9C2596", "FD78E00A34CDC9D7D8091CAA57CDC14B83E54362C87FEC9329E3CF442952770F", "FD8119B33DEDF86FA2C0B8DEF589B3CDA23F7A94F61987ACE6150DCC9B9E9CD4", "FD89F92B8829CE7392B47C0ED84C6AFC3595DB7DDA24639A8AB325F2C83DE0D3", "FD969E1B5297C32E77779144D221CCB6F17C2996B3074A2123C9148FDE503045", "FDA1C58A907FB5C9F6CD5E9B7632A71F19AA8263ABCC465A805B3F7EE2E1869C", "FDBFA660F5F9536D14D1AEA47B8AD52194A56B7E998A98510729B3B69EB70975", "FDE1BF635D60EE0CA8051E326BCA1EFB7C7E659B969B5B079432E17D2860391E", "FE0952C328022F7E88539E801342AFC03132BF9060AB11DA5AB172ACF0B2B21C", "FE1F7929A5246356FBE2342F084D581EB70488749FF87514742F19541C0EDDB8", "FE6A60EA653FEE6F655EBB8429BCB70E7D54726EC0055ECB440856BF66B419CA", "FE6D95CEEFE9596CD6D6134F8326AB13E3C97D550B3E62F57DECDBDBC51C329A", "FE92891352F62141E1660E1A95087A794A20D312AEFF1AED380D11E9110B3439", "FF2C2BFCBB90602D8754D2DB410E2689E4769FD1BA87A1858A65C8348DF8BAC2", "FF5A8A25C6F29CF39641217FCD026C317D3243C49B57A257E96A9297D83DE158", "FFBD74E0F454FF6A49CA3F34C7271269653B26F1B1272560F1EA3CC07A2021C8", "FFEEC184B6E70C6210AE293D53A3A1B1504EA119812486B8160ACE05A643D9DD"]}, {"type": "ics", "idList": ["AA23-215A", "ICSA-21-306-01", "ICSA-21-336-06", "ICSA-22-055-02", "ICSA-22-069-09", "ICSA-22-097-01", "ICSA-22-104-05", "ICSA-22-132-02", "ICSA-22-167-14", "ICSA-22-221-01", "ICSA-22-221-01-0", "ICSA-22-258-05", "ICSA-22-272-02", "ICSA-22-286-05", "ICSA-22-342-02", "ICSA-23-017-03", "ICSA-23-047-03", "ICSA-23-047-04", "ICSA-23-059-01", "ICSA-23-075-01", "ICSA-23-080-07", "ICSA-23-122-01", "ICSA-23-143-02", "ICSA-23-164-03", "ICSA-23-166-10", "ICSA-23-166-11", "ICSA-23-166-12", "ICSA-23-194-01", "ICSA-23-320-13", "ICSMA-21-187-01"]}, {"type": "impervablog", "idList": ["IMPERVABLOG:45FA8B88D226614CA46C4FD925A08C8B"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00598"]}, {"type": "jetbrains", "idList": ["JETBRAINS:JETBRAINS-SECURITY-BULLETIN-Q4-2021"]}, {"type": "joomla", "idList": ["JOOMLA-816"]}, {"type": "jvn", "idList": ["JVN:15317878"]}, {"type": "kaspersky", "idList": ["KLA11641", "KLA11784", "KLA11785", "KLA12311", "KLA12321", "KLA12322", "KLA12365", "KLA12366", "KLA12367", "KLA12407", "KLA12422", "KLA12436", "KLA12485", "KLA12559", "KLA12588", "KLA12589"]}, {"type": "kitploit", "idList": ["KITPLOIT:3050371869908791295", "KITPLOIT:6278364996548285306", "KITPLOIT:7586926896865819908", "KITPLOIT:8873655879415683009"]}, {"type": "krebs", "idList": ["KREBS:62B4C5DD1022EFBE81E351F756E43F36"]}, {"type": "mageia", "idList": ["MGASA-2018-0431", "MGASA-2018-0475", "MGASA-2019-0135", "MGASA-2019-0148", "MGASA-2019-0318", "MGASA-2019-0399", "MGASA-2019-0407", "MGASA-2020-0155", "MGASA-2020-0166", "MGASA-2020-0232", "MGASA-2020-0277", "MGASA-2020-0477", "MGASA-2021-0034", "MGASA-2021-0054", "MGASA-2021-0055", "MGASA-2021-0064", "MGASA-2021-0071", "MGASA-2021-0099", "MGASA-2021-0100", "MGASA-2021-0101", "MGASA-2021-0102", "MGASA-2021-0119", "MGASA-2021-0139", "MGASA-2021-0153", "MGASA-2021-0168", "MGASA-2021-0176", "MGASA-2021-0191", "MGASA-2021-0192", "MGASA-2021-0294", "MGASA-2021-0327", "MGASA-2021-0357", "MGASA-2021-0370", "MGASA-2021-0371", "MGASA-2021-0378", "MGASA-2021-0381", "MGASA-2021-0386", "MGASA-2021-0404", "MGASA-2021-0418", "MGASA-2021-0419", "MGASA-2021-0428", "MGASA-2021-0435", "MGASA-2021-0438", "MGASA-2021-0453", "MGASA-2021-0457", "MGASA-2021-0463", "MGASA-2021-0474", "MGASA-2021-0485", "MGASA-2021-0489", "MGASA-2021-0490", "MGASA-2021-0507", "MGASA-2021-0508", "MGASA-2021-0537", "MGASA-2021-0538", "MGASA-2021-0539", "MGASA-2021-0561", "MGASA-2021-0574", "MGASA-2021-0575", "MGASA-2021-0595", "MGASA-2022-0002", "MGASA-2022-0009", "MGASA-2022-0021", "MGASA-2022-0022", "MGASA-2022-0028", "MGASA-2022-0032", "MGASA-2022-0077", "MGASA-2022-0080", "MGASA-2022-0084", "MGASA-2022-0091", "MGASA-2022-0092", "MGASA-2022-0095", "MGASA-2022-0100", "MGASA-2022-0101", "MGASA-2022-0105", "MGASA-2022-0111", "MGASA-2022-0113", "MGASA-2022-0121", "MGASA-2022-0122", "MGASA-2022-0124", "MGASA-2022-0137", "MGASA-2022-0149", "MGASA-2022-0168", "MGASA-2022-0173", "MGASA-2022-0177", "MGASA-2022-0203", "MGASA-2022-0265", "MGASA-2022-0314", "MGASA-2022-0339", "MGASA-2022-0340", "MGASA-2022-0435", "MGASA-2023-0039", "MGASA-2023-0095", "MGASA-2023-0138", "MGASA-2023-0141", "MGASA-2023-0230"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:0A61417A438C7DDFAF7749BDD909CF11", "MALWAREBYTES:30F9B0094E0BC177A7D657BF67D87E39", "MALWAREBYTES:A4F71EAE9519BD2DCD54B442CF67088A", "MALWAREBYTES:DACEDE0F6B5888B6C6E281338C4B9980"]}, {"type": "mariadbunix", "idList": ["MARIA:CVE-2018-25032", "MARIA:CVE-2022-0778", "MARIA:USN-5739-1"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY-GATHER-JETTY_WEB_INF_DISCLOSURE-", "MSF:EXPLOIT-LINUX-HTTP-SPRING_CLOUD_GATEWAY_RCE-", "MSF:EXPLOIT-LINUX-HTTP-VMWARE_NSXMGR_XSTREAM_RCE_CVE_2021_39144-", "MSF:EXPLOIT-MULTI-HTTP-SPRING_CLOUD_FUNCTION_SPEL_INJECTION-", "MSF:EXPLOIT-MULTI-HTTP-SPRING_FRAMEWORK_RCE_SPRING4SHELL-"]}, {"type": "mmpc", "idList": ["MMPC:07417E2EE012BAE0350B156AD2AE30B3", "MMPC:0FBB61490D4A94C83AEE14DDEE722297", "MMPC:42ECD98DCF925DC4063DE66F75FB5433"]}, {"type": "mscve", "idList": ["MS:CVE-2021-22947", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "mskb", "idList": ["KB5009543", "KB5009545", "KB5009555", "KB5009557", "KB5009566"]}, {"type": "msrc", "idList": ["MSRC:4016FF02733260CBC5200B5091666FD4", "MSRC:68FA6D02FA64FF61F41A7B1A8E364197", "MSRC:6DA934C9E783C787D408548AA6F1CEC3", "MSRC:A49EE2D875C0E490BD326B3CDDB7399F"]}, {"type": "mssecure", "idList": ["MSSECURE:07417E2EE012BAE0350B156AD2AE30B3", "MSSECURE:0FBB61490D4A94C83AEE14DDEE722297", "MSSECURE:42ECD98DCF925DC4063DE66F75FB5433"]}, {"type": "nessus", "idList": ["700509.PRM", "AIX_IJ28226.NASL", "AIX_IJ28227.NASL", "AIX_IJ28228.NASL", "AIX_IJ28229.NASL", "AIX_IJ42339.NASL", "AIX_IJ42341.NASL", "AIX_IJ42381.NASL", "AL2022_ALAS2022-2022-035.NASL", "AL2022_ALAS2022-2022-039.NASL", "AL2022_ALAS2022-2022-041.NASL", "AL2022_ALAS2022-2022-042.NASL", "AL2022_ALAS2022-2022-044.NASL", "AL2022_ALAS2022-2022-053.NASL", "AL2022_ALAS2022-2022-058.NASL", "AL2022_ALAS2022-2022-068.NASL", "AL2022_ALAS2022-2022-074.NASL", "AL2022_ALAS2022-2022-077.NASL", "AL2022_ALAS2022-2022-097.NASL", "AL2022_ALAS2022-2022-100.NASL", "AL2022_ALAS2022-2022-102.NASL", "AL2022_ALAS2022-2022-104.NASL", "AL2022_ALAS2022-2022-105.NASL", "AL2022_ALAS2022-2022-111.NASL", "AL2022_ALAS2022-2022-112.NASL", "AL2022_ALAS2022-2022-113.NASL", "AL2022_ALAS2022-2022-115.NASL", "AL2022_ALAS2022-2022-119.NASL", "AL2022_ALAS2022-2022-120.NASL", "AL2022_ALAS2022-2022-121.NASL", "AL2022_ALAS2022-2022-123.NASL", "AL2022_ALAS2022-2022-130.NASL", "AL2022_ALAS2022-2022-151.NASL", "AL2022_ALAS2022-2022-152.NASL", "AL2022_ALAS2022-2022-153.NASL", "AL2022_ALAS2022-2022-155.NASL", "AL2022_ALAS2022-2022-158.NASL", "AL2022_ALAS2022-2022-159.NASL", "AL2022_ALAS2022-2022-168.NASL", "AL2022_ALAS2022-2022-178.NASL", "AL2022_ALAS2022-2022-182.NASL", "AL2022_ALAS2022-2022-185.NASL", "AL2022_ALAS2022-2022-187.NASL", "AL2022_ALAS2022-2022-188.NASL", "AL2022_ALAS2022-2022-193.NASL", "AL2022_ALAS2022-2022-195.NASL", "AL2022_ALAS2022-2022-197.NASL", "AL2022_ALAS2022-2022-198.NASL", "AL2022_ALAS2022-2022-199.NASL", "AL2022_ALAS2022-2022-202.NASL", "AL2022_ALAS2022-2022-214.NASL", "AL2022_ALAS2022-2022-220.NASL", "AL2022_ALAS2022-2022-225.NASL", "AL2022_ALAS2022-2022-231.NASL", "AL2022_ALAS2022-2022-233.NASL", "AL2022_ALAS2022-2022-234.NASL", "AL2023_ALAS2023-2023-002.NASL", "AL2023_ALAS2023-2023-003.NASL", "AL2023_ALAS2023-2023-014.NASL", "AL2023_ALAS2023-2023-016.NASL", "AL2023_ALAS2023-2023-026.NASL", "AL2023_ALAS2023-2023-034.NASL", "AL2023_ALAS2023-2023-037.NASL", "AL2023_ALAS2023-2023-042.NASL", "AL2023_ALAS2023-2023-043.NASL", "AL2023_ALAS2023-2023-048.NASL", "AL2023_ALAS2023-2023-051.NASL", "AL2023_ALAS2023-2023-056.NASL", "AL2023_ALAS2023-2023-059.NASL", "AL2023_ALAS2023-2023-060.NASL", "AL2023_ALAS2023-2023-063.NASL", "AL2023_ALAS2023-2023-064.NASL", "AL2023_ALAS2023-2023-070.NASL", "AL2023_ALAS2023-2023-072.NASL", "AL2023_ALAS2023-2023-084.NASL", "AL2023_ALAS2023-2023-096.NASL", "AL2023_ALAS2023-2023-098.NASL", "AL2023_ALAS2023-2023-175.NASL", "AL2_ALAS-2019-1189.NASL", "AL2_ALAS-2019-1204.NASL", "AL2_ALAS-2019-1230.NASL", "AL2_ALAS-2019-1247.NASL", "AL2_ALAS-2019-1258.NASL", "AL2_ALAS-2019-1259.NASL", "AL2_ALAS-2019-1334.NASL", "AL2_ALAS-2020-1395.NASL", "AL2_ALAS-2020-1413.NASL", "AL2_ALAS-2020-1427.NASL", "AL2_ALAS-2020-1449.NASL", "AL2_ALAS-2020-1519.NASL", "AL2_ALAS-2021-1611.NASL", "AL2_ALAS-2021-1622.NASL", "AL2_ALAS-2021-1626.NASL", "AL2_ALAS-2021-1627.NASL", "AL2_ALAS-2021-1639.NASL", "AL2_ALAS-2021-1668.NASL", "AL2_ALAS-2021-1670.NASL", "AL2_ALAS-2021-1698.NASL", "AL2_ALAS-2021-1719.NASL", "AL2_ALAS-2021-1724.NASL", "AL2_ALAS-2021-1727.NASL", "AL2_ALAS-2021-1729.NASL", "AL2_ALAS-2022-1739.NASL", "AL2_ALAS-2022-1748.NASL", "AL2_ALAS-2022-1749.NASL", "AL2_ALAS-2022-1750.NASL", "AL2_ALAS-2022-1758.NASL", "AL2_ALAS-2022-1761.NASL", "AL2_ALAS-2022-1766.NASL", "AL2_ALAS-2022-1767.NASL", "AL2_ALAS-2022-1769.NASL", "AL2_ALAS-2022-1772.NASL", "AL2_ALAS-2022-1776.NASL", "AL2_ALAS-2022-1782.NASL", "AL2_ALAS-2022-1783.NASL", "AL2_ALAS-2022-1793.NASL", "AL2_ALAS-2022-1801.NASL", "AL2_ALAS-2022-1802.NASL", "AL2_ALAS-2022-1805.NASL", "AL2_ALAS-2022-1811.NASL", "AL2_ALAS-2022-1815.NASL", "AL2_ALAS-2022-1822.NASL", "AL2_ALAS-2022-1823.NASL", "AL2_ALAS-2022-1824.NASL", "AL2_ALAS-2022-1826.NASL", "AL2_ALAS-2022-1827.NASL", "AL2_ALAS-2022-1830.NASL", "AL2_ALAS-2022-1831.NASL", "AL2_ALAS-2022-1832.NASL", "AL2_ALAS-2022-1835.NASL", "AL2_ALAS-2022-1836.NASL", "AL2_ALAS-2022-1848.NASL", "AL2_ALAS-2022-1880.NASL", "AL2_ALAS-2023-1936.NASL", "AL2_ALAS-2023-1956.NASL", "AL2_ALAS-2023-1966.NASL", "AL2_ALAS-2023-2045.NASL", "AL2_ALAS-2023-2059.NASL", "AL2_ALAS-2023-2317.NASL", "AL2_ALASCORRETTO8-2022-003.NASL", "AL2_ALASGOLANG1_19-2023-002.NASL", "AL2_ALASJAVA-OPENJDK11-2022-002.NASL", "AL2_ALASKERNEL-5_10-2022-004.NASL", "AL2_ALASKERNEL-5_10-2022-006.NASL", "AL2_ALASKERNEL-5_10-2022-007.NASL", "AL2_ALASKERNEL-5_10-2022-008.NASL", "AL2_ALASKERNEL-5_10-2022-011.NASL", "AL2_ALASKERNEL-5_10-2022-012.NASL", "AL2_ALASKERNEL-5_4-2022-003.NASL", "AL2_ALASKERNEL-5_4-2022-009.NASL", "AL2_ALASKERNEL-5_4-2022-023.NASL", "AL2_ALASKERNEL-5_4-2022-024.NASL", "AL2_ALASKERNEL-5_4-2022-027.NASL", "AL2_ALASKERNEL-5_4-2022-029.NASL", "AL2_ALASKERNEL-5_4-2022-031.NASL", "AL2_ALASMARIADB10_5-2023-003.NASL", "AL2_ALASMICROVM-KERNEL-4_14-2023-001.NASL", "AL2_ALASNITRO-ENCLAVES-2022-018.NASL", "AL2_ALASOPENSSL-SNAPSAFE-2023-001.NASL", "AL2_ALASPYTHON3_8-2023-005.NASL", "AL2_ALASPYTHON3_8-2023-009.NASL", "AL2_ALASREDIS6-2023-003.NASL", "AL2_ALASTOMCAT8_5-2023-004.NASL", "AL2_ALASTOMCAT8_5-2023-005.NASL", "AL2_ALASTOMCAT8_5-2023-006.NASL", "AL2_ALASTOMCAT8_5-2023-008.NASL", "AL2_ALASTOMCAT8_5-2023-009.NASL", "AL2_ALASTOMCAT9-2023-003.NASL", "AL2_ALASTOMCAT9-2023-004.NASL", "AL2_ALASTOMCAT9-2023-006.NASL", "ALA_ALAS-2019-1189.NASL", "ALA_ALAS-2019-1202.NASL", "ALA_ALAS-2019-1204.NASL", "ALA_ALAS-2019-1230.NASL", "ALA_ALAS-2019-1242.NASL", "ALA_ALAS-2019-1243.NASL", "ALA_ALAS-2019-1258.NASL", "ALA_ALAS-2019-1259.NASL", "ALA_ALAS-2019-1311.NASL", "ALA_ALAS-2019-1324.NASL", "ALA_ALAS-2020-1370.NASL", "ALA_ALAS-2020-1389.NASL", "ALA_ALAS-2020-1390.NASL", "ALA_ALAS-2020-1407.NASL", "ALA_ALAS-2020-1428.NASL", "ALA_ALAS-2020-1429.NASL", "ALA_ALAS-2021-1484.NASL", "ALA_ALAS-2021-1491.NASL", "ALA_ALAS-2021-1493.NASL", "ALA_ALAS-2021-1503.NASL", "ALA_ALAS-2021-1545.NASL", "ALA_ALAS-2021-1546.NASL", "ALA_ALAS-2021-1549.NASL", "ALA_ALAS-2022-1562.NASL", "ALA_ALAS-2022-1563.NASL", "ALA_ALAS-2022-1565.NASL", "ALA_ALAS-2022-1571.NASL", "ALA_ALAS-2022-1572.NASL", "ALA_ALAS-2022-1574.NASL", "ALA_ALAS-2022-1575.NASL", "ALA_ALAS-2022-1576.NASL", "ALA_ALAS-2022-1578.NASL", "ALA_ALAS-2022-1583.NASL", "ALA_ALAS-2022-1584.NASL", "ALA_ALAS-2022-1590.NASL", "ALA_ALAS-2022-1591.NASL", "ALA_ALAS-2022-1593.NASL", "ALA_ALAS-2022-1597.NASL", "ALA_ALAS-2022-1598.NASL", "ALA_ALAS-2022-1602.NASL", "ALA_ALAS-2022-1605.NASL", "ALA_ALAS-2022-1626.NASL", "ALA_ALAS-2022-1627.NASL", "ALA_ALAS-2022-1631.NASL", "ALA_ALAS-2022-1633.NASL", "ALA_ALAS-2022-1640.NASL", "ALA_ALAS-2023-1685.NASL", "ALA_ALAS-2023-1688.NASL", "ALA_ALAS-2023-1695.NASL", "ALA_ALAS-2023-1709.NASL", "ALA_ALAS-2023-1717.NASL", "ALA_ALAS-2023-1718.NASL", "ALA_ALAS-2023-1743.NASL", "ALMA_LINUX_ALSA-2020-4432.NASL", "ALMA_LINUX_ALSA-2021-1024.NASL", "ALMA_LINUX_ALSA-2021-1631.NASL", "ALMA_LINUX_ALSA-2021-1633.NASL", "ALMA_LINUX_ALSA-2021-2583.NASL", "ALMA_LINUX_ALSA-2021-3576.NASL", "ALMA_LINUX_ALSA-2021-4059.NASL", "ALMA_LINUX_ALSA-2021-4142.NASL", "ALMA_LINUX_ALSA-2021-4409.NASL", "ALMA_LINUX_ALSA-2021-4455.NASL", "ALMA_LINUX_ALSA-2022-0290.NASL", "ALMA_LINUX_ALSA-2022-0658.NASL", "ALMA_LINUX_ALSA-2022-1763.NASL", "ALMA_LINUX_ALSA-2022-1764.NASL", "ALMA_LINUX_ALSA-2022-1819.NASL", "ALMA_LINUX_ALSA-2022-1821.NASL", "ALMA_LINUX_ALSA-2022-1932.NASL", "ALMA_LINUX_ALSA-2022-1986.NASL", "ALMA_LINUX_ALSA-2022-1988.NASL", "ALMA_LINUX_ALSA-2022-2013.NASL", "ALMA_LINUX_ALSA-2022-2043.NASL", "ALMA_LINUX_ALSA-2022-4582.NASL", "ALMA_LINUX_ALSA-2022-4584.NASL", "ALMA_LINUX_ALSA-2022-4592.NASL", "ALMA_LINUX_ALSA-2022-4899.NASL", "ALMA_LINUX_ALSA-2022-4940.NASL", "ALMA_LINUX_ALSA-2022-5242.NASL", "ALMA_LINUX_ALSA-2022-5250.NASL", "ALMA_LINUX_ALSA-2022-5326.NASL", "ALMA_LINUX_ALSA-2022-5683.NASL", "ALMA_LINUX_ALSA-2022-5695.NASL", "ALMA_LINUX_ALSA-2022-5696.NASL", "ALMA_LINUX_ALSA-2022-5709.NASL", "ALMA_LINUX_ALSA-2022-5736.NASL", "ALMA_LINUX_ALSA-2022-5818.NASL", "ALMA_LINUX_ALSA-2022-6224.NASL", "ALMA_LINUX_ALSA-2022-6590.NASL", "ALMA_LINUX_ALSA-2022-7119.NASL", "ALMA_LINUX_ALSA-2022-7541.NASL", "ALMA_LINUX_ALSA-2022-7647.NASL", "ALMA_LINUX_ALSA-2022-7813.NASL", "ALMA_LINUX_ALSA-2022-7830.NASL", "ALMA_LINUX_ALSA-2022-8067.NASL", "ALMA_LINUX_ALSA-2022-8096.NASL", "ALMA_LINUX_ALSA-2022-8420.NASL", "ALMA_LINUX_ALSA-2022-9073.NASL", "ALMA_LINUX_ALSA-2023-2312.NASL", "AMAZON_CORRETTO_11_0_16_8_1.NASL", "AMAZON_CORRETTO_17_0_3_6_1.NASL", "AMAZON_CORRETTO_17_0_4_8_1.NASL", "AMAZON_CORRETTO_18_0_1_10_1.NASL", "AMAZON_CORRETTO_18_0_2_9_1.NASL", "AMAZON_CORRETTO_8_332_08_1.NASL", "AMAZON_CORRETTO_8_342_07_1.NASL", "ANSIBLE_TOWER_3_5_1.NASL", "APACHE_2_4_39.NASL", "APACHE_2_4_41.NASL", "APACHE_2_4_42.NASL", "APACHE_2_4_53.NASL", "APACHE_LOG4J_1_2.NASL", "APACHE_LOG4J_1_X_MULTIPLE_VULNERABILITIES.NASL", "APACHE_LOG4J_2_17_1.NASL", "APACHE_SHIRO_CVE-2021-41303.NASL", "APPLE_IOS_155_CHECK.NBIN", "AZUL_ZULU_18_30_12.NASL", "AZUL_ZULU_18_32.NASL", "CENTOS8_RHSA-2019-0981.NASL", "CENTOS8_RHSA-2019-3335.NASL", "CENTOS8_RHSA-2019-3436.NASL", "CENTOS8_RHSA-2019-3520.NASL", "CENTOS8_RHSA-2020-1605.NASL", "CENTOS8_RHSA-2020-1916.NASL", "CENTOS8_RHSA-2020-4432.NASL", "CENTOS8_RHSA-2020-4641.NASL", "CENTOS8_RHSA-2020-4654.NASL", "CENTOS8_RHSA-2020-4670.NASL", "CENTOS8_RHSA-2020-4751.NASL", "CENTOS8_RHSA-2020-4847.NASL", "CENTOS8_RHSA-2021-1024.NASL", "CENTOS8_RHSA-2021-1631.NASL", "CENTOS8_RHSA-2021-1633.NASL", "CENTOS8_RHSA-2021-1761.NASL", "CENTOS8_RHSA-2021-1846.NASL", "CENTOS8_RHSA-2021-1879.NASL", "CENTOS8_RHSA-2021-2583.NASL", "CENTOS8_RHSA-2021-3576.NASL", "CENTOS8_RHSA-2021-3623.NASL", "CENTOS8_RHSA-2021-3666.NASL", "CENTOS8_RHSA-2021-4059.NASL", "CENTOS8_RHSA-2021-4142.NASL", "CENTOS8_RHSA-2021-4151.NASL", "CENTOS8_RHSA-2021-4160.NASL", "CENTOS8_RHSA-2021-4162.NASL", "CENTOS8_RHSA-2021-4409.NASL", "CENTOS8_RHSA-2021-4455.NASL", "CENTOS8_RHSA-2022-0658.NASL", "CENTOS8_RHSA-2022-1049.NASL", "CENTOS8_RHSA-2022-1763.NASL", "CENTOS8_RHSA-2022-1764.NASL", "CENTOS8_RHSA-2022-1819.NASL", "CENTOS8_RHSA-2022-1821.NASL", "CENTOS8_RHSA-2022-1932.NASL", "CENTOS8_RHSA-2022-1986.NASL", "CENTOS8_RHSA-2022-2043.NASL", "CENTOS8_RHSA-2022-7119.NASL", "CENTOS8_RHSA-2022-7541.NASL", "CENTOS8_RHSA-2022-7647.NASL", "CENTOS8_RHSA-2022-7830.NASL", "CENTOS8_RHSA-2022-9073.NASL", "CENTOS_RHSA-2017-2423.NASL", "CENTOS_RHSA-2019-0710.NASL", "CENTOS_RHSA-2019-1467.NASL", "CENTOS_RHSA-2019-1587.NASL", "CENTOS_RHSA-2019-2030.NASL", "CENTOS_RHSA-2019-2035.NASL", "CENTOS_RHSA-2019-2343.NASL", "CENTOS_RHSA-2020-0194.NASL", "CENTOS_RHSA-2020-0850.NASL", "CENTOS_RHSA-2020-0851.NASL", "CENTOS_RHSA-2020-2530.NASL", "CENTOS_RHSA-2020-3936.NASL", "CENTOS_RHSA-2020-3958.NASL", "CENTOS_RHSA-2021-2683.NASL", "CENTOS_RHSA-2021-3327.NASL", "CENTOS_RHSA-2021-4782.NASL", "CENTOS_RHSA-2021-4788.NASL", "CENTOS_RHSA-2021-5206.NASL", "CENTOS_RHSA-2022-0063.NASL", "CENTOS_RHSA-2022-0442.NASL", "CENTOS_RHSA-2022-0620.NASL", "CENTOS_RHSA-2022-0666.NASL", "CENTOS_RHSA-2022-1045.NASL", "CENTOS_RHSA-2022-1066.NASL", "CENTOS_RHSA-2022-2191.NASL", "CENTOS_RHSA-2022-2213.NASL", "CENTOS_RHSA-2022-4930.NASL", "CENTOS_RHSA-2022-5052.NASL", "CENTOS_RHSA-2022-5234.NASL", "CENTOS_RHSA-2022-5235.NASL", "CENTOS_RHSA-2022-5687.NASL", "CENTOS_RHSA-2022-5698.NASL", "CLOUDBEES-SECURITY-ADVISORY-2021-12-01.NASL", "CLOUDBEES-SECURITY-ADVISORY-2022-02-09.NASL", "DEBIAN_DLA-1748.NASL", "DEBIAN_DLA-1834.NASL", "DEBIAN_DLA-1835.NASL", "DEBIAN_DLA-1896.NASL", "DEBIAN_DLA-2065.NASL", "DEBIAN_DLA-2139.NASL", "DEBIAN_DLA-2191.NASL", "DEBIAN_DLA-2209.NASL", "DEBIAN_DLA-2217.NASL", "DEBIAN_DLA-2279.NASL", "DEBIAN_DLA-2280.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2337.NASL", "DEBIAN_DLA-2370.NASL", "DEBIAN_DLA-2406.NASL", "DEBIAN_DLA-2511.NASL", "DEBIAN_DLA-2608.NASL", "DEBIAN_DLA-2619.NASL", "DEBIAN_DLA-2638.NASL", "DEBIAN_DLA-2686.NASL", "DEBIAN_DLA-2689.NASL", "DEBIAN_DLA-2690.NASL", "DEBIAN_DLA-2691.NASL", "DEBIAN_DLA-2693.NASL", "DEBIAN_DLA-2696.NASL", "DEBIAN_DLA-2704.NASL", "DEBIAN_DLA-2706.NASL", "DEBIAN_DLA-2712.NASL", "DEBIAN_DLA-2713.NASL", "DEBIAN_DLA-2738.NASL", "DEBIAN_DLA-2741.NASL", "DEBIAN_DLA-2751.NASL", "DEBIAN_DLA-2767.NASL", "DEBIAN_DLA-2769.NASL", "DEBIAN_DLA-2771.NASL", "DEBIAN_DLA-2773.NASL", "DEBIAN_DLA-2808.NASL", "DEBIAN_DLA-2821.NASL", "DEBIAN_DLA-2843.NASL", "DEBIAN_DLA-2870.NASL", "DEBIAN_DLA-2871.NASL", "DEBIAN_DLA-2877.NASL", "DEBIAN_DLA-2891.NASL", "DEBIAN_DLA-2892.NASL", "DEBIAN_DLA-2905.NASL", "DEBIAN_DLA-2919.NASL", "DEBIAN_DLA-2924.NASL", "DEBIAN_DLA-2931.NASL", "DEBIAN_DLA-2952.NASL", "DEBIAN_DLA-2953.NASL", "DEBIAN_DLA-2960.NASL", "DEBIAN_DLA-2968.NASL", "DEBIAN_DLA-2972.NASL", "DEBIAN_DLA-2976.NASL", "DEBIAN_DLA-2977.NASL", "DEBIAN_DLA-2985.NASL", "DEBIAN_DLA-2986.NASL", "DEBIAN_DLA-2990.NASL", "DEBIAN_DLA-2991.NASL", "DEBIAN_DLA-2993.NASL", "DEBIAN_DLA-3001.NASL", "DEBIAN_DLA-3008.NASL", "DEBIAN_DLA-3011.NASL", "DEBIAN_DLA-3012.NASL", "DEBIAN_DLA-3065.NASL", "DEBIAN_DLA-3085.NASL", "DEBIAN_DLA-3100.NASL", "DEBIAN_DLA-3114.NASL", "DEBIAN_DLA-3129.NASL", "DEBIAN_DLA-3137.NASL", "DEBIAN_DLA-3152.NASL", "DEBIAN_DLA-3155.NASL", "DEBIAN_DLA-3160.NASL", "DEBIAN_DLA-3182.NASL", "DEBIAN_DLA-3207.NASL", "DEBIAN_DLA-3230.NASL", "DEBIAN_DLA-3268.NASL", "DEBIAN_DLA-3289.NASL", "DEBIAN_DLA-3373.NASL", "DEBIAN_DLA-3395.NASL", "DEBIAN_DLA-3432.NASL", "DEBIAN_DLA-3477.NASL", "DEBIAN_DLA-3551.NASL", "DEBIAN_DLA-3610.NASL", "DEBIAN_DLA-3619.NASL", "DEBIAN_DSA-4422.NASL", "DEBIAN_DSA-4509.NASL", "DEBIAN_DSA-4686.NASL", "DEBIAN_DSA-4693.NASL", "DEBIAN_DSA-4727.NASL", "DEBIAN_DSA-4757.NASL", "DEBIAN_DSA-4875.NASL", "DEBIAN_DSA-4954.NASL", "DEBIAN_DSA-4978.NASL", "DEBIAN_DSA-5004.NASL", "DEBIAN_DSA-5009.NASL", "DEBIAN_DSA-5010.NASL", "DEBIAN_DSA-5043.NASL", "DEBIAN_DSA-5087.NASL", "DEBIAN_DSA-5092.NASL", "DEBIAN_DSA-5095.NASL", "DEBIAN_DSA-5096.NASL", "DEBIAN_DSA-5103.NASL", "DEBIAN_DSA-5111.NASL", "DEBIAN_DSA-5122.NASL", "DEBIAN_DSA-5123.NASL", "DEBIAN_DSA-5127.NASL", "DEBIAN_DSA-5139.NASL", "DEBIAN_DSA-5142.NASL", "DEBIAN_DSA-5169.NASL", "DEBIAN_DSA-5170.NASL", "DEBIAN_DSA-5173.NASL", "DEBIAN_DSA-5188.NASL", "DEBIAN_DSA-5192.NASL", "DEBIAN_DSA-5197.NASL", "DEBIAN_DSA-5227.NASL", "DEBIAN_DSA-5239.NASL", "DEBIAN_DSA-5256.NASL", "DEBIAN_DSA-5265.NASL", "DEBIAN_DSA-5283.NASL", "DEBIAN_DSA-5316.NASL", "DELL_POWERVAULT_ME5_DSA-2023-083.NASL", "DELL_WYSE_MANAGEMENT_SUITE_DSA-2022-098.NASL", "DELL_WYSE_MANAGEMENT_SUITE_DSA-2022-143.NASL", "DELL_WYSE_MANAGEMENT_SUITE_DSA-2022-329_4_0.NASL", "DRAC_DSA-2022-154_2_83_83_83_5_10_30_00.NASL", "DRUPAL_8_8_6.NASL", "DRUPAL_9_3_3.NASL", "DRUPAL_9_3_8.NASL", "EULEROS_SA-2019-1124.NASL", "EULEROS_SA-2019-1149.NASL", "EULEROS_SA-2019-1277.NASL", "EULEROS_SA-2019-1337.NASL", "EULEROS_SA-2019-1403.NASL", "EULEROS_SA-2019-1434.NASL", "EULEROS_SA-2019-1657.NASL", "EULEROS_SA-2019-1658.NASL", "EULEROS_SA-2019-1771.NASL", "EULEROS_SA-2019-1778.NASL", "EULEROS_SA-2019-1797.NASL", "EULEROS_SA-2019-1866.NASL", "EULEROS_SA-2019-1886.NASL", "EULEROS_SA-2019-1934.NASL", "EULEROS_SA-2019-1947.NASL", "EULEROS_SA-2019-2019.NASL", "EULEROS_SA-2019-2080.NASL", "EULEROS_SA-2019-2157.NASL", "EULEROS_SA-2019-2225.NASL", "EULEROS_SA-2019-2239.NASL", "EULEROS_SA-2019-2249.NASL", "EULEROS_SA-2019-2311.NASL", "EULEROS_SA-2019-2442.NASL", "EULEROS_SA-2019-2653.NASL", "EULEROS_SA-2020-1027.NASL", "EULEROS_SA-2020-1043.NASL", "EULEROS_SA-2020-1155.NASL", "EULEROS_SA-2020-1212.NASL", "EULEROS_SA-2020-1250.NASL", "EULEROS_SA-2020-1275.NASL", "EULEROS_SA-2020-1359.NASL", "EULEROS_SA-2020-1429.NASL", "EULEROS_SA-2020-1455.NASL", "EULEROS_SA-2020-1505.NASL", "EULEROS_SA-2020-1532.NASL", "EULEROS_SA-2020-1552.NASL", "EULEROS_SA-2020-1596.NASL", "EULEROS_SA-2020-1601.NASL", "EULEROS_SA-2020-1633.NASL", "EULEROS_SA-2020-1643.NASL", "EULEROS_SA-2020-1645.NASL", "EULEROS_SA-2020-1650.NASL", "EULEROS_SA-2020-1677.NASL", "EULEROS_SA-2020-1692.NASL", "EULEROS_SA-2020-1749.NASL", "EULEROS_SA-2020-1753.NASL", "EULEROS_SA-2020-1799.NASL", "EULEROS_SA-2020-1807.NASL", "EULEROS_SA-2020-1825.NASL", "EULEROS_SA-2020-1829.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1912.NASL", "EULEROS_SA-2020-1932.NASL", "EULEROS_SA-2020-1938.NASL", "EULEROS_SA-2020-1948.NASL", "EULEROS_SA-2020-1958.NASL", "EULEROS_SA-2020-2011.NASL", "EULEROS_SA-2020-2093.NASL", "EULEROS_SA-2020-2102.NASL", "EULEROS_SA-2020-2103.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2151.NASL", "EULEROS_SA-2020-2166.NASL", "EULEROS_SA-2020-2176.NASL", "EULEROS_SA-2020-2201.NASL", "EULEROS_SA-2020-2224.NASL", "EULEROS_SA-2020-2269.NASL", "EULEROS_SA-2020-2319.NASL", "EULEROS_SA-2020-2353.NASL", "EULEROS_SA-2020-2443.NASL", "EULEROS_SA-2020-2489.NASL", "EULEROS_SA-2020-2490.NASL", "EULEROS_SA-2020-2502.NASL", "EULEROS_SA-2020-2503.NASL", "EULEROS_SA-2020-2514.NASL", "EULEROS_SA-2020-2527.NASL", "EULEROS_SA-2020-2528.NASL", "EULEROS_SA-2021-1039.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1114.NASL", "EULEROS_SA-2021-1168.NASL", "EULEROS_SA-2021-1200.NASL", "EULEROS_SA-2021-1226.NASL", "EULEROS_SA-2021-1350.NASL", "EULEROS_SA-2021-1386.NASL", "EULEROS_SA-2021-1454.NASL", "EULEROS_SA-2021-1512.NASL", "EULEROS_SA-2021-1543.NASL", "EULEROS_SA-2021-1560.NASL", "EULEROS_SA-2021-1565.NASL", "EULEROS_SA-2021-1572.NASL", "EULEROS_SA-2021-1604.NASL", "EULEROS_SA-2021-1623.NASL", "EULEROS_SA-2021-1624.NASL", "EULEROS_SA-2021-1642.NASL", "EULEROS_SA-2021-1648.NASL", "EULEROS_SA-2021-1649.NASL", "EULEROS_SA-2021-1684.NASL", "EULEROS_SA-2021-1722.NASL", "EULEROS_SA-2021-1723.NASL", "EULEROS_SA-2021-1747.NASL", "EULEROS_SA-2021-1755.NASL", "EULEROS_SA-2021-1808.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1856.NASL", "EULEROS_SA-2021-1886.NASL", "EULEROS_SA-2021-1891.NASL", "EULEROS_SA-2021-1911.NASL", "EULEROS_SA-2021-1912.NASL", "EULEROS_SA-2021-1915.NASL", "EULEROS_SA-2021-1936.NASL", "EULEROS_SA-2021-1937.NASL", "EULEROS_SA-2021-1957.NASL", "EULEROS_SA-2021-1958.NASL", "EULEROS_SA-2021-1960.NASL", "EULEROS_SA-2021-1967.NASL", "EULEROS_SA-2021-1970.NASL", "EULEROS_SA-2021-1971.NASL", "EULEROS_SA-2021-1983.NASL", "EULEROS_SA-2021-1985.NASL", "EULEROS_SA-2021-2007.NASL", "EULEROS_SA-2021-2020.NASL", "EULEROS_SA-2021-2028.NASL", "EULEROS_SA-2021-2031.NASL", "EULEROS_SA-2021-2040.NASL", "EULEROS_SA-2021-2051.NASL", "EULEROS_SA-2021-2052.NASL", "EULEROS_SA-2021-2062.NASL", "EULEROS_SA-2021-2063.NASL", "EULEROS_SA-2021-2075.NASL", "EULEROS_SA-2021-2078.NASL", "EULEROS_SA-2021-2096.NASL", "EULEROS_SA-2021-2159.NASL", "EULEROS_SA-2021-2221.NASL", "EULEROS_SA-2021-2225.NASL", "EULEROS_SA-2021-2392.NASL", "EULEROS_SA-2021-2395.NASL", "EULEROS_SA-2021-2427.NASL", "EULEROS_SA-2021-2435.NASL", "EULEROS_SA-2021-2453.NASL", "EULEROS_SA-2021-2465.NASL", "EULEROS_SA-2021-2469.NASL", "EULEROS_SA-2021-2484.NASL", "EULEROS_SA-2021-2485.NASL", "EULEROS_SA-2021-2503.NASL", "EULEROS_SA-2021-2532.NASL", "EULEROS_SA-2021-2541.NASL", "EULEROS_SA-2021-2556.NASL", "EULEROS_SA-2021-2565.NASL", "EULEROS_SA-2021-2569.NASL", "EULEROS_SA-2021-2574.NASL", "EULEROS_SA-2021-2588.NASL", "EULEROS_SA-2021-2590.NASL", "EULEROS_SA-2021-2623.NASL", "EULEROS_SA-2021-2631.NASL", "EULEROS_SA-2021-2636.NASL", "EULEROS_SA-2021-2637.NASL", "EULEROS_SA-2021-2651.NASL", "EULEROS_SA-2021-2652.NASL", "EULEROS_SA-2021-2660.NASL", "EULEROS_SA-2021-2664.NASL", "EULEROS_SA-2021-2669.NASL", "EULEROS_SA-2021-2679.NASL", "EULEROS_SA-2021-2684.NASL", "EULEROS_SA-2021-2688.NASL", "EULEROS_SA-2021-2689.NASL", "EULEROS_SA-2021-2695.NASL", "EULEROS_SA-2021-2704.NASL", "EULEROS_SA-2021-2709.NASL", "EULEROS_SA-2021-2713.NASL", "EULEROS_SA-2021-2714.NASL", "EULEROS_SA-2021-2720.NASL", "EULEROS_SA-2021-2737.NASL", "EULEROS_SA-2021-2742.NASL", "EULEROS_SA-2021-2743.NASL", "EULEROS_SA-2021-2745.NASL", "EULEROS_SA-2021-2759.NASL", "EULEROS_SA-2021-2761.NASL", "EULEROS_SA-2021-2766.NASL", "EULEROS_SA-2021-2776.NASL", "EULEROS_SA-2021-2777.NASL", "EULEROS_SA-2021-2782.NASL", "EULEROS_SA-2021-2795.NASL", "EULEROS_SA-2021-2796.NASL", "EULEROS_SA-2021-2798.NASL", "EULEROS_SA-2021-2809.NASL", "EULEROS_SA-2021-2812.NASL", "EULEROS_SA-2021-2813.NASL", "EULEROS_SA-2021-2818.NASL", "EULEROS_SA-2021-2820.NASL", "EULEROS_SA-2021-2825.NASL", "EULEROS_SA-2021-2836.NASL", "EULEROS_SA-2021-2841.NASL", "EULEROS_SA-2021-2848.NASL", "EULEROS_SA-2021-2852.NASL", "EULEROS_SA-2021-2853.NASL", "EULEROS_SA-2021-2858.NASL", "EULEROS_SA-2021-2875.NASL", "EULEROS_SA-2021-2881.NASL", "EULEROS_SA-2021-2882.NASL", "EULEROS_SA-2021-2888.NASL", "EULEROS_SA-2021-2902.NASL", "EULEROS_SA-2021-2918.NASL", "EULEROS_SA-2021-2926.NASL", "EULEROS_SA-2021-2934.NASL", "EULEROS_SA-2021-2935.NASL", "EULEROS_SA-2022-1003.NASL", "EULEROS_SA-2022-1006.NASL", "EULEROS_SA-2022-1010.NASL", "EULEROS_SA-2022-1013.NASL", "EULEROS_SA-2022-1023.NASL", "EULEROS_SA-2022-1026.NASL", "EULEROS_SA-2022-1030.NASL", "EULEROS_SA-2022-1033.NASL", "EULEROS_SA-2022-1041.NASL", "EULEROS_SA-2022-1049.NASL", "EULEROS_SA-2022-1051.NASL", "EULEROS_SA-2022-1052.NASL", "EULEROS_SA-2022-1057.NASL", "EULEROS_SA-2022-1066.NASL", "EULEROS_SA-2022-1070.NASL", "EULEROS_SA-2022-1071.NASL", "EULEROS_SA-2022-1074.NASL", "EULEROS_SA-2022-1091.NASL", "EULEROS_SA-2022-1112.NASL", "EULEROS_SA-2022-1122.NASL", "EULEROS_SA-2022-1125.NASL", "EULEROS_SA-2022-1127.NASL", "EULEROS_SA-2022-1139.NASL", "EULEROS_SA-2022-1164.NASL", "EULEROS_SA-2022-1171.NASL", "EULEROS_SA-2022-1172.NASL", "EULEROS_SA-2022-1173.NASL", "EULEROS_SA-2022-1183.NASL", "EULEROS_SA-2022-1196.NASL", "EULEROS_SA-2022-1202.NASL", "EULEROS_SA-2022-1208.NASL", "EULEROS_SA-2022-1212.NASL", "EULEROS_SA-2022-1214.NASL", "EULEROS_SA-2022-1221.NASL", "EULEROS_SA-2022-1227.NASL", "EULEROS_SA-2022-1231.NASL", "EULEROS_SA-2022-1233.NASL", "EULEROS_SA-2022-1240.NASL", "EULEROS_SA-2022-1243.NASL", "EULEROS_SA-2022-1252.NASL", "EULEROS_SA-2022-1255.NASL", "EULEROS_SA-2022-1267.NASL", "EULEROS_SA-2022-1269.NASL", "EULEROS_SA-2022-1271.NASL", "EULEROS_SA-2022-1276.NASL", "EULEROS_SA-2022-1280.NASL", "EULEROS_SA-2022-1289.NASL", "EULEROS_SA-2022-1292.NASL", "EULEROS_SA-2022-1305.NASL", "EULEROS_SA-2022-1308.NASL", "EULEROS_SA-2022-1328.NASL", "EULEROS_SA-2022-1330.NASL", "EULEROS_SA-2022-1334.NASL", "EULEROS_SA-2022-1336.NASL", "EULEROS_SA-2022-1352.NASL", "EULEROS_SA-2022-1357.NASL", "EULEROS_SA-2022-1360.NASL", "EULEROS_SA-2022-1366.NASL", "EULEROS_SA-2022-1370.NASL", "EULEROS_SA-2022-1371.NASL", "EULEROS_SA-2022-1376.NASL", "EULEROS_SA-2022-1384.NASL", "EULEROS_SA-2022-1385.NASL", "EULEROS_SA-2022-1396.NASL", "EULEROS_SA-2022-1397.NASL", "EULEROS_SA-2022-1402.NASL", "EULEROS_SA-2022-1410.NASL", "EULEROS_SA-2022-1411.NASL", "EULEROS_SA-2022-1427.NASL", "EULEROS_SA-2022-1429.NASL", "EULEROS_SA-2022-1432.NASL", "EULEROS_SA-2022-1434.NASL", "EULEROS_SA-2022-1435.NASL", "EULEROS_SA-2022-1448.NASL", "EULEROS_SA-2022-1450.NASL", "EULEROS_SA-2022-1453.NASL", "EULEROS_SA-2022-1455.NASL", "EULEROS_SA-2022-1456.NASL", "EULEROS_SA-2022-1464.NASL", "EULEROS_SA-2022-1466.NASL", "EULEROS_SA-2022-1473.NASL", "EULEROS_SA-2022-1475.NASL", "EULEROS_SA-2022-1485.NASL", "EULEROS_SA-2022-1489.NASL", "EULEROS_SA-2022-1491.NASL", "EULEROS_SA-2022-1494.NASL", "EULEROS_SA-2022-1504.NASL", "EULEROS_SA-2022-1508.NASL", "EULEROS_SA-2022-1510.NASL", "EULEROS_SA-2022-1513.NASL", "EULEROS_SA-2022-1523.NASL", "EULEROS_SA-2022-1527.NASL", "EULEROS_SA-2022-1534.NASL", "EULEROS_SA-2022-1537.NASL", "EULEROS_SA-2022-1541.NASL", "EULEROS_SA-2022-1545.NASL", "EULEROS_SA-2022-1546.NASL", "EULEROS_SA-2022-1547.NASL", "EULEROS_SA-2022-1555.NASL", "EULEROS_SA-2022-1559.NASL", "EULEROS_SA-2022-1560.NASL", "EULEROS_SA-2022-1565.NASL", "EULEROS_SA-2022-1566.NASL", "EULEROS_SA-2022-1569.NASL", "EULEROS_SA-2022-1574.NASL", "EULEROS_SA-2022-1578.NASL", "EULEROS_SA-2022-1580.NASL", "EULEROS_SA-2022-1592.NASL", "EULEROS_SA-2022-1606.NASL", "EULEROS_SA-2022-1607.NASL", "EULEROS_SA-2022-1610.NASL", "EULEROS_SA-2022-1612.NASL", "EULEROS_SA-2022-1629.NASL", "EULEROS_SA-2022-1630.NASL", "EULEROS_SA-2022-1633.NASL", "EULEROS_SA-2022-1635.NASL", "EULEROS_SA-2022-1647.NASL", "EULEROS_SA-2022-1648.NASL", "EULEROS_SA-2022-1649.NASL", "EULEROS_SA-2022-1661.NASL", "EULEROS_SA-2022-1662.NASL", "EULEROS_SA-2022-1663.NASL", "EULEROS_SA-2022-1678.NASL", "EULEROS_SA-2022-1680.NASL", "EULEROS_SA-2022-1681.NASL", "EULEROS_SA-2022-1684.NASL", "EULEROS_SA-2022-1691.NASL", "EULEROS_SA-2022-1703.NASL", "EULEROS_SA-2022-1712.NASL", "EULEROS_SA-2022-1728.NASL", "EULEROS_SA-2022-1730.NASL", "EULEROS_SA-2022-1735.NASL", "EULEROS_SA-2022-1741.NASL", "EULEROS_SA-2022-1744.NASL", "EULEROS_SA-2022-1749.NASL", "EULEROS_SA-2022-1753.NASL", "EULEROS_SA-2022-1754.NASL", "EULEROS_SA-2022-1758.NASL", "EULEROS_SA-2022-1769.NASL", "EULEROS_SA-2022-1772.NASL", "EULEROS_SA-2022-1775.NASL", "EULEROS_SA-2022-1777.NASL", "EULEROS_SA-2022-1779.NASL", "EULEROS_SA-2022-1780.NASL", "EULEROS_SA-2022-1785.NASL", "EULEROS_SA-2022-1788.NASL", "EULEROS_SA-2022-1790.NASL", "EULEROS_SA-2022-1791.NASL", "EULEROS_SA-2022-1793.NASL", "EULEROS_SA-2022-1795.NASL", "EULEROS_SA-2022-1796.NASL", "EULEROS_SA-2022-1802.NASL", "EULEROS_SA-2022-1805.NASL", "EULEROS_SA-2022-1807.NASL", "EULEROS_SA-2022-1808.NASL", "EULEROS_SA-2022-1810.NASL", "EULEROS_SA-2022-1812.NASL", "EULEROS_SA-2022-1813.NASL", "EULEROS_SA-2022-1835.NASL", "EULEROS_SA-2022-1841.NASL", "EULEROS_SA-2022-1843.NASL", "EULEROS_SA-2022-1844.NASL", "EULEROS_SA-2022-1846.NASL", "EULEROS_SA-2022-1849.NASL", "EULEROS_SA-2022-1850.NASL", "EULEROS_SA-2022-1853.NASL", "EULEROS_SA-2022-1859.NASL", "EULEROS_SA-2022-1865.NASL", "EULEROS_SA-2022-1867.NASL", "EULEROS_SA-2022-1868.NASL", "EULEROS_SA-2022-1870.NASL", "EULEROS_SA-2022-1873.NASL", "EULEROS_SA-2022-1874.NASL", "EULEROS_SA-2022-1877.NASL", "EULEROS_SA-2022-1890.NASL", "EULEROS_SA-2022-1892.NASL", "EULEROS_SA-2022-1893.NASL", "EULEROS_SA-2022-1895.NASL", "EULEROS_SA-2022-1896.NASL", "EULEROS_SA-2022-1901.NASL", "EULEROS_SA-2022-1906.NASL", "EULEROS_SA-2022-1909.NASL", "EULEROS_SA-2022-1913.NASL", "EULEROS_SA-2022-1918.NASL", "EULEROS_SA-2022-1920.NASL", "EULEROS_SA-2022-1924.NASL", "EULEROS_SA-2022-1931.NASL", "EULEROS_SA-2022-1933.NASL", "EULEROS_SA-2022-1934.NASL", "EULEROS_SA-2022-1938.NASL", "EULEROS_SA-2022-1943.NASL", "EULEROS_SA-2022-1953.NASL", "EULEROS_SA-2022-1955.NASL", "EULEROS_SA-2022-1956.NASL", "EULEROS_SA-2022-1968.NASL", "EULEROS_SA-2022-1969.NASL", "EULEROS_SA-2022-1972.NASL", "EULEROS_SA-2022-1977.NASL", "EULEROS_SA-2022-1984.NASL", "EULEROS_SA-2022-1985.NASL", "EULEROS_SA-2022-1986.NASL", "EULEROS_SA-2022-1998.NASL", "EULEROS_SA-2022-2002.NASL", "EULEROS_SA-2022-2007.NASL", "EULEROS_SA-2022-2014.NASL", "EULEROS_SA-2022-2015.NASL", "EULEROS_SA-2022-2016.NASL", "EULEROS_SA-2022-2021.NASL", "EULEROS_SA-2022-2023.NASL", "EULEROS_SA-2022-2025.NASL", "EULEROS_SA-2022-2026.NASL", "EULEROS_SA-2022-2029.NASL", "EULEROS_SA-2022-2030.NASL", "EULEROS_SA-2022-2032.NASL", "EULEROS_SA-2022-2033.NASL", "EULEROS_SA-2022-2036.NASL", "EULEROS_SA-2022-2049.NASL", "EULEROS_SA-2022-2051.NASL", "EULEROS_SA-2022-2053.NASL", "EULEROS_SA-2022-2054.NASL", "EULEROS_SA-2022-2057.NASL", "EULEROS_SA-2022-2058.NASL", "EULEROS_SA-2022-2060.NASL", "EULEROS_SA-2022-2061.NASL", "EULEROS_SA-2022-2064.NASL", "EULEROS_SA-2022-2089.NASL", "EULEROS_SA-2022-2093.NASL", "EULEROS_SA-2022-2098.NASL", "EULEROS_SA-2022-2103.NASL", "EULEROS_SA-2022-2104.NASL", "EULEROS_SA-2022-2105.NASL", "EULEROS_SA-2022-2109.NASL", "EULEROS_SA-2022-2110.NASL", "EULEROS_SA-2022-2113.NASL", "EULEROS_SA-2022-2118.NASL", "EULEROS_SA-2022-2123.NASL", "EULEROS_SA-2022-2124.NASL", "EULEROS_SA-2022-2125.NASL", "EULEROS_SA-2022-2133.NASL", "EULEROS_SA-2022-2137.NASL", "EULEROS_SA-2022-2143.NASL", "EULEROS_SA-2022-2148.NASL", "EULEROS_SA-2022-2149.NASL", "EULEROS_SA-2022-2150.NASL", "EULEROS_SA-2022-2158.NASL", "EULEROS_SA-2022-2159.NASL", "EULEROS_SA-2022-2162.NASL", "EULEROS_SA-2022-2168.NASL", "EULEROS_SA-2022-2173.NASL", "EULEROS_SA-2022-2174.NASL", "EULEROS_SA-2022-2175.NASL", "EULEROS_SA-2022-2177.NASL", "EULEROS_SA-2022-2180.NASL", "EULEROS_SA-2022-2181.NASL", "EULEROS_SA-2022-2183.NASL", "EULEROS_SA-2022-2186.NASL", "EULEROS_SA-2022-2187.NASL", "EULEROS_SA-2022-2190.NASL", "EULEROS_SA-2022-2196.NASL", "EULEROS_SA-2022-2199.NASL", "EULEROS_SA-2022-2200.NASL", "EULEROS_SA-2022-2202.NASL", "EULEROS_SA-2022-2205.NASL", "EULEROS_SA-2022-2206.NASL", "EULEROS_SA-2022-2209.NASL", "EULEROS_SA-2022-2215.NASL", "EULEROS_SA-2022-2228.NASL", "EULEROS_SA-2022-2300.NASL", "EULEROS_SA-2022-2329.NASL", "EULEROS_SA-2022-2346.NASL", "EULEROS_SA-2022-2348.NASL", "EULEROS_SA-2022-2354.NASL", "EULEROS_SA-2022-2360.NASL", "EULEROS_SA-2022-2369.NASL", "EULEROS_SA-2022-2370.NASL", "EULEROS_SA-2022-2371.NASL", "EULEROS_SA-2022-2382.NASL", "EULEROS_SA-2022-2390.NASL", "EULEROS_SA-2022-2396.NASL", "EULEROS_SA-2022-2405.NASL", "EULEROS_SA-2022-2406.NASL", "EULEROS_SA-2022-2407.NASL", "EULEROS_SA-2022-2419.NASL", "EULEROS_SA-2022-2432.NASL", "EULEROS_SA-2022-2440.NASL", "EULEROS_SA-2022-2446.NASL", "EULEROS_SA-2022-2465.NASL", "EULEROS_SA-2022-2492.NASL", "EULEROS_SA-2022-2501.NASL", "EULEROS_SA-2022-2505.NASL", "EULEROS_SA-2022-2506.NASL", "EULEROS_SA-2022-2517.NASL", "EULEROS_SA-2022-2522.NASL", "EULEROS_SA-2022-2524.NASL", "EULEROS_SA-2022-2525.NASL", "EULEROS_SA-2022-2526.NASL", "EULEROS_SA-2022-2530.NASL", "EULEROS_SA-2022-2534.NASL", "EULEROS_SA-2022-2541.NASL", "EULEROS_SA-2022-2543.NASL", "EULEROS_SA-2022-2548.NASL", "EULEROS_SA-2022-2549.NASL", "EULEROS_SA-2022-2552.NASL", "EULEROS_SA-2022-2560.NASL", "EULEROS_SA-2022-2563.NASL", "EULEROS_SA-2022-2564.NASL", "EULEROS_SA-2022-2566.NASL", "EULEROS_SA-2022-2572.NASL", "EULEROS_SA-2022-2575.NASL", "EULEROS_SA-2022-2578.NASL", "EULEROS_SA-2022-2583.NASL", "EULEROS_SA-2022-2594.NASL", "EULEROS_SA-2022-2597.NASL", "EULEROS_SA-2022-2598.NASL", "EULEROS_SA-2022-2603.NASL", "EULEROS_SA-2022-2608.NASL", "EULEROS_SA-2022-2616.NASL", "EULEROS_SA-2022-2617.NASL", "EULEROS_SA-2022-2618.NASL", "EULEROS_SA-2022-2622.NASL", "EULEROS_SA-2022-2626.NASL", "EULEROS_SA-2022-2629.NASL", "EULEROS_SA-2022-2659.NASL", "EULEROS_SA-2022-2691.NASL", "EULEROS_SA-2022-2723.NASL", "EULEROS_SA-2022-2736.NASL", "EULEROS_SA-2022-2740.NASL", "EULEROS_SA-2022-2758.NASL", "EULEROS_SA-2022-2771.NASL", "EULEROS_SA-2022-2775.NASL", "EULEROS_SA-2022-2816.NASL", "EULEROS_SA-2022-2828.NASL", "EULEROS_SA-2022-2831.NASL", "EULEROS_SA-2022-2841.NASL", "EULEROS_SA-2022-2852.NASL", "EULEROS_SA-2022-2854.NASL", "EULEROS_SA-2022-2857.NASL", "EULEROS_SA-2022-2877.NASL", "EULEROS_SA-2022-2895.NASL", "EULEROS_SA-2022-2911.NASL", "EULEROS_SA-2022-2937.NASL", "EULEROS_SA-2023-1052.NASL", "EULEROS_SA-2023-1054.NASL", "EULEROS_SA-2023-1057.NASL", "EULEROS_SA-2023-1059.NASL", "EULEROS_SA-2023-1064.NASL", "EULEROS_SA-2023-1068.NASL", "EULEROS_SA-2023-1072.NASL", "EULEROS_SA-2023-1077.NASL", "EULEROS_SA-2023-1094.NASL", "EULEROS_SA-2023-1111.NASL", "EULEROS_SA-2023-1118.NASL", "EULEROS_SA-2023-1135.NASL", "EULEROS_SA-2023-1152.NASL", "EULEROS_SA-2023-1155.NASL", "EULEROS_SA-2023-1173.NASL", "EULEROS_SA-2023-1176.NASL", "EULEROS_SA-2023-1187.NASL", "EULEROS_SA-2023-1197.NASL", "EULEROS_SA-2023-1201.NASL", "EULEROS_SA-2023-1217.NASL", "EULEROS_SA-2023-1227.NASL", "EULEROS_SA-2023-1231.NASL", "EULEROS_SA-2023-1246.NASL", "EULEROS_SA-2023-1250.NASL", "EULEROS_SA-2023-1254.NASL", "EULEROS_SA-2023-1258.NASL", "EULEROS_SA-2023-1260.NASL", "EULEROS_SA-2023-1263.NASL", "EULEROS_SA-2023-1266.NASL", "EULEROS_SA-2023-1271.NASL", "EULEROS_SA-2023-1279.NASL", "EULEROS_SA-2023-1281.NASL", "EULEROS_SA-2023-1284.NASL", "EULEROS_SA-2023-1286.NASL", "EULEROS_SA-2023-1303.NASL", "EULEROS_SA-2023-1305.NASL", "EULEROS_SA-2023-1349.NASL", "EULEROS_SA-2023-1370.NASL", "EULEROS_SA-2023-1377.NASL", "EULEROS_SA-2023-1398.NASL", "EULEROS_SA-2023-1405.NASL", "EULEROS_SA-2023-1416.NASL", "EULEROS_SA-2023-1420.NASL", "EULEROS_SA-2023-1431.NASL", "EULEROS_SA-2023-1620.NASL", "EULEROS_SA-2023-1629.NASL", "EULEROS_SA-2023-1654.NASL", "EULEROS_SA-2023-1663.NASL", "EULEROS_SA-2023-1694.NASL", "EULEROS_SA-2023-1695.NASL", "EULEROS_SA-2023-1716.NASL", "EULEROS_SA-2023-1720.NASL", "EULEROS_SA-2023-1729.NASL", "EULEROS_SA-2023-1736.NASL", "EULEROS_SA-2023-1737.NASL", "EULEROS_SA-2023-1739.NASL", "EULEROS_SA-2023-1741.NASL", "EULEROS_SA-2023-1748.NASL", "EULEROS_SA-2023-1884.NASL", "EULEROS_SA-2023-1915.NASL", "EULEROS_SA-2023-2048.NASL", "EULEROS_SA-2023-2054.NASL", "EULEROS_SA-2023-2099.NASL", "EULEROS_SA-2023-2106.NASL", "EULEROS_SA-2023-2162.NASL", "EULEROS_SA-2023-2183.NASL", "EULEROS_SA-2023-2431.NASL", "EULEROS_SA-2023-2444.NASL", "F5_BIGIP_SOL00994461.NASL", "F5_BIGIP_SOL02453220.NASL", "F5_BIGIP_SOL12492858.NASL", "F5_BIGIP_SOL21548854.NASL", "F5_BIGIP_SOL23153696.NASL", "F5_BIGIP_SOL24608264.NASL", "F5_BIGIP_SOL31323265.NASL", "F5_BIGIP_SOL32760744.NASL", "F5_BIGIP_SOL52379673.NASL", "F5_BIGIP_SOL53225395.NASL", "F5_BIGIP_SOL57542514.NASL", "F5_BIGIP_SOL66544153.NASL", "F5_BIGIP_SOL67090077.NASL", "FEDORA_2018-41320B315A.NASL", "FEDORA_2018-52262A02BE.NASL", "FEDORA_2018-8A85ED2F10.NASL", "FEDORA_2018-9324E844D9.NASL", "FEDORA_2019-119B14075A.NASL", "FEDORA_2019-1FFD6B6064.NASL", "FEDORA_2019-243442E600.NASL", "FEDORA_2019-2B1F72899A.NASL", "FEDORA_2019-51F1E08207.NASL", "FEDORA_2019-57462FA10D.NASL", "FEDORA_2019-5DC275C9F2.NASL", "FEDORA_2019-60A1DEFCD1.NASL", "FEDORA_2019-6B02154AA0.NASL", "FEDORA_2019-6BAEB15DA3.NASL", "FEDORA_2019-6E1938A3C5.NASL", "FEDORA_2019-7723D4774A.NASL", "FEDORA_2019-79B5790566.NASL", "FEDORA_2019-7D9F3CF3CE.NASL", "FEDORA_2019-7DF59302E0.NASL", "FEDORA_2019-86F32CBAB1.NASL", "FEDORA_2019-9BFB4A3E4B.NASL", "FEDORA_2019-A122FE704D.NASL", "FEDORA_2019-B06EC6159B.NASL", "FEDORA_2019-BCAD44B5D6.NASL", "FEDORA_2019-CF725DD20B.NASL", "FEDORA_2019-CF7695B470.NASL", "FEDORA_2019-D202CDA4F8.NASL", "FEDORA_2019-EC26883852.NASL", "FEDORA_2020-0B32A59B54.NASL", "FEDORA_2020-0D3D3F5072.NASL", "FEDORA_2020-11BE4B36D4.NASL", "FEDORA_2020-189A1E6C3E.NASL", "FEDORA_2020-36D2DB5F51.NASL", "FEDORA_2020-40C35D7B37.NASL", "FEDORA_2020-4700A73BD5.NASL", "FEDORA_2020-8371993B6B.NASL", "FEDORA_2020-8C15928D23.NASL", "FEDORA_2020-BDB0BFA928.NASL", "FEDORA_2020-CE396E7D5C.NASL", "FEDORA_2020-DB0EB54982.NASL", "FEDORA_2020-FBB94073A1.NASL", "FEDORA_2021-076A2DCCBA.NASL", "FEDORA_2021-17668E344A.NASL", "FEDORA_2021-1D8254899C.NASL", "FEDORA_2021-3342569A0F.NASL", "FEDORA_2021-3352C1C802.NASL", "FEDORA_2021-33A1B73E48.NASL", "FEDORA_2021-42BA9FEB47.NASL", "FEDORA_2021-66547FF92D.NASL", "FEDORA_2021-7547AD987F.NASL", "FEDORA_2021-79CBBEFEBE.NASL", "FEDORA_2021-851C6E4E2D.NASL", "FEDORA_2021-907F3BACAE.NASL", "FEDORA_2021-CC3FF94CFC.NASL", "FEDORA_2021-CED31F3F0C.NASL", "FEDORA_2021-D5CDE50865.NASL", "FEDORA_2021-E3A5A74610.NASL", "FEDORA_2021-E71C033F88.NASL", "FEDORA_2021-EED7193502.NASL", "FEDORA_2021-F4FD9372C7.NASL", "FEDORA_2021-FAF88B9499.NASL", "FEDORA_2022-9D655503EA.NASL", "FEDORA_2022-B61DFD219B.NASL", "FEDORA_2022-BF18450366.NASL", "FREEBSD_PKG_01823528A4C111EDB6AFB42E991FC52E.NASL", "FREEBSD_PKG_022DDE128F4A11EC83AC080027415D17.NASL", "FREEBSD_PKG_096AB080907C11ECBB14002324B2FBA8.NASL", "FREEBSD_PKG_0B0AD1961EE84A9889B14D5D82AF49A9.NASL", "FREEBSD_PKG_11E36890D28C11ECA06FD4C9EF517024.NASL", "FREEBSD_PKG_18ED9650A1D611E99B17FCAA147E860E.NASL", "FREEBSD_PKG_1AAAA5C6804D11EC8BE6D4C9EF517024.NASL", "FREEBSD_PKG_1FB13175ED5211EA8B93001B217B3468.NASL", "FREEBSD_PKG_20006B5FA0BC11EB8AE6FC4DD43E2B6A.NASL", "FREEBSD_PKG_27C822A0ADDC11EDA9EEDCA632B19F10.NASL", "FREEBSD_PKG_2A1B931F2B8611EC8ACDC80AA9043978.NASL", "FREEBSD_PKG_36D10AF7248D11ED856ED4C9EF517024.NASL", "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "FREEBSD_PKG_38F2E3A0B61E11EC9EBC1C697AA5A594.NASL", "FREEBSD_PKG_43E9FFD4D6E011ED956F7054D21A9E2A.NASL", "FREEBSD_PKG_4EEB93BFF20411EC8FBDD4C9EF517024.NASL", "FREEBSD_PKG_50AD9A9A1E2811E998D70050562A4D7B.NASL", "FREEBSD_PKG_53CAF29B918011EDACBEB42E991FC52E.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_5A668AB38D8611EBB8D6D4C9EF517024.NASL", "FREEBSD_PKG_6601C08DA46C11EC8BE6D4C9EF517024.NASL", "FREEBSD_PKG_676CA4869C1E11EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_70E71A24015111ECBF0C080027EEDC6A.NASL", "FREEBSD_PKG_8E15060608C911ED856ED4C9EF517024.NASL", "FREEBSD_PKG_A449C604A43A11E9B422FCAA147E860E.NASL", "FREEBSD_PKG_AAE8FECF888E11EA971408002718DE91.NASL", "FREEBSD_PKG_B019585ABFEA11ECB46CB42E991FC52E.NASL", "FREEBSD_PKG_B092BD4F1B1611EC9D9D0022489AD614.NASL", "FREEBSD_PKG_B360B12074B111EAA84A4C72B94353B5.NASL", "FREEBSD_PKG_B51CFAEAE91911EC9FBA080027240888.NASL", "FREEBSD_PKG_C0C1834C976111EBACFD0022489AD614.NASL", "FREEBSD_PKG_C7EC6375C3CF11EB904F14DAE9D5A9D2.NASL", "FREEBSD_PKG_C9221EC917A211ECB335D4C9EF517024.NASL", "FREEBSD_PKG_CAF545F2C0D911E990514C72B94353B5.NASL", "FREEBSD_PKG_CC42DB1CC65F11ECAD960800270512F4.NASL", "FREEBSD_PKG_CD2DC126CFE411EA91724C72B94353B5.NASL", "FREEBSD_PKG_CF2105C6551B11E9B95CB499BAEBFEAF.NASL", "FREEBSD_PKG_DC49F6DC99D211ED86E9D4C9EF517024.NASL", "FREEBSD_PKG_E1387E9508D011EDBE26001999F8D30B.NASL", "FREEBSD_PKG_EA05C456A4FD11EC90DE1C697AA5A594.NASL", "FREEBSD_PKG_FCEB2B08CB7611ECA06FD4C9EF517024.NASL", "GENTOO_GLSA-201909-04.NASL", "GENTOO_GLSA-202003-26.NASL", "GENTOO_GLSA-202006-21.NASL", "GENTOO_GLSA-202007-03.NASL", "GENTOO_GLSA-202101-18.NASL", "GENTOO_GLSA-202103-03.NASL", "GENTOO_GLSA-202208-02.NASL", "GENTOO_GLSA-202208-06.NASL", "GENTOO_GLSA-202208-20.NASL", "GENTOO_GLSA-202208-24.NASL", "GENTOO_GLSA-202208-32.NASL", "GENTOO_GLSA-202208-34.NASL", "GENTOO_GLSA-202208-36.NASL", "GENTOO_GLSA-202209-01.NASL", "GENTOO_GLSA-202209-02.NASL", "GENTOO_GLSA-202209-17.NASL", "GENTOO_GLSA-202210-02.NASL", "GENTOO_GLSA-202210-03.NASL", "GENTOO_GLSA-202210-13.NASL", "GENTOO_GLSA-202210-15.NASL", "GENTOO_GLSA-202210-42.NASL", "GENTOO_GLSA-202212-01.NASL", "GENTOO_GLSA-202305-02.NASL", "GENTOO_GLSA-202305-16.NASL", "GENTOO_GLSA-202310-16.NASL", "IBM_ASPERA_FASPEX_4_4_2_185316.NASL", "IBM_COGNOS_6615285.NASL", "IBM_COGNOS_6828527.NASL", "IBM_COGNOS_6841801.NASL", "IBM_COGNOS_6986505.NASL", "IBM_HTTP_SERVER_6191631.NASL", "IBM_HTTP_SERVER_880413.NASL", "IBM_JAVA_2022_07_19.NASL", "IBM_RATIONAL_CLEARCASE_6606577.NASL", "JENKINS_2_334.NASL", "JFROG_ARTIFACTORY_7_11_1.NASL", "JIRA_8_15_0_JRASERVER-72052.NASL", "JIRA_8_18_0_JRASERVER-72669.NASL", "JIRA_8_21_0_JRASERVER-73070.NASL", "JIRA_9_0_0_JRASERVER-73885.NASL", "JIRA_9_6_0_JRASERVER-74776.NASL", "JIRA_JSDSERVER_14749.NASL", "JIRA_SERVICE_DESK_JSDSERVER-14007.NASL", "JOOMLA_3919.NASL", "JQUERY-UI_1_13_0.NASL", "JQUERY_CVE-2020-11022.NASL", "JUNIPER_JSA70180.NASL", "JUNIPER_JSA70186.NASL", "LCE_6_0_9.NASL", "LOG4J_VULNERABLE_ECOSYSTEM_LAUNCHER.NASL", "MACOS_HT213183.NASL", "MACOS_HT213255.NASL", "MACOS_HT213256.NASL", "MACOS_HT213257.NASL", "MARIADB_10_2_42.NASL", "MARIADB_10_3_33.NASL", "MARIADB_10_3_36.NASL", "MARIADB_10_4_23.NASL", "MARIADB_10_4_26.NASL", "MARIADB_10_5_14.NASL", "MARIADB_10_5_17.NASL", "MARIADB_10_6_6.NASL", "MARIADB_10_6_9.NASL", "MARIADB_10_7_2.NASL", "MARIADB_10_7_5.NASL", "MARIADB_10_8_4.NASL", "MARIADB_10_9_2.NASL", "MARINER_GOLANG_CVE-2021-41771.NASL", "MARINER_GOLANG_CVE-2021-41772.NASL", "MARINER_GZIP_CVE-2022-1271.NASL", "MARINER_KERNEL_CVE-2021-43389.NASL", "MARINER_KERNEL_CVE-2021-43976.NASL", "MARINER_LIBXSLT_LIBXML2_CVE-2022-29824.NASL", "MARINER_OPENSSL_CVE-2022-1292.NASL", "MARINER_PYTHON-TWISTED_CVE-2022-24801.NASL", "MARINER_PYYAML_CVE-2020-14343.NASL", "MARINER_PYYAML_CVE-2020-1747.NASL", "MARINER_REDIS_CVE-2022-24735.NASL", "MARINER_REDIS_CVE-2022-24736.NASL", "MARINER_VIM_CVE-2022-1154.NASL", "MCAFEE_EPO_SB10332.NASL", "MYSQL_5_7_34.NASL", "MYSQL_5_7_37.NASL", "MYSQL_5_7_38.NASL", "MYSQL_5_7_39.NASL", "MYSQL_8_0_21.NASL", "MYSQL_8_0_24.NASL", "MYSQL_8_0_26.NASL", "MYSQL_8_0_28.NASL", "MYSQL_8_0_29.NASL", "MYSQL_8_0_30.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_21_1243.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_23.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_26.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_27.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_30.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_31.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_33.NASL", "NESSUS_TNS-2022-11.NASL", "NESSUS_TNS-2022-20.NASL", "NESSUS_TNS-2022-21.NASL", "NESSUS_TNS-2022-26.NASL", "NESSUS_TNS-2023-09.NASL", "NESSUS_TNS-2023-20.NASL", "NESSUS_TNS_2021_04.NASL", "NESSUS_TNS_2022_06.NASL", "NEWSTART_CGSL_NS-SA-2019-0061_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0160_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0163_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0166_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0174_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0187_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0189_PYTHON-REQUESTS.NASL", "NEWSTART_CGSL_NS-SA-2019-0202_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2019-0229_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2019-0230_PYTHON-REQUESTS.NASL", "NEWSTART_CGSL_NS-SA-2019-0250_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2020-0011_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0035_PYTHON-PIP.NASL", "NEWSTART_CGSL_NS-SA-2020-0044_PYTHON-VIRTUALENV.NASL", "NEWSTART_CGSL_NS-SA-2020-0055_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2020-0100_APACHE-COMMONS-BEANUTILS.NASL", "NEWSTART_CGSL_NS-SA-2020-0112_PYTHON-PIP.NASL", "NEWSTART_CGSL_NS-SA-2020-0118_PYTHON-VIRTUALENV.NASL", "NEWSTART_CGSL_NS-SA-2021-0036_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2021-0045_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0081_PYTHON-PIP.NASL", "NEWSTART_CGSL_NS-SA-2021-0104_IPA.NASL", "NEWSTART_CGSL_NS-SA-2021-0130_PYTHON-URLLIB3.NASL", "NEWSTART_CGSL_NS-SA-2021-0135_TOMCAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0159_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2021-0171_IPA.NASL", "NEWSTART_CGSL_NS-SA-2022-0001_OPENSSH-LATEST.NASL", "NEWSTART_CGSL_NS-SA-2022-0007_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2022-0015_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0037_IPA.NASL", "NEWSTART_CGSL_NS-SA-2022-0040_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0045_XSTREAM.NASL", "NEWSTART_CGSL_NS-SA-2022-0049_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2022-0068_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0070_OPENSSH.NASL", "NEWSTART_CGSL_NS-SA-2022-0073_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0076_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2022-0076_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0077_CYRUS-SASL.NASL", "NEWSTART_CGSL_NS-SA-2022-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0079_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0083_CURL.NASL", "NEWSTART_CGSL_NS-SA-2022-0085_GLIBC.NASL", "NEWSTART_CGSL_NS-SA-2022-0088_CYRUS-SASL.NASL", "NEWSTART_CGSL_NS-SA-2022-0088_LIBGCRYPT.NASL", "NEWSTART_CGSL_NS-SA-2022-0089_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0096_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0100_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2022-0101_PYTHON-LXML.NASL", "NEWSTART_CGSL_NS-SA-2022-0102_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2022-0104_LIBXML2.NASL", "NEWSTART_CGSL_NS-SA-2023-0001_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2023-0002_ZLIB.NASL", "NEWSTART_CGSL_NS-SA-2023-0004_ZLIB.NASL", "NEWSTART_CGSL_NS-SA-2023-0005_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2023-0006_RSYNC.NASL", "NEWSTART_CGSL_NS-SA-2023-0008_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2023-0011_HTTPD.NASL", "NEWSTART_CGSL_NS-SA-2023-0012_CYRUS-SASL.NASL", "NEWSTART_CGSL_NS-SA-2023-0017_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2023-0021_ZLIB.NASL", "NEWSTART_CGSL_NS-SA-2023-0025_OPENSSL.NASL", "NEWSTART_CGSL_NS-SA-2023-0136_PYTHON-LXML.NASL", "NEWSTART_CGSL_NS-SA-2023-0137_PYTHON-JINJA2.NASL", "NEWSTART_CGSL_NS-SA-2023-0139_PYYAML.NASL", "NEWSTART_CGSL_NS-SA-2023-0140_PYTHON-CRYPTOGRAPHY.NASL", "NEWSTART_CGSL_NS-SA-2023-1001_HTTPD.NASL", "NNM_5_13_0.NASL", "NNM_5_13_1.NASL", "NNM_6_0_1.NASL", "NNM_6_2_2.NASL", "NODEJS_2021_AUG.NASL", "NODEJS_2022_JAN.NASL", "NUTANIX_NXSA-AHV-20201105_2267.NASL", "NUTANIX_NXSA-AHV-20201105_2286.NASL", "NUTANIX_NXSA-AHV-20201105_2298.NASL", "NUTANIX_NXSA-AHV-20201105_30142.NASL", "NUTANIX_NXSA-AHV-20201105_30281.NASL", "NUTANIX_NXSA-AHV-20201105_30398.NASL", "NUTANIX_NXSA-AHV-20220304_10013.NASL", "NUTANIX_NXSA-AHV-20220304_242.NASL", "NUTANIX_NXSA-AHV-20230302_207.NASL", "NUTANIX_NXSA-AOS-5_10_9.NASL", "NUTANIX_NXSA-AOS-5_11_2.NASL", "NUTANIX_NXSA-AOS-5_15_1.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_16.NASL", "NUTANIX_NXSA-AOS-5_16_1_3.NASL", "NUTANIX_NXSA-AOS-5_17_0_3.NASL", "NUTANIX_NXSA-AOS-5_17_1.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_18_1.NASL", "NUTANIX_NXSA-AOS-5_19.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_19_2.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-5_20_2.NASL", "NUTANIX_NXSA-AOS-5_20_3.NASL", "NUTANIX_NXSA-AOS-5_20_3_5.NASL", "NUTANIX_NXSA-AOS-5_20_3_6.NASL", "NUTANIX_NXSA-AOS-5_20_4.NASL", "NUTANIX_NXSA-AOS-5_20_4_5.NASL", "NUTANIX_NXSA-AOS-5_20_5.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_0_1_6.NASL", "NUTANIX_NXSA-AOS-6_0_2.NASL", "NUTANIX_NXSA-AOS-6_0_2_5.NASL", "NUTANIX_NXSA-AOS-6_0_2_6.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "NUTANIX_NXSA-AOS-6_1_1.NASL", "NUTANIX_NXSA-AOS-6_1_1_5.NASL", "NUTANIX_NXSA-AOS-6_5_1_5.NASL", "NUTANIX_NXSA-AOS-6_5_2.NASL", "NUTANIX_NXSA-AOS-6_6.NASL", "NUTANIX_NXSA-AOS-6_6_2.NASL", "OPENJDK_2022-07-19.NASL", "OPENSSH_88.NASL", "OPENSSL_1_0_2ZC_DEV.NASL", "OPENSSL_1_0_2ZD.NASL", "OPENSSL_1_0_2ZE.NASL", "OPENSSL_1_0_2ZF.NASL", "OPENSSL_1_1_1K.NASL", "OPENSSL_1_1_1M.NASL", "OPENSSL_1_1_1N.NASL", "OPENSSL_1_1_1O.NASL", "OPENSSL_1_1_1P.NASL", "OPENSSL_3_0_1.NASL", "OPENSSL_3_0_2.NASL", "OPENSSL_3_0_3.NASL", "OPENSSL_3_0_4.NASL", "OPENSUSE-2018-1188.NASL", "OPENSUSE-2019-1190.NASL", "OPENSUSE-2019-1209.NASL", "OPENSUSE-2019-1258.NASL", "OPENSUSE-2019-1273.NASL", "OPENSUSE-2019-1282.NASL", "OPENSUSE-2019-1371.NASL", "OPENSUSE-2019-1580.NASL", "OPENSUSE-2019-1754.NASL", "OPENSUSE-2019-1906.NASL", "OPENSUSE-2019-2051.NASL", "OPENSUSE-2019-2058.NASL", "OPENSUSE-2019-2131.NASL", "OPENSUSE-2019-2133.NASL", "OPENSUSE-2019-792.NASL", "OPENSUSE-2020-1060.NASL", "OPENSUSE-2020-1153.NASL", "OPENSUSE-2020-1586.NASL", "OPENSUSE-2020-1598.NASL", "OPENSUSE-2020-1613.NASL", "OPENSUSE-2020-1655.NASL", "OPENSUSE-2020-1888.NASL", "OPENSUSE-2020-2143.NASL", "OPENSUSE-2020-2152.NASL", "OPENSUSE-2020-2161.NASL", "OPENSUSE-2020-2169.NASL", "OPENSUSE-2020-2184.NASL", "OPENSUSE-2020-2185.NASL", "OPENSUSE-2020-2189.NASL", "OPENSUSE-2020-2190.NASL", "OPENSUSE-2020-2193.NASL", "OPENSUSE-2020-2211.NASL", "OPENSUSE-2020-2237.NASL", "OPENSUSE-2020-2260.NASL", "OPENSUSE-2020-2282.NASL", "OPENSUSE-2020-2332.NASL", "OPENSUSE-2020-2333.NASL", "OPENSUSE-2020-2367.NASL", "OPENSUSE-2020-507.NASL", "OPENSUSE-2020-51.NASL", "OPENSUSE-2020-597.NASL", "OPENSUSE-2020-630.NASL", "OPENSUSE-2020-711.NASL", "OPENSUSE-2020-719.NASL", "OPENSUSE-2020-86.NASL", "OPENSUSE-2020-935.NASL", "OPENSUSE-2021-1031.NASL", "OPENSUSE-2021-1059.NASL", "OPENSUSE-2021-1061.NASL", "OPENSUSE-2021-1076.NASL", "OPENSUSE-2021-1115.NASL", "OPENSUSE-2021-1130.NASL", "OPENSUSE-2021-1142.NASL", "OPENSUSE-2021-1168.NASL", "OPENSUSE-2021-1206.NASL", "OPENSUSE-2021-1214.NASL", "OPENSUSE-2021-1239.NASL", "OPENSUSE-2021-1271.NASL", "OPENSUSE-2021-1313.NASL", "OPENSUSE-2021-1357.NASL", "OPENSUSE-2021-1365.NASL", "OPENSUSE-2021-1384.NASL", "OPENSUSE-2021-1401.NASL", "OPENSUSE-2021-1411.NASL", "OPENSUSE-2021-1418.NASL", "OPENSUSE-2021-1460.NASL", "OPENSUSE-2021-1477.NASL", "OPENSUSE-2021-1539.NASL", "OPENSUSE-2021-1598.NASL", "OPENSUSE-2021-1612.NASL", "OPENSUSE-2021-1631.NASL", "OPENSUSE-2021-1859.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-1995.NASL", "OPENSUSE-2021-2157.NASL", "OPENSUSE-2021-221.NASL", "OPENSUSE-2021-2293.NASL", "OPENSUSE-2021-2327.NASL", "OPENSUSE-2021-2353.NASL", "OPENSUSE-2021-242.NASL", "OPENSUSE-2021-2575.NASL", "OPENSUSE-2021-2612.NASL", "OPENSUSE-2021-2637.NASL", "OPENSUSE-2021-2645.NASL", "OPENSUSE-2021-2687.NASL", "OPENSUSE-2021-270.NASL", "OPENSUSE-2021-2760.NASL", "OPENSUSE-2021-2795.NASL", "OPENSUSE-2021-2817.NASL", "OPENSUSE-2021-2838.NASL", "OPENSUSE-2021-2875.NASL", "OPENSUSE-2021-2940.NASL", "OPENSUSE-2021-2953.NASL", "OPENSUSE-2021-3179.NASL", "OPENSUSE-2021-3205.NASL", "OPENSUSE-2021-3211.NASL", "OPENSUSE-2021-3298.NASL", "OPENSUSE-2021-331.NASL", "OPENSUSE-2021-3338.NASL", "OPENSUSE-2021-3387.NASL", "OPENSUSE-2021-3447.NASL", "OPENSUSE-2021-3454.NASL", "OPENSUSE-2021-3476.NASL", "OPENSUSE-2021-3489.NASL", "OPENSUSE-2021-3641.NASL", "OPENSUSE-2021-3655.NASL", "OPENSUSE-2021-3675.NASL", "OPENSUSE-2021-3833.NASL", "OPENSUSE-2021-3834.NASL", "OPENSUSE-2021-3876.NASL", "OPENSUSE-2021-3941.NASL", "OPENSUSE-2021-3950.NASL", "OPENSUSE-2021-4001.NASL", "OPENSUSE-2021-4002.NASL", "OPENSUSE-2021-4104.NASL", "OPENSUSE-2021-4111.NASL", "OPENSUSE-2021-4112.NASL", "OPENSUSE-2021-4208.NASL", "OPENSUSE-2021-476.NASL", "OPENSUSE-2021-496.NASL", "OPENSUSE-2021-579.NASL", "OPENSUSE-2021-605.NASL", "OPENSUSE-2021-75.NASL", "OPENSUSE-2021-758.NASL", "OPENSUSE-2021-851.NASL", "OPENSUSE-2021-911.NASL", "OPENSUSE-2021-919.NASL", "OPENSUSE-2022-0002-1.NASL", "OPENSUSE-2022-0038-1.NASL", "OPENSUSE-2022-0056-1.NASL", "OPENSUSE-2022-0064-1.NASL", "OPENSUSE-2022-0112-1.NASL", "OPENSUSE-2022-0113-1.NASL", "OPENSUSE-2022-0131-1.NASL", "OPENSUSE-2022-0134-1.NASL", "OPENSUSE-2022-0169-1.NASL", "OPENSUSE-2022-0198-1.NASL", "OPENSUSE-2022-0214-1.NASL", "OPENSUSE-2022-0226-1.NASL", "OPENSUSE-2022-0330-1.NASL", "OPENSUSE-2022-0363-1.NASL", "OPENSUSE-2022-0366-1.NASL", "OPENSUSE-2022-0370-1.NASL", "OPENSUSE-2022-0500-1.NASL", "OPENSUSE-2022-0503-1.NASL", "OPENSUSE-2022-0525-1.NASL", "OPENSUSE-2022-0723-1.NASL", "OPENSUSE-2022-0724-1.NASL", "OPENSUSE-2022-0743-1.NASL", "OPENSUSE-2022-0755-1.NASL", "OPENSUSE-2022-0760-1.NASL", "OPENSUSE-2022-0768-1.NASL", "OPENSUSE-2022-0817-1.NASL", "OPENSUSE-2022-0818-1.NASL", "OPENSUSE-2022-0856-1.NASL", "OPENSUSE-2022-0940-1.NASL", "OPENSUSE-2022-0942-1.NASL", "OPENSUSE-2022-10067-1.NASL", "OPENSUSE-2022-10122-1.NASL", "OPENSUSE-2022-10126-1.NASL", "OPENSUSE-2022-10129-1.NASL", "OPENSUSE-2022-10152-1.NASL", "OPENSUSE-2022-1031-1.NASL", "OPENSUSE-2022-1037-1.NASL", "OPENSUSE-2022-1039-1.NASL", "OPENSUSE-2022-1061-1.NASL", "OPENSUSE-2022-1064-1.NASL", "OPENSUSE-2022-1091-1.NASL", "ORACLELINUX_ELSA-2017-2423.NASL", "ORACLELINUX_ELSA-2019-0710.NASL", "ORACLELINUX_ELSA-2019-0981.NASL", "ORACLELINUX_ELSA-2019-0997.NASL", "ORACLELINUX_ELSA-2019-1467.NASL", "ORACLELINUX_ELSA-2019-1587.NASL", "ORACLELINUX_ELSA-2019-2030.NASL", "ORACLELINUX_ELSA-2019-2035.NASL", "ORACLELINUX_ELSA-2019-2343.NASL", "ORACLELINUX_ELSA-2019-3335.NASL", "ORACLELINUX_ELSA-2019-3436.NASL", "ORACLELINUX_ELSA-2019-3520.NASL", "ORACLELINUX_ELSA-2020-0194.NASL", "ORACLELINUX_ELSA-2020-0850.NASL", "ORACLELINUX_ELSA-2020-0851.NASL", "ORACLELINUX_ELSA-2020-1605.NASL", "ORACLELINUX_ELSA-2020-1916.NASL", "ORACLELINUX_ELSA-2020-2068.NASL", "ORACLELINUX_ELSA-2020-2081.NASL", "ORACLELINUX_ELSA-2020-2529.NASL", "ORACLELINUX_ELSA-2020-2530.NASL", "ORACLELINUX_ELSA-2020-3936.NASL", "ORACLELINUX_ELSA-2020-3958.NASL", "ORACLELINUX_ELSA-2020-4432.NASL", "ORACLELINUX_ELSA-2020-4641.NASL", "ORACLELINUX_ELSA-2020-4654.NASL", "ORACLELINUX_ELSA-2020-4670.NASL", "ORACLELINUX_ELSA-2020-4751.NASL", "ORACLELINUX_ELSA-2020-4847.NASL", "ORACLELINUX_ELSA-2021-0860.NASL", "ORACLELINUX_ELSA-2021-1024.NASL", "ORACLELINUX_ELSA-2021-1631.NASL", "ORACLELINUX_ELSA-2021-1633.NASL", "ORACLELINUX_ELSA-2021-1761.NASL", "ORACLELINUX_ELSA-2021-1846.NASL", "ORACLELINUX_ELSA-2021-1879.NASL", "ORACLELINUX_ELSA-2021-2583.NASL", "ORACLELINUX_ELSA-2021-2683.NASL", "ORACLELINUX_ELSA-2021-3327.NASL", "ORACLELINUX_ELSA-2021-3576.NASL", "ORACLELINUX_ELSA-2021-3623.NASL", "ORACLELINUX_ELSA-2021-3666.NASL", "ORACLELINUX_ELSA-2021-3956.NASL", "ORACLELINUX_ELSA-2021-4059.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4160.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-4409.NASL", "ORACLELINUX_ELSA-2021-4455.NASL", "ORACLELINUX_ELSA-2021-4782.NASL", "ORACLELINUX_ELSA-2021-4788.NASL", "ORACLELINUX_ELSA-2021-5206.NASL", "ORACLELINUX_ELSA-2021-9100.NASL", "ORACLELINUX_ELSA-2021-9101.NASL", "ORACLELINUX_ELSA-2021-9107.NASL", "ORACLELINUX_ELSA-2021-9128.NASL", "ORACLELINUX_ELSA-2021-9129.NASL", "ORACLELINUX_ELSA-2021-9130.NASL", "ORACLELINUX_ELSA-2021-9151.NASL", "ORACLELINUX_ELSA-2021-9222.NASL", "ORACLELINUX_ELSA-2021-9223.NASL", "ORACLELINUX_ELSA-2021-9305.NASL", "ORACLELINUX_ELSA-2021-9306.NASL", "ORACLELINUX_ELSA-2021-9307.NASL", "ORACLELINUX_ELSA-2021-9308.NASL", "ORACLELINUX_ELSA-2021-9400.NASL", "ORACLELINUX_ELSA-2021-9452.NASL", "ORACLELINUX_ELSA-2021-9453.NASL", "ORACLELINUX_ELSA-2021-9474.NASL", "ORACLELINUX_ELSA-2021-9475.NASL", "ORACLELINUX_ELSA-2021-9552.NASL", "ORACLELINUX_ELSA-2021-9564.NASL", "ORACLELINUX_ELSA-2021-9565.NASL", "ORACLELINUX_ELSA-2021-9575.NASL", "ORACLELINUX_ELSA-2022-0063.NASL", "ORACLELINUX_ELSA-2022-0290.NASL", "ORACLELINUX_ELSA-2022-0442.NASL", "ORACLELINUX_ELSA-2022-0620.NASL", "ORACLELINUX_ELSA-2022-0658.NASL", "ORACLELINUX_ELSA-2022-0666.NASL", "ORACLELINUX_ELSA-2022-0896.NASL", "ORACLELINUX_ELSA-2022-0899.NASL", "ORACLELINUX_ELSA-2022-1045.NASL", "ORACLELINUX_ELSA-2022-1049.NASL", "ORACLELINUX_ELSA-2022-1065.NASL", "ORACLELINUX_ELSA-2022-1066.NASL", "ORACLELINUX_ELSA-2022-1198.NASL", "ORACLELINUX_ELSA-2022-14857.NASL", "ORACLELINUX_ELSA-2022-1537.NASL", "ORACLELINUX_ELSA-2022-1546.NASL", "ORACLELINUX_ELSA-2022-1550.NASL", "ORACLELINUX_ELSA-2022-1552.NASL", "ORACLELINUX_ELSA-2022-1642.NASL", "ORACLELINUX_ELSA-2022-1763.NASL", "ORACLELINUX_ELSA-2022-1764.NASL", "ORACLELINUX_ELSA-2022-1819.NASL", "ORACLELINUX_ELSA-2022-1821.NASL", "ORACLELINUX_ELSA-2022-1932.NASL", "ORACLELINUX_ELSA-2022-1986.NASL", "ORACLELINUX_ELSA-2022-1988.NASL", "ORACLELINUX_ELSA-2022-2013.NASL", "ORACLELINUX_ELSA-2022-2043.NASL", "ORACLELINUX_ELSA-2022-2191.NASL", "ORACLELINUX_ELSA-2022-2201.NASL", "ORACLELINUX_ELSA-2022-2213.NASL", "ORACLELINUX_ELSA-2022-4582.NASL", "ORACLELINUX_ELSA-2022-4584.NASL", "ORACLELINUX_ELSA-2022-4592.NASL", "ORACLELINUX_ELSA-2022-4899.NASL", "ORACLELINUX_ELSA-2022-4930.NASL", "ORACLELINUX_ELSA-2022-4940.NASL", "ORACLELINUX_ELSA-2022-4991.NASL", "ORACLELINUX_ELSA-2022-5052.NASL", "ORACLELINUX_ELSA-2022-5234.NASL", "ORACLELINUX_ELSA-2022-5235.NASL", "ORACLELINUX_ELSA-2022-5242.NASL", "ORACLELINUX_ELSA-2022-5250.NASL", "ORACLELINUX_ELSA-2022-5317.NASL", "ORACLELINUX_ELSA-2022-5326.NASL", "ORACLELINUX_ELSA-2022-5683.NASL", "ORACLELINUX_ELSA-2022-5687.NASL", "ORACLELINUX_ELSA-2022-5695.NASL", "ORACLELINUX_ELSA-2022-5696.NASL", "ORACLELINUX_ELSA-2022-5698.NASL", "ORACLELINUX_ELSA-2022-5709.NASL", "ORACLELINUX_ELSA-2022-5726.NASL", "ORACLELINUX_ELSA-2022-5736.NASL", "ORACLELINUX_ELSA-2022-5818.NASL", "ORACLELINUX_ELSA-2022-6224.NASL", "ORACLELINUX_ELSA-2022-6590.NASL", "ORACLELINUX_ELSA-2022-7119.NASL", "ORACLELINUX_ELSA-2022-7541.NASL", "ORACLELINUX_ELSA-2022-7647.NASL", "ORACLELINUX_ELSA-2022-7830.NASL", "ORACLELINUX_ELSA-2022-8067.NASL", "ORACLELINUX_ELSA-2022-8096.NASL", "ORACLELINUX_ELSA-2022-8420.NASL", "ORACLELINUX_ELSA-2022-9056.NASL", "ORACLELINUX_ELSA-2022-90731.NASL", "ORACLELINUX_ELSA-2022-9088.NASL", "ORACLELINUX_ELSA-2022-9147.NASL", "ORACLELINUX_ELSA-2022-9148.NASL", "ORACLELINUX_ELSA-2022-9177.NASL", "ORACLELINUX_ELSA-2022-9181.NASL", "ORACLELINUX_ELSA-2022-9182.NASL", "ORACLELINUX_ELSA-2022-9204.NASL", "ORACLELINUX_ELSA-2022-9224.NASL", "ORACLELINUX_ELSA-2022-9225.NASL", "ORACLELINUX_ELSA-2022-9233.NASL", "ORACLELINUX_ELSA-2022-9234.NASL", "ORACLELINUX_ELSA-2022-9237.NASL", "ORACLELINUX_ELSA-2022-9239.NASL", "ORACLELINUX_ELSA-2022-9243.NASL", "ORACLELINUX_ELSA-2022-9244.NASL", "ORACLELINUX_ELSA-2022-9245.NASL", "ORACLELINUX_ELSA-2022-9246.NASL", "ORACLELINUX_ELSA-2022-9249.NASL", "ORACLELINUX_ELSA-2022-9255.NASL", "ORACLELINUX_ELSA-2022-9257.NASL", "ORACLELINUX_ELSA-2022-9258.NASL", "ORACLELINUX_ELSA-2022-9260.NASL", "ORACLELINUX_ELSA-2022-9263.NASL", "ORACLELINUX_ELSA-2022-9272.NASL", "ORACLELINUX_ELSA-2022-9313.NASL", "ORACLELINUX_ELSA-2022-9314.NASL", "ORACLELINUX_ELSA-2022-9341.NASL", "ORACLELINUX_ELSA-2022-9348.NASL", "ORACLELINUX_ELSA-2022-9358.NASL", "ORACLELINUX_ELSA-2022-9419.NASL", "ORACLELINUX_ELSA-2022-9421.NASL", "ORACLELINUX_ELSA-2022-9479.NASL", "ORACLELINUX_ELSA-2022-9480.NASL", "ORACLELINUX_ELSA-2022-9565.NASL", "ORACLELINUX_ELSA-2022-9683.NASL", "ORACLELINUX_ELSA-2022-9751.NASL", "ORACLELINUX_ELSA-2022-9761.NASL", "ORACLELINUX_ELSA-2022-9852.NASL", "ORACLELINUX_ELSA-2022-9969.NASL", "ORACLELINUX_ELSA-2023-12232.NASL", "ORACLELINUX_ELSA-2023-12349.NASL", "ORACLELINUX_ELSA-2023-2312.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "ORACLEVM_OVMSA-2022-0007.NASL", "ORACLEVM_OVMSA-2022-0010.NASL", "ORACLEVM_OVMSA-2022-0011.NASL", "ORACLEVM_OVMSA-2022-0014.NASL", "ORACLEVM_OVMSA-2022-0024.NASL", "ORACLEVM_OVMSA-2022-0026.NASL", "ORACLEVM_OVMSA-2023-0007.NASL", "ORACLE_ACCESS_MANAGER_CPU_APR_2023.NASL", "ORACLE_ACCESS_MANAGER_CPU_JUL_2023.NASL", "ORACLE_ACCESS_MANAGER_CPU_OCT_2023.NASL", "ORACLE_BI_PUBLISHER_APR_2021_CPU.NASL", "ORACLE_BI_PUBLISHER_CPU_JUL_2023.NASL", "ORACLE_BI_PUBLISHER_CPU_OCT_2022.NASL", "ORACLE_BI_PUBLISHER_CPU_OCT_2023.NASL", "ORACLE_BI_PUBLISHER_JUL_2022_CPU.NASL", "ORACLE_BI_PUBLISHER_OAS_5_9_CPU_OCT_2022.NASL", "ORACLE_BI_PUBLISHER_OAS_6_4_CPU_OCT_2022.NASL", "ORACLE_BI_PUBLISHER_OAS_CPU_JAN_2023.NASL", "ORACLE_BI_PUBLISHER_OAS_CPU_JUL_2022.NASL", "ORACLE_BPM_CPU_APR_2022.NASL", "ORACLE_BPM_CPU_JAN_2021.NASL", "ORACLE_BPM_CPU_JAN_2022.NASL", "ORACLE_BPM_CPU_JUL_2023.NASL", "ORACLE_BPM_CPU_OCT_2020.NASL", "ORACLE_COHERENCE_CPU_APR_2021.NASL", "ORACLE_COHERENCE_CPU_APR_2022.NASL", "ORACLE_COHERENCE_CPU_JUL_2022.NASL", "ORACLE_COHERENCE_CPU_OCT_2022.NASL", "ORACLE_E-BUSINESS_CPU_APR_2021.NASL", "ORACLE_E-BUSINESS_CPU_JAN_2022.NASL", "ORACLE_E-BUSINESS_CPU_JUL_2022.NASL", "ORACLE_E-BUSINESS_CPU_OCT_2022.NASL", "ORACLE_E-BUSINESS_CVE_2022_21500.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_APR_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JAN_2023.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JUL_2021.NASL", "ORACLE_ENTERPRISE_MANAGER_CPU_JUL_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_JUL_2020_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_APR_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JAN_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JAN_2022_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JUL_2021_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_JUL_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_OCT_2021_UI.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_CPU_OCT_2022.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_JUL_2019_CPU.NASL", "ORACLE_ENTERPRISE_MANAGER_OPS_CENTER_OCT_2020_CPU.NASL", "ORACLE_ESSBASE_CPU_OCT_2022.NASL", "ORACLE_GOLDENGATE_CPU_JAN_2022.NASL", "ORACLE_GOLDENGATE_CPU_OCT_2021.NASL", "ORACLE_GOLDENGATE_CPU_OCT_2022.NASL", "ORACLE_HTTP_SERVER_CPU_JAN_2023.NASL", "ORACLE_IDENTITY_MANAGEMENT_CPU_APR_2022.NASL", "ORACLE_IDENTITY_MANAGEMENT_CPU_OCT_2023.NASL", "ORACLE_JAVA_CPU_JUL_2022.NASL", "ORACLE_JDEVELOPER_CPU_APR_2022.NASL", "ORACLE_JDEVELOPER_CPU_JUL_2021.NASL", "ORACLE_JDEVELOPER_CPU_JUL_2023.NASL", "ORACLE_JDEVELOPER_CPU_OCT_2020.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_APR_2022.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JAN_2023.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2021.NASL", "ORACLE_MYSQL_WORKBENCH_8_0_29.NASL", "ORACLE_NOSQL_CPU_OCT_2021.NASL", "ORACLE_OATS_CPU_APR_2020.NASL", "ORACLE_OATS_CPU_APR_2023.NASL", "ORACLE_OATS_CPU_JAN_2021.NASL", "ORACLE_OATS_CPU_JAN_2022.NASL", "ORACLE_OATS_CPU_JUL_2021.NASL", "ORACLE_OATS_CPU_JUL_2023.NASL", "ORACLE_OATS_CPU_OCT_2023.NASL", "ORACLE_OBIEE_CPU_APR_2023.NASL", "ORACLE_OBIEE_CPU_APR_2023_OAS.NASL", "ORACLE_OBIEE_CPU_JUL_2023.NASL", "ORACLE_OBIEE_CPU_JUL_2023_OAS.NASL", "ORACLE_OBIEE_CPU_OCT_2023.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_JUL_2022.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2020.NASL", "ORACLE_PRIMAVERA_GATEWAY_CPU_OCT_2021.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2020.NASL", "ORACLE_PRIMAVERA_P6_EPPM_CPU_JUL_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_APR_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2020.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JAN_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_JUL_2022.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2021.NASL", "ORACLE_PRIMAVERA_UNIFIER_CPU_OCT_2022.NASL", "ORACLE_RDBMS_CPU_APR_2021.NASL", "ORACLE_RDBMS_CPU_JAN_2023.NASL", "ORACLE_RDBMS_CPU_JAN_2023_WIN.NASL", "ORACLE_RDBMS_CPU_JUL_2020.NASL", "ORACLE_RDBMS_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_JUL_2022.NASL", "ORACLE_RDBMS_CPU_OCT_2020.NASL", "ORACLE_RDBMS_CPU_OCT_2021.NASL", "ORACLE_RDBMS_CPU_OCT_2022.NASL", "ORACLE_RDBMS_CPU_OCT_2023.NASL", "ORACLE_SECURE_GLOBAL_DESKTOP_JAN_2020_CPU.NASL", "ORACLE_TUXEDO_CPU_APR_2022.NASL", "ORACLE_TUXEDO_CPU_JAN_2020.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JAN_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_JUL_2022.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2020.NBIN", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2021.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2022.NASL", "ORACLE_WEBCENTER_PORTAL_CPU_OCT_2023.NASL", "ORACLE_WEBCENTER_SITES_CPU_APR_2022.NASL", "ORACLE_WEBCENTER_SITES_CPU_JAN_2023.NASL", "ORACLE_WEBCENTER_SITES_CPU_JUL_2023.NASL", "ORACLE_WEBCENTER_SITES_CPU_OCT_2022.NASL", "ORACLE_WEBCENTER_SITES_JAN_2021_CPU.NASL", "ORACLE_WEBCENTER_SITES_OCT_2021_CPU.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_APR_2023.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JAN_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_JUL_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2020.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2021.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2022_V14.NASL", "ORACLE_WEBLOGIC_SERVER_CPU_OCT_2023.NASL", "PALO_ALTO_CVE-2022-0778.NASL", "PALO_ALTO_GLOBALPROTECT_AGENT_CVE-2022-0778.NASL", "PHOTONOS_PHSA-2019-1_0-0236_PYTHON2.NASL", "PHOTONOS_PHSA-2019-1_0-0237_PYTHON2.NASL", "PHOTONOS_PHSA-2019-1_0-0237_PYTHON3.NASL", "PHOTONOS_PHSA-2019-1_0-0253_HTTPD.NASL", "PHOTONOS_PHSA-2019-2_0-0178_HTTPD.NASL", "PHOTONOS_PHSA-2019-3_0-0009_PYTHON.NASL", "PHOTONOS_PHSA-2019-3_0-0035_HTTPD.NASL", "PHOTONOS_PHSA-2020-1_0-0290_HTTPD.NASL", "PHOTONOS_PHSA-2020-1_0-0290_PYYAML.NASL", "PHOTONOS_PHSA-2020-1_0-0298_APACHE.NASL", "PHOTONOS_PHSA-2020-1_0-0303_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0338_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0228_HTTPD.NASL", "PHOTONOS_PHSA-2020-2_0-0229_PYYAML.NASL", "PHOTONOS_PHSA-2020-2_0-0248_APACHE.NASL", "PHOTONOS_PHSA-2020-2_0-0256_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0295_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0079_HTTPD.NASL", "PHOTONOS_PHSA-2020-3_0-0080_PYYAML.NASL", "PHOTONOS_PHSA-2020-3_0-0100_APACHE.NASL", "PHOTONOS_PHSA-2020-3_0-0108_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0161_PYTHON3.NASL", "PHOTONOS_PHSA-2021-1_0-0361_PYYAML.NASL", "PHOTONOS_PHSA-2021-1_0-0382_LINUX.NASL", "PHOTONOS_PHSA-2021-1_0-0418_APACHE.NASL", "PHOTONOS_PHSA-2021-1_0-0419_PYTHON.NASL", "PHOTONOS_PHSA-2021-1_0-0423_C.NASL", "PHOTONOS_PHSA-2021-1_0-0428_GLIBC.NASL", "PHOTONOS_PHSA-2021-1_0-0434_CURL.NASL", "PHOTONOS_PHSA-2021-1_0-0440_OPENSSH.NASL", "PHOTONOS_PHSA-2021-2_0-0317_PYTHON3.NASL", "PHOTONOS_PHSA-2021-2_0-0331_NXTGN.NASL", "PHOTONOS_PHSA-2021-2_0-0340_LINUX.NASL", "PHOTONOS_PHSA-2021-2_0-0362_PYTHON.NASL", "PHOTONOS_PHSA-2021-2_0-0374_APACHE.NASL", "PHOTONOS_PHSA-2021-2_0-0378_C.NASL", "PHOTONOS_PHSA-2021-2_0-0383_GLIBC.NASL", "PHOTONOS_PHSA-2021-2_0-0392_CURL.NASL", "PHOTONOS_PHSA-2021-2_0-0393_PYTHON.NASL", "PHOTONOS_PHSA-2021-3_0-0190_PYYAML.NASL", "PHOTONOS_PHSA-2021-3_0-0192_PYTHON3.NASL", "PHOTONOS_PHSA-2021-3_0-0210_NXTGN.NASL", "PHOTONOS_PHSA-2021-3_0-0221_LINUX.NASL", "PHOTONOS_PHSA-2021-3_0-0246_PYTHON.NASL", "PHOTONOS_PHSA-2021-3_0-0257_LIBGCRYPT.NASL", "PHOTONOS_PHSA-2021-3_0-0274_APACHE.NASL", "PHOTONOS_PHSA-2021-3_0-0282_C.NASL", "PHOTONOS_PHSA-2021-3_0-0295_GLIBC.NASL", "PHOTONOS_PHSA-2021-3_0-0301_CURL.NASL", "PHOTONOS_PHSA-2021-3_0-0324_KAFKA.NASL", "PHOTONOS_PHSA-2021-3_0-0342_KRB5.NASL", "PHOTONOS_PHSA-2021-4_0-0007_OPENSSL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0011_LINUX.NASL", "PHOTONOS_PHSA-2021-4_0-0028_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0051_LIBGCRYPT.NASL", "PHOTONOS_PHSA-2021-4_0-0051_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0073_APACHE.NASL", "PHOTONOS_PHSA-2021-4_0-0079_C.NASL", "PHOTONOS_PHSA-2021-4_0-0095_GLIBC.NASL", "PHOTONOS_PHSA-2021-4_0-0102_CURL.NASL", "PHOTONOS_PHSA-2021-4_0-0113_OPENSSH.NASL", "PHOTONOS_PHSA-2021-4_0-0126_APACHE.NASL", "PUPPET_AGENT_CVE-2021-3450.NASL", "PUPPET_ENTERPRISE_CVE-2021-3450.NASL", "PYTHON_3_9_1.NASL", "PYTHON_3_9_6.NASL", "REDHAT-RHSA-2017-1801.NASL", "REDHAT-RHSA-2017-2423.NASL", "REDHAT-RHSA-2017-2638.NASL", "REDHAT-RHSA-2017-2811.NASL", "REDHAT-RHSA-2017-3399.NASL", "REDHAT-RHSA-2019-0710.NASL", "REDHAT-RHSA-2019-0981.NASL", "REDHAT-RHSA-2019-0997.NASL", "REDHAT-RHSA-2019-1467.NASL", "REDHAT-RHSA-2019-1587.NASL", "REDHAT-RHSA-2019-2030.NASL", "REDHAT-RHSA-2019-2035.NASL", "REDHAT-RHSA-2019-2343.NASL", "REDHAT-RHSA-2019-2437.NASL", "REDHAT-RHSA-2019-2980.NASL", "REDHAT-RHSA-2019-3170.NASL", "REDHAT-RHSA-2019-3335.NASL", "REDHAT-RHSA-2019-3436.NASL", "REDHAT-RHSA-2019-3520.NASL", "REDHAT-RHSA-2020-0057.NASL", "REDHAT-RHSA-2020-0194.NASL", "REDHAT-RHSA-2020-0250.NASL", "REDHAT-RHSA-2020-0804.NASL", "REDHAT-RHSA-2020-0805.NASL", "REDHAT-RHSA-2020-0806.NASL", "REDHAT-RHSA-2020-0850.NASL", "REDHAT-RHSA-2020-0851.NASL", "REDHAT-RHSA-2020-1268.NASL", "REDHAT-RHSA-2020-1308.NASL", "REDHAT-RHSA-2020-1337.NASL", "REDHAT-RHSA-2020-1346.NASL", "REDHAT-RHSA-2020-1454.NASL", "REDHAT-RHSA-2020-1462.NASL", "REDHAT-RHSA-2020-1605.NASL", "REDHAT-RHSA-2020-1916.NASL", "REDHAT-RHSA-2020-2068.NASL", "REDHAT-RHSA-2020-2081.NASL", "REDHAT-RHSA-2020-2217.NASL", "REDHAT-RHSA-2020-2263.NASL", "REDHAT-RHSA-2020-2362.NASL", "REDHAT-RHSA-2020-2483.NASL", "REDHAT-RHSA-2020-2506.NASL", "REDHAT-RHSA-2020-2529.NASL", "REDHAT-RHSA-2020-2530.NASL", "REDHAT-RHSA-2020-2740.NASL", "REDHAT-RHSA-2020-3369.NASL", "REDHAT-RHSA-2020-3461.NASL", "REDHAT-RHSA-2020-3462.NASL", "REDHAT-RHSA-2020-3463.NASL", "REDHAT-RHSA-2020-3637.NASL", "REDHAT-RHSA-2020-3638.NASL", "REDHAT-RHSA-2020-3639.NASL", "REDHAT-RHSA-2020-3807.NASL", "REDHAT-RHSA-2020-3936.NASL", "REDHAT-RHSA-2020-3958.NASL", "REDHAT-RHSA-2020-4273.NASL", "REDHAT-RHSA-2020-4285.NASL", "REDHAT-RHSA-2020-4299.NASL", "REDHAT-RHSA-2020-4312.NASL", "REDHAT-RHSA-2020-4401.NASL", "REDHAT-RHSA-2020-4432.NASL", "REDHAT-RHSA-2020-4641.NASL", "REDHAT-RHSA-2020-4654.NASL", "REDHAT-RHSA-2020-4670.NASL", "REDHAT-RHSA-2020-4751.NASL", "REDHAT-RHSA-2020-4847.NASL", "REDHAT-RHSA-2020-5340.NASL", "REDHAT-RHSA-2020-5341.NASL", "REDHAT-RHSA-2020-5342.NASL", "REDHAT-RHSA-2020-5412.NASL", "REDHAT-RHSA-2021-0034.NASL", "REDHAT-RHSA-2021-0079.NASL", "REDHAT-RHSA-2021-0381.NASL", "REDHAT-RHSA-2021-0860.NASL", "REDHAT-RHSA-2021-0872.NASL", "REDHAT-RHSA-2021-0873.NASL", "REDHAT-RHSA-2021-0874.NASL", "REDHAT-RHSA-2021-1024.NASL", "REDHAT-RHSA-2021-1063.NASL", "REDHAT-RHSA-2021-1131.NASL", "REDHAT-RHSA-2021-1189.NASL", "REDHAT-RHSA-2021-1195.NASL", "REDHAT-RHSA-2021-1199.NASL", "REDHAT-RHSA-2021-1202.NASL", "REDHAT-RHSA-2021-1631.NASL", "REDHAT-RHSA-2021-1633.NASL", "REDHAT-RHSA-2021-1761.NASL", "REDHAT-RHSA-2021-1846.NASL", "REDHAT-RHSA-2021-1879.NASL", "REDHAT-RHSA-2021-2179.NASL", "REDHAT-RHSA-2021-2561.NASL", "REDHAT-RHSA-2021-2583.NASL", "REDHAT-RHSA-2021-2683.NASL", "REDHAT-RHSA-2021-3252.NASL", "REDHAT-RHSA-2021-3254.NASL", "REDHAT-RHSA-2021-3280.NASL", "REDHAT-RHSA-2021-3281.NASL", "REDHAT-RHSA-2021-3327.NASL", "REDHAT-RHSA-2021-3328.NASL", "REDHAT-RHSA-2021-3459.NASL", "REDHAT-RHSA-2021-3466.NASL", "REDHAT-RHSA-2021-3467.NASL", "REDHAT-RHSA-2021-3468.NASL", "REDHAT-RHSA-2021-3527.NASL", "REDHAT-RHSA-2021-3528.NASL", "REDHAT-RHSA-2021-3529.NASL", "REDHAT-RHSA-2021-3576.NASL", "REDHAT-RHSA-2021-3623.NASL", "REDHAT-RHSA-2021-3638.NASL", "REDHAT-RHSA-2021-3639.NASL", "REDHAT-RHSA-2021-3656.NASL", "REDHAT-RHSA-2021-3658.NASL", "REDHAT-RHSA-2021-3666.NASL", "REDHAT-RHSA-2021-3956.NASL", "REDHAT-RHSA-2021-4059.NASL", "REDHAT-RHSA-2021-4142.NASL", "REDHAT-RHSA-2021-4151.NASL", "REDHAT-RHSA-2021-4160.NASL", "REDHAT-RHSA-2021-4162.NASL", "REDHAT-RHSA-2021-4409.NASL", "REDHAT-RHSA-2021-4455.NASL", "REDHAT-RHSA-2021-4676.NASL", "REDHAT-RHSA-2021-4677.NASL", "REDHAT-RHSA-2021-4702.NASL", "REDHAT-RHSA-2021-4782.NASL", "REDHAT-RHSA-2021-4788.NASL", "REDHAT-RHSA-2021-4861.NASL", "REDHAT-RHSA-2021-5149.NASL", "REDHAT-RHSA-2021-5150.NASL", "REDHAT-RHSA-2021-5151.NASL", "REDHAT-RHSA-2021-5176.NASL", "REDHAT-RHSA-2021-5206.NASL", "REDHAT-RHSA-2021-5269.NASL", "REDHAT-RHSA-2022-0055.NASL", "REDHAT-RHSA-2022-0063.NASL", "REDHAT-RHSA-2022-0065.NASL", "REDHAT-RHSA-2022-0151.NASL", "REDHAT-RHSA-2022-0152.NASL", "REDHAT-RHSA-2022-0289.NASL", "REDHAT-RHSA-2022-0290.NASL", "REDHAT-RHSA-2022-0291.NASL", "REDHAT-RHSA-2022-0294.NASL", "REDHAT-RHSA-2022-0436.NASL", "REDHAT-RHSA-2022-0438.NASL", "REDHAT-RHSA-2022-0439.NASL", "REDHAT-RHSA-2022-0442.NASL", "REDHAT-RHSA-2022-0447.NASL", "REDHAT-RHSA-2022-0448.NASL", "REDHAT-RHSA-2022-0475.NASL", "REDHAT-RHSA-2022-0524.NASL", "REDHAT-RHSA-2022-0620.NASL", "REDHAT-RHSA-2022-0622.NASL", "REDHAT-RHSA-2022-0635.NASL", "REDHAT-RHSA-2022-0658.NASL", "REDHAT-RHSA-2022-0666.NASL", "REDHAT-RHSA-2022-0668.NASL", "REDHAT-RHSA-2022-0730.NASL", "REDHAT-RHSA-2022-0731.NASL", "REDHAT-RHSA-2022-0780.NASL", "REDHAT-RHSA-2022-0820.NASL", "REDHAT-RHSA-2022-0821.NASL", "REDHAT-RHSA-2022-0823.NASL", "REDHAT-RHSA-2022-0841.NASL", "REDHAT-RHSA-2022-0851.NASL", "REDHAT-RHSA-2022-0896.NASL", "REDHAT-RHSA-2022-0899.NASL", "REDHAT-RHSA-2022-0925.NASL", "REDHAT-RHSA-2022-0958.NASL", "REDHAT-RHSA-2022-0987.NASL", "REDHAT-RHSA-2022-1000.NASL", "REDHAT-RHSA-2022-1045.NASL", "REDHAT-RHSA-2022-1049.NASL", "REDHAT-RHSA-2022-1065.NASL", "REDHAT-RHSA-2022-1066.NASL", "REDHAT-RHSA-2022-1071.NASL", "REDHAT-RHSA-2022-1072.NASL", "REDHAT-RHSA-2022-1073.NASL", "REDHAT-RHSA-2022-1075.NASL", "REDHAT-RHSA-2022-1076.NASL", "REDHAT-RHSA-2022-1077.NASL", "REDHAT-RHSA-2022-1078.NASL", "REDHAT-RHSA-2022-1080.NASL", "REDHAT-RHSA-2022-1082.NASL", "REDHAT-RHSA-2022-1091.NASL", "REDHAT-RHSA-2022-1102.NASL", "REDHAT-RHSA-2022-1103.NASL", "REDHAT-RHSA-2022-1104.NASL", "REDHAT-RHSA-2022-1107.NASL", "REDHAT-RHSA-2022-1112.NASL", "REDHAT-RHSA-2022-1136.NASL", "REDHAT-RHSA-2022-1137.NASL", "REDHAT-RHSA-2022-1138.NASL", "REDHAT-RHSA-2022-1139.NASL", "REDHAT-RHSA-2022-1173.NASL", "REDHAT-RHSA-2022-1185.NASL", "REDHAT-RHSA-2022-1198.NASL", "REDHAT-RHSA-2022-1199.NASL", "REDHAT-RHSA-2022-1263.NASL", "REDHAT-RHSA-2022-1276.NASL", "REDHAT-RHSA-2022-1296.NASL", "REDHAT-RHSA-2022-1297.NASL", "REDHAT-RHSA-2022-1324.NASL", "REDHAT-RHSA-2022-1354.NASL", "REDHAT-RHSA-2022-1373.NASL", "REDHAT-RHSA-2022-1389.NASL", "REDHAT-RHSA-2022-1413.NASL", "REDHAT-RHSA-2022-1418.NASL", "REDHAT-RHSA-2022-1420.NASL", "REDHAT-RHSA-2022-1455.NASL", "REDHAT-RHSA-2022-1519.NASL", "REDHAT-RHSA-2022-1535.NASL", "REDHAT-RHSA-2022-1537.NASL", "REDHAT-RHSA-2022-1546.NASL", "REDHAT-RHSA-2022-1550.NASL", "REDHAT-RHSA-2022-1552.NASL", "REDHAT-RHSA-2022-1555.NASL", "REDHAT-RHSA-2022-1591.NASL", "REDHAT-RHSA-2022-1592.NASL", "REDHAT-RHSA-2022-1642.NASL", "REDHAT-RHSA-2022-1645.NASL", "REDHAT-RHSA-2022-1646.NASL", "REDHAT-RHSA-2022-1661.NASL", "REDHAT-RHSA-2022-1663.NASL", "REDHAT-RHSA-2022-1664.NASL", "REDHAT-RHSA-2022-1665.NASL", "REDHAT-RHSA-2022-1676.NASL", "REDHAT-RHSA-2022-1763.NASL", "REDHAT-RHSA-2022-1764.NASL", "REDHAT-RHSA-2022-1819.NASL", "REDHAT-RHSA-2022-1821.NASL", "REDHAT-RHSA-2022-1932.NASL", "REDHAT-RHSA-2022-1975.NASL", "REDHAT-RHSA-2022-1986.NASL", "REDHAT-RHSA-2022-1988.NASL", "REDHAT-RHSA-2022-2013.NASL", "REDHAT-RHSA-2022-2043.NASL", "REDHAT-RHSA-2022-2189.NASL", "REDHAT-RHSA-2022-2191.NASL", "REDHAT-RHSA-2022-2192.NASL", "REDHAT-RHSA-2022-2197.NASL", "REDHAT-RHSA-2022-2198.NASL", "REDHAT-RHSA-2022-2201.NASL", "REDHAT-RHSA-2022-2213.NASL", "REDHAT-RHSA-2022-2214.NASL", "REDHAT-RHSA-2022-4582.NASL", "REDHAT-RHSA-2022-4584.NASL", "REDHAT-RHSA-2022-4592.NASL", "REDHAT-RHSA-2022-4711.NASL", "REDHAT-RHSA-2022-4829.NASL", "REDHAT-RHSA-2022-4835.NASL", "REDHAT-RHSA-2022-4845.NASL", "REDHAT-RHSA-2022-4896.NASL", "REDHAT-RHSA-2022-4899.NASL", "REDHAT-RHSA-2022-4914.NASL", "REDHAT-RHSA-2022-4918.NASL", "REDHAT-RHSA-2022-4919.NASL", "REDHAT-RHSA-2022-4930.NASL", "REDHAT-RHSA-2022-4940.NASL", "REDHAT-RHSA-2022-4991.NASL", "REDHAT-RHSA-2022-4992.NASL", "REDHAT-RHSA-2022-4993.NASL", "REDHAT-RHSA-2022-4994.NASL", "REDHAT-RHSA-2022-5004.NASL", "REDHAT-RHSA-2022-5052.NASL", "REDHAT-RHSA-2022-5053.NASL", "REDHAT-RHSA-2022-5068.NASL", "REDHAT-RHSA-2022-5234.NASL", "REDHAT-RHSA-2022-5235.NASL", "REDHAT-RHSA-2022-5242.NASL", "REDHAT-RHSA-2022-5250.NASL", "REDHAT-RHSA-2022-5317.NASL", "REDHAT-RHSA-2022-5326.NASL", "REDHAT-RHSA-2022-5439.NASL", "REDHAT-RHSA-2022-5459.NASL", "REDHAT-RHSA-2022-5460.NASL", "REDHAT-RHSA-2022-5555.NASL", "REDHAT-RHSA-2022-5626.NASL", "REDHAT-RHSA-2022-5633.NASL", "REDHAT-RHSA-2022-5681.NASL", "REDHAT-RHSA-2022-5683.NASL", "REDHAT-RHSA-2022-5684.NASL", "REDHAT-RHSA-2022-5685.NASL", "REDHAT-RHSA-2022-5687.NASL", "REDHAT-RHSA-2022-5695.NASL", "REDHAT-RHSA-2022-5696.NASL", "REDHAT-RHSA-2022-5697.NASL", "REDHAT-RHSA-2022-5698.NASL", "REDHAT-RHSA-2022-5700.NASL", "REDHAT-RHSA-2022-5701.NASL", "REDHAT-RHSA-2022-5709.NASL", "REDHAT-RHSA-2022-5726.NASL", "REDHAT-RHSA-2022-5729.NASL", "REDHAT-RHSA-2022-5736.NASL", "REDHAT-RHSA-2022-5818.NASL", "REDHAT-RHSA-2022-5892.NASL", "REDHAT-RHSA-2022-5893.NASL", "REDHAT-RHSA-2022-5894.NASL", "REDHAT-RHSA-2022-6094.NASL", "REDHAT-RHSA-2022-6224.NASL", "REDHAT-RHSA-2022-6393.NASL", "REDHAT-RHSA-2022-6518.NASL", "REDHAT-RHSA-2022-6590.NASL", "REDHAT-RHSA-2022-6753.NASL", "REDHAT-RHSA-2022-6782.NASL", "REDHAT-RHSA-2022-6783.NASL", "REDHAT-RHSA-2022-6983.NASL", "REDHAT-RHSA-2022-6991.NASL", "REDHAT-RHSA-2022-7044.NASL", "REDHAT-RHSA-2022-7119.NASL", "REDHAT-RHSA-2022-7272.NASL", "REDHAT-RHSA-2022-7343.NASL", "REDHAT-RHSA-2022-7409.NASL", "REDHAT-RHSA-2022-7410.NASL", "REDHAT-RHSA-2022-7411.NASL", "REDHAT-RHSA-2022-7541.NASL", "REDHAT-RHSA-2022-7647.NASL", "REDHAT-RHSA-2022-7813.NASL", "REDHAT-RHSA-2022-7830.NASL", "REDHAT-RHSA-2022-8067.NASL", "REDHAT-RHSA-2022-8096.NASL", "REDHAT-RHSA-2022-8420.NASL", "REDHAT-RHSA-2022-8840.NASL", "REDHAT-RHSA-2022-8852.NASL", "REDHAT-RHSA-2022-8861.NASL", "REDHAT-RHSA-2022-8917.NASL", "REDHAT-RHSA-2022-9073.NASL", "REDHAT-RHSA-2023-0552.NASL", "REDHAT-RHSA-2023-0553.NASL", "REDHAT-RHSA-2023-0554.NASL", "REDHAT-RHSA-2023-0943.NASL", "REDHAT-RHSA-2023-0975.NASL", "REDHAT-RHSA-2023-0976.NASL", "REDHAT-RHSA-2023-1043.NASL", "REDHAT-RHSA-2023-1044.NASL", "REDHAT-RHSA-2023-1045.NASL", "REDHAT-RHSA-2023-1742.NASL", "REDHAT-RHSA-2023-2312.NASL", "ROCKY_LINUX_RLSA-2019-0981.NASL", "ROCKY_LINUX_RLSA-2019-3335.NASL", "ROCKY_LINUX_RLSA-2020-1605.NASL", "ROCKY_LINUX_RLSA-2020-4641.NASL", "ROCKY_LINUX_RLSA-2020-4654.NASL", "ROCKY_LINUX_RLSA-2020-4670.NASL", "ROCKY_LINUX_RLSA-2020-4751.NASL", "ROCKY_LINUX_RLSA-2021-1024.NASL", "ROCKY_LINUX_RLSA-2021-1631.NASL", "ROCKY_LINUX_RLSA-2021-1761.NASL", "ROCKY_LINUX_RLSA-2021-1846.NASL", "ROCKY_LINUX_RLSA-2021-1879.NASL", "ROCKY_LINUX_RLSA-2021-2583.NASL", "ROCKY_LINUX_RLSA-2021-3576.NASL", "ROCKY_LINUX_RLSA-2021-3623.NASL", "ROCKY_LINUX_RLSA-2021-3666.NASL", "ROCKY_LINUX_RLSA-2021-4059.NASL", "ROCKY_LINUX_RLSA-2021-4142.NASL", "ROCKY_LINUX_RLSA-2021-4151.NASL", "ROCKY_LINUX_RLSA-2021-4160.NASL", "ROCKY_LINUX_RLSA-2021-4162.NASL", "ROCKY_LINUX_RLSA-2021-4409.NASL", "ROCKY_LINUX_RLSA-2022-0290.NASL", "ROCKY_LINUX_RLSA-2022-0658.NASL", "ROCKY_LINUX_RLSA-2022-0896.NASL", "ROCKY_LINUX_RLSA-2022-0899.NASL", "ROCKY_LINUX_RLSA-2022-1049.NASL", "ROCKY_LINUX_RLSA-2022-1065.NASL", "ROCKY_LINUX_RLSA-2022-1537.NASL", "ROCKY_LINUX_RLSA-2022-1546.NASL", "ROCKY_LINUX_RLSA-2022-1550.NASL", "ROCKY_LINUX_RLSA-2022-1552.NASL", "ROCKY_LINUX_RLSA-2022-1555.NASL", "ROCKY_LINUX_RLSA-2022-1642.NASL", "ROCKY_LINUX_RLSA-2022-1763.NASL", "ROCKY_LINUX_RLSA-2022-1764.NASL", "ROCKY_LINUX_RLSA-2022-1819.NASL", "ROCKY_LINUX_RLSA-2022-1821.NASL", "ROCKY_LINUX_RLSA-2022-1932.NASL", "ROCKY_LINUX_RLSA-2022-1975.NASL", "ROCKY_LINUX_RLSA-2022-1988.NASL", "ROCKY_LINUX_RLSA-2022-2013.NASL", "ROCKY_LINUX_RLSA-2022-2043.NASL", "ROCKY_LINUX_RLSA-2022-2201.NASL", "ROCKY_LINUX_RLSA-2022-4582.NASL", "ROCKY_LINUX_RLSA-2022-4899.NASL", "ROCKY_LINUX_RLSA-2022-4940.NASL", "ROCKY_LINUX_RLSA-2022-4991.NASL", "ROCKY_LINUX_RLSA-2022-5250.NASL", "ROCKY_LINUX_RLSA-2022-5317.NASL", "ROCKY_LINUX_RLSA-2022-5326.NASL", "ROCKY_LINUX_RLSA-2022-5498.NASL", "ROCKY_LINUX_RLSA-2022-5683.NASL", "ROCKY_LINUX_RLSA-2022-5696.NASL", "ROCKY_LINUX_RLSA-2022-5726.NASL", "ROCKY_LINUX_RLSA-2022-5818.NASL", "ROCKY_LINUX_RLSA-2022-6590.NASL", "ROCKY_LINUX_RLSA-2022-7119.NASL", "ROCKY_LINUX_RLSA-2022-7541.NASL", "ROCKY_LINUX_RLSA-2022-7647.NASL", "ROCKY_LINUX_RLSA-2022-8067.NASL", "ROCKY_LINUX_RLSA-2022-8096.NASL", "ROCKY_LINUX_RLSA-2022-8506.NASL", "ROCKY_LINUX_RLSA-2022-9073.NASL", "ROCKY_LINUX_RLSA-2023-6818.NASL", "SECURITYCENTER_5_17_0_TNS_2020_11.NASL", "SECURITYCENTER_5_17_0_TNS_2021_06.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08_XSS.NASL", "SECURITYCENTER_5_19_0_TNS_2021_14.NASL", "SECURITYCENTER_5_21_0_TNS_2022_04.NASL", "SECURITYCENTER_5_21_0_TNS_2022_04_1.NASL", "SECURITYCENTER_5_23_1_TNS_2023_08.NASL", "SECURITYCENTER_OPENSSL_1_1_1K_TNS_2021_03.NASL", "SLACKWARE_SSA_2019-293-01.NASL", "SLACKWARE_SSA_2020-091-02.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SLACKWARE_SSA_2021-258-01.NASL", "SLACKWARE_SSA_2022-031-01.NASL", "SLACKWARE_SSA_2022-055-01.NASL", "SLACKWARE_SSA_2022-059-01.NASL", "SLACKWARE_SSA_2022-067-01.NASL", "SLACKWARE_SSA_2022-071-01.NASL", "SLACKWARE_SSA_2022-073-01.NASL", "SLACKWARE_SSA_2022-076-02.NASL", "SLACKWARE_SSA_2022-087-01.NASL", "SLACKWARE_SSA_2022-089-01.NASL", "SLACKWARE_SSA_2022-104-02.NASL", "SLACKWARE_SSA_2022-104-03.NASL", "SLACKWARE_SSA_2022-122-01.NASL", "SLACKWARE_SSA_2022-124-02.NASL", "SLACKWARE_SSA_2022-129-01.NASL", "SLACKWARE_SSA_2022-131-01.NASL", "SLACKWARE_SSA_2022-174-01.NASL", "SLACKWARE_SSA_2022-179-03.NASL", "SLACKWARE_SSA_2022-228-01.NASL", "SLACKWARE_SSA_2023-032-01.NASL", "SL_20190408_PYTHON_ON_SL7_X.NASL", "SL_20190613_PYTHON_ON_SL6_X.NASL", "SL_20190620_PYTHON_ON_SL7_X.NASL", "SL_20190806_HTTPD_ON_SL7_X.NASL", "SL_20190806_PYTHON_ON_SL7_X.NASL", "SL_20190806_PYTHON_REQUESTS_ON_SL7_X.NASL", "SL_20200121_APACHE_COMMONS_BEANUTILS_ON_SL7_X.NASL", "SL_20200317_PYTHON_PIP_ON_SL7_X.NASL", "SL_20200317_PYTHON_VIRTUALENV_ON_SL7_X.NASL", "SL_20200512_PYTHON_PIP_ON_SL7_X.NASL", "SL_20200512_PYTHON_VIRTUALENV_ON_SL7_X.NASL", "SL_20200611_TOMCAT6_ON_SL6_X.NASL", "SL_20200611_TOMCAT_ON_SL7_X.NASL", "SL_20201001_HTTPD_ON_SL7_X.NASL", "SL_20201001_IPA_ON_SL7_X.NASL", "SL_20210712_XSTREAM_ON_SL7_X.NASL", "SL_20210831_KERNEL_ON_SL7_X.NASL", "SL_20211025_XSTREAM_ON_SL7_X.NASL", "SL_20211220_LOG4J_ON_SL7_X.NASL", "SL_20220114_KERNEL_ON_SL7_X.NASL", "SL_20220223_KERNEL_ON_SL7_X.NASL", "SL_20220224_CYRUS_SASL_ON_SL7_X.NASL", "SL_20220406_KERNEL_ON_SL7_X.NASL", "SL_20220511_GZIP_ON_SL7_X.NASL", "SL_20220517_ZLIB_ON_SL7_X.NASL", "SL_20220608_PYTHON_TWISTED_WEB_ON_SL7_X.NASL", "SL_20220615_XZ_ON_SL7_X.NASL", "SL_20220628_PYTHON_ON_SL7_X.NASL", "SL_20220628_PYTHON_VIRTUALENV_ON_SL7_X.NASL", "SL_20220801_JAVA_11_OPENJDK_ON_SL7_X.NASL", "SL_20220801_JAVA_1_8_0_OPENJDK_ON_SL7_X.NASL", "SMB_NT_MS21_OCT_VISUAL_STUDIO.NASL", "SMB_NT_MS22_JAN_5009543.NASL", "SMB_NT_MS22_JAN_5009545.NASL", "SMB_NT_MS22_JAN_5009555.NASL", "SMB_NT_MS22_JAN_5009557.NASL", "SMB_NT_MS22_JAN_5009566.NASL", "SOLARIS10_148419-04.NASL", "SOLARIS10_153153-06.NASL", "SOLARIS10_X86_148420-04.NASL", "SOLARIS10_X86_153154-06.NASL", "SOLARIS_JAN2023_SRU11_4_53_132_2.NASL", "SOLARIS_JUL2022_SRU11_4_42_113_1.NASL", "SOLARIS_JUL2022_SRU11_4_45_119_2.NASL", "SOLARIS_JUL2022_SRU11_4_46_119_2.NASL", "SOLARIS_JUL2022_SRU11_4_47_119_2.NASL", "SPRING4SHELL.NBIN", "SPRING_CLOUD_CVE-2022-22963.NBIN", "SPRING_CLOUD_GATEWAY_CVE-2022-22947.NASL", "SPRING_CLOUD_GATEWAY_CVE-2022-22947_DIRECT.NBIN", "SPRING_CVE-2020-5398.NASL", "SPRING_CVE-2022-22963_LOCAL.NASL", "SPRING_CVE-2022-22965_LOCAL.NASL", "SPRING_DATA_COMMONS_2_0_6.NASL", "SPRING_SECURITY_CVE-2022-22978.NASL", "STRUTS_S2-062.NASL", "SUSE_SU-2019-0873-1.NASL", "SUSE_SU-2019-0878-1.NASL", "SUSE_SU-2019-0888-1.NASL", "SUSE_SU-2019-0889-1.NASL", "SUSE_SU-2019-0961-1.NASL", "SUSE_SU-2019-0971-1.NASL", "SUSE_SU-2019-0972-1.NASL", "SUSE_SU-2019-14018-1.NASL", "SUSE_SU-2019-14142-1.NASL", "SUSE_SU-2019-1439-1.NASL", "SUSE_SU-2019-2050-1.NASL", "SUSE_SU-2019-2053-1.NASL", "SUSE_SU-2019-2053-2.NASL", "SUSE_SU-2019-2064-1.NASL", "SUSE_SU-2019-2091-1.NASL", "SUSE_SU-2019-2237-1.NASL", "SUSE_SU-2019-2329-1.NASL", "SUSE_SU-2020-0114-1.NASL", "SUSE_SU-2020-0234-1.NASL", "SUSE_SU-2020-0302-1.NASL", "SUSE_SU-2020-0555-1.NASL", "SUSE_SU-2020-0959-1.NASL", "SUSE_SU-2020-1111-1.NASL", "SUSE_SU-2020-1126-1.NASL", "SUSE_SU-2020-1272-1.NASL", "SUSE_SU-2020-1285-1.NASL", "SUSE_SU-2020-14267-1.NASL", "SUSE_SU-2020-14375-1.NASL", "SUSE_SU-2020-14442-1.NASL", "SUSE_SU-2020-1693-1.NASL", "SUSE_SU-2020-1699-1.NASL", "SUSE_SU-2020-2105-1.NASL", "SUSE_SU-2020-2106-1.NASL", "SUSE_SU-2020-2107-1.NASL", "SUSE_SU-2020-2121-1.NASL", "SUSE_SU-2020-2134-1.NASL", "SUSE_SU-2020-2152-1.NASL", "SUSE_SU-2020-2487-1.NASL", "SUSE_SU-2020-2879-1.NASL", "SUSE_SU-2020-2904-1.NASL", "SUSE_SU-2020-2905-1.NASL", "SUSE_SU-2020-2907-1.NASL", "SUSE_SU-2020-3014-1.NASL", "SUSE_SU-2020-3501-1.NASL", "SUSE_SU-2020-3503-1.NASL", "SUSE_SU-2020-3532-1.NASL", "SUSE_SU-2020-3544-1.NASL", "SUSE_SU-2020-3563-1.NASL", "SUSE_SU-2020-3593-1.NASL", "SUSE_SU-2020-3596-1.NASL", "SUSE_SU-2020-3597-1.NASL", "SUSE_SU-2020-3748-1.NASL", "SUSE_SU-2020-3764-1.NASL", "SUSE_SU-2020-3765-1.NASL", "SUSE_SU-2020-3798-1.NASL", "SUSE_SU-2020-3865-1.NASL", "SUSE_SU-2020-3930-1.NASL", "SUSE_SU-2021-0098-1.NASL", "SUSE_SU-2021-0118-1.NASL", "SUSE_SU-2021-0133-1.NASL", "SUSE_SU-2021-0344-1.NASL", "SUSE_SU-2021-0355-1.NASL", "SUSE_SU-2021-0428-1.NASL", "SUSE_SU-2021-0432-1.NASL", "SUSE_SU-2021-0434-1.NASL", "SUSE_SU-2021-0438-1.NASL", "SUSE_SU-2021-0452-1.NASL", "SUSE_SU-2021-0529-1.NASL", "SUSE_SU-2021-0954-1.NASL", "SUSE_SU-2021-0955-1.NASL", "SUSE_SU-2021-0955-2.NASL", "SUSE_SU-2021-1210-1.NASL", "SUSE_SU-2021-1211-1.NASL", "SUSE_SU-2021-1238-1.NASL", "SUSE_SU-2021-1248-1.NASL", "SUSE_SU-2021-14630-1.NASL", "SUSE_SU-2021-14705-1.NASL", "SUSE_SU-2021-14751-1.NASL", "SUSE_SU-2021-14764-1.NASL", "SUSE_SU-2021-14776-1.NASL", "SUSE_SU-2021-14807-1.NASL", "SUSE_SU-2021-14847-1.NASL", "SUSE_SU-2021-14849-1.NASL", "SUSE_SU-2021-14866-1.NASL", "SUSE_SU-2021-14870-1.NASL", "SUSE_SU-2021-1573-1.NASL", "SUSE_SU-2021-1596-1.NASL", "SUSE_SU-2021-1617-1.NASL", "SUSE_SU-2021-1621-1.NASL", "SUSE_SU-2021-1623-1.NASL", "SUSE_SU-2021-1624-1.NASL", "SUSE_SU-2021-1859-1.NASL", "SUSE_SU-2021-1865-1.NASL", "SUSE_SU-2021-1870-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-1995-1.NASL", "SUSE_SU-2021-2155-1.NASL", "SUSE_SU-2021-2156-1.NASL", "SUSE_SU-2021-2157-1.NASL", "SUSE_SU-2021-2198-1.NASL", "SUSE_SU-2021-2236-1.NASL", "SUSE_SU-2021-2293-1.NASL", "SUSE_SU-2021-2323-1.NASL", "SUSE_SU-2021-2326-1.NASL", "SUSE_SU-2021-2327-1.NASL", "SUSE_SU-2021-2353-1.NASL", "SUSE_SU-2021-2407-1.NASL", "SUSE_SU-2021-2408-1.NASL", "SUSE_SU-2021-2416-1.NASL", "SUSE_SU-2021-2438-1.NASL", "SUSE_SU-2021-2577-1.NASL", "SUSE_SU-2021-2599-1.NASL", "SUSE_SU-2021-2612-1.NASL", "SUSE_SU-2021-2643-1.NASL", "SUSE_SU-2021-2645-1.NASL", "SUSE_SU-2021-2646-1.NASL", "SUSE_SU-2021-2678-1.NASL", "SUSE_SU-2021-2687-1.NASL", "SUSE_SU-2021-2690-1.NASL", "SUSE_SU-2021-2756-1.NASL", "SUSE_SU-2021-2760-1.NASL", "SUSE_SU-2021-2817-1.NASL", "SUSE_SU-2021-2818-1.NASL", "SUSE_SU-2021-2823-1.NASL", "SUSE_SU-2021-2824-1.NASL", "SUSE_SU-2021-2838-1.NASL", "SUSE_SU-2021-2875-1.NASL", "SUSE_SU-2021-2940-1.NASL", "SUSE_SU-2021-2953-1.NASL", "SUSE_SU-2021-3177-1.NASL", "SUSE_SU-2021-3178-1.NASL", "SUSE_SU-2021-3179-1.NASL", "SUSE_SU-2021-3184-1.NASL", "SUSE_SU-2021-3205-1.NASL", "SUSE_SU-2021-3207-1.NASL", "SUSE_SU-2021-3211-1.NASL", "SUSE_SU-2021-3251-1.NASL", "SUSE_SU-2021-3297-1.NASL", "SUSE_SU-2021-3298-1.NASL", "SUSE_SU-2021-3332-1.NASL", "SUSE_SU-2021-3337-1.NASL", "SUSE_SU-2021-3338-1.NASL", "SUSE_SU-2021-3339-1.NASL", "SUSE_SU-2021-3351-1.NASL", "SUSE_SU-2021-3386-1.NASL", "SUSE_SU-2021-3387-1.NASL", "SUSE_SU-2021-3388-1.NASL", "SUSE_SU-2021-3389-1.NASL", "SUSE_SU-2021-3415-1.NASL", "SUSE_SU-2021-3447-1.NASL", "SUSE_SU-2021-3454-1.NASL", "SUSE_SU-2021-3476-1.NASL", "SUSE_SU-2021-3477-1.NASL", "SUSE_SU-2021-3486-1.NASL", "SUSE_SU-2021-3489-1.NASL", "SUSE_SU-2021-3524-1.NASL", "SUSE_SU-2021-3640-1.NASL", "SUSE_SU-2021-3641-1.NASL", "SUSE_SU-2021-3642-1.NASL", "SUSE_SU-2021-3655-1.NASL", "SUSE_SU-2021-3658-1.NASL", "SUSE_SU-2021-3675-1.NASL", "SUSE_SU-2021-3684-1.NASL", "SUSE_SU-2021-3710-1.NASL", "SUSE_SU-2021-3723-1.NASL", "SUSE_SU-2021-3735-1.NASL", "SUSE_SU-2021-3737-1.NASL", "SUSE_SU-2021-3738-1.NASL", "SUSE_SU-2021-3748-1.NASL", "SUSE_SU-2021-3751-1.NASL", "SUSE_SU-2021-3754-1.NASL", "SUSE_SU-2021-3806-1.NASL", "SUSE_SU-2021-3807-1.NASL", "SUSE_SU-2021-3833-1.NASL", "SUSE_SU-2021-3834-1.NASL", "SUSE_SU-2021-3848-1.NASL", "SUSE_SU-2021-3875-1.NASL", "SUSE_SU-2021-3876-1.NASL", "SUSE_SU-2021-3877-1.NASL", "SUSE_SU-2021-3887-1.NASL", "SUSE_SU-2021-3929-1.NASL", "SUSE_SU-2021-3933-1.NASL", "SUSE_SU-2021-3935-1.NASL", "SUSE_SU-2021-3941-1.NASL", "SUSE_SU-2021-3947-1.NASL", "SUSE_SU-2021-3950-1.NASL", "SUSE_SU-2021-3951-1.NASL", "SUSE_SU-2021-3969-1.NASL", "SUSE_SU-2021-3972-1.NASL", "SUSE_SU-2021-3978-1.NASL", "SUSE_SU-2021-3979-1.NASL", "SUSE_SU-2021-3992-1.NASL", "SUSE_SU-2021-4001-1.NASL", "SUSE_SU-2021-4002-1.NASL", "SUSE_SU-2021-4015-1.NASL", "SUSE_SU-2021-4015-2.NASL", "SUSE_SU-2021-4021-1.NASL", "SUSE_SU-2021-4038-1.NASL", "SUSE_SU-2021-4051-1.NASL", "SUSE_SU-2021-4057-1.NASL", "SUSE_SU-2021-4075-1.NASL", "SUSE_SU-2021-4090-1.NASL", "SUSE_SU-2021-4099-1.NASL", "SUSE_SU-2021-4104-1.NASL", "SUSE_SU-2021-4111-1.NASL", "SUSE_SU-2021-4112-1.NASL", "SUSE_SU-2021-4115-1.NASL", "SUSE_SU-2022-0056-1.NASL", "SUSE_SU-2022-0060-1.NASL", "SUSE_SU-2022-0064-1.NASL", "SUSE_SU-2022-0068-1.NASL", "SUSE_SU-2022-0079-1.NASL", "SUSE_SU-2022-0080-1.NASL", "SUSE_SU-2022-0090-1.NASL", "SUSE_SU-2022-0101-1.NASL", "SUSE_SU-2022-0112-1.NASL", "SUSE_SU-2022-0113-1.NASL", "SUSE_SU-2022-0114-1.NASL", "SUSE_SU-2022-0118-1.NASL", "SUSE_SU-2022-0131-1.NASL", "SUSE_SU-2022-0134-1.NASL", "SUSE_SU-2022-0134-2.NASL", "SUSE_SU-2022-0134-3.NASL", "SUSE_SU-2022-0169-1.NASL", "SUSE_SU-2022-0181-1.NASL", "SUSE_SU-2022-0197-1.NASL", "SUSE_SU-2022-0198-1.NASL", "SUSE_SU-2022-0206-1.NASL", "SUSE_SU-2022-0212-1.NASL", "SUSE_SU-2022-0214-1.NASL", "SUSE_SU-2022-0226-1.NASL", "SUSE_SU-2022-0234-1.NASL", "SUSE_SU-2022-0237-1.NASL", "SUSE_SU-2022-0238-1.NASL", "SUSE_SU-2022-0241-1.NASL", "SUSE_SU-2022-0242-1.NASL", "SUSE_SU-2022-0243-1.NASL", "SUSE_SU-2022-0246-1.NASL", "SUSE_SU-2022-0254-1.NASL", "SUSE_SU-2022-0255-1.NASL", "SUSE_SU-2022-0257-1.NASL", "SUSE_SU-2022-0263-1.NASL", "SUSE_SU-2022-0267-1.NASL", "SUSE_SU-2022-0270-1.NASL", "SUSE_SU-2022-0288-1.NASL", "SUSE_SU-2022-0289-1.NASL", "SUSE_SU-2022-0291-1.NASL", "SUSE_SU-2022-0292-1.NASL", "SUSE_SU-2022-0293-1.NASL", "SUSE_SU-2022-0295-1.NASL", "SUSE_SU-2022-0296-1.NASL", "SUSE_SU-2022-0298-1.NASL", "SUSE_SU-2022-0325-1.NASL", "SUSE_SU-2022-0327-1.NASL", "SUSE_SU-2022-0328-1.NASL", "SUSE_SU-2022-0330-1.NASL", "SUSE_SU-2022-0362-1.NASL", "SUSE_SU-2022-0363-1.NASL", "SUSE_SU-2022-0364-1.NASL", "SUSE_SU-2022-0366-1.NASL", "SUSE_SU-2022-0367-1.NASL", "SUSE_SU-2022-0370-1.NASL", "SUSE_SU-2022-0371-1.NASL", "SUSE_SU-2022-0372-1.NASL", "SUSE_SU-2022-0418-1.NASL", "SUSE_SU-2022-0436-1.NASL", "SUSE_SU-2022-0441-1.NASL", "SUSE_SU-2022-0463-1.NASL", "SUSE_SU-2022-0477-1.NASL", "SUSE_SU-2022-0500-1.NASL", "SUSE_SU-2022-0503-1.NASL", "SUSE_SU-2022-0524-1.NASL", "SUSE_SU-2022-0525-1.NASL", "SUSE_SU-2022-0525-2.NASL", "SUSE_SU-2022-0542-1.NASL", "SUSE_SU-2022-0543-1.NASL", "SUSE_SU-2022-0552-1.NASL", "SUSE_SU-2022-0555-1.NASL", "SUSE_SU-2022-0570-1.NASL", "SUSE_SU-2022-0653-1.NASL", "SUSE_SU-2022-0693-1.NASL", "SUSE_SU-2022-0694-1.NASL", "SUSE_SU-2022-0695-1.NASL", "SUSE_SU-2022-0702-1.NASL", "SUSE_SU-2022-0723-1.NASL", "SUSE_SU-2022-0724-1.NASL", "SUSE_SU-2022-0743-1.NASL", "SUSE_SU-2022-0755-1.NASL", "SUSE_SU-2022-0756-1.NASL", "SUSE_SU-2022-0757-1.NASL", "SUSE_SU-2022-0759-1.NASL", "SUSE_SU-2022-0760-1.NASL", "SUSE_SU-2022-0761-1.NASL", "SUSE_SU-2022-0762-1.NASL", "SUSE_SU-2022-0763-1.NASL", "SUSE_SU-2022-0764-1.NASL", "SUSE_SU-2022-0765-1.NASL", "SUSE_SU-2022-0766-1.NASL", "SUSE_SU-2022-0767-1.NASL", "SUSE_SU-2022-0768-1.NASL", "SUSE_SU-2022-0784-1.NASL", "SUSE_SU-2022-0802-1.NASL", "SUSE_SU-2022-0803-1.NASL", "SUSE_SU-2022-0805-1.NASL", "SUSE_SU-2022-0817-1.NASL", "SUSE_SU-2022-0818-1.NASL", "SUSE_SU-2022-0832-1.NASL", "SUSE_SU-2022-0851-1.NASL", "SUSE_SU-2022-0853-1.NASL", "SUSE_SU-2022-0854-1.NASL", "SUSE_SU-2022-0856-1.NASL", "SUSE_SU-2022-0857-1.NASL", "SUSE_SU-2022-0859-1.NASL", "SUSE_SU-2022-0860-1.NASL", "SUSE_SU-2022-0895-1.NASL", "SUSE_SU-2022-0909-1.NASL", "SUSE_SU-2022-0918-1.NASL", "SUSE_SU-2022-0928-1.NASL", "SUSE_SU-2022-0929-1.NASL", "SUSE_SU-2022-0931-1.NASL", "SUSE_SU-2022-0935-1.NASL", "SUSE_SU-2022-0939-1.NASL", "SUSE_SU-2022-0940-1.NASL", "SUSE_SU-2022-0942-1.NASL", "SUSE_SU-2022-0978-1.NASL", "SUSE_SU-2022-0984-1.NASL", "SUSE_SU-2022-0998-1.NASL", "SUSE_SU-2022-1023-1.NASL", "SUSE_SU-2022-1031-1.NASL", "SUSE_SU-2022-1034-1.NASL", "SUSE_SU-2022-1037-1.NASL", "SUSE_SU-2022-1038-1.NASL", "SUSE_SU-2022-1039-1.NASL", "SUSE_SU-2022-1043-1.NASL", "SUSE_SU-2022-1044-1.NASL", "SUSE_SU-2022-1061-1.NASL", "SUSE_SU-2022-1062-1.NASL", "SUSE_SU-2022-1064-1.NASL", "SUSE_SU-2022-1064-2.NASL", "SUSE_SU-2022-1091-1.NASL", "SUSE_SU-2022-1094-1.NASL", "SUSE_SU-2022-1158-1.NASL", "SUSE_SU-2022-1160-1.NASL", "SUSE_SU-2022-1163-1.NASL", "SUSE_SU-2022-1183-1.NASL", "SUSE_SU-2022-1196-1.NASL", "SUSE_SU-2022-1250-1.NASL", "SUSE_SU-2022-1265-1.NASL", "SUSE_SU-2022-1271-1.NASL", "SUSE_SU-2022-1272-1.NASL", "SUSE_SU-2022-1275-1.NASL", "SUSE_SU-2022-1285-1.NASL", "SUSE_SU-2022-1300-1.NASL", "SUSE_SU-2022-1308-1.NASL", "SUSE_SU-2022-1318-1.NASL", "SUSE_SU-2022-1320-1.NASL", "SUSE_SU-2022-1322-1.NASL", "SUSE_SU-2022-1326-1.NASL", "SUSE_SU-2022-1329-1.NASL", "SUSE_SU-2022-1335-1.NASL", "SUSE_SU-2022-1359-1.NASL", "SUSE_SU-2022-1369-1.NASL", "SUSE_SU-2022-1375-1.NASL", "SUSE_SU-2022-1407-1.NASL", "SUSE_SU-2022-1408-1.NASL", "SUSE_SU-2022-1417-1.NASL", "SUSE_SU-2022-1418-1.NASL", "SUSE_SU-2022-1440-1.NASL", "SUSE_SU-2022-1448-1.NASL", "SUSE_SU-2022-1453-1.NASL", "SUSE_SU-2022-1454-1.NASL", "SUSE_SU-2022-1459-1.NASL", "SUSE_SU-2022-1461-1.NASL", "SUSE_SU-2022-1462-1.NASL", "SUSE_SU-2022-1477-1.NASL", "SUSE_SU-2022-1485-1.NASL", "SUSE_SU-2022-1486-1.NASL", "SUSE_SU-2022-14881-1.NASL", "SUSE_SU-2022-14889-1.NASL", "SUSE_SU-2022-14894-1.NASL", "SUSE_SU-2022-14904-1.NASL", "SUSE_SU-2022-14905-1.NASL", "SUSE_SU-2022-14915-1.NASL", "SUSE_SU-2022-14916-1.NASL", "SUSE_SU-2022-14923-1.NASL", "SUSE_SU-2022-14924-1.NASL", "SUSE_SU-2022-14929-1.NASL", "SUSE_SU-2022-14938-1.NASL", "SUSE_SU-2022-1546-1.NASL", "SUSE_SU-2022-1593-1.NASL", "SUSE_SU-2022-1598-1.NASL", "SUSE_SU-2022-1611-1.NASL", "SUSE_SU-2022-1617-1.NASL", "SUSE_SU-2022-1634-1.NASL", "SUSE_SU-2022-1641-1.NASL", "SUSE_SU-2022-1650-1.NASL", "SUSE_SU-2022-1651-1.NASL", "SUSE_SU-2022-1668-1.NASL", "SUSE_SU-2022-1673-1.NASL", "SUSE_SU-2022-1674-1.NASL", "SUSE_SU-2022-1678-1.NASL", "SUSE_SU-2022-1686-1.NASL", "SUSE_SU-2022-1717-1.NASL", "SUSE_SU-2022-1750-1.NASL", "SUSE_SU-2022-1819-1.NASL", "SUSE_SU-2022-1833-1.NASL", "SUSE_SU-2022-1842-1.NASL", "SUSE_SU-2022-1929-1.NASL", "SUSE_SU-2022-2044-1.NASL", "SUSE_SU-2022-2047-1.NASL", "SUSE_SU-2022-2068-1.NASL", "SUSE_SU-2022-2075-1.NASL", "SUSE_SU-2022-2077-1.NASL", "SUSE_SU-2022-2082-1.NASL", "SUSE_SU-2022-2083-1.NASL", "SUSE_SU-2022-2098-1.NASL", "SUSE_SU-2022-2103-1.NASL", "SUSE_SU-2022-2104-1.NASL", "SUSE_SU-2022-2106-1.NASL", "SUSE_SU-2022-2111-1.NASL", "SUSE_SU-2022-2179-1.NASL", "SUSE_SU-2022-2180-1.NASL", "SUSE_SU-2022-2181-1.NASL", "SUSE_SU-2022-2182-1.NASL", "SUSE_SU-2022-2197-1.NASL", "SUSE_SU-2022-2251-1.NASL", "SUSE_SU-2022-2306-1.NASL", "SUSE_SU-2022-2308-1.NASL", "SUSE_SU-2022-2309-1.NASL", "SUSE_SU-2022-2321-1.NASL", "SUSE_SU-2022-2351-1.NASL", "SUSE_SU-2022-2376-1.NASL", "SUSE_SU-2022-2377-1.NASL", "SUSE_SU-2022-2379-1.NASL", "SUSE_SU-2022-2382-1.NASL", "SUSE_SU-2022-2393-1.NASL", "SUSE_SU-2022-2407-1.NASL", "SUSE_SU-2022-2411-1.NASL", "SUSE_SU-2022-2422-1.NASL", "SUSE_SU-2022-2423-1.NASL", "SUSE_SU-2022-2424-1.NASL", "SUSE_SU-2022-2441-1.NASL", "SUSE_SU-2022-2478-1.NASL", "SUSE_SU-2022-2549-1.NASL", "SUSE_SU-2022-2552-1.NASL", "SUSE_SU-2022-2610-1.NASL", "SUSE_SU-2022-2629-1.NASL", "SUSE_SU-2022-2645-1.NASL", "SUSE_SU-2022-2646-1.NASL", "SUSE_SU-2022-2660-1.NASL", "SUSE_SU-2022-2707-1.NASL", "SUSE_SU-2022-2793-1.NASL", "SUSE_SU-2022-2809-1.NASL", "SUSE_SU-2022-2819-1.NASL", "SUSE_SU-2022-2831-1.NASL", "SUSE_SU-2022-2841-1.NASL", "SUSE_SU-2022-2855-1.NASL", "SUSE_SU-2022-2856-1.NASL", "SUSE_SU-2022-2898-1.NASL", "SUSE_SU-2022-2899-1.NASL", "SUSE_SU-2022-2949-1.NASL", "SUSE_SU-2022-3092-1.NASL", "SUSE_SU-2022-3152-1.NASL", "SUSE_SU-2022-3225-1.NASL", "SUSE_SU-2022-3231-1.NASL", "SUSE_SU-2022-3264-1.NASL", "SUSE_SU-2022-3265-1.NASL", "SUSE_SU-2022-3274-1.NASL", "SUSE_SU-2022-3282-1.NASL", "SUSE_SU-2022-3291-1.NASL", "SUSE_SU-2022-3408-1.NASL", "SUSE_SU-2022-3422-1.NASL", "SUSE_SU-2022-3450-1.NASL", "SUSE_SU-2022-3547-1.NASL", "SUSE_SU-2022-3609-1.NASL", "SUSE_SU-2022-3809-1.NASL", "SUSE_SU-2022-3875-1.NASL", "SUSE_SU-2022-3876-1.NASL", "SUSE_SU-2022-4154-1.NASL", "SUSE_SU-2022-4166-1.NASL", "SUSE_SU-2022-4281-1.NASL", "SUSE_SU-2023-0516-2.NASL", "SUSE_SU-2023-0600-1.NASL", "SUSE_SU-2023-0601-1.NASL", "SUSE_SU-2023-0602-1.NASL", "SUSE_SU-2023-0603-1.NASL", "SUSE_SU-2023-0634-1.NASL", "SUSE_SU-2023-0747-1.NASL", "SUSE_SU-2023-0768-1.NASL", "SUSE_SU-2023-0852-1.NASL", "SUSE_SU-2023-1848-1.NASL", "SUSE_SU-2023-2048-1.NASL", "SUSE_SU-2023-2096-1.NASL", "SUSE_SU-2023-2096-2.NASL", "SUSE_SU-2023-2232-1.NASL", "TENABLE_NESSUS_AGENT_TNS-2022-07.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_08.NASL", "TENABLE_OT_ABB_CVE-2022-0778.NASL", "TENABLE_OT_SIEMENS_CVE-2018-25032.NASL", "TENABLE_OT_SIEMENS_CVE-2021-3449.NASL", "TOMCAT_10_0_0_M5.NASL", "TOMCAT_10_0_12.NASL", "TOMCAT_10_0_16.NASL", "TOMCAT_10_0_2.NASL", "TOMCAT_10_0_20.NASL", "TOMCAT_10_0_21.NASL", "TOMCAT_10_1_0_M10.NASL", "TOMCAT_10_1_0_M15.NASL", "TOMCAT_10_1_0_M6.NASL", "TOMCAT_7_0_104.NASL", "TOMCAT_7_0_108.NASL", "TOMCAT_8_5_55.NASL", "TOMCAT_8_5_63.NASL", "TOMCAT_8_5_72.NASL", "TOMCAT_8_5_75.NASL", "TOMCAT_8_5_76.NASL", "TOMCAT_8_5_78.NASL", "TOMCAT_8_5_79.NASL", "TOMCAT_9_0_21.NASL", "TOMCAT_9_0_35.NASL", "TOMCAT_9_0_43.NASL", "TOMCAT_9_0_54.NASL", "TOMCAT_9_0_58.NASL", "TOMCAT_9_0_62.NASL", "TOMCAT_9_0_63.NASL", "UBUNTU_USN-3790-1.NASL", "UBUNTU_USN-3790-2.NASL", "UBUNTU_USN-3937-1.NASL", "UBUNTU_USN-4113-1.NASL", "UBUNTU_USN-4113-2.NASL", "UBUNTU_USN-4127-1.NASL", "UBUNTU_USN-4427-1.NASL", "UBUNTU_USN-4439-1.NASL", "UBUNTU_USN-4440-1.NASL", "UBUNTU_USN-4448-1.NASL", "UBUNTU_USN-4458-1.NASL", "UBUNTU_USN-4483-1.NASL", "UBUNTU_USN-4485-1.NASL", "UBUNTU_USN-4495-1.NASL", "UBUNTU_USN-4570-1.NASL", "UBUNTU_USN-4575-1.NASL", "UBUNTU_USN-4596-1.NASL", "UBUNTU_USN-4601-1.NASL", "UBUNTU_USN-4657-1.NASL", "UBUNTU_USN-4658-1.NASL", "UBUNTU_USN-4659-1.NASL", "UBUNTU_USN-4660-1.NASL", "UBUNTU_USN-4681-1.NASL", "UBUNTU_USN-4754-1.NASL", "UBUNTU_USN-4754-3.NASL", "UBUNTU_USN-4754-4.NASL", "UBUNTU_USN-4766-1.NASL", "UBUNTU_USN-4891-1.NASL", "UBUNTU_USN-4912-1.NASL", "UBUNTU_USN-4916-1.NASL", "UBUNTU_USN-4917-1.NASL", "UBUNTU_USN-4940-1.NASL", "UBUNTU_USN-4961-2.NASL", "UBUNTU_USN-4973-1.NASL", "UBUNTU_USN-4973-2.NASL", "UBUNTU_USN-5034-1.NASL", "UBUNTU_USN-5034-2.NASL", "UBUNTU_USN-5038-1.NASL", "UBUNTU_USN-5056-1.NASL", "UBUNTU_USN-5070-1.NASL", "UBUNTU_USN-5071-1.NASL", "UBUNTU_USN-5071-2.NASL", "UBUNTU_USN-5071-3.NASL", "UBUNTU_USN-5073-1.NASL", "UBUNTU_USN-5073-2.NASL", "UBUNTU_USN-5073-3.NASL", "UBUNTU_USN-5079-1.NASL", "UBUNTU_USN-5079-2.NASL", "UBUNTU_USN-5080-1.NASL", "UBUNTU_USN-5080-2.NASL", "UBUNTU_USN-5083-1.NASL", "UBUNTU_USN-5092-1.NASL", "UBUNTU_USN-5092-2.NASL", "UBUNTU_USN-5095-1.NASL", "UBUNTU_USN-5096-1.NASL", "UBUNTU_USN-5106-1.NASL", "UBUNTU_USN-5113-1.NASL", "UBUNTU_USN-5115-1.NASL", "UBUNTU_USN-5117-1.NASL", "UBUNTU_USN-5120-1.NASL", "UBUNTU_USN-5136-1.NASL", "UBUNTU_USN-5137-1.NASL", "UBUNTU_USN-5137-2.NASL", "UBUNTU_USN-5138-1.NASL", "UBUNTU_USN-5139-1.NASL", "UBUNTU_USN-5140-1.NASL", "UBUNTU_USN-5161-1.NASL", "UBUNTU_USN-5162-1.NASL", "UBUNTU_USN-5163-1.NASL", "UBUNTU_USN-5164-1.NASL", "UBUNTU_USN-5165-1.NASL", "UBUNTU_USN-5181-1.NASL", "UBUNTU_USN-5199-1.NASL", "UBUNTU_USN-5200-1.NASL", "UBUNTU_USN-5201-1.NASL", "UBUNTU_USN-5206-1.NASL", "UBUNTU_USN-5207-1.NASL", "UBUNTU_USN-5208-1.NASL", "UBUNTU_USN-5209-1.NASL", "UBUNTU_USN-5210-1.NASL", "UBUNTU_USN-5211-1.NASL", "UBUNTU_USN-5218-1.NASL", "UBUNTU_USN-5222-1.NASL", "UBUNTU_USN-5223-1.NASL", "UBUNTU_USN-5223-2.NASL", "UBUNTU_USN-5225-1.NASL", "UBUNTU_USN-5245-1.NASL", "UBUNTU_USN-5265-1.NASL", "UBUNTU_USN-5266-1.NASL", "UBUNTU_USN-5267-1.NASL", "UBUNTU_USN-5267-3.NASL", "UBUNTU_USN-5268-1.NASL", "UBUNTU_USN-5278-1.NASL", "UBUNTU_USN-5294-1.NASL", "UBUNTU_USN-5294-2.NASL", "UBUNTU_USN-5295-1.NASL", "UBUNTU_USN-5295-2.NASL", "UBUNTU_USN-5297-1.NASL", "UBUNTU_USN-5298-1.NASL", "UBUNTU_USN-5299-1.NASL", "UBUNTU_USN-5301-1.NASL", "UBUNTU_USN-5301-2.NASL", "UBUNTU_USN-5302-1.NASL", "UBUNTU_USN-5304-1.NASL", "UBUNTU_USN-5310-1.NASL", "UBUNTU_USN-5310-2.NASL", "UBUNTU_USN-5317-1.NASL", "UBUNTU_USN-5318-1.NASL", "UBUNTU_USN-5319-1.NASL", "UBUNTU_USN-5324-1.NASL", "UBUNTU_USN-5328-1.NASL", "UBUNTU_USN-5328-2.NASL", "UBUNTU_USN-5333-1.NASL", "UBUNTU_USN-5333-2.NASL", "UBUNTU_USN-5337-1.NASL", "UBUNTU_USN-5338-1.NASL", "UBUNTU_USN-5339-1.NASL", "UBUNTU_USN-5343-1.NASL", "UBUNTU_USN-5355-1.NASL", "UBUNTU_USN-5355-2.NASL", "UBUNTU_USN-5359-1.NASL", "UBUNTU_USN-5359-2.NASL", "UBUNTU_USN-5360-1.NASL", "UBUNTU_USN-5361-1.NASL", "UBUNTU_USN-5362-1.NASL", "UBUNTU_USN-5368-1.NASL", "UBUNTU_USN-5377-1.NASL", "UBUNTU_USN-5378-1.NASL", "UBUNTU_USN-5378-2.NASL", "UBUNTU_USN-5378-3.NASL", "UBUNTU_USN-5378-4.NASL", "UBUNTU_USN-5381-1.NASL", "UBUNTU_USN-5383-1.NASL", "UBUNTU_USN-5402-1.NASL", "UBUNTU_USN-5402-2.NASL", "UBUNTU_USN-5413-1.NASL", "UBUNTU_USN-5415-1.NASL", "UBUNTU_USN-5422-1.NASL", "UBUNTU_USN-5433-1.NASL", "UBUNTU_USN-5466-1.NASL", "UBUNTU_USN-5467-1.NASL", "UBUNTU_USN-5488-1.NASL", "UBUNTU_USN-5488-2.NASL", "UBUNTU_USN-5500-1.NASL", "UBUNTU_USN-5505-1.NASL", "UBUNTU_USN-5515-1.NASL", "UBUNTU_USN-5525-1.NASL", "UBUNTU_USN-5537-1.NASL", "UBUNTU_USN-5537-2.NASL", "UBUNTU_USN-5541-1.NASL", "UBUNTU_USN-5546-1.NASL", "UBUNTU_USN-5546-2.NASL", "UBUNTU_USN-5576-1.NASL", "UBUNTU_USN-5613-1.NASL", "UBUNTU_USN-5613-2.NASL", "UBUNTU_USN-5666-1.NASL", "UBUNTU_USN-5739-1.NASL", "UBUNTU_USN-5763-1.NASL", "UBUNTU_USN-5805-1.NASL", "UBUNTU_USN-5946-1.NASL", "UBUNTU_USN-5959-1.NASL", "UBUNTU_USN-5998-1.NASL", "UBUNTU_USN-6001-1.NASL", "UBUNTU_USN-6011-1.NASL", "UBUNTU_USN-6014-1.NASL", "UBUNTU_USN-6049-1.NASL", "UBUNTU_USN-6117-1.NASL", "UBUNTU_USN-6419-1.NASL", "UBUNTU_USN-6457-1.NASL", "VIRTUALBOX_JUL_2022_CPU.NASL", "VIRTUOZZO_VZLSA-2019-1467.NASL", "VIRTUOZZO_VZLSA-2019-2343.NASL", "VMWARE_NSX_FOR_VSPHERE_6_4_14.NASL", "WEBSPHERE_1115085.NASL", "WEBSPHERE_9_0_5_12_CVE-2021-23450.NASL", "WEBSPHERE_LIBERTY_22_0_0_3_CVE-2021-23450.NASL", "WEB_APPLICATION_SCANNING_112430", "WEB_APPLICATION_SCANNING_112437", "WEB_APPLICATION_SCANNING_112438", "WEB_APPLICATION_SCANNING_112485", "WEB_APPLICATION_SCANNING_112709", "WEB_APPLICATION_SCANNING_112710", "WEB_APPLICATION_SCANNING_112711", "WEB_APPLICATION_SCANNING_112712", "WEB_APPLICATION_SCANNING_113006", "WEB_APPLICATION_SCANNING_113042", "WEB_APPLICATION_SCANNING_113194", "WEB_APPLICATION_SCANNING_113204", "WEB_APPLICATION_SCANNING_113206", "WEB_APPLICATION_SCANNING_113626", "WEB_APPLICATION_SCANNING_113627", "WEB_APPLICATION_SCANNING_113628", "WEB_APPLICATION_SCANNING_113629", "WEB_APPLICATION_SCANNING_98669", "WEB_APPLICATION_SCANNING_98998", "WORDPRESS_5_8_1.NASL", "ZIMBRA_8_8_15_P40.NASL", "ZIMBRA_9_0_0_P26.NASL", "ZIMBRA_9_0_0_P33.NASL"]}, {"type": "nodejs", "idList": ["NODEJS:1467", "NODEJS:1518", "NODEJS:1524", "NODEJS:1673", "NODEJS:1682"]}, {"type": "nodejsblog", "idList": ["NODEJSBLOG:APRIL-2021-SECURITY-RELEASES", "NODEJSBLOG:AUG-2021-SECURITY-RELEASES", "NODEJSBLOG:JAN-2022-SECURITY-RELEASES", "NODEJSBLOG:MAR-2022-SECURITY-RELEASES", "NODEJSBLOG:OPENSSL-FIXES-IN-REGULAR-RELEASES-MAY2022"]}, {"type": "nuclei", "idList": ["NUCLEI:CVE-2018-1273", "NUCLEI:CVE-2020-9484", "NUCLEI:CVE-2021-29505", "NUCLEI:CVE-2021-31805", "NUCLEI:CVE-2021-34429", "NUCLEI:CVE-2021-39141", "NUCLEI:CVE-2021-39144", "NUCLEI:CVE-2021-39146", "NUCLEI:CVE-2021-39152", "NUCLEI:CVE-2022-21500", "NUCLEI:CVE-2022-22947", "NUCLEI:CVE-2022-22963", "NUCLEI:CVE-2022-22965"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2021-3449", "OPENSSL:CVE-2021-3450", "OPENSSL:CVE-2021-4160", "OPENSSL:CVE-2022-0778", "OPENSSL:CVE-2022-1292", "OPENSSL:CVE-2022-2068"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108764", "OPENVAS:1361412562310108811", "OPENVAS:1361412562310114149", "OPENVAS:1361412562310114150", "OPENVAS:1361412562310142228", "OPENVAS:1361412562310142229", "OPENVAS:1361412562310143671", "OPENVAS:1361412562310143672", "OPENVAS:1361412562310143812", "OPENVAS:1361412562310143813", "OPENVAS:1361412562310143963", "OPENVAS:1361412562310143964", "OPENVAS:1361412562310143968", "OPENVAS:1361412562310144144", "OPENVAS:1361412562310144145", "OPENVAS:1361412562310704422", "OPENVAS:1361412562310704509", "OPENVAS:1361412562310704686", "OPENVAS:1361412562310704693", "OPENVAS:1361412562310704727", "OPENVAS:1361412562310843769", "OPENVAS:1361412562310843797", "OPENVAS:1361412562310843965", "OPENVAS:1361412562310844154", "OPENVAS:1361412562310844168", "OPENVAS:1361412562310844179", "OPENVAS:1361412562310851938", "OPENVAS:1361412562310852416", "OPENVAS:1361412562310852430", "OPENVAS:1361412562310852446", "OPENVAS:1361412562310852452", "OPENVAS:1361412562310852457", "OPENVAS:1361412562310852490", "OPENVAS:1361412562310852563", "OPENVAS:1361412562310852650", "OPENVAS:1361412562310852684", "OPENVAS:1361412562310852686", "OPENVAS:1361412562310852700", "OPENVAS:1361412562310852922", "OPENVAS:1361412562310852944", "OPENVAS:1361412562310852991", "OPENVAS:1361412562310853008", "OPENVAS:1361412562310853108", "OPENVAS:1361412562310853132", "OPENVAS:1361412562310853160", "OPENVAS:1361412562310853179", "OPENVAS:1361412562310853182", "OPENVAS:1361412562310853260", "OPENVAS:1361412562310874986", "OPENVAS:1361412562310875246", "OPENVAS:1361412562310875269", "OPENVAS:1361412562310875537", "OPENVAS:1361412562310875540", "OPENVAS:1361412562310875545", "OPENVAS:1361412562310875641", "OPENVAS:1361412562310875841", "OPENVAS:1361412562310875963", "OPENVAS:1361412562310876064", "OPENVAS:1361412562310876229", "OPENVAS:1361412562310876358", "OPENVAS:1361412562310876371", "OPENVAS:1361412562310876424", "OPENVAS:1361412562310876481", "OPENVAS:1361412562310876483", "OPENVAS:1361412562310876569", "OPENVAS:1361412562310876576", "OPENVAS:1361412562310876616", "OPENVAS:1361412562310876619", "OPENVAS:1361412562310876633", "OPENVAS:1361412562310876635", "OPENVAS:1361412562310876817", "OPENVAS:1361412562310876820", "OPENVAS:1361412562310876955", "OPENVAS:1361412562310876974", "OPENVAS:1361412562310876976", "OPENVAS:1361412562310876994", "OPENVAS:1361412562310877152", "OPENVAS:1361412562310877216", "OPENVAS:1361412562310877282", "OPENVAS:1361412562310877619", "OPENVAS:1361412562310877626", "OPENVAS:1361412562310877635", "OPENVAS:1361412562310877925", "OPENVAS:1361412562310877967", "OPENVAS:1361412562310877975", "OPENVAS:1361412562310877995", "OPENVAS:1361412562310883035", "OPENVAS:1361412562310883068", "OPENVAS:1361412562310883071", "OPENVAS:1361412562310883102", "OPENVAS:1361412562310883171", "OPENVAS:1361412562310883205", "OPENVAS:1361412562310883207", "OPENVAS:1361412562310883252", "OPENVAS:1361412562310891748", "OPENVAS:1361412562310891834", "OPENVAS:1361412562310891835", "OPENVAS:1361412562310891896", "OPENVAS:1361412562310892065", "OPENVAS:1361412562310892139", "OPENVAS:1361412562310892191", "OPENVAS:1361412562310892209", "OPENVAS:1361412562310892217", "OPENVAS:1361412562310892279", "OPENVAS:1361412562310892280", "OPENVAS:1361412562311220191124", "OPENVAS:1361412562311220191149", "OPENVAS:1361412562311220191277", "OPENVAS:1361412562311220191337", "OPENVAS:1361412562311220191403", "OPENVAS:1361412562311220191434", "OPENVAS:1361412562311220191657", "OPENVAS:1361412562311220191658", "OPENVAS:1361412562311220191771", "OPENVAS:1361412562311220191778", "OPENVAS:1361412562311220191797", "OPENVAS:1361412562311220191866", "OPENVAS:1361412562311220191886", "OPENVAS:1361412562311220191934", "OPENVAS:1361412562311220191947", "OPENVAS:1361412562311220192019", "OPENVAS:1361412562311220192080", "OPENVAS:1361412562311220192157", "OPENVAS:1361412562311220192225", "OPENVAS:1361412562311220192239", "OPENVAS:1361412562311220192249", "OPENVAS:1361412562311220192311", "OPENVAS:1361412562311220192442", "OPENVAS:1361412562311220192653", "OPENVAS:1361412562311220201027", "OPENVAS:1361412562311220201043", "OPENVAS:1361412562311220201155", "OPENVAS:1361412562311220201212", "OPENVAS:1361412562311220201250", "OPENVAS:1361412562311220201275", "OPENVAS:1361412562311220201359", "OPENVAS:1361412562311220201429", "OPENVAS:1361412562311220201455", "OPENVAS:1361412562311220201505", "OPENVAS:1361412562311220201532", "OPENVAS:1361412562311220201552", "OPENVAS:1361412562311220201596", "OPENVAS:1361412562311220201601", "OPENVAS:1361412562311220201633", "OPENVAS:1361412562311220201643", "OPENVAS:1361412562311220201645", "OPENVAS:1361412562311220201650", "OPENVAS:1361412562311220201677", "OPENVAS:1361412562311220201692", "OPENVAS:1361412562311220201749", "OPENVAS:1361412562311220201753"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2020", "ORACLE:CPUAPR2021", "ORACLE:CPUAPR2022", "ORACLE:CPUAPR2023", "ORACLE:CPUJAN2020", "ORACLE:CPUJAN2021", "ORACLE:CPUJAN2022", "ORACLE:CPUJAN2023", "ORACLE:CPUJUL2019", "ORACLE:CPUJUL2020", "ORACLE:CPUJUL2021", "ORACLE:CPUJUL2023", "ORACLE:CPUOCT2019", "ORACLE:CPUOCT2020", "ORACLE:CPUOCT2021", "ORACLE:CPUOCT2022", "ORACLE:CPUOCT2023"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-0710", "ELSA-2019-0981", "ELSA-2019-0997", "ELSA-2019-1467", "ELSA-2019-2030", "ELSA-2019-2035", "ELSA-2019-2343", "ELSA-2019-3335", "ELSA-2019-3436", "ELSA-2019-3520", "ELSA-2020-0194", "ELSA-2020-0850", "ELSA-2020-0851", "ELSA-2020-1605", "ELSA-2020-1916", "ELSA-2020-2068", "ELSA-2020-2081", "ELSA-2020-2529", "ELSA-2020-2530", "ELSA-2020-3936", "ELSA-2020-3958", "ELSA-2020-4004", "ELSA-2020-4432", "ELSA-2020-4641", "ELSA-2020-4654", "ELSA-2020-4670", "ELSA-2020-4751", "ELSA-2020-4847", "ELSA-2021-0860", "ELSA-2021-1024", "ELSA-2021-1631", "ELSA-2021-1633", "ELSA-2021-1761", "ELSA-2021-1846", "ELSA-2021-1879", "ELSA-2021-2583", "ELSA-2021-2683", "ELSA-2021-3327", "ELSA-2021-3576", "ELSA-2021-3623", "ELSA-2021-3666", "ELSA-2021-3956", "ELSA-2021-4059", "ELSA-2021-4151", "ELSA-2021-4160", "ELSA-2021-4162", "ELSA-2021-4409", "ELSA-2021-4455", "ELSA-2021-4782", "ELSA-2021-4788", "ELSA-2021-5206", "ELSA-2021-9100", "ELSA-2021-9101", "ELSA-2021-9107", "ELSA-2021-9128", "ELSA-2021-9129", "ELSA-2021-9130", "ELSA-2021-9151", "ELSA-2021-9222", "ELSA-2021-9223", "ELSA-2021-9305", "ELSA-2021-9306", "ELSA-2021-9307", "ELSA-2021-9308", "ELSA-2021-9400", "ELSA-2021-9452", "ELSA-2021-9453", "ELSA-2021-9474", "ELSA-2021-9475", "ELSA-2021-9552", "ELSA-2021-9564", "ELSA-2021-9565", "ELSA-2021-9575", "ELSA-2022-0063", "ELSA-2022-0290", "ELSA-2022-0442", "ELSA-2022-0620", "ELSA-2022-0658", "ELSA-2022-0666", "ELSA-2022-0896", "ELSA-2022-0899", "ELSA-2022-1045", "ELSA-2022-1049", "ELSA-2022-1065", "ELSA-2022-1066", "ELSA-2022-1198", "ELSA-2022-14857", "ELSA-2022-1537", "ELSA-2022-1546", "ELSA-2022-1550", "ELSA-2022-1552", "ELSA-2022-1642", "ELSA-2022-1763", "ELSA-2022-1764", "ELSA-2022-1819", "ELSA-2022-1821", "ELSA-2022-1932", "ELSA-2022-1986", "ELSA-2022-1988", "ELSA-2022-2013", "ELSA-2022-2043", "ELSA-2022-2191", "ELSA-2022-2201", "ELSA-2022-2213", "ELSA-2022-4582", "ELSA-2022-4584", "ELSA-2022-4592", "ELSA-2022-4899", "ELSA-2022-4930", "ELSA-2022-4940", "ELSA-2022-4991", "ELSA-2022-5052", "ELSA-2022-5234", "ELSA-2022-5235", "ELSA-2022-5242", "ELSA-2022-5250", "ELSA-2022-5317", "ELSA-2022-5326", "ELSA-2022-5683", "ELSA-2022-5687", "ELSA-2022-5695", "ELSA-2022-5696", "ELSA-2022-5698", "ELSA-2022-5709", "ELSA-2022-5726", "ELSA-2022-5736", "ELSA-2022-5818", "ELSA-2022-6224", "ELSA-2022-6590", "ELSA-2022-7119", "ELSA-2022-7541", "ELSA-2022-7647", "ELSA-2022-7830", "ELSA-2022-8067", "ELSA-2022-8096", "ELSA-2022-8420", "ELSA-2022-9056", "ELSA-2022-9073-1", "ELSA-2022-9088", "ELSA-2022-9147", "ELSA-2022-9148", "ELSA-2022-9177", "ELSA-2022-9181", "ELSA-2022-9182", "ELSA-2022-9204", "ELSA-2022-9224", "ELSA-2022-9225", "ELSA-2022-9233", "ELSA-2022-9234", "ELSA-2022-9237", "ELSA-2022-9239", "ELSA-2022-9243", "ELSA-2022-9244", "ELSA-2022-9245", "ELSA-2022-9246", "ELSA-2022-9249", "ELSA-2022-9255", "ELSA-2022-9257", "ELSA-2022-9258", "ELSA-2022-9260", "ELSA-2022-9263", "ELSA-2022-9272", "ELSA-2022-9313", "ELSA-2022-9314", "ELSA-2022-9341", "ELSA-2022-9348", "ELSA-2022-9358", "ELSA-2022-9419", "ELSA-2022-9421", "ELSA-2022-9479", "ELSA-2022-9480", "ELSA-2022-9565", "ELSA-2022-9683", "ELSA-2022-9751", "ELSA-2022-9761", "ELSA-2022-9852", "ELSA-2022-9969", "ELSA-2023-12232", "ELSA-2023-12349", "ELSA-2023-2312"]}, {"type": "osv", "idList": ["OSV:ASB-A-111893654", "OSV:BIT-NODE-2021-3450", "OSV:CVE-2018-25032", "OSV:CVE-2020-14343", "OSV:CVE-2020-1747", "OSV:CVE-2020-26137", "OSV:CVE-2021-22939", "OSV:CVE-2021-22946", "OSV:CVE-2021-22947", "OSV:CVE-2021-29921", "OSV:CVE-2021-3177", "OSV:CVE-2021-33560", "OSV:CVE-2021-35940", "OSV:CVE-2021-3672", "OSV:CVE-2021-37750", "OSV:CVE-2021-41617", "OSV:CVE-2021-43818", "OSV:CVE-2021-44531", "OSV:CVE-2021-44532", "OSV:CVE-2021-44533", "OSV:CVE-2022-0778", "OSV:CVE-2022-1154", "OSV:CVE-2022-1271", "OSV:CVE-2022-1292", "OSV:CVE-2022-2068", "OSV:CVE-2022-21824", "OSV:CVE-2022-22720", "OSV:CVE-2022-22721", "OSV:CVE-2022-23308", "OSV:CVE-2022-24407", "OSV:CVE-2022-24735", "OSV:CVE-2022-24736", "OSV:CVE-2022-27778", "OSV:CVE-2022-29824", "OSV:DLA-1748-1", "OSV:DLA-1834-1", "OSV:DLA-1835-1", "OSV:DLA-1835-2", "OSV:DLA-1896-1", "OSV:DLA-2065-1", "OSV:DLA-2139-1", "OSV:DLA-2191-1", "OSV:DLA-2209-1", "OSV:DLA-2217-1", "OSV:DLA-2279-1", "OSV:DLA-2280-1", "OSV:DLA-2323-1", "OSV:DLA-2337-1", "OSV:DLA-2370-1", "OSV:DLA-2406-1", "OSV:DLA-2483-1", "OSV:DLA-2511-1", "OSV:DLA-2594-1", "OSV:DLA-2619-1", "OSV:DLA-2638-1", "OSV:DLA-2686-1", "OSV:DLA-2689-1", "OSV:DLA-2690-1", "OSV:DLA-2693-1", "OSV:DLA-2696-1", "OSV:DLA-2706-1", "OSV:DLA-2712-1", "OSV:DLA-2713-1", "OSV:DLA-2738-1", "OSV:DLA-2741-1", "OSV:DLA-2751-1", "OSV:DLA-2771-1", "OSV:DLA-2773-1", "OSV:DLA-2785-1", "OSV:DLA-2808-1", "OSV:DLA-2821-1", "OSV:DLA-2843-1", "OSV:DLA-2877-1", "OSV:DLA-2889-1", "OSV:DLA-2891-1", "OSV:DLA-2892-1", "OSV:DLA-2919-1", "OSV:DLA-2924-1", "OSV:DLA-2940-1", "OSV:DLA-2941-1", "OSV:DLA-2953-1", "OSV:DLA-2968-1", "OSV:DLA-2972-1", "OSV:DLA-2976-1", "OSV:DLA-2977-1", "OSV:DLA-2985-1", "OSV:DLA-2986-1", "OSV:DLA-2990-1", "OSV:DLA-2991-1", "OSV:DLA-2993-1", "OSV:DLA-3001-1", "OSV:DLA-3011-1", "OSV:DLA-3012-1", "OSV:DLA-3065-1", "OSV:DLA-3085-1", "OSV:DLA-3100-1", "OSV:DLA-3114-1", "OSV:DLA-3129-1", "OSV:DLA-3137-1", "OSV:DLA-3152-1", "OSV:DLA-3155-1", "OSV:DLA-3160-1", "OSV:DLA-3182-1", "OSV:DLA-3207-1", "OSV:DLA-3230-1", "OSV:DLA-3289-1", "OSV:DLA-3351-1", "OSV:DLA-3373-1", "OSV:DLA-3395-1", "OSV:DLA-3395-2", "OSV:DLA-3432-1", "OSV:DLA-3477-1", "OSV:DLA-3610-1", "OSV:DLA-3619-1", "OSV:DSA-4422-1", "OSV:DSA-4509-1", "OSV:DSA-4509-2", "OSV:DSA-4509-3", "OSV:DSA-4727-1", "OSV:DSA-4757-1", "OSV:DSA-4875-1", "OSV:DSA-4954-1", "OSV:DSA-4978-1", "OSV:DSA-5010-1", "OSV:DSA-5043-1", "OSV:DSA-5087-1", "OSV:DSA-5092-1", "OSV:DSA-5095-1", "OSV:DSA-5096-1", "OSV:DSA-5111-1", "OSV:DSA-5122-1", "OSV:DSA-5123-1", "OSV:DSA-5127-1", "OSV:DSA-5170-1", "OSV:DSA-5173-1", "OSV:DSA-5227-1", "OSV:DSA-5239-1", "OSV:DSA-5256-1", "OSV:DSA-5265-1", "OSV:DSA-5283-1", "OSV:DSA-5316-1", "OSV:GHSA-2363-CQG2-863C", "OSV:GHSA-269Q-HMXG-M83Q", "OSV:GHSA-288C-CQ4H-88GQ", "OSV:GHSA-29MW-WPGM-HMR9", "OSV:GHSA-2F88-5HG8-9X2X", "OSV:GHSA-2H63-QP69-FWVW", "OSV:GHSA-2Q8X-2P7F-574V", "OSV:GHSA-2QP4-G3Q3-F92W", "OSV:GHSA-2QRG-X229-3V8Q", "OSV:GHSA-344F-F5VG-2JFJ", "OSV:GHSA-34WX-X2W9-VQM3", "OSV:GHSA-35JH-R3H4-6JHM", "OSV:GHSA-36P3-WJMG-H94X", "OSV:GHSA-3C6G-PVG8-GQW2", "OSV:GHSA-3CCQ-5VW3-2P6X", "OSV:GHSA-3GX9-37WW-9QW6", "OSV:GHSA-3J6G-HXX5-3Q26", "OSV:GHSA-3W6P-8F82-GW8R", "OSV:GHSA-3W73-FMF3-HG5C", "OSV:GHSA-4FC4-4P5G-6W89", "OSV:GHSA-4FQ3-MR56-CG6R", "OSV:GHSA-4JRV-PPP4-JM57", "OSV:GHSA-5545-2Q6W-2GH6", "OSV:GHSA-55X5-FJ6C-H6M8", "OSV:GHSA-57J2-W4CX-62H2", "OSV:GHSA-5Q8M-MQMX-PXP9", "OSV:GHSA-5R5R-6HPJ-8GG9", "OSV:GHSA-5V34-G2PX-J4FW", "OSV:GHSA-5XP3-JFQ3-5Q8X", "OSV:GHSA-64XX-CQ4Q-MF44", "OSV:GHSA-65FG-84F6-3JQ3", "OSV:GHSA-6757-JP84-GXFX", "OSV:GHSA-6PHF-73Q6-GH87", "OSV:GHSA-6Q8V-2HVM-FX37", "OSV:GHSA-6V73-FGF6-W5J7", "OSV:GHSA-6W62-HX7R-MW68", "OSV:GHSA-6WF9-JMG9-VXCC", "OSV:GHSA-73XV-W5GP-FRXH", "OSV:GHSA-7CHV-RRW6-W6FC", "OSV:GHSA-7GRW-6PJH-JPC9", "OSV:GHSA-7HFM-57QF-J43Q", "OSV:GHSA-7PM4-G2QJ-J85X", "OSV:GHSA-7QCQ-XP2F-56F6", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-8489-44MV-GGJ8", "OSV:GHSA-89QR-369F-5M5X", "OSV:GHSA-8C4J-34R4-XR8G", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-8JRJ-525P-826V", "OSV:GHSA-8M5H-HRQM-PXM2", "OSV:GHSA-8Q59-Q68H-6HV4", "OSV:GHSA-8W26-6F25-CM9X", "OSV:GHSA-8WX2-9Q48-VM9R", "OSV:GHSA-9279-7HPH-R3XW", "OSV:GHSA-9339-86WC-4QGF", "OSV:GHSA-9654-PR4F-GH6M", "OSV:GHSA-96JQ-75WH-2658", "OSV:GHSA-9849-P7JC-9RMV", "OSV:GHSA-9C8W-JRW3-Q2C3", "OSV:GHSA-9F3J-PM6F-9FM5", "OSV:GHSA-9GJ3-HWP5-PMWC", "OSV:GHSA-9GPH-22XH-8X98", "OSV:GHSA-9M6F-7XCQ-8VF8", "OSV:GHSA-9RR6-JPG7-9JG6", "OSV:GHSA-9VJP-V76F-G363", "OSV:GHSA-C28R-HW5M-5GV3", "OSV:GHSA-C2CP-3XJ9-97W9", "OSV:GHSA-C2JG-HW38-JRQQ", "OSV:GHSA-C427-HJC3-WRFW", "OSV:GHSA-C58J-88F5-H53F", "OSV:GHSA-C6PW-Q7F2-97HV", "OSV:GHSA-CGX6-HPWQ-FHV5", "OSV:GHSA-CPH5-M8F7-6C5X", "OSV:GHSA-CQCC-MM6X-VMVW", "OSV:GHSA-CRV7-7245-F45F", "OSV:GHSA-CVM9-FJM9-3572", "OSV:GHSA-CXFM-5M4G-X7XP", "OSV:GHSA-F6JP-J6W3-W9HM", "OSV:GHSA-F7C7-J99H-C22F", "OSV:GHSA-F7VH-QWP3-X37M", "OSV:GHSA-F8VC-WFC8-HXQH", "OSV:GHSA-F9XH-2QGP-CQ57", "OSV:GHSA-FG2V-W576-W4V3", "OSV:GHSA-FG3J-Q579-V8X4", "OSV:GHSA-FP5R-V3W9-4333", "OSV:GHSA-FPFV-JQM9-F5JM", "OSV:GHSA-FQ42-C5RG-92C2", "OSV:GHSA-G5MM-VMX4-3RG7", "OSV:GHSA-G5W6-MRJ7-75H2", "OSV:GHSA-GFWJ-FWQJ-FP3V", "OSV:GHSA-GPQQ-952Q-5327", "OSV:GHSA-GPVV-69J7-GWJ8", "OSV:GHSA-GRG4-WF29-R9VV", "OSV:GHSA-GW42-F939-FHVM", "OSV:GHSA-GWRP-PVRQ-JMWV", "OSV:GHSA-GX8X-G87M-H5Q6", "OSV:GHSA-GXR4-XJJ5-5PX2", "OSV:GHSA-H3CH-5PP2-VH6W", "OSV:GHSA-H65F-JVQW-M9FJ", "OSV:GHSA-H7V4-7XG3-HXCC", "OSV:GHSA-H9GJ-RQRW-X4FQ", "OSV:GHSA-HH26-6XWR-GGV7", "OSV:GHSA-HH32-7344-CG2F", "OSV:GHSA-HJ5V-574P-MJ7C", "OSV:GHSA-HPH2-M3G5-XXV4", "OSV:GHSA-HRHX-6H34-J5HC", "OSV:GHSA-HWJ3-M3P6-HJ38", "OSV:GHSA-J7QV-PGF6-HVH4", "OSV:GHSA-J8WC-GXX9-82HX", "OSV:GHSA-J9H8-PHRW-H4FH", "OSV:GHSA-JC36-42CF-VQWJ", "OSV:GHSA-JGWR-3QM3-26F3", "OSV:GHSA-JPCQ-CGW6-V4J6", "OSV:GHSA-JVFV-HRRC-6Q72", "OSV:GHSA-JXFH-8WGV-VFR2", "OSV:GHSA-M6X4-97WX-4Q27", "OSV:GHSA-M72M-MHQ2-9P6C", "OSV:GHSA-M8GW-HJPR-RJV7", "OSV:GHSA-M929-7FR6-CVJG", "OSV:GHSA-MC84-PJ99-Q6HH", "OSV:GHSA-MW3R-PFMG-XP92", "OSV:GHSA-P8PQ-R894-FM8F", "OSV:GHSA-PV7H-HX5H-MGFJ", "OSV:GHSA-Q4M3-2J7H-F7XW", "OSV:GHSA-Q5R4-CFPX-H6FH", "OSV:GHSA-Q77Q-VX4Q-XX6Q", "OSV:GHSA-QRX8-8545-4WG2", "OSV:GHSA-QW3F-W4PF-JH5F", "OSV:GHSA-R3GR-CXRF-HG25", "OSV:GHSA-R695-7VR9-JGC2", "OSV:GHSA-RCJJ-H6GH-JF3R", "OSV:GHSA-RMR5-CPV2-VGJF", "OSV:GHSA-RPJM-422R-95MH", "OSV:GHSA-RQPH-VQWM-22VC", "OSV:GHSA-V57X-GXFJ-484Q", "OSV:GHSA-V585-23HC-C647", "OSV:GHSA-V6GP-9MMM-C6P5", "OSV:GHSA-V73W-R9XG-7CR9", "OSV:GHSA-V8J6-6C2R-R27C", "OSV:GHSA-VFQX-33QM-G869", "OSV:GHSA-VFRC-7R7C-W9MX", "OSV:GHSA-VJV5-GP2W-65VM", "OSV:GHSA-VP37-2F9P-3VR3", "OSV:GHSA-W9JG-GVGR-354M", "OSV:GHSA-W9P3-5CR8-M3JJ", "OSV:GHSA-WH8G-3J2C-RQJ5", "OSV:GHSA-WPH7-X527-W3H5", "OSV:GHSA-WQVQ-5M8C-6G24", "OSV:GHSA-WX54-3278-M5G4", "OSV:GHSA-WX5J-54MM-RQQQ", "OSV:GHSA-X3MH-JVJW-3XWX", "OSV:GHSA-X84V-XCM2-53PG", "OSV:GHSA-XMC8-26Q4-QJHX", "OSV:GHSA-XQFJ-VM6H-2X34", "OSV:GHSA-XW4P-CRPJ-VJX2", "OSV:GHSA-XXX9-3XCR-GJJ3", "OSV:GO-2021-0263", "OSV:GO-2021-0264", "OSV:GO-2021-0317", "OSV:GO-2021-0319", "OSV:GO-2022-0318", "OSV:PYSEC-2018-28", "OSV:PYSEC-2020-148", "OSV:PYSEC-2020-173", "OSV:PYSEC-2020-92", "OSV:PYSEC-2020-96", "OSV:PYSEC-2021-142", "OSV:PYSEC-2021-437", "OSV:PYSEC-2021-855", "OSV:PYSEC-2021-856", "OSV:PYSEC-2021-857", "OSV:PYSEC-2022-186", "OSV:PYSEC-2022-195", "OSV:RUSTSEC-2021-0055", "OSV:RUSTSEC-2021-0056", "OSV:RUSTSEC-2022-0014"]}, {"type": "owncloud", "idList": ["OWNCLOUD:CVE-2018-25032"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152462", "PACKETSTORM:162159", "PACKETSTORM:162160", "PACKETSTORM:165255", "PACKETSTORM:165258", "PACKETSTORM:166219", "PACKETSTORM:166562", "PACKETSTORM:167011", "PACKETSTORM:167345", "PACKETSTORM:168742", "PACKETSTORM:169825", "PACKETSTORM:169859", "PACKETSTORM:171728", "PACKETSTORM:173430"]}, {"type": "paloalto", "idList": ["PA-CVE-2020-27619", "PA-CVE-2021-41617", "PA-CVE-2021-44228", "PA-CVE-2022-0778", "PA-CVE-2022-22963"]}, {"type": "photon", "idList": ["PHSA-2019-0006", "PHSA-2019-0009", "PHSA-2019-0016", "PHSA-2019-0035", "PHSA-2019-0140", "PHSA-2019-0141", "PHSA-2019-0147", "PHSA-2019-0161", "PHSA-2019-0178", "PHSA-2019-0216", "PHSA-2019-0221", "PHSA-2019-0237", "PHSA-2019-0253", "PHSA-2019-1.0-0216", "PHSA-2019-1.0-0221", "PHSA-2019-1.0-0237", "PHSA-2019-1.0-0253", "PHSA-2019-2.0-0140", "PHSA-2019-2.0-0141", "PHSA-2019-2.0-0147", "PHSA-2019-2.0-0161", "PHSA-2019-2.0-0178", "PHSA-2019-3.0-0005", "PHSA-2019-3.0-0006", "PHSA-2019-3.0-0009", "PHSA-2019-3.0-0016", "PHSA-2019-3.0-0035", "PHSA-2020-0079", "PHSA-2020-0080", "PHSA-2020-0100", "PHSA-2020-0108", "PHSA-2020-0161", "PHSA-2020-0228", "PHSA-2020-0229", "PHSA-2020-0248", "PHSA-2020-0256", "PHSA-2020-0290", "PHSA-2020-0298", "PHSA-2020-0303", "PHSA-2020-0338", "PHSA-2020-1.0-0290", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0303", "PHSA-2020-1.0-0338", "PHSA-2020-2.0-0227", "PHSA-2020-2.0-0228", "PHSA-2020-2.0-0229", "PHSA-2020-2.0-0248", "PHSA-2020-2.0-0256", "PHSA-2020-2.0-0295", "PHSA-2020-3.0-0079", "PHSA-2020-3.0-0080", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0161", "PHSA-2021-0007", "PHSA-2021-0011", "PHSA-2021-0028", "PHSA-2021-0051", "PHSA-2021-0073", "PHSA-2021-0079", "PHSA-2021-0090", "PHSA-2021-0095", "PHSA-2021-0102", "PHSA-2021-0113", "PHSA-2021-0121", "PHSA-2021-0126", "PHSA-2021-0130", "PHSA-2021-0138", "PHSA-2021-0139", "PHSA-2021-0190", "PHSA-2021-0192", "PHSA-2021-0210", "PHSA-2021-0221", "PHSA-2021-0246", "PHSA-2021-0257", "PHSA-2021-0258", "PHSA-2021-0274", "PHSA-2021-0282", "PHSA-2021-0295", "PHSA-2021-0301", "PHSA-2021-0317", "PHSA-2021-0321", "PHSA-2021-0324", "PHSA-2021-0331", "PHSA-2021-0332", "PHSA-2021-0340", "PHSA-2021-0361", "PHSA-2021-0375", "PHSA-2021-0382", "PHSA-2021-0392", "PHSA-2021-0407", "PHSA-2021-0418", "PHSA-2021-0419", "PHSA-2021-0423", "PHSA-2021-0428", "PHSA-2021-0434", "PHSA-2021-0440", "PHSA-2021-0442", "PHSA-2021-0449", "PHSA-2021-0452", "PHSA-2021-0455", "PHSA-2021-1.0-0361", "PHSA-2021-1.0-0382", "PHSA-2021-1.0-0418", "PHSA-2021-1.0-0419", "PHSA-2021-1.0-0423", "PHSA-2021-1.0-0428", "PHSA-2021-1.0-0434", "PHSA-2021-1.0-0440", "PHSA-2021-2.0-0317", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0340", "PHSA-2021-2.0-0362", "PHSA-2021-2.0-0374", "PHSA-2021-2.0-0378", "PHSA-2021-2.0-0383", "PHSA-2021-2.0-0392", "PHSA-2021-2.0-0393", "PHSA-2021-3.0-0190", "PHSA-2021-3.0-0192", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0221", "PHSA-2021-3.0-0246", "PHSA-2021-3.0-0254", "PHSA-2021-3.0-0257", "PHSA-2021-3.0-0258", "PHSA-2021-3.0-0274", "PHSA-2021-3.0-0278", "PHSA-2021-3.0-0282", "PHSA-2021-3.0-0295", "PHSA-2021-3.0-0301", "PHSA-2021-3.0-0313", "PHSA-2021-3.0-0316", "PHSA-2021-3.0-0324", "PHSA-2021-3.0-0325", "PHSA-2021-3.0-0327", "PHSA-2021-3.0-0334", "PHSA-2021-3.0-0336", "PHSA-2021-3.0-0341", "PHSA-2021-3.0-0342", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0011", "PHSA-2021-4.0-0028", "PHSA-2021-4.0-0051", "PHSA-2021-4.0-0073", "PHSA-2021-4.0-0079", "PHSA-2021-4.0-0090", "PHSA-2021-4.0-0095", "PHSA-2021-4.0-0102", "PHSA-2021-4.0-0113", "PHSA-2021-4.0-0121", "PHSA-2021-4.0-0126", "PHSA-2021-4.0-0130", "PHSA-2021-4.0-0138", "PHSA-2021-4.0-0139", "PHSA-2022-0144", "PHSA-2022-0154", "PHSA-2022-0155", "PHSA-2022-0159", "PHSA-2022-0161", "PHSA-2022-0162", "PHSA-2022-0164", "PHSA-2022-0165", "PHSA-2022-0166", "PHSA-2022-0167", "PHSA-2022-0170", "PHSA-2022-0171", "PHSA-2022-0172", "PHSA-2022-0183", "PHSA-2022-0185", "PHSA-2022-0198", "PHSA-2022-0201", "PHSA-2022-0341", "PHSA-2022-0356", "PHSA-2022-0358", "PHSA-2022-0361", "PHSA-2022-0362", "PHSA-2022-0364", "PHSA-2022-0368", "PHSA-2022-0371", "PHSA-2022-0373", "PHSA-2022-0375", "PHSA-2022-0380", "PHSA-2022-0381", "PHSA-2022-0382", "PHSA-2022-0393", "PHSA-2022-0399", "PHSA-2022-0411", "PHSA-2022-0429", "PHSA-2022-0434", "PHSA-2022-0435", "PHSA-2022-0440", "PHSA-2022-0445", "PHSA-2022-0450", "PHSA-2022-0452", "PHSA-2022-0453", "PHSA-2022-0454", "PHSA-2022-0455", "PHSA-2022-0460", "PHSA-2022-0461", "PHSA-2022-0465", "PHSA-2022-0469", "PHSA-2022-0470", "PHSA-2022-0476", "PHSA-2022-0477", "PHSA-2022-0479", "PHSA-2022-0495", "PHSA-2022-0499", "PHSA-2022-0513", "PHSA-2022-0515", "PHSA-2022-3.0-0342", "PHSA-2022-3.0-0350", "PHSA-2022-3.0-0356", "PHSA-2022-3.0-0358", "PHSA-2022-3.0-0361", "PHSA-2022-3.0-0362", "PHSA-2022-3.0-0364", "PHSA-2022-3.0-0368", "PHSA-2022-3.0-0371", "PHSA-2022-3.0-0372", "PHSA-2022-3.0-0373", "PHSA-2022-3.0-0375", "PHSA-2022-3.0-0380", "PHSA-2022-3.0-0381", "PHSA-2022-3.0-0382", "PHSA-2022-3.0-0391", "PHSA-2022-3.0-0393", "PHSA-2022-3.0-0399", "PHSA-2022-3.0-0411", "PHSA-2022-3.0-0449", "PHSA-2022-4.0-0144", "PHSA-2022-4.0-0154", "PHSA-2022-4.0-0155", "PHSA-2022-4.0-0159", "PHSA-2022-4.0-0161", "PHSA-2022-4.0-0162", "PHSA-2022-4.0-0164", "PHSA-2022-4.0-0165", "PHSA-2022-4.0-0166", "PHSA-2022-4.0-0167", "PHSA-2022-4.0-0170", "PHSA-2022-4.0-0171", "PHSA-2022-4.0-0172", "PHSA-2022-4.0-0183", "PHSA-2022-4.0-0185", "PHSA-2022-4.0-0198", "PHSA-2022-4.0-0201", "PHSA-2023-3.0-0601", "PHSA-2023-3.0-0603", "PHSA-2023-3.0-0611", "PHSA-2023-3.0-0614", "PHSA-2023-4.0-0413", "PHSA-2023-4.0-0419", "PHSA-2023-5.0-0050", "PHSA-2023-5.0-0140"]}, {"type": "prion", "idList": ["PRION:CVE-2018-1259", "PRION:CVE-2018-1273", "PRION:CVE-2018-1274", "PRION:CVE-2018-18074", "PRION:CVE-2018-25032", "PRION:CVE-2018-8032", "PRION:CVE-2019-0219", "PRION:CVE-2019-0220", "PRION:CVE-2019-0227", "PRION:CVE-2019-10082", "PRION:CVE-2019-10086", "PRION:CVE-2019-10160", "PRION:CVE-2019-17495", "PRION:CVE-2019-17571", "PRION:CVE-2019-18348", "PRION:CVE-2019-20916", "PRION:CVE-2019-9636", "PRION:CVE-2019-9740", "PRION:CVE-2019-9947", "PRION:CVE-2020-0404", "PRION:CVE-2020-10683", "PRION:CVE-2020-11022", "PRION:CVE-2020-11023", "PRION:CVE-2020-11987", "PRION:CVE-2020-13974", "PRION:CVE-2020-14343", "PRION:CVE-2020-1747", "PRION:CVE-2020-17521", "PRION:CVE-2020-1927", "PRION:CVE-2020-25649", "PRION:CVE-2020-26137", "PRION:CVE-2020-26184", "PRION:CVE-2020-26185", "PRION:CVE-2020-26237", "PRION:CVE-2020-27619", "PRION:CVE-2020-27820", "PRION:CVE-2020-28052", "PRION:CVE-2020-28491", "PRION:CVE-2020-28500", "PRION:CVE-2020-29396", "PRION:CVE-2020-29505", "PRION:CVE-2020-29506", "PRION:CVE-2020-29507", "PRION:CVE-2020-29508", "PRION:CVE-2020-29651", "PRION:CVE-2020-35163", "PRION:CVE-2020-35164", "PRION:CVE-2020-35166", "PRION:CVE-2020-35167", "PRION:CVE-2020-35168", "PRION:CVE-2020-35169", "PRION:CVE-2020-35490", "PRION:CVE-2020-35491", "PRION:CVE-2020-35728", "PRION:CVE-2020-36179", "PRION:CVE-2020-36180", "PRION:CVE-2020-36181", "PRION:CVE-2020-36182", "PRION:CVE-2020-36183", "PRION:CVE-2020-36184", "PRION:CVE-2020-36185", "PRION:CVE-2020-36186", "PRION:CVE-2020-36187", "PRION:CVE-2020-36188", "PRION:CVE-2020-36189", "PRION:CVE-2020-36518", "PRION:CVE-2020-4788", "PRION:CVE-2020-5258", "PRION:CVE-2020-5397", "PRION:CVE-2020-5398", "PRION:CVE-2020-7656", "PRION:CVE-2020-7712", "PRION:CVE-2020-9484", "PRION:CVE-2020-9492", "PRION:CVE-2021-20322", "PRION:CVE-2021-21781", "PRION:CVE-2021-22118", "PRION:CVE-2021-22119", "PRION:CVE-2021-22931", "PRION:CVE-2021-22939", "PRION:CVE-2021-22940", "PRION:CVE-2021-22946", "PRION:CVE-2021-22947", "PRION:CVE-2021-23337", "PRION:CVE-2021-23450", "PRION:CVE-2021-2351", "PRION:CVE-2021-23926", "PRION:CVE-2021-25329", "PRION:CVE-2021-26291", "PRION:CVE-2021-29154", "PRION:CVE-2021-29425", "PRION:CVE-2021-29505", "PRION:CVE-2021-29921", "PRION:CVE-2021-30129", "PRION:CVE-2021-31684", "PRION:CVE-2021-3177", "PRION:CVE-2021-31805", "PRION:CVE-2021-31811", "PRION:CVE-2021-31812", "PRION:CVE-2021-33560", "PRION:CVE-2021-33813", "PRION:CVE-2021-34141", "PRION:CVE-2021-34429", "PRION:CVE-2021-3449", "PRION:CVE-2021-3450", "PRION:CVE-2021-35043", "PRION:CVE-2021-35515", "PRION:CVE-2021-35516", "PRION:CVE-2021-35517", "PRION:CVE-2021-3572", "PRION:CVE-2021-35940", "PRION:CVE-2021-36090", "PRION:CVE-2021-3612", "PRION:CVE-2021-36373", "PRION:CVE-2021-36374", "PRION:CVE-2021-3672", "PRION:CVE-2021-37136", "PRION:CVE-2021-37137", "PRION:CVE-2021-37159", "PRION:CVE-2021-3737", "PRION:CVE-2021-3743", "PRION:CVE-2021-3744", "PRION:CVE-2021-3749", "PRION:CVE-2021-3752", "PRION:CVE-2021-37714", "PRION:CVE-2021-3772", "PRION:CVE-2021-3773", "PRION:CVE-2021-37750", "PRION:CVE-2021-38153", "PRION:CVE-2021-38296", "PRION:CVE-2021-38604", "PRION:CVE-2021-39139", "PRION:CVE-2021-39140", "PRION:CVE-2021-39141", "PRION:CVE-2021-39144", "PRION:CVE-2021-39145", "PRION:CVE-2021-39146", "PRION:CVE-2021-39147", "PRION:CVE-2021-39148", "PRION:CVE-2021-39149", "PRION:CVE-2021-39150", "PRION:CVE-2021-39151", "PRION:CVE-2021-39152", "PRION:CVE-2021-39153", "PRION:CVE-2021-39154", "PRION:CVE-2021-4002", "PRION:CVE-2021-40690", "PRION:CVE-2021-4083", "PRION:CVE-2021-4104", "PRION:CVE-2021-4115", "PRION:CVE-2021-41182", "PRION:CVE-2021-41183", "PRION:CVE-2021-41184", "PRION:CVE-2021-41303", "PRION:CVE-2021-41495", "PRION:CVE-2021-41496", "PRION:CVE-2021-4157", "PRION:CVE-2021-4160", "PRION:CVE-2021-41617", "PRION:CVE-2021-41771", "PRION:CVE-2021-41772", "PRION:CVE-2021-4197", "PRION:CVE-2021-4203", "PRION:CVE-2021-42340", "PRION:CVE-2021-42575", "PRION:CVE-2021-42739", "PRION:CVE-2021-43389", "PRION:CVE-2021-43396", "PRION:CVE-2021-43797", "PRION:CVE-2021-43818", "PRION:CVE-2021-43859", "PRION:CVE-2021-43976", "PRION:CVE-2021-44531", "PRION:CVE-2021-44532", "PRION:CVE-2021-44533", "PRION:CVE-2021-44832", "PRION:CVE-2021-45485", "PRION:CVE-2021-45486", "PRION:CVE-2021-45943", "PRION:CVE-2022-0001", "PRION:CVE-2022-0002", "PRION:CVE-2022-0286", "PRION:CVE-2022-0322", "PRION:CVE-2022-0538", "PRION:CVE-2022-0778", "PRION:CVE-2022-0839", "PRION:CVE-2022-1011", "PRION:CVE-2022-1154", "PRION:CVE-2022-1271", "PRION:CVE-2022-1292", "PRION:CVE-2022-2068", "PRION:CVE-2022-21428", "PRION:CVE-2022-21429", "PRION:CVE-2022-21432", "PRION:CVE-2022-21439", "PRION:CVE-2022-21455", "PRION:CVE-2022-21500", "PRION:CVE-2022-21508", "PRION:CVE-2022-21509", "PRION:CVE-2022-21510", "PRION:CVE-2022-21511", "PRION:CVE-2022-21512", "PRION:CVE-2022-21513", "PRION:CVE-2022-21514", "PRION:CVE-2022-21515", "PRION:CVE-2022-21516", "PRION:CVE-2022-21517", "PRION:CVE-2022-21518", "PRION:CVE-2022-21519", "PRION:CVE-2022-21520", "PRION:CVE-2022-21521", "PRION:CVE-2022-21522", "PRION:CVE-2022-21523", "PRION:CVE-2022-21524", "PRION:CVE-2022-21525", "PRION:CVE-2022-21526", "PRION:CVE-2022-21527", "PRION:CVE-2022-21528", "PRION:CVE-2022-21529", "PRION:CVE-2022-21530", "PRION:CVE-2022-21531", "PRION:CVE-2022-21532", "PRION:CVE-2022-21533", "PRION:CVE-2022-21534", "PRION:CVE-2022-21535", "PRION:CVE-2022-21536", "PRION:CVE-2022-21537", "PRION:CVE-2022-21538", "PRION:CVE-2022-21539", "PRION:CVE-2022-21540", "PRION:CVE-2022-21541", "PRION:CVE-2022-21542", "PRION:CVE-2022-21543", "PRION:CVE-2022-21544", "PRION:CVE-2022-21545", "PRION:CVE-2022-21547", "PRION:CVE-2022-21548", "PRION:CVE-2022-21549", "PRION:CVE-2022-21550", "PRION:CVE-2022-21551", "PRION:CVE-2022-21552", "PRION:CVE-2022-21553", "PRION:CVE-2022-21554", "PRION:CVE-2022-21555", "PRION:CVE-2022-21556", "PRION:CVE-2022-21557", "PRION:CVE-2022-21558", "PRION:CVE-2022-21559", "PRION:CVE-2022-21560", "PRION:CVE-2022-21561", "PRION:CVE-2022-21562", "PRION:CVE-2022-21563", "PRION:CVE-2022-21564", "PRION:CVE-2022-21565", "PRION:CVE-2022-21566", "PRION:CVE-2022-21567", "PRION:CVE-2022-21568", "PRION:CVE-2022-21569", "PRION:CVE-2022-21570", "PRION:CVE-2022-21571", "PRION:CVE-2022-21572", "PRION:CVE-2022-21573", "PRION:CVE-2022-21574", "PRION:CVE-2022-21575", "PRION:CVE-2022-21576", "PRION:CVE-2022-21577", "PRION:CVE-2022-21578", "PRION:CVE-2022-21579", "PRION:CVE-2022-21580", "PRION:CVE-2022-21581", "PRION:CVE-2022-21582", "PRION:CVE-2022-21583", "PRION:CVE-2022-21584", "PRION:CVE-2022-21585", "PRION:CVE-2022-21586", "PRION:CVE-2022-21824", "PRION:CVE-2022-22720", "PRION:CVE-2022-22721", "PRION:CVE-2022-22946", "PRION:CVE-2022-22947", "PRION:CVE-2022-22963", "PRION:CVE-2022-22965", "PRION:CVE-2022-22968", "PRION:CVE-2022-22969", "PRION:CVE-2022-22970", "PRION:CVE-2022-22971", "PRION:CVE-2022-22976", "PRION:CVE-2022-22978", "PRION:CVE-2022-23181", "PRION:CVE-2022-23218", "PRION:CVE-2022-23219", "PRION:CVE-2022-23302", "PRION:CVE-2022-23305", "PRION:CVE-2022-23307", "PRION:CVE-2022-23308", "PRION:CVE-2022-23437", "PRION:CVE-2022-23457", "PRION:CVE-2022-23632", "PRION:CVE-2022-23772", "PRION:CVE-2022-23773", "PRION:CVE-2022-23806", "PRION:CVE-2022-24329", "PRION:CVE-2022-24407", "PRION:CVE-2022-24728", "PRION:CVE-2022-24729", "PRION:CVE-2022-24735", "PRION:CVE-2022-24736", "PRION:CVE-2022-24801", "PRION:CVE-2022-24823", "PRION:CVE-2022-24839", "PRION:CVE-2022-24891", "PRION:CVE-2022-25169", "PRION:CVE-2022-25636", "PRION:CVE-2022-25647", "PRION:CVE-2022-25762", "PRION:CVE-2022-25845", "PRION:CVE-2022-27778", "PRION:CVE-2022-28366", "PRION:CVE-2022-29577", "PRION:CVE-2022-29824", "PRION:CVE-2022-29885", "PRION:CVE-2022-30126", "PRION:CVE-2022-30973", "PRION:CVE-2022-33879", "PRION:CVE-2022-34169", "PRION:CVE-2022-43712"]}, {"type": "qt", "idList": ["QT:4450E23D85850EEC88DDB90DB16B99C2"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0EAB7251347951045CAC549194E33673", "QUALYSBLOG:3F273F13C86516B494271DB7BE04A954", "QUALYSBLOG:3FADA4B80DBBF178154C0729CFC1358F", "QUALYSBLOG:42335884011D582222F08AEF81D70B94", "QUALYSBLOG:5059D1C3913FB6542F3283A66F9B3A43", "QUALYSBLOG:5FAC1C82A388DBB84ECD7CD43450B624", "QUALYSBLOG:6DE7FC733B2FD13EE70756266FF191D0", "QUALYSBLOG:A0F20902D80081B44813D92C6DCCDAAF", "QUALYSBLOG:D140886B3C4505719904327B06F12032", "QUALYSBLOG:D1FC7658A8AB3554F3796CEE14DA3320"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:0576BE6110654A3F9BF7B9DE1118A10A", "RAPID7BLOG:06452152BAEAFEF87319B9037298CFC6", "RAPID7BLOG:07CA09B4E3B3835E096AA56546C43E8E", "RAPID7BLOG:07EA4EC150B77E4EB3557E1B1BA39725", "RAPID7BLOG:18D49792276E208F17E7D64BCE2FDEF6", "RAPID7BLOG:1C4EBCEAFC7E54954F827CAEDB3291DA", "RAPID7BLOG:20364300767E58631FFE0D21622E63A3", "RAPID7BLOG:3CB617802DB281BCA8BA6057AE3A98E0", "RAPID7BLOG:46F0D57262DABE81708D657F2733AA5D", "RAPID7BLOG:66B9F80A5ED88EFA9D054CBCE8AA19A5", "RAPID7BLOG:73EAE8A2825E9B6764F314122B4E5F25", "RAPID7BLOG:80C2CFBF70B3668FC60A8C97D27CA478", "RAPID7BLOG:9CB105938BDE92F573A2DE68BC20CF46", "RAPID7BLOG:AB5C0BC130F45073226CC41D25680EA0", "RAPID7BLOG:CB5AE4C9C1DC52B0AA46E0F184E87A6D", "RAPID7BLOG:D185BF677E20E357AFE422CFB80809A5", "RAPID7BLOG:F14526C6852230A4E4CF44ADE151DF49", "RAPID7BLOG:F35E0080B6D8ADFC130595780153F61A", "RAPID7BLOG:F708A09CA1EFFC0565CA94D5DBC414D5"]}, {"type": "redhat", "idList": ["RHSA-2017:1801", "RHSA-2017:1802", "RHSA-2017:2423", "RHSA-2017:2633", "RHSA-2017:2638", "RHSA-2017:2810", "RHSA-2017:2811", "RHSA-2017:2888", "RHSA-2017:2889", "RHSA-2017:3244", "RHSA-2017:3399", "RHSA-2017:3400", "RHSA-2018:1809", "RHSA-2018:3768", "RHSA-2019:0710", "RHSA-2019:0765", "RHSA-2019:0806", "RHSA-2019:0902", "RHSA-2019:0981", "RHSA-2019:0997", "RHSA-2019:1260", "RHSA-2019:1467", "RHSA-2019:1545", "RHSA-2019:1587", "RHSA-2019:1700", "RHSA-2019:2030", "RHSA-2019:2035", "RHSA-2019:2343", "RHSA-2019:2437", "RHSA-2019:2980", "RHSA-2019:3170", "RHSA-2019:3335", "RHSA-2019:3436", "RHSA-2019:3520", "RHSA-2019:3725", "RHSA-2019:4126", "RHSA-2019:4317", "RHSA-2020:0057", "RHSA-2020:0192", "RHSA-2020:0194", "RHSA-2020:0250", "RHSA-2020:0251", "RHSA-2020:0804", "RHSA-2020:0805", "RHSA-2020:0806", "RHSA-2020:0811", "RHSA-2020:0850", "RHSA-2020:0851", "RHSA-2020:0899", "RHSA-2020:0951", "RHSA-2020:1268", "RHSA-2020:1308", "RHSA-2020:1336", "RHSA-2020:1337", "RHSA-2020:1346", "RHSA-2020:1454", "RHSA-2020:1462", "RHSA-2020:1605", "RHSA-2020:1916", "RHSA-2020:2067", "RHSA-2020:2068", "RHSA-2020:2081", "RHSA-2020:2217", "RHSA-2020:2263", "RHSA-2020:2321", "RHSA-2020:2333", "RHSA-2020:2362", "RHSA-2020:2412", "RHSA-2020:2483", "RHSA-2020:2487", "RHSA-2020:2506", "RHSA-2020:2509", "RHSA-2020:2529", "RHSA-2020:2530", "RHSA-2020:2619", "RHSA-2020:2740", "RHSA-2020:2813", "RHSA-2020:3017", "RHSA-2020:3192", "RHSA-2020:3194", "RHSA-2020:3197", "RHSA-2020:3247", "RHSA-2020:3369", "RHSA-2020:3461", "RHSA-2020:3462", "RHSA-2020:3463", "RHSA-2020:3464", "RHSA-2020:3501", "RHSA-2020:3585", "RHSA-2020:3587", "RHSA-2020:3637", "RHSA-2020:3638", "RHSA-2020:3639", "RHSA-2020:3642", "RHSA-2020:3807", "RHSA-2020:3936", "RHSA-2020:3958", "RHSA-2020:4211", "RHSA-2020:4273", "RHSA-2020:4285", "RHSA-2020:4298", "RHSA-2020:4299", "RHSA-2020:4312", "RHSA-2020:4379", "RHSA-2020:4401", "RHSA-2020:4402", "RHSA-2020:4432", "RHSA-2020:4641", "RHSA-2020:4654", "RHSA-2020:4670", "RHSA-2020:4751", "RHSA-2020:4847", "RHSA-2020:4960", "RHSA-2020:4961", "RHSA-2020:5149", "RHSA-2020:5249", "RHSA-2020:5340", "RHSA-2020:5341", "RHSA-2020:5342", "RHSA-2020:5344", "RHSA-2020:5361", "RHSA-2020:5364", "RHSA-2020:5410", "RHSA-2020:5412", "RHSA-2020:5533", "RHSA-2020:5568", "RHSA-2020:5605", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2021:0034", "RHSA-2021:0050", "RHSA-2021:0079", "RHSA-2021:0190", "RHSA-2021:0381", "RHSA-2021:0436", "RHSA-2021:0778", "RHSA-2021:0799", "RHSA-2021:0811", "RHSA-2021:0860", "RHSA-2021:0872", "RHSA-2021:0873", "RHSA-2021:0874", "RHSA-2021:0885", "RHSA-2021:0974", "RHSA-2021:1024", "RHSA-2021:1063", "RHSA-2021:1131", "RHSA-2021:1168", "RHSA-2021:1189", "RHSA-2021:1195", "RHSA-2021:1196", "RHSA-2021:1199", "RHSA-2021:1200", "RHSA-2021:1202", "RHSA-2021:1203", "RHSA-2021:1230", "RHSA-2021:1260", "RHSA-2021:1338", "RHSA-2021:1369", "RHSA-2021:1401", "RHSA-2021:1429", "RHSA-2021:1448", "RHSA-2021:1515", "RHSA-2021:1631", "RHSA-2021:1633", "RHSA-2021:1761", "RHSA-2021:1846", "RHSA-2021:1879", "RHSA-2021:2021", "RHSA-2021:2039", "RHSA-2021:2041", "RHSA-2021:2121", "RHSA-2021:2130", "RHSA-2021:2136", "RHSA-2021:2179", "RHSA-2021:2210", "RHSA-2021:2438", "RHSA-2021:2461", "RHSA-2021:2465", "RHSA-2021:2475", "RHSA-2021:2476", "RHSA-2021:2479", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:2561", "RHSA-2021:2562", "RHSA-2021:2583", "RHSA-2021:2683", "RHSA-2021:2755", "RHSA-2021:2920", "RHSA-2021:3016", "RHSA-2021:3119", "RHSA-2021:3125", "RHSA-2021:3140", "RHSA-2021:3205", "RHSA-2021:3207", "RHSA-2021:3225", "RHSA-2021:3252", "RHSA-2021:3254", "RHSA-2021:3280", "RHSA-2021:3281", "RHSA-2021:3327", "RHSA-2021:3328", "RHSA-2021:3425", "RHSA-2021:3454", "RHSA-2021:3459", "RHSA-2021:3466", "RHSA-2021:3467", "RHSA-2021:3468", "RHSA-2021:3471", "RHSA-2021:3516", "RHSA-2021:3527", "RHSA-2021:3528", "RHSA-2021:3529", "RHSA-2021:3534", "RHSA-2021:3556", "RHSA-2021:3576", "RHSA-2021:3623", "RHSA-2021:3638", "RHSA-2021:3639", "RHSA-2021:3653", "RHSA-2021:3656", "RHSA-2021:3658", "RHSA-2021:3660", "RHSA-2021:3666", "RHSA-2021:3694", "RHSA-2021:3700", "RHSA-2021:3851", "RHSA-2021:3873", "RHSA-2021:3880", "RHSA-2021:3917", "RHSA-2021:3925", "RHSA-2021:3949", "RHSA-2021:3956", "RHSA-2021:3959", "RHSA-2021:4032", "RHSA-2021:4059", "RHSA-2021:4104", "RHSA-2021:4142", "RHSA-2021:4151", "RHSA-2021:4160", "RHSA-2021:4162", "RHSA-2021:4409", "RHSA-2021:4455", "RHSA-2021:4618", "RHSA-2021:4627", "RHSA-2021:4628", "RHSA-2021:4676", "RHSA-2021:4677", "RHSA-2021:4679", "RHSA-2021:4702", "RHSA-2021:4725", "RHSA-2021:4766", "RHSA-2021:4767", "RHSA-2021:4782", "RHSA-2021:4788", "RHSA-2021:4845", "RHSA-2021:4848", "RHSA-2021:4851", "RHSA-2021:4861", "RHSA-2021:4863", "RHSA-2021:4902", "RHSA-2021:4914", "RHSA-2021:4918", "RHSA-2021:5038", "RHSA-2021:5107", "RHSA-2021:5127", "RHSA-2021:5128", "RHSA-2021:5129", "RHSA-2021:5134", "RHSA-2021:5137", "RHSA-2021:5141", "RHSA-2021:5148", "RHSA-2021:5149", "RHSA-2021:5150", "RHSA-2021:5151", "RHSA-2021:5154", "RHSA-2021:5170", "RHSA-2021:5176", "RHSA-2021:5183", "RHSA-2021:5184", "RHSA-2021:5186", "RHSA-2021:5191", "RHSA-2021:5206", "RHSA-2021:5269", "RHSA-2022:0055", "RHSA-2022:0056", "RHSA-2022:0063", "RHSA-2022:0065", "RHSA-2022:0083", "RHSA-2022:0138", "RHSA-2022:0146", "RHSA-2022:0151", "RHSA-2022:0152", "RHSA-2022:0155", "RHSA-2022:0164", "RHSA-2022:0181", "RHSA-2022:0202", "RHSA-2022:0203", "RHSA-2022:0205", "RHSA-2022:0216", "RHSA-2022:0219", "RHSA-2022:0222", "RHSA-2022:0223", "RHSA-2022:0225", "RHSA-2022:0226", "RHSA-2022:0227", "RHSA-2022:0230", "RHSA-2022:0236", "RHSA-2022:0289", "RHSA-2022:0290", "RHSA-2022:0291", "RHSA-2022:0294", "RHSA-2022:0296", "RHSA-2022:0297", "RHSA-2022:0318", "RHSA-2022:0430", "RHSA-2022:0434", "RHSA-2022:0435", "RHSA-2022:0436", "RHSA-2022:0437", "RHSA-2022:0438", "RHSA-2022:0439", "RHSA-2022:0442", "RHSA-2022:0444", "RHSA-2022:0445", "RHSA-2022:0446", "RHSA-2022:0447", "RHSA-2022:0448", "RHSA-2022:0449", "RHSA-2022:0450", "RHSA-2022:0467", "RHSA-2022:0469", "RHSA-2022:0475", "RHSA-2022:0485", "RHSA-2022:0493", "RHSA-2022:0497", "RHSA-2022:0501", "RHSA-2022:0507", "RHSA-2022:0520", "RHSA-2022:0524", "RHSA-2022:0527", "RHSA-2022:0553", "RHSA-2022:0577", "RHSA-2022:0580", "RHSA-2022:0589", "RHSA-2022:0595", "RHSA-2022:0620", "RHSA-2022:0622", "RHSA-2022:0635", "RHSA-2022:0658", "RHSA-2022:0661", "RHSA-2022:0666", "RHSA-2022:0668", "RHSA-2022:0721", "RHSA-2022:0727", "RHSA-2022:0728", "RHSA-2022:0730", "RHSA-2022:0731", "RHSA-2022:0735", "RHSA-2022:0737", "RHSA-2022:0780", "RHSA-2022:0820", "RHSA-2022:0821", "RHSA-2022:0823", "RHSA-2022:0841", "RHSA-2022:0842", "RHSA-2022:0851", "RHSA-2022:0856", "RHSA-2022:0896", "RHSA-2022:0899", "RHSA-2022:0925", "RHSA-2022:0947", "RHSA-2022:0958", "RHSA-2022:0987", "RHSA-2022:1000", "RHSA-2022:1013", "RHSA-2022:1029", "RHSA-2022:1039", "RHSA-2022:1041", "RHSA-2022:1042", "RHSA-2022:1045", "RHSA-2022:1049", "RHSA-2022:1051", "RHSA-2022:1065", "RHSA-2022:1066", "RHSA-2022:1071", "RHSA-2022:1072", "RHSA-2022:1073", "RHSA-2022:1075", "RHSA-2022:1076", "RHSA-2022:1077", "RHSA-2022:1078", "RHSA-2022:1080", "RHSA-2022:1081", "RHSA-2022:1082", "RHSA-2022:1083", "RHSA-2022:1091", "RHSA-2022:1102", "RHSA-2022:1103", "RHSA-2022:1104", "RHSA-2022:1107", "RHSA-2022:1108", "RHSA-2022:1110", "RHSA-2022:1112", "RHSA-2022:1136", "RHSA-2022:1137", "RHSA-2022:1138", "RHSA-2022:1139", "RHSA-2022:1173", "RHSA-2022:1179", "RHSA-2022:1185", "RHSA-2022:1198", "RHSA-2022:1199", "RHSA-2022:1263", "RHSA-2022:1276", "RHSA-2022:1291", "RHSA-2022:1292", "RHSA-2022:1296", "RHSA-2022:1297", "RHSA-2022:1299", "RHSA-2022:1306", "RHSA-2022:1324", "RHSA-2022:1333", "RHSA-2022:1345", "RHSA-2022:1354", "RHSA-2022:1356", "RHSA-2022:1357", "RHSA-2022:1360", "RHSA-2022:1363", "RHSA-2022:1370", "RHSA-2022:1373", "RHSA-2022:1378", "RHSA-2022:1379", "RHSA-2022:1389", "RHSA-2022:1390", "RHSA-2022:1396", "RHSA-2022:1413", "RHSA-2022:1418", "RHSA-2022:1420", "RHSA-2022:1455", "RHSA-2022:1476", "RHSA-2022:1519", "RHSA-2022:1520", "RHSA-2022:1535", "RHSA-2022:1537", "RHSA-2022:1546", "RHSA-2022:1550", "RHSA-2022:1552", "RHSA-2022:1555", "RHSA-2022:1591", "RHSA-2022:1592", "RHSA-2022:1622", "RHSA-2022:1626", "RHSA-2022:1627", "RHSA-2022:1642", "RHSA-2022:1645", "RHSA-2022:1646", "RHSA-2022:1661", "RHSA-2022:1663", "RHSA-2022:1664", "RHSA-2022:1665", "RHSA-2022:1676", "RHSA-2022:1679", "RHSA-2022:1681", "RHSA-2022:1699", "RHSA-2022:1713", "RHSA-2022:1715", "RHSA-2022:1734", "RHSA-2022:1739", "RHSA-2022:1745", "RHSA-2022:1747", "RHSA-2022:1763", "RHSA-2022:1764", "RHSA-2022:1819", "RHSA-2022:1821", "RHSA-2022:1932", "RHSA-2022:1975", "RHSA-2022:1986", "RHSA-2022:1988", "RHSA-2022:2013", "RHSA-2022:2043", "RHSA-2022:2183", "RHSA-2022:2189", "RHSA-2022:2191", "RHSA-2022:2192", "RHSA-2022:2197", "RHSA-2022:2198", "RHSA-2022:2201", "RHSA-2022:2213", "RHSA-2022:2214", "RHSA-2022:2216", "RHSA-2022:2217", "RHSA-2022:2218", "RHSA-2022:2232", "RHSA-2022:2264", "RHSA-2022:2265", "RHSA-2022:2268", "RHSA-2022:2272", "RHSA-2022:2281", "RHSA-2022:2283", "RHSA-2022:4582", "RHSA-2022:4584", "RHSA-2022:4592", "RHSA-2022:4623", "RHSA-2022:4668", "RHSA-2022:4671", "RHSA-2022:4690", "RHSA-2022:4691", "RHSA-2022:4692", "RHSA-2022:4711", "RHSA-2022:4814", "RHSA-2022:4829", "RHSA-2022:4835", "RHSA-2022:4845", "RHSA-2022:4860", "RHSA-2022:4863", "RHSA-2022:4880", "RHSA-2022:4896", "RHSA-2022:4899", "RHSA-2022:4914", "RHSA-2022:4918", "RHSA-2022:4919", "RHSA-2022:4922", "RHSA-2022:4930", "RHSA-2022:4940", "RHSA-2022:4956", "RHSA-2022:4985", "RHSA-2022:4991", "RHSA-2022:4992", "RHSA-2022:4993", "RHSA-2022:4994", "RHSA-2022:5004", "RHSA-2022:5006", "RHSA-2022:5026", "RHSA-2022:5029", "RHSA-2022:5052", "RHSA-2022:5053", "RHSA-2022:5068", "RHSA-2022:5069", "RHSA-2022:5070", "RHSA-2022:5101", "RHSA-2022:5132", "RHSA-2022:5152", "RHSA-2022:5153", "RHSA-2022:5187", "RHSA-2022:5188", "RHSA-2022:5189", "RHSA-2022:5192", "RHSA-2022:5201", "RHSA-2022:5234", "RHSA-2022:5235", "RHSA-2022:5242", "RHSA-2022:5250", "RHSA-2022:5317", "RHSA-2022:5326", "RHSA-2022:5392", "RHSA-2022:5439", "RHSA-2022:5458", "RHSA-2022:5459", "RHSA-2022:5460", "RHSA-2022:5483", "RHSA-2022:5498", "RHSA-2022:5525", "RHSA-2022:5531", "RHSA-2022:5532", "RHSA-2022:5555", "RHSA-2022:5556", "RHSA-2022:5596", "RHSA-2022:5606", "RHSA-2022:5626", "RHSA-2022:5633", "RHSA-2022:5673", "RHSA-2022:5681", "RHSA-2022:5683", "RHSA-2022:5684", "RHSA-2022:5685", "RHSA-2022:5687", "RHSA-2022:5695", "RHSA-2022:5696", "RHSA-2022:5697", "RHSA-2022:5698", "RHSA-2022:5699", "RHSA-2022:5700", "RHSA-2022:5701", "RHSA-2022:5704", "RHSA-2022:5709", "RHSA-2022:5726", "RHSA-2022:5729", "RHSA-2022:5730", "RHSA-2022:5736", "RHSA-2022:5753", "RHSA-2022:5754", "RHSA-2022:5755", "RHSA-2022:5756", "RHSA-2022:5757", "RHSA-2022:5758", "RHSA-2022:5818", "RHSA-2022:5840", "RHSA-2022:5875", "RHSA-2022:5879", "RHSA-2022:5892", "RHSA-2022:5893", "RHSA-2022:5894", "RHSA-2022:5903", "RHSA-2022:5908", "RHSA-2022:5909", "RHSA-2022:5924", "RHSA-2022:5928", "RHSA-2022:6024", "RHSA-2022:6040", "RHSA-2022:6051", "RHSA-2022:6053", "RHSA-2022:6094", "RHSA-2022:6103", "RHSA-2022:6155", "RHSA-2022:6156", "RHSA-2022:6182", "RHSA-2022:6183", "RHSA-2022:6184", "RHSA-2022:6188", "RHSA-2022:6224", "RHSA-2022:6252", "RHSA-2022:6262", "RHSA-2022:6263", "RHSA-2022:6271", "RHSA-2022:6283", "RHSA-2022:6290", "RHSA-2022:6345", "RHSA-2022:6346", "RHSA-2022:6348", "RHSA-2022:6370", "RHSA-2022:6393", "RHSA-2022:6407", "RHSA-2022:6422", "RHSA-2022:6429", "RHSA-2022:6430", "RHSA-2022:6507", "RHSA-2022:6517", "RHSA-2022:6518", "RHSA-2022:6526", "RHSA-2022:6590", "RHSA-2022:6681", "RHSA-2022:6696", "RHSA-2022:6714", "RHSA-2022:6753", "RHSA-2022:6782", "RHSA-2022:6783", "RHSA-2022:6787", "RHSA-2022:6813", "RHSA-2022:6819", "RHSA-2022:6835", "RHSA-2022:6890", "RHSA-2022:6916", "RHSA-2022:6983", "RHSA-2022:6991", "RHSA-2022:7044", "RHSA-2022:7055", "RHSA-2022:7058", "RHSA-2022:7119", "RHSA-2022:7144", "RHSA-2022:7211", "RHSA-2022:7216", "RHSA-2022:7257", "RHSA-2022:7272", "RHSA-2022:7273", "RHSA-2022:7343", "RHSA-2022:7409", "RHSA-2022:7410", "RHSA-2022:7411", "RHSA-2022:7417", "RHSA-2022:7435", "RHSA-2022:7541", "RHSA-2022:7647", "RHSA-2022:7813", "RHSA-2022:7830", "RHSA-2022:7874", "RHSA-2022:8067", "RHSA-2022:8096", "RHSA-2022:8420", "RHSA-2022:8506", "RHSA-2022:8524", "RHSA-2022:8609", "RHSA-2022:8652", "RHSA-2022:8750", "RHSA-2022:8781", "RHSA-2022:8840", "RHSA-2022:8841", "RHSA-2022:8852", "RHSA-2022:8861", "RHSA-2022:8889", "RHSA-2022:8913", "RHSA-2022:8917", "RHSA-2022:9073", "RHSA-2022:9111", "RHSA-2023:0264", "RHSA-2023:0272", "RHSA-2023:0408", "RHSA-2023:0552", "RHSA-2023:0553", "RHSA-2023:0554", "RHSA-2023:0556", "RHSA-2023:0769", "RHSA-2023:0786", "RHSA-2023:0943", "RHSA-2023:0975", "RHSA-2023:0976", "RHSA-2023:1043", "RHSA-2023:1044", "RHSA-2023:1045", "RHSA-2023:1047", "RHSA-2023:1049", "RHSA-2023:1303", "RHSA-2023:1326", "RHSA-2023:1334", "RHSA-2023:1529", "RHSA-2023:1661", "RHSA-2023:1742", "RHSA-2023:2312", "RHSA-2023:3185", "RHSA-2023:3198", "RHSA-2023:3223", "RHSA-2023:3299", "RHSA-2023:3663", "RHSA-2023:3742", "RHSA-2023:3892", "RHSA-2023:3914", "RHSA-2023:4053", "RHSA-2023:4290", "RHSA-2023:4983", "RHSA-2023:5006", "RHSA-2023:5165", "RHSA-2023:5931", "RHSA-2023:5979", "RHSA-2023:5980", "RHSA-2023:5982", "RHSA-2023:6818"]}, {"type": "redhatcve", "idList": ["RH:CVE-2017-5645", "RH:CVE-2018-1259", "RH:CVE-2018-1273", "RH:CVE-2018-1274", "RH:CVE-2018-18074", "RH:CVE-2018-25032", "RH:CVE-2018-8032", "RH:CVE-2019-0220", "RH:CVE-2019-0227", "RH:CVE-2019-10082", "RH:CVE-2019-10086", "RH:CVE-2019-10160", "RH:CVE-2019-17571", "RH:CVE-2019-20916", "RH:CVE-2019-9636", "RH:CVE-2019-9740", "RH:CVE-2019-9947", "RH:CVE-2020-0404", "RH:CVE-2020-10683", "RH:CVE-2020-11022", "RH:CVE-2020-11023", "RH:CVE-2020-11078", "RH:CVE-2020-11987", "RH:CVE-2020-13974", "RH:CVE-2020-14343", "RH:CVE-2020-1747", "RH:CVE-2020-17521", "RH:CVE-2020-1927", "RH:CVE-2020-25649", "RH:CVE-2020-26137", "RH:CVE-2020-26237", "RH:CVE-2020-27619", "RH:CVE-2020-27820", "RH:CVE-2020-28052", "RH:CVE-2020-28491", "RH:CVE-2020-28500", "RH:CVE-2020-29651", "RH:CVE-2020-35490", "RH:CVE-2020-35491", "RH:CVE-2020-35728", "RH:CVE-2020-36179", "RH:CVE-2020-36180", "RH:CVE-2020-36181", "RH:CVE-2020-36182", "RH:CVE-2020-36183", "RH:CVE-2020-36184", "RH:CVE-2020-36185", "RH:CVE-2020-36186", "RH:CVE-2020-36187", "RH:CVE-2020-36188", "RH:CVE-2020-36189", "RH:CVE-2020-36518", "RH:CVE-2020-4788", "RH:CVE-2020-5258", "RH:CVE-2020-5397", "RH:CVE-2020-5398", "RH:CVE-2020-7656", "RH:CVE-2020-9484", "RH:CVE-2020-9492", "RH:CVE-2021-0920", "RH:CVE-2021-20322", "RH:CVE-2021-21781", "RH:CVE-2021-22118", "RH:CVE-2021-22119", "RH:CVE-2021-22931", "RH:CVE-2021-22939", "RH:CVE-2021-22940", "RH:CVE-2021-22946", "RH:CVE-2021-22947", "RH:CVE-2021-23337", "RH:CVE-2021-23450", "RH:CVE-2021-23926", "RH:CVE-2021-25329", "RH:CVE-2021-26291", "RH:CVE-2021-29154", "RH:CVE-2021-29425", "RH:CVE-2021-29505", "RH:CVE-2021-29921", "RH:CVE-2021-30129", "RH:CVE-2021-30641", "RH:CVE-2021-31684", "RH:CVE-2021-3177", "RH:CVE-2021-31805", "RH:CVE-2021-31811", "RH:CVE-2021-31812", "RH:CVE-2021-33560", "RH:CVE-2021-33813", "RH:CVE-2021-34141", "RH:CVE-2021-34429", "RH:CVE-2021-3449", "RH:CVE-2021-3450", "RH:CVE-2021-35043", "RH:CVE-2021-35515", "RH:CVE-2021-35516", "RH:CVE-2021-35517", "RH:CVE-2021-3572", "RH:CVE-2021-35940", "RH:CVE-2021-36090", "RH:CVE-2021-3612", "RH:CVE-2021-36373", "RH:CVE-2021-36374", "RH:CVE-2021-3672", "RH:CVE-2021-37136", "RH:CVE-2021-37137", "RH:CVE-2021-37159", "RH:CVE-2021-3737", "RH:CVE-2021-3743", "RH:CVE-2021-3744", "RH:CVE-2021-3749", "RH:CVE-2021-3752", "RH:CVE-2021-37714", "RH:CVE-2021-3772", "RH:CVE-2021-3773", "RH:CVE-2021-37750", "RH:CVE-2021-38153", "RH:CVE-2021-38604", "RH:CVE-2021-3894", "RH:CVE-2021-39139", "RH:CVE-2021-39140", "RH:CVE-2021-39141", "RH:CVE-2021-39144", "RH:CVE-2021-39145", "RH:CVE-2021-39146", "RH:CVE-2021-39147", "RH:CVE-2021-39148", "RH:CVE-2021-39149", "RH:CVE-2021-39150", "RH:CVE-2021-39151", "RH:CVE-2021-39152", "RH:CVE-2021-39153", "RH:CVE-2021-39154", "RH:CVE-2021-4002", "RH:CVE-2021-40528", "RH:CVE-2021-40690", "RH:CVE-2021-4083", "RH:CVE-2021-4104", "RH:CVE-2021-4115", "RH:CVE-2021-41182", "RH:CVE-2021-41183", "RH:CVE-2021-41184", "RH:CVE-2021-41303", "RH:CVE-2021-41495", "RH:CVE-2021-41496", "RH:CVE-2021-4157", "RH:CVE-2021-4160", "RH:CVE-2021-41617", "RH:CVE-2021-41771", "RH:CVE-2021-41772", "RH:CVE-2021-4197", "RH:CVE-2021-4203", "RH:CVE-2021-42340", "RH:CVE-2021-42575", "RH:CVE-2021-42739", "RH:CVE-2021-43389", "RH:CVE-2021-43396", "RH:CVE-2021-43797", "RH:CVE-2021-43818", "RH:CVE-2021-43859", "RH:CVE-2021-43976", "RH:CVE-2021-44228", "RH:CVE-2021-44531", "RH:CVE-2021-44532", "RH:CVE-2021-44533", "RH:CVE-2021-44832", "RH:CVE-2021-45485", "RH:CVE-2021-45486", "RH:CVE-2022-0001", "RH:CVE-2022-0002", "RH:CVE-2022-0286", "RH:CVE-2022-0322", "RH:CVE-2022-0538", "RH:CVE-2022-0778", "RH:CVE-2022-0839", "RH:CVE-2022-1011", "RH:CVE-2022-1154", "RH:CVE-2022-1271", "RH:CVE-2022-1292", "RH:CVE-2022-2068", "RH:CVE-2022-21455", "RH:CVE-2022-21509", "RH:CVE-2022-21515", "RH:CVE-2022-21517", "RH:CVE-2022-21522", "RH:CVE-2022-21525", "RH:CVE-2022-21526", "RH:CVE-2022-21527", "RH:CVE-2022-21528", "RH:CVE-2022-21529", "RH:CVE-2022-21530", "RH:CVE-2022-21531", "RH:CVE-2022-21534", "RH:CVE-2022-21537", "RH:CVE-2022-21538", "RH:CVE-2022-21539", "RH:CVE-2022-21540", "RH:CVE-2022-21541", "RH:CVE-2022-21547", "RH:CVE-2022-21549", "RH:CVE-2022-21553", "RH:CVE-2022-21556", "RH:CVE-2022-21569", "RH:CVE-2022-21824", "RH:CVE-2022-22720", "RH:CVE-2022-22721", "RH:CVE-2022-22963", "RH:CVE-2022-22965", "RH:CVE-2022-22968", "RH:CVE-2022-22970", "RH:CVE-2022-22971", "RH:CVE-2022-22976", "RH:CVE-2022-22978", "RH:CVE-2022-23181", "RH:CVE-2022-23218", "RH:CVE-2022-23219", "RH:CVE-2022-23302", "RH:CVE-2022-23305", "RH:CVE-2022-23307", "RH:CVE-2022-23308", "RH:CVE-2022-23437", "RH:CVE-2022-23632", "RH:CVE-2022-23772", "RH:CVE-2022-23773", "RH:CVE-2022-23806", "RH:CVE-2022-24329", "RH:CVE-2022-24407", "RH:CVE-2022-24735", "RH:CVE-2022-24736", "RH:CVE-2022-24801", "RH:CVE-2022-24823", "RH:CVE-2022-24839", "RH:CVE-2022-25636", "RH:CVE-2022-25647", "RH:CVE-2022-25762", "RH:CVE-2022-25845", "RH:CVE-2022-27778", "RH:CVE-2022-29824", "RH:CVE-2022-29885", "RH:CVE-2022-30126", "RH:CVE-2022-30973", "RH:CVE-2022-34169"]}, {"type": "redos", "idList": ["ROS-20220125-04", "ROS-20220125-10", "ROS-20220125-14", "ROS-20220309-01", "ROS-20220315-01", "ROS-20220317-01", "ROS-20220318-02", "ROS-20220318-03", "ROS-20220323-02", "ROS-20220329-01", "ROS-20220407-02", "ROS-20220413-01", "ROS-20220516-02", "ROS-20220516-08", "ROS-20220524-01", "ROS-20220524-03", "ROS-20220919-01", "ROS-20221103-06", "ROS-20230619-05"]}, {"type": "rhino", "idList": ["RHINO:ADD7C478031F3DD8CC7E20F3B676DB4B"]}, {"type": "rocky", "idList": ["RLBA-2019:3693", "RLEA-2022:5139", "RLSA-2019:0981", "RLSA-2019:3335", "RLSA-2020:1605", "RLSA-2020:4641", "RLSA-2020:4654", "RLSA-2020:4670", "RLSA-2020:4751", "RLSA-2020:4847", "RLSA-2021:1024", "RLSA-2021:1631", "RLSA-2021:1761", "RLSA-2021:1846", "RLSA-2021:1879", "RLSA-2021:2583", "RLSA-2021:3576", "RLSA-2021:3623", "RLSA-2021:3666", "RLSA-2021:4059", "RLSA-2021:4142", "RLSA-2021:4151", "RLSA-2021:4160", "RLSA-2021:4162", "RLSA-2021:4409", "RLSA-2022:0290", "RLSA-2022:0658", "RLSA-2022:0896", "RLSA-2022:0899", "RLSA-2022:1049", "RLSA-2022:1065", "RLSA-2022:1537", "RLSA-2022:1546", "RLSA-2022:1550", "RLSA-2022:1552", "RLSA-2022:1555", "RLSA-2022:1642", "RLSA-2022:1763", "RLSA-2022:1764", "RLSA-2022:1819", "RLSA-2022:1821", "RLSA-2022:1932", "RLSA-2022:1975", "RLSA-2022:1988", "RLSA-2022:2013", "RLSA-2022:2043", "RLSA-2022:2201", "RLSA-2022:4582", "RLSA-2022:4899", "RLSA-2022:4940", "RLSA-2022:4991", "RLSA-2022:5250", "RLSA-2022:5317", "RLSA-2022:5326", "RLSA-2022:5498", "RLSA-2022:5683", "RLSA-2022:5696", "RLSA-2022:5726", "RLSA-2022:5818", "RLSA-2022:6590", "RLSA-2022:7119", "RLSA-2022:7541", "RLSA-2022:7647", "RLSA-2022:7830", "RLSA-2022:8067", "RLSA-2022:8096", "RLSA-2022:8506", "RLSA-2022:9073", "RLSA-2023:6818"]}, {"type": "rosalinux", "idList": ["ROSA-SA-2021-1909", "ROSA-SA-2021-1957", "ROSA-SA-2021-1988", "ROSA-SA-2023-2138", "ROSA-SA-2023-2156", "ROSA-SA-2023-2158", "ROSA-SA-2023-2160", "ROSA-SA-2023-2203", "ROSA-SA-2023-2211", "ROSA-SA-2023-2215", "ROSA-SA-2023-2230", "ROSA-SA-2023-2246", "ROSA-SA-2023-2250", "ROSA-SA-2023-2252", "ROSA-SA-2023-2258", "ROSA-SA-2023-2271"]}, {"type": "rubygems", "idList": ["RUBY:NOKOGIRI-2018-25032", "RUBY:NOKOGIRI-2021-30560", "RUBY:NOKOGIRI-2022-23437", "RUBY:NOKOGIRI-2022-24839"]}, {"type": "rustsec", "idList": ["RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2022-0014"]}, {"type": "saint", "idList": ["SAINT:ACED9607933F401D5B0A59CB25D22B09", "SAINT:EA21934BE7986CEF27E73EAA38D7EB58"]}, {"type": "securelist", "idList": ["SECURELIST:0ED76DA480D73D593C82769757DFD87A", "SECURELIST:11665FFD7075FB9D59316195101DE894", "SECURELIST:C1F2E1B6711C8D84F3E78D203B3CE837", "SECURELIST:D9AF9603FDB076FD6351B6ED483A4947", "SECURELIST:E21F9D6D3E5AFD65C99FC385D4B5F1DC"]}, {"type": "seebug", "idList": ["SSV:97238", "SSV:99170", "SSV:99251"]}, {"type": "slackware", "idList": ["SSA-2019-293-01", "SSA-2020-091-02", "SSA-2021-202-01", "SSA-2021-258-01", "SSA-2022-031-01", "SSA-2022-055-01", "SSA-2022-059-01", "SSA-2022-067-01", "SSA-2022-071-01", "SSA-2022-073-01", "SSA-2022-076-02", "SSA-2022-087-01", "SSA-2022-089-01", "SSA-2022-104-02", "SSA-2022-104-03", "SSA-2022-122-01", "SSA-2022-124-02", "SSA-2022-129-01", "SSA-2022-131-01", "SSA-2022-174-01", "SSA-2022-179-03", "SSA-2022-228-01", "SSA-2023-032-01"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "spring", "idList": ["SPRING:0A31867D9351CED0BD42C5AD9FB90F8C", "SPRING:0A400737352FF4B32CD8407A2515D57D", "SPRING:512A6EDB5FF647D089FEF32E7751C62B", "SPRING:5D790268422545C1CFB6959B07261E50", "SPRING:D910A9047EA53BB42480F75D9C5916E5", "SPRING:D9A1E160C61599F24065CC7E5746BD38", "SPRING:DA8F6AA20460EB2D550732A7F74584F6", "SPRING:EA9C08B2E57AC70E90A896D25F4A8BEE"]}, {"type": "srcincite", "idList": ["SRC-2022-0021"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:3218-1", "OPENSUSE-SU-2019:1190-1", "OPENSUSE-SU-2019:1209-1", "OPENSUSE-SU-2019:1258-1", "OPENSUSE-SU-2019:1273-1", "OPENSUSE-SU-2019:1282-1", "OPENSUSE-SU-2019:1371-1", "OPENSUSE-SU-2019:1580-1", "OPENSUSE-SU-2019:1754-1", "OPENSUSE-SU-2019:1906-1", "OPENSUSE-SU-2019:2051-1", "OPENSUSE-SU-2019:2058-1", "OPENSUSE-SU-2019:2131-1", "OPENSUSE-SU-2019:2133-1", "OPENSUSE-SU-2020:0051-1", "OPENSUSE-SU-2020:0086-1", "OPENSUSE-SU-2020:0507-1", "OPENSUSE-SU-2020:0597-1", "OPENSUSE-SU-2020:0630-1", "OPENSUSE-SU-2020:0711-1", "OPENSUSE-SU-2020:0719-1", "OPENSUSE-SU-2020:0935-1", "OPENSUSE-SU-2020:1060-1", "OPENSUSE-SU-2020:1106-1", "OPENSUSE-SU-2020:1153-1", "OPENSUSE-SU-2020:1586-1", "OPENSUSE-SU-2020:1598-1", "OPENSUSE-SU-2020:1613-1", "OPENSUSE-SU-2020:1655-1", "OPENSUSE-SU-2020:1888-1", "OPENSUSE-SU-2020:2143-1", "OPENSUSE-SU-2020:2152-1", "OPENSUSE-SU-2020:2161-1", "OPENSUSE-SU-2020:2169-1", "OPENSUSE-SU-2020:2184-1", "OPENSUSE-SU-2020:2185-1", "OPENSUSE-SU-2020:2189-1", "OPENSUSE-SU-2020:2190-1", "OPENSUSE-SU-2020:2193-1", "OPENSUSE-SU-2020:2211-1", "OPENSUSE-SU-2020:2237-1", "OPENSUSE-SU-2020:2260-1", "OPENSUSE-SU-2020:2282-1", "OPENSUSE-SU-2020:2332-1", "OPENSUSE-SU-2020:2333-1", "OPENSUSE-SU-2020:2367-1", "OPENSUSE-SU-2021:0075-1", "OPENSUSE-SU-2021:0242-1", "OPENSUSE-SU-2021:0270-1", "OPENSUSE-SU-2021:0331-1", "OPENSUSE-SU-2021:0476-1", "OPENSUSE-SU-2021:0496-1", "OPENSUSE-SU-2021:0579-1", "OPENSUSE-SU-2021:0605-1", "OPENSUSE-SU-2021:0758-1", "OPENSUSE-SU-2021:0851-1", "OPENSUSE-SU-2021:0911-1", "OPENSUSE-SU-2021:0919-1", "OPENSUSE-SU-2021:1031-1", "OPENSUSE-SU-2021:1059-1", "OPENSUSE-SU-2021:1061-1", "OPENSUSE-SU-2021:1076-1", "OPENSUSE-SU-2021:1115-1", "OPENSUSE-SU-2021:1142-1", "OPENSUSE-SU-2021:1168-1", "OPENSUSE-SU-2021:1206-1", "OPENSUSE-SU-2021:1214-1", "OPENSUSE-SU-2021:1239-1", "OPENSUSE-SU-2021:1271-1", "OPENSUSE-SU-2021:1313-1", "OPENSUSE-SU-2021:1357-1", "OPENSUSE-SU-2021:1365-1", "OPENSUSE-SU-2021:1384-1", "OPENSUSE-SU-2021:1401-1", "OPENSUSE-SU-2021:1411-1", "OPENSUSE-SU-2021:1418-1", "OPENSUSE-SU-2021:1460-1", "OPENSUSE-SU-2021:1477-1", "OPENSUSE-SU-2021:1501-1", "OPENSUSE-SU-2021:1539-1", "OPENSUSE-SU-2021:1598-1", "OPENSUSE-SU-2021:1612-1", "OPENSUSE-SU-2021:1631-1", "OPENSUSE-SU-2021:1859-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1", "OPENSUSE-SU-2021:1995-1", "OPENSUSE-SU-2021:2157-1", "OPENSUSE-SU-2021:2293-1", "OPENSUSE-SU-2021:2327-1", "OPENSUSE-SU-2021:2353-1", "OPENSUSE-SU-2021:2612-1", "OPENSUSE-SU-2021:2645-1", "OPENSUSE-SU-2021:2687-1", "OPENSUSE-SU-2021:2760-1", "OPENSUSE-SU-2021:2817-1", "OPENSUSE-SU-2021:2838-1", "OPENSUSE-SU-2021:2875-1", "OPENSUSE-SU-2021:2940-1", "OPENSUSE-SU-2021:2953-1", "OPENSUSE-SU-2021:3179-1", "OPENSUSE-SU-2021:3205-1", "OPENSUSE-SU-2021:3211-1", "OPENSUSE-SU-2021:3298-1", "OPENSUSE-SU-2021:3338-1", "OPENSUSE-SU-2021:3387-1", "OPENSUSE-SU-2021:3447-1", "OPENSUSE-SU-2021:3454-1", "OPENSUSE-SU-2021:3476-1", "OPENSUSE-SU-2021:3489-1", "OPENSUSE-SU-2021:3641-1", "OPENSUSE-SU-2021:3655-1", "OPENSUSE-SU-2021:3675-1", "OPENSUSE-SU-2021:3806-1", "OPENSUSE-SU-2021:3833-1", "OPENSUSE-SU-2021:3834-1", "OPENSUSE-SU-2021:3876-1", "OPENSUSE-SU-2021:3941-1", "OPENSUSE-SU-2021:3950-1", "OPENSUSE-SU-2021:4001-1", "OPENSUSE-SU-2021:4002-1", "OPENSUSE-SU-2021:4104-1", "OPENSUSE-SU-2021:4111-1", "OPENSUSE-SU-2021:4112-1", "OPENSUSE-SU-2021:4208-1", "OPENSUSE-SU-2022:0002-1", "OPENSUSE-SU-2022:0038-1", "OPENSUSE-SU-2022:0040-1", "OPENSUSE-SU-2022:0056-1", "OPENSUSE-SU-2022:0064-1", "OPENSUSE-SU-2022:0112-1", "OPENSUSE-SU-2022:0113-1", "OPENSUSE-SU-2022:0131-1", "OPENSUSE-SU-2022:0134-1", "OPENSUSE-SU-2022:0169-1", "OPENSUSE-SU-2022:0198-1", "OPENSUSE-SU-2022:0214-1", "OPENSUSE-SU-2022:0226-1", "OPENSUSE-SU-2022:0330-1", "OPENSUSE-SU-2022:0363-1", "OPENSUSE-SU-2022:0366-1", "OPENSUSE-SU-2022:0370-1", "OPENSUSE-SU-2022:0500-1", "OPENSUSE-SU-2022:0503-1", "OPENSUSE-SU-2022:0525-1", "OPENSUSE-SU-2022:0723-1", "OPENSUSE-SU-2022:0724-1", "OPENSUSE-SU-2022:0743-1", "OPENSUSE-SU-2022:0755-1", "OPENSUSE-SU-2022:0760-1", "OPENSUSE-SU-2022:0768-1", "OPENSUSE-SU-2022:0802-1", "OPENSUSE-SU-2022:0803-1", "OPENSUSE-SU-2022:0817-1", "OPENSUSE-SU-2022:0818-1", "OPENSUSE-SU-2022:0856-1", "OPENSUSE-SU-2022:0940-1", "OPENSUSE-SU-2022:0942-1", "OPENSUSE-SU-2022:10067-1", "OPENSUSE-SU-2022:10122-1", "OPENSUSE-SU-2022:10126-1", "OPENSUSE-SU-2022:10129-1", "OPENSUSE-SU-2022:10152-1", "OPENSUSE-SU-2022:1031-1", "OPENSUSE-SU-2022:1037-1", "OPENSUSE-SU-2022:1039-1", "OPENSUSE-SU-2022:1061-1", "OPENSUSE-SU-2022:1064-1", "OPENSUSE-SU-2022:1091-1", "OPENSUSE-SU-2022:2422-1", "OPENSUSE-SU-2022:2549-1", "SUSE-SU-2022:1064-2", "SUSE-SU-2022:1158-1", "SUSE-SU-2022:1163-1", "SUSE-SU-2022:1183-1", "SUSE-SU-2022:1265-1", "SUSE-SU-2022:1271-1", "SUSE-SU-2022:1418-1", "SUSE-SU-2022:1454-1", "SUSE-SU-2022:1461-1", "SUSE-SU-2022:1462-1", "SUSE-SU-2022:1477-1", "SUSE-SU-2022:1485-1", "SUSE-SU-2022:1617-1", "SUSE-SU-2022:1678-1", "SUSE-SU-2022:1717-1", "SUSE-SU-2022:1750-1", "SUSE-SU-2022:1842-1", "SUSE-SU-2022:1929-1", "SUSE-SU-2022:2044-1", "SUSE-SU-2022:2047-1", "SUSE-SU-2022:2111-1", "SUSE-SU-2022:2174-1", "SUSE-SU-2022:2251-1", "SUSE-SU-2022:2251-2", "SUSE-SU-2022:2306-1", "SUSE-SU-2022:2308-1", "SUSE-SU-2022:2321-1", "SUSE-SU-2022:2376-1", "SUSE-SU-2022:2411-1", "SUSE-SU-2022:2422-1", "SUSE-SU-2022:2424-2", "SUSE-SU-2022:2549-1", "SUSE-SU-2022:2552-1", "SUSE-SU-2022:2646-1", "SUSE-SU-2022:2660-1", "SUSE-SU-2022:2707-1", "SUSE-SU-2022:2831-1", "SUSE-SU-2022:2855-1", "SUSE-SU-2022:2856-1", "SUSE-SU-2022:2949-1", "SUSE-SU-2022:3092-1", "SUSE-SU-2022:3264-1", "SUSE-SU-2022:3408-1", "SUSE-SU-2022:3609-1", "SUSE-SU-2022:3809-1", "SUSE-SU-2022:3875-1"]}, {"type": "symantec", "idList": ["SMNTC-107400", "SMNTC-107867", "SMNTC-109915", "SMNTC-110516", "SMNTC-111028", "SMNTC-111264", "SMNTC-16056", "SMNTC-17650", "SMNTC-17849", "SMNTC-19793"]}, {"type": "talos", "idList": ["TALOS-2021-1243"]}, {"type": "talosblog", "idList": ["TALOSBLOG:3587BB077717B0512A9D0EFCCBE8770B", "TALOSBLOG:3F14583676BF3FEC18226D8E465C8707"]}, {"type": "tenable", "idList": ["TENABLE:F29BAD72446123F9BCC7E3C50234FFF8"]}, {"type": "thn", "idList": ["THN:00A15BC93C4697B74FA1D56130C0C35E", "THN:06F5ECB1217B8E9B20CB0AC447D63E26", "THN:1D10167F5D53B2791D676CF56488D5D9", "THN:307694C0E91D88A3482E306F82A089D9", "THN:3E5F28AD1BE3C9B2442EA318E6E13E5C", "THN:4CD6AEBFF705DD178769DA927390CFFD", "THN:51196AEF32803B9BBB839D4CADBF5B38", "THN:5D50D5AA81EE14FA1044614364EAEBC6", "THN:701EA1BEE49C9AF916F8D5BAE87B2264", "THN:76D7572EDBE770410D6F0518DAD8B0AD", "THN:7A3DFDA680FEA7FB77640D29F9D3E3E2", "THN:8198C407B889F0B459BC5B078A2D620C", "THN:8FDA592D55831C1C4E3583B81FABA962", "THN:933FE23273AB5250B949633A337D44E1", "THN:9F9D436651F16F99B6EA52F0DB9AE75C", "THN:A256C18D45C73FAE1CA7A079253D9D10", "THN:A4284A3BA2971D8DA287C1A8393ECAC8", "THN:AD68BC1A9DDE81C0E66BA93D01C2ECFB", "THN:B878F356832352DE3255B00CFB12A5B7", "THN:D65992731CD4A3B443CD2E03761CE18B", "THN:D944A50894C25A7CEE196C1A3ABFCAC6", "THN:EAFAEB28A545DC638924DAC8AAA4FBF2", "THN:EC08545A59E5E648DC06498AB3111060", "THN:ECDABD8FB1E94F5D8AFD13E4C1CB5840", "THN:F37A3A53FDDEB75EB3128C37B460F7F4"]}, {"type": "threatpost", "idList": ["THREATPOST:05E04E358AB0AB9A5BF524854B34E49D", "THREATPOST:136544A8850662645EB54E79AAB40F75", "THREATPOST:137878F5B0776A981FB6046E1C674926", "THREATPOST:3A5F59D56E40560C393A3F69A362A31B", "THREATPOST:46837E7270195429E1D891848E911254", "THREATPOST:4C9E0FFA5C914E395A66D2DC65B16649", "THREATPOST:B173AAC5711A218F24186FBC5AAC11C5", "THREATPOST:D7D5E283A1FBB50F8BD8797B0D60A622", "THREATPOST:F12423DD382283B0E48D4852237679FC"]}, {"type": "tomcat", "idList": ["TOMCAT:11C6E48DCBA5EAFD1F9CDDC0358EAA1B", "TOMCAT:134FFF2A5E889835054EC92E557C984D", "TOMCAT:165051AC2BE10A9500B7745CB9AB7C4F", "TOMCAT:1EC0F1D5E7FF84CFCAC4566485FFCAC6", "TOMCAT:36341E62C29FA8D208E5019D7D60DFC8", "TOMCAT:38E1DC5950ADDBB8A055F354B172C65E", "TOMCAT:42FCCA1B939943E71978F85565FFC5D2", "TOMCAT:47B91042927062AB4C945C176AD09B02", "TOMCAT:58DCB1174EDF5F295BB9030BB80D4F70", "TOMCAT:6C76B942203866596C449F47FBCB6A47", "TOMCAT:75BDD1762995663D2613C2EC3D1F16DD", "TOMCAT:7E3DBF853D3232754593B8D1B97F1298", "TOMCAT:800D297D8266A4359A873DA0DBF5D504", "TOMCAT:8A2C262DE6E0BAC59E53AD562A9743FE", "TOMCAT:9B1DDBF633DAFBB1A5BECFE202020044", "TOMCAT:9B658D22C08634C8C17F1EFEE3366D4D", "TOMCAT:A01991EC43D0F6A28E9CB4553C6B4670", "TOMCAT:BD106E970B6D4964B80C5CC3715C6DD2", "TOMCAT:C5537152452B543D3F3B9565BB62CA70", "TOMCAT:C878975BAAD7823EE793B63FC6053125", "TOMCAT:E76617B2A121AAAE8F7420BCA50A252C", "TOMCAT:ECCF6A4DAA30CE7FE974F228B3888E80"]}, {"type": "trellix", "idList": ["TRELLIX:33C611A7064C89E309C4A45CAE585BD5", "TRELLIX:341471F990B5DC7BFF1C28F924F10E32", "TRELLIX:39F2C513984A5BB7A3E14C8FB15CED7C", "TRELLIX:7B9C31B3E2F1A079101A700230D5A5C0"]}, {"type": "trendmicroblog", "idList": ["TRENDMICROBLOG:3BBEDAD3D1AE692D361A31D5E9AE2538", "TRENDMICROBLOG:59C3D813302731E6DE220FB088280F67", "TRENDMICROBLOG:AFF0912EF635E2446F0D546515038F73"]}, {"type": "typo3", "idList": ["TYPO3-EXT-SA-2020-015"]}, {"type": "ubuntu", "idList": ["LSN-0076-1", "LSN-0083-1", "LSN-0085-1", "USN-3790-1", "USN-3790-2", "USN-3937-1", "USN-4113-1", "USN-4113-2", "USN-4127-1", "USN-4127-2", "USN-4427-1", "USN-4439-1", "USN-4440-1", "USN-4448-1", "USN-4458-1", "USN-4483-1", "USN-4485-1", "USN-4495-1", "USN-4570-1", "USN-4575-1", "USN-4596-1", "USN-4601-1", "USN-4657-1", "USN-4658-1", "USN-4658-2", "USN-4659-1", "USN-4659-2", "USN-4660-1", "USN-4660-2", "USN-4681-1", "USN-4754-1", "USN-4754-2", "USN-4754-3", "USN-4754-4", "USN-4754-5", "USN-4766-1", "USN-4891-1", "USN-4912-1", "USN-4916-1", "USN-4916-2", "USN-4917-1", "USN-4940-1", "USN-4961-2", "USN-4973-1", "USN-4973-2", "USN-5034-1", "USN-5034-2", "USN-5038-1", "USN-5056-1", "USN-5070-1", "USN-5071-1", "USN-5071-2", "USN-5071-3", "USN-5073-1", "USN-5073-2", "USN-5073-3", "USN-5079-1", "USN-5079-2", "USN-5079-3", "USN-5079-4", "USN-5080-1", "USN-5080-2", "USN-5083-1", "USN-5092-1", "USN-5092-2", "USN-5092-3", "USN-5095-1", "USN-5096-1", "USN-5106-1", "USN-5113-1", "USN-5115-1", "USN-5117-1", "USN-5120-1", "USN-5136-1", "USN-5137-1", "USN-5137-2", "USN-5138-1", "USN-5139-1", "USN-5140-1", "USN-5161-1", "USN-5162-1", "USN-5163-1", "USN-5164-1", "USN-5165-1", "USN-5181-1", "USN-5199-1", "USN-5200-1", "USN-5201-1", "USN-5206-1", "USN-5207-1", "USN-5208-1", "USN-5209-1", "USN-5210-1", "USN-5210-2", "USN-5211-1", "USN-5218-1", "USN-5222-1", "USN-5223-1", "USN-5223-2", "USN-5225-1", "USN-5245-1", "USN-5265-1", "USN-5266-1", "USN-5267-1", "USN-5267-2", "USN-5267-3", "USN-5268-1", "USN-5278-1", "USN-5294-1", "USN-5294-2", "USN-5295-1", "USN-5295-2", "USN-5297-1", "USN-5298-1", "USN-5299-1", "USN-5301-1", "USN-5301-2", "USN-5302-1", "USN-5304-1", "USN-5310-1", "USN-5310-2", "USN-5317-1", "USN-5318-1", "USN-5319-1", "USN-5324-1", "USN-5328-1", "USN-5328-2", "USN-5333-1", "USN-5333-2", "USN-5337-1", "USN-5338-1", "USN-5339-1", "USN-5343-1", "USN-5355-1", "USN-5355-2", "USN-5359-1", "USN-5359-2", "USN-5360-1", "USN-5361-1", "USN-5362-1", "USN-5368-1", "USN-5377-1", "USN-5378-1", "USN-5378-2", "USN-5378-3", "USN-5378-4", "USN-5381-1", "USN-5383-1", "USN-5402-1", "USN-5402-2", "USN-5413-1", "USN-5415-1", "USN-5422-1", "USN-5433-1", "USN-5466-1", "USN-5467-1", "USN-5500-1", "USN-5505-1", "USN-5513-1", "USN-5515-1", "USN-5525-1", "USN-5537-1", "USN-5537-2", "USN-5541-1", "USN-5546-1", "USN-5546-2", "USN-5576-1", "USN-5613-1", "USN-5613-2", "USN-5666-1", "USN-5739-1", "USN-5763-1", "USN-5805-1", "USN-5946-1", "USN-5959-1", "USN-5998-1", "USN-6001-1", "USN-6011-1", "USN-6013-1", "USN-6014-1", "USN-6049-1", "USN-6117-1", "USN-6419-1", "USN-6457-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-18074", "UB:CVE-2018-25032", "UB:CVE-2018-8032", "UB:CVE-2019-0220", "UB:CVE-2019-0227", "UB:CVE-2019-10082", "UB:CVE-2019-10086", "UB:CVE-2019-10160", "UB:CVE-2019-11236", "UB:CVE-2019-17571", "UB:CVE-2019-18348", "UB:CVE-2019-20916", "UB:CVE-2019-9636", "UB:CVE-2019-9740", "UB:CVE-2019-9947", "UB:CVE-2020-0404", "UB:CVE-2020-10683", "UB:CVE-2020-11022", "UB:CVE-2020-11023", "UB:CVE-2020-11987", "UB:CVE-2020-13974", "UB:CVE-2020-14343", "UB:CVE-2020-1747", "UB:CVE-2020-17521", "UB:CVE-2020-1927", "UB:CVE-2020-23064", "UB:CVE-2020-25649", "UB:CVE-2020-26137", "UB:CVE-2020-26237", "UB:CVE-2020-27619", "UB:CVE-2020-27820", "UB:CVE-2020-28052", "UB:CVE-2020-28491", "UB:CVE-2020-28500", "UB:CVE-2020-29396", "UB:CVE-2020-29651", "UB:CVE-2020-35490", "UB:CVE-2020-35491", "UB:CVE-2020-35728", "UB:CVE-2020-36179", "UB:CVE-2020-36180", "UB:CVE-2020-36181", "UB:CVE-2020-36182", "UB:CVE-2020-36183", "UB:CVE-2020-36184", "UB:CVE-2020-36185", "UB:CVE-2020-36186", "UB:CVE-2020-36187", "UB:CVE-2020-36188", "UB:CVE-2020-36189", "UB:CVE-2020-36518", "UB:CVE-2020-4788", "UB:CVE-2020-5258", "UB:CVE-2020-5397", "UB:CVE-2020-5398", "UB:CVE-2020-7656", "UB:CVE-2020-9484", "UB:CVE-2021-20322", "UB:CVE-2021-21781", "UB:CVE-2021-22118", "UB:CVE-2021-22119", "UB:CVE-2021-22931", "UB:CVE-2021-22939", "UB:CVE-2021-22940", "UB:CVE-2021-22946", "UB:CVE-2021-22947", "UB:CVE-2021-23337", "UB:CVE-2021-23450", "UB:CVE-2021-23926", "UB:CVE-2021-25329", "UB:CVE-2021-26291", "UB:CVE-2021-29154", "UB:CVE-2021-29425", "UB:CVE-2021-29505", "UB:CVE-2021-29921", "UB:CVE-2021-30641", "UB:CVE-2021-31684", "UB:CVE-2021-3177", "UB:CVE-2021-31805", "UB:CVE-2021-31811", "UB:CVE-2021-31812", "UB:CVE-2021-33560", "UB:CVE-2021-33571", "UB:CVE-2021-33574", "UB:CVE-2021-33813", "UB:CVE-2021-34141", "UB:CVE-2021-34429", "UB:CVE-2021-3449", "UB:CVE-2021-3450", "UB:CVE-2021-35043", "UB:CVE-2021-35515", "UB:CVE-2021-35516", "UB:CVE-2021-35517", "UB:CVE-2021-3572", "UB:CVE-2021-35940", "UB:CVE-2021-36090", "UB:CVE-2021-3612", "UB:CVE-2021-36373", "UB:CVE-2021-36374", "UB:CVE-2021-3671", "UB:CVE-2021-3672", "UB:CVE-2021-37136", "UB:CVE-2021-37137", "UB:CVE-2021-37159", "UB:CVE-2021-3737", "UB:CVE-2021-3743", "UB:CVE-2021-3744", "UB:CVE-2021-3749", "UB:CVE-2021-3752", "UB:CVE-2021-3764", "UB:CVE-2021-37714", "UB:CVE-2021-3772", "UB:CVE-2021-3773", "UB:CVE-2021-37750", "UB:CVE-2021-38153", "UB:CVE-2021-38604", "UB:CVE-2021-3894", "UB:CVE-2021-39139", "UB:CVE-2021-39140", "UB:CVE-2021-39141", "UB:CVE-2021-39144", "UB:CVE-2021-39145", "UB:CVE-2021-39146", "UB:CVE-2021-39147", "UB:CVE-2021-39148", "UB:CVE-2021-39149", "UB:CVE-2021-39150", "UB:CVE-2021-39151", "UB:CVE-2021-39152", "UB:CVE-2021-39153", "UB:CVE-2021-39154", "UB:CVE-2021-4002", "UB:CVE-2021-40528", "UB:CVE-2021-40690", "UB:CVE-2021-4083", "UB:CVE-2021-4104", "UB:CVE-2021-4115", "UB:CVE-2021-41182", "UB:CVE-2021-41183", "UB:CVE-2021-41184", "UB:CVE-2021-41303", "UB:CVE-2021-41495", "UB:CVE-2021-41496", "UB:CVE-2021-4157", "UB:CVE-2021-4160", "UB:CVE-2021-41617", "UB:CVE-2021-41771", "UB:CVE-2021-41772", "UB:CVE-2021-4197", "UB:CVE-2021-4203", "UB:CVE-2021-42340", "UB:CVE-2021-42739", "UB:CVE-2021-43389", "UB:CVE-2021-43396", "UB:CVE-2021-43797", "UB:CVE-2021-43818", "UB:CVE-2021-43859", "UB:CVE-2021-43976", "UB:CVE-2021-44228", "UB:CVE-2021-44531", "UB:CVE-2021-44532", "UB:CVE-2021-44533", "UB:CVE-2021-44832", "UB:CVE-2021-45485", "UB:CVE-2021-45486", "UB:CVE-2021-45943", "UB:CVE-2022-0001", "UB:CVE-2022-0002", "UB:CVE-2022-0286", "UB:CVE-2022-0322", "UB:CVE-2022-0778", "UB:CVE-2022-1011", "UB:CVE-2022-1154", "UB:CVE-2022-1271", "UB:CVE-2022-1292", "UB:CVE-2022-2068", "UB:CVE-2022-21455", "UB:CVE-2022-21509", "UB:CVE-2022-21515", "UB:CVE-2022-21517", "UB:CVE-2022-21522", "UB:CVE-2022-21525", "UB:CVE-2022-21526", "UB:CVE-2022-21527", "UB:CVE-2022-21528", "UB:CVE-2022-21529", "UB:CVE-2022-21530", "UB:CVE-2022-21531", "UB:CVE-2022-21534", "UB:CVE-2022-21537", "UB:CVE-2022-21538", "UB:CVE-2022-21539", "UB:CVE-2022-21540", "UB:CVE-2022-21541", "UB:CVE-2022-21547", "UB:CVE-2022-21549", "UB:CVE-2022-21553", "UB:CVE-2022-21554", "UB:CVE-2022-21556", "UB:CVE-2022-21569", "UB:CVE-2022-21571", "UB:CVE-2022-21824", "UB:CVE-2022-22720", "UB:CVE-2022-22721", "UB:CVE-2022-22965", "UB:CVE-2022-22968", "UB:CVE-2022-22970", "UB:CVE-2022-22971", "UB:CVE-2022-22976", "UB:CVE-2022-22978", "UB:CVE-2022-23181", "UB:CVE-2022-23218", "UB:CVE-2022-23219", "UB:CVE-2022-23302", "UB:CVE-2022-23305", "UB:CVE-2022-23307", "UB:CVE-2022-23308", "UB:CVE-2022-23437", "UB:CVE-2022-23457", "UB:CVE-2022-23772", "UB:CVE-2022-23773", "UB:CVE-2022-23806", "UB:CVE-2022-24329", "UB:CVE-2022-24407", "UB:CVE-2022-24728", "UB:CVE-2022-24729", "UB:CVE-2022-24735", "UB:CVE-2022-24736", "UB:CVE-2022-24801", "UB:CVE-2022-24823", "UB:CVE-2022-24839", "UB:CVE-2022-24891", "UB:CVE-2022-25169", "UB:CVE-2022-25636", "UB:CVE-2022-25647", "UB:CVE-2022-25762", "UB:CVE-2022-27778", "UB:CVE-2022-28366", "UB:CVE-2022-29577", "UB:CVE-2022-29824", "UB:CVE-2022-29885", "UB:CVE-2022-30126", "UB:CVE-2022-30973", "UB:CVE-2022-33879", "UB:CVE-2022-34169"]}, {"type": "vaadin", "idList": ["VAADIN:ADVISORY-2021-10-27", "VAADIN:ADVISORY-2022-04-01"]}, {"type": "veracode", "idList": ["VERACODE:19903", "VERACODE:20378", "VERACODE:20528", "VERACODE:20588", "VERACODE:21091", "VERACODE:21314", "VERACODE:21686", "VERACODE:22052", "VERACODE:22224", "VERACODE:22312", "VERACODE:22313", "VERACODE:22619", "VERACODE:22667", "VERACODE:25055", "VERACODE:25140", "VERACODE:25141", "VERACODE:25429", "VERACODE:25456", "VERACODE:25469", "VERACODE:26176", "VERACODE:26514", "VERACODE:27288", "VERACODE:27584", "VERACODE:27682", "VERACODE:27984", "VERACODE:28525", "VERACODE:28632", "VERACODE:28637", "VERACODE:28823", "VERACODE:28909", "VERACODE:28931", "VERACODE:28932", "VERACODE:28933", "VERACODE:28934", "VERACODE:28935", "VERACODE:28936", "VERACODE:28938", "VERACODE:28939", "VERACODE:28940", "VERACODE:28941", "VERACODE:28942", "VERACODE:29098", "VERACODE:29153", "VERACODE:29405", "VERACODE:29408", "VERACODE:29425", "VERACODE:29490", "VERACODE:29500", "VERACODE:29541", "VERACODE:29554", "VERACODE:29835", "VERACODE:29836", "VERACODE:29972", "VERACODE:30170", "VERACODE:30531", "VERACODE:30649", "VERACODE:30708", "VERACODE:30744", "VERACODE:30772", "VERACODE:30955", "VERACODE:30959", "VERACODE:31015", "VERACODE:31194", "VERACODE:31200", "VERACODE:31202", "VERACODE:31213", "VERACODE:31214", "VERACODE:31223", "VERACODE:31283", "VERACODE:31465", "VERACODE:31560", "VERACODE:31600", "VERACODE:31601", "VERACODE:31646", "VERACODE:31748", "VERACODE:31789", "VERACODE:31793", "VERACODE:31794", "VERACODE:31795", "VERACODE:31796", "VERACODE:31797", "VERACODE:31798", "VERACODE:31799", "VERACODE:31800", "VERACODE:31801", "VERACODE:31803", "VERACODE:31805", "VERACODE:31806", "VERACODE:31850", "VERACODE:31899", "VERACODE:31916", "VERACODE:32046", "VERACODE:32047", "VERACODE:32052", "VERACODE:32149", "VERACODE:32152", "VERACODE:32153", "VERACODE:32164", "VERACODE:32170", "VERACODE:32200", "VERACODE:32216", "VERACODE:32246", "VERACODE:32400", "VERACODE:32501", "VERACODE:32663", "VERACODE:32711", "VERACODE:32740", "VERACODE:32741", "VERACODE:32744", "VERACODE:32832", "VERACODE:32833", "VERACODE:32902", "VERACODE:33141", "VERACODE:33238", "VERACODE:33300", "VERACODE:33348", "VERACODE:33394", "VERACODE:33402", "VERACODE:33403", "VERACODE:33406", "VERACODE:33467", "VERACODE:33476", "VERACODE:33610", "VERACODE:33611", "VERACODE:33612", "VERACODE:33613", "VERACODE:33647", "VERACODE:33693", "VERACODE:33755", "VERACODE:33763", "VERACODE:33766", "VERACODE:33776", "VERACODE:33884", "VERACODE:33896", "VERACODE:33901", "VERACODE:33902", "VERACODE:33938", "VERACODE:33977", "VERACODE:34087", "VERACODE:34091", "VERACODE:34096", "VERACODE:34149", "VERACODE:34197", "VERACODE:34198", "VERACODE:34216", "VERACODE:34276", "VERACODE:34333", "VERACODE:34455", "VERACODE:34482", "VERACODE:34483", "VERACODE:34568", "VERACODE:34613", "VERACODE:34615", "VERACODE:34668", "VERACODE:34691", "VERACODE:34692", "VERACODE:34716", "VERACODE:34722", "VERACODE:34723", "VERACODE:34849", "VERACODE:34852", "VERACODE:34863", "VERACODE:34883", "VERACODE:34884", "VERACODE:34974", "VERACODE:35017", "VERACODE:35036", "VERACODE:35037", "VERACODE:35039", "VERACODE:35066", "VERACODE:35070", "VERACODE:35109", "VERACODE:35201", "VERACODE:35206", "VERACODE:35267", "VERACODE:35285", "VERACODE:35365", "VERACODE:35377", "VERACODE:35378", "VERACODE:35379", "VERACODE:35443", "VERACODE:35474", "VERACODE:35505", "VERACODE:35506", "VERACODE:35510", "VERACODE:35536", "VERACODE:35567", "VERACODE:35579", "VERACODE:35618", "VERACODE:35627", "VERACODE:35676", "VERACODE:35781", "VERACODE:35785", "VERACODE:35826", "VERACODE:35877", "VERACODE:35956", "VERACODE:35988", "VERACODE:35989", "VERACODE:36025", "VERACODE:36060", "VERACODE:36098", "VERACODE:36100", "VERACODE:36182", "VERACODE:36352", "VERACODE:36421", "VERACODE:36443", "VERACODE:36445", "VERACODE:36446", "VERACODE:36447", "VERACODE:36452", "VERACODE:36941", "VERACODE:37406", "VERACODE:37642", "VERACODE:37949", "VERACODE:37950", "VERACODE:37951", "VERACODE:37952", "VERACODE:37953", "VERACODE:37954", "VERACODE:37955", "VERACODE:37956", "VERACODE:37957", "VERACODE:37958", "VERACODE:37959", "VERACODE:37960", "VERACODE:37961", "VERACODE:37962", "VERACODE:37963", "VERACODE:37964", "VERACODE:37965", "VERACODE:37966", "VERACODE:38089", "VERACODE:38090", "VERACODE:3919", "VERACODE:6077", "VERACODE:6078", "VERACODE:6271", "VERACODE:7585", "VERACODE:7856"]}, {"type": "virtuozzo", "idList": ["VZA-2022-014", "VZA-2022-016", "VZA-2022-017"]}, {"type": "vmware", "idList": ["VMSA-2022-0010", "VMSA-2022-0010.1", "VMSA-2022-0010.3", "VMSA-2022-0010.4", "VMSA-2022-0010.5", "VMSA-2022-0027", "VMSA-2022-0027.1"]}, {"type": "wallarmlab", "idList": ["WALLARMLAB:1F9667DCAF40881A6551C0A619CA0BB4", "WALLARMLAB:9178CD01A603571D2C21329BF42F9BFD", "WALLARMLAB:9CFFE14B0134DDC7E5CE56ADFE082425", "WALLARMLAB:EE38CF1B0A21B442BBC4119F13A3537F"]}, {"type": "wizblog", "idList": ["WIZBLOG:E7BB6906DDEB4849A11E483EC9AE559E"]}, {"type": "wolfi", "idList": ["WOLFI:CVE-2018-25032"]}, {"type": "xen", "idList": ["XSA-398"]}, {"type": "zdi", "idList": ["ZDI-22-1026", "ZDI-22-619", "ZDI-22-876"]}, {"type": "zdt", "idList": ["1337DAY-ID-32519", "1337DAY-ID-36102", "1337DAY-ID-36103", "1337DAY-ID-36980", "1337DAY-ID-37132", "1337DAY-ID-37133", "1337DAY-ID-37446", "1337DAY-ID-37565", "1337DAY-ID-37692", "1337DAY-ID-37760", "1337DAY-ID-38037", "1337DAY-ID-38064", "1337DAY-ID-38069", "1337DAY-ID-38495", "1337DAY-ID-38858"]}]}, "epss": [{"cve": "CVE-2018-1259", "epss": 0.00287, "percentile": 0.64136, "modified": "2023-05-02"}, {"cve": "CVE-2018-1273", "epss": 0.97497, "percentile": 0.99954, "modified": "2023-05-02"}, {"cve": "CVE-2018-1274", "epss": 0.00496, "percentile": 0.72732, "modified": "2023-05-02"}, {"cve": "CVE-2018-18074", "epss": 0.00347, "percentile": 0.67429, "modified": "2023-05-02"}, {"cve": "CVE-2018-25032", "epss": 0.00189, "percentile": 0.54931, "modified": "2023-05-02"}, {"cve": "CVE-2018-8032", "epss": 0.00212, "percentile": 0.57688, "modified": "2023-05-02"}, {"cve": "CVE-2019-0219", "epss": 0.00356, "percentile": 0.67851, "modified": "2023-05-01"}, {"cve": "CVE-2019-0220", "epss": 0.00521, "percentile": 0.73415, "modified": "2023-05-02"}, {"cve": "CVE-2019-0227", "epss": 0.96322, "percentile": 0.99254, "modified": "2023-05-02"}, {"cve": "CVE-2019-10082", "epss": 0.00283, "percentile": 0.63861, "modified": "2023-05-02"}, {"cve": "CVE-2019-10086", "epss": 0.00311, "percentile": 0.65581, "modified": "2023-05-02"}, {"cve": "CVE-2019-17495", "epss": 0.0098, "percentile": 0.81203, "modified": "2023-05-02"}, {"cve": "CVE-2019-17571", "epss": 0.97471, "percentile": 0.99935, "modified": "2023-05-01"}, {"cve": "CVE-2019-20916", "epss": 0.00202, "percentile": 0.56686, "modified": "2023-05-01"}, {"cve": "CVE-2019-9636", "epss": 0.00797, "percentile": 0.79127, "modified": "2023-05-02"}, {"cve": "CVE-2019-9740", "epss": 0.00451, "percentile": 0.71377, "modified": "2023-05-02"}, {"cve": "CVE-2020-0404", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2020-10683", "epss": 0.00261, "percentile": 0.62278, "modified": "2023-05-01"}, {"cve": "CVE-2020-11022", "epss": 0.08634, "percentile": 0.93497, "modified": "2023-05-01"}, {"cve": "CVE-2020-11023", "epss": 0.00518, "percentile": 0.73312, "modified": "2023-05-01"}, {"cve": "CVE-2020-11987", "epss": 0.00075, "percentile": 0.30478, "modified": "2023-05-01"}, {"cve": "CVE-2020-13974", "epss": 0.00077, "percentile": 0.31543, "modified": "2023-05-01"}, {"cve": "CVE-2020-14343", "epss": 0.0013, "percentile": 0.46493, "modified": "2023-05-01"}, {"cve": "CVE-2020-1747", "epss": 0.01203, "percentile": 0.83138, "modified": "2023-05-01"}, {"cve": "CVE-2020-17521", "epss": 0.00051, "percentile": 0.17713, "modified": "2023-05-01"}, {"cve": "CVE-2020-1927", "epss": 0.00155, "percentile": 0.50452, "modified": "2023-05-01"}, {"cve": "CVE-2020-25649", "epss": 0.0014, "percentile": 0.48322, "modified": "2023-05-01"}, {"cve": "CVE-2020-26137", "epss": 0.00248, "percentile": 0.61197, "modified": "2023-05-01"}, {"cve": "CVE-2020-26184", "epss": 0.00083, "percentile": 0.33874, "modified": "2023-05-02"}, {"cve": "CVE-2020-26185", "epss": 0.00046, "percentile": 0.13987, "modified": "2023-05-02"}, {"cve": "CVE-2020-26237", "epss": 0.00203, "percentile": 0.56722, "modified": "2023-05-01"}, {"cve": "CVE-2020-27619", "epss": 0.00322, "percentile": 0.66183, "modified": "2023-05-01"}, {"cve": "CVE-2020-27820", "epss": 0.00045, "percentile": 0.12116, "modified": "2023-05-01"}, {"cve": "CVE-2020-28052", "epss": 0.00199, "percentile": 0.56203, "modified": "2023-05-01"}, {"cve": "CVE-2020-28491", "epss": 0.00075, "percentile": 0.30598, "modified": "2023-05-01"}, {"cve": "CVE-2020-28500", "epss": 0.00182, "percentile": 0.53956, "modified": "2023-05-01"}, {"cve": "CVE-2020-29396", "epss": 0.00192, "percentile": 0.5549, "modified": "2023-05-01"}, {"cve": "CVE-2020-29505", "epss": 0.00097, "percentile": 0.3922, "modified": "2023-05-02"}, {"cve": "CVE-2020-29506", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-29507", "epss": 0.00097, "percentile": 0.39166, "modified": "2023-05-02"}, {"cve": "CVE-2020-29508", "epss": 0.00097, "percentile": 0.39166, "modified": "2023-05-02"}, {"cve": "CVE-2020-29651", "epss": 0.00267, "percentile": 0.62722, "modified": "2023-05-01"}, {"cve": "CVE-2020-35163", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-35164", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-35166", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-35167", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-35168", "epss": 0.00099, "percentile": 0.39777, "modified": "2023-05-02"}, {"cve": "CVE-2020-35169", "epss": 0.00097, "percentile": 0.39166, "modified": "2023-05-02"}, {"cve": "CVE-2020-35490", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35491", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-35728", "epss": 0.00367, "percentile": 0.68335, "modified": "2023-05-01"}, {"cve": "CVE-2020-36179", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36180", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36181", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36182", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36183", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36184", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36185", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36186", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36187", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36188", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36189", "epss": 0.00184, "percentile": 0.5417, "modified": "2023-05-01"}, {"cve": "CVE-2020-36518", "epss": 0.00236, "percentile": 0.60199, "modified": "2023-05-02"}, {"cve": "CVE-2020-4788", "epss": 0.00043, "percentile": 0.07818, "modified": "2023-05-01"}, {"cve": "CVE-2020-5258", "epss": 0.00181, "percentile": 0.53745, "modified": "2023-05-01"}, {"cve": "CVE-2020-5397", "epss": 0.00128, "percentile": 0.46164, "modified": "2023-05-01"}, {"cve": "CVE-2020-5398", "epss": 0.97067, "percentile": 0.99603, "modified": "2023-05-01"}, {"cve": "CVE-2020-7656", "epss": 0.00103, "percentile": 0.40766, "modified": "2023-05-01"}, {"cve": "CVE-2020-7712", "epss": 0.00626, "percentile": 0.75866, "modified": "2023-05-01"}, {"cve": "CVE-2020-9484", "epss": 0.9701, "percentile": 0.99569, "modified": "2023-05-01"}, {"cve": "CVE-2020-9492", "epss": 0.00486, "percentile": 0.72454, "modified": "2023-05-01"}, {"cve": "CVE-2021-20322", "epss": 0.00227, "percentile": 0.59432, "modified": "2023-05-02"}, {"cve": "CVE-2021-21781", "epss": 0.00045, "percentile": 0.12502, "modified": "2023-05-01"}, {"cve": "CVE-2021-22118", "epss": 0.00046, "percentile": 0.14115, "modified": "2023-05-01"}, {"cve": "CVE-2021-22119", "epss": 0.00428, "percentile": 0.70601, "modified": "2023-05-01"}, {"cve": "CVE-2021-22931", "epss": 0.00809, "percentile": 0.79287, "modified": "2023-05-01"}, {"cve": "CVE-2021-22939", "epss": 0.00286, "percentile": 0.64065, "modified": "2023-05-01"}, {"cve": "CVE-2021-22940", "epss": 0.00214, "percentile": 0.57873, "modified": "2023-05-01"}, {"cve": "CVE-2021-22946", "epss": 0.00187, "percentile": 0.54525, "modified": "2023-05-02"}, {"cve": "CVE-2021-22947", "epss": 0.00089, "percentile": 0.36472, "modified": "2023-05-02"}, {"cve": "CVE-2021-23337", "epss": 0.00606, "percentile": 0.75429, "modified": "2023-05-01"}, {"cve": "CVE-2021-23450", "epss": 0.00308, "percentile": 0.65465, "modified": "2023-05-02"}, {"cve": "CVE-2021-2351", "epss": 0.01165, "percentile": 0.82842, "modified": "2023-05-01"}, {"cve": "CVE-2021-23926", "epss": 0.00237, "percentile": 0.60274, "modified": "2023-05-01"}, {"cve": "CVE-2021-26291", "epss": 0.00145, "percentile": 0.49036, "modified": "2023-05-01"}, {"cve": "CVE-2021-29154", "epss": 0.00045, "percentile": 0.12116, "modified": "2023-05-01"}, {"cve": "CVE-2021-29425", "epss": 0.00184, "percentile": 0.54113, "modified": "2023-05-01"}, {"cve": "CVE-2021-29505", "epss": 0.02373, "percentile": 0.88243, "modified": "2023-05-01"}, {"cve": "CVE-2021-29921", "epss": 0.00609, "percentile": 0.75498, "modified": "2023-05-01"}, {"cve": "CVE-2021-30129", "epss": 0.00739, "percentile": 0.78116, "modified": "2023-05-01"}, {"cve": "CVE-2021-31684", "epss": 0.01015, "percentile": 0.81547, "modified": "2023-05-01"}, {"cve": "CVE-2021-3177", "epss": 0.00924, "percentile": 0.80647, "modified": "2023-05-01"}, {"cve": "CVE-2021-31805", "epss": 0.01056, "percentile": 0.81899, "modified": "2023-05-02"}, {"cve": "CVE-2021-31811", "epss": 0.00074, "percentile": 0.30182, "modified": "2023-05-01"}, {"cve": "CVE-2021-31812", "epss": 0.00072, "percentile": 0.29499, "modified": "2023-05-01"}, {"cve": "CVE-2021-33560", "epss": 0.00105, "percentile": 0.41486, "modified": "2023-05-01"}, {"cve": "CVE-2021-33813", "epss": 0.00216, "percentile": 0.58076, "modified": "2023-05-01"}, {"cve": "CVE-2021-34141", "epss": 0.00099, "percentile": 0.39637, "modified": "2023-05-02"}, {"cve": "CVE-2021-34429", "epss": 0.88034, "percentile": 0.98105, "modified": "2023-05-01"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64497, "modified": "2023-05-01"}, {"cve": "CVE-2021-3450", "epss": 0.00198, "percentile": 0.56154, "modified": "2023-05-01"}, {"cve": "CVE-2021-35043", "epss": 0.001, "percentile": 0.4, "modified": "2023-05-01"}, {"cve": "CVE-2021-35515", "epss": 0.00169, "percentile": 0.52441, "modified": "2023-05-01"}, {"cve": "CVE-2021-35516", "epss": 0.00228, "percentile": 0.59493, "modified": "2023-05-01"}, {"cve": "CVE-2021-35517", "epss": 0.00292, "percentile": 0.64471, "modified": "2023-05-01"}, {"cve": "CVE-2021-3572", "epss": 0.00057, "percentile": 0.21718, "modified": "2023-05-01"}, {"cve": "CVE-2021-35940", "epss": 0.00055, "percentile": 0.20893, "modified": "2023-05-02"}, {"cve": "CVE-2021-36090", "epss": 0.00218, "percentile": 0.58281, "modified": "2023-05-01"}, {"cve": "CVE-2021-3612", "epss": 0.00043, "percentile": 0.07857, "modified": "2023-05-01"}, {"cve": "CVE-2021-36373", "epss": 0.00073, "percentile": 0.2979, "modified": "2023-05-01"}, {"cve": "CVE-2021-36374", "epss": 0.00071, "percentile": 0.28925, "modified": "2023-05-01"}, {"cve": "CVE-2021-3672", "epss": 0.00126, "percentile": 0.45829, "modified": "2023-05-01"}, {"cve": "CVE-2021-37136", "epss": 0.00176, "percentile": 0.53198, "modified": "2023-05-02"}, {"cve": "CVE-2021-37137", "epss": 0.00176, "percentile": 0.53198, "modified": "2023-05-02"}, {"cve": "CVE-2021-37159", "epss": 0.00076, "percentile": 0.30818, "modified": "2023-05-01"}, {"cve": "CVE-2021-3737", "epss": 0.00303, "percentile": 0.65143, "modified": "2023-05-02"}, {"cve": "CVE-2021-3743", "epss": 0.00043, "percentile": 0.07862, "modified": "2023-05-02"}, {"cve": "CVE-2021-3744", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2021-3749", "epss": 0.00295, "percentile": 0.6463, "modified": "2023-05-02"}, {"cve": "CVE-2021-3752", "epss": 0.00097, "percentile": 0.39346, "modified": "2023-05-02"}, {"cve": "CVE-2021-37714", "epss": 0.0057, "percentile": 0.74606, "modified": "2023-05-02"}, {"cve": "CVE-2021-3772", "epss": 0.00139, "percentile": 0.4805, "modified": "2023-05-02"}, {"cve": "CVE-2021-3773", "epss": 0.00595, "percentile": 0.75185, "modified": "2023-05-02"}, {"cve": "CVE-2021-37750", "epss": 0.00323, "percentile": 0.66234, "modified": "2023-05-02"}, {"cve": "CVE-2021-38153", "epss": 0.00081, "percentile": 0.33025, "modified": "2023-05-02"}, {"cve": "CVE-2021-38296", "epss": 0.00072, "percentile": 0.29285, "modified": "2023-05-02"}, {"cve": "CVE-2021-38604", "epss": 0.00376, "percentile": 0.68696, "modified": "2023-05-01"}, {"cve": "CVE-2021-39139", "epss": 0.01657, "percentile": 0.85741, "modified": "2023-05-02"}, {"cve": "CVE-2021-39140", "epss": 0.00674, "percentile": 0.76869, "modified": "2023-05-02"}, {"cve": "CVE-2021-39141", "epss": 0.12837, "percentile": 0.94621, "modified": "2023-05-02"}, {"cve": "CVE-2021-39144", "epss": 0.97297, "percentile": 0.99757, "modified": "2023-05-02"}, {"cve": "CVE-2021-39145", "epss": 0.01276, "percentile": 0.83661, "modified": "2023-05-02"}, {"cve": "CVE-2021-39146", "epss": 0.15124, "percentile": 0.94983, "modified": "2023-05-02"}, {"cve": "CVE-2021-39147", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-39148", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-39149", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-39150", "epss": 0.00569, "percentile": 0.74553, "modified": "2023-05-02"}, {"cve": "CVE-2021-39151", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-39152", "epss": 0.00668, "percentile": 0.76746, "modified": "2023-05-02"}, {"cve": "CVE-2021-39153", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-39154", "epss": 0.00944, "percentile": 0.80847, "modified": "2023-05-02"}, {"cve": "CVE-2021-4002", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2021-40690", "epss": 0.00212, "percentile": 0.57736, "modified": "2023-05-02"}, {"cve": "CVE-2021-4083", "epss": 0.00043, "percentile": 0.07862, "modified": "2023-05-02"}, {"cve": "CVE-2021-4104", "epss": 0.94101, "percentile": 0.98694, "modified": "2023-05-02"}, {"cve": "CVE-2021-4115", "epss": 0.00043, "percentile": 0.07839, "modified": "2023-05-02"}, {"cve": "CVE-2021-41182", "epss": 0.00378, "percentile": 0.68811, "modified": "2023-05-02"}, {"cve": "CVE-2021-41183", "epss": 0.00249, "percentile": 0.61248, "modified": "2023-05-02"}, {"cve": "CVE-2021-41184", "epss": 0.00264, "percentile": 0.62566, "modified": "2023-05-02"}, {"cve": "CVE-2021-41303", "epss": 0.37727, "percentile": 0.96622, "modified": "2023-05-02"}, {"cve": "CVE-2021-41495", "epss": 0.00066, "percentile": 0.26933, "modified": "2023-05-02"}, {"cve": "CVE-2021-41496", "epss": 0.00043, "percentile": 0.07019, "modified": "2023-05-02"}, {"cve": "CVE-2021-4157", "epss": 0.00069, "percentile": 0.28244, "modified": "2023-05-02"}, {"cve": "CVE-2021-4160", "epss": 0.00125, "percentile": 0.45631, "modified": "2023-05-02"}, {"cve": "CVE-2021-41617", "epss": 0.00055, "percentile": 0.20782, "modified": "2023-05-02"}, {"cve": "CVE-2021-41771", "epss": 0.00556, "percentile": 0.74265, "modified": "2023-05-02"}, {"cve": "CVE-2021-41772", "epss": 0.00196, "percentile": 0.55941, "modified": "2023-05-02"}, {"cve": "CVE-2021-4197", "epss": 0.00043, "percentile": 0.07862, "modified": "2023-05-02"}, {"cve": "CVE-2021-4203", "epss": 0.00097, "percentile": 0.3931, "modified": "2023-05-02"}, {"cve": "CVE-2021-42340", "epss": 0.00781, "percentile": 0.78839, "modified": "2023-05-02"}, {"cve": "CVE-2021-42575", "epss": 0.00335, "percentile": 0.66888, "modified": "2023-05-02"}, {"cve": "CVE-2021-42739", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2021-43389", "epss": 0.00045, "percentile": 0.12522, "modified": "2023-05-02"}, {"cve": "CVE-2021-43396", "epss": 0.00212, "percentile": 0.57657, "modified": "2023-05-02"}, {"cve": "CVE-2021-43797", "epss": 0.00134, "percentile": 0.47121, "modified": "2023-05-02"}, {"cve": "CVE-2021-43818", "epss": 0.00151, "percentile": 0.49883, "modified": "2023-05-02"}, {"cve": "CVE-2021-43859", "epss": 0.00602, "percentile": 0.75342, "modified": "2023-05-02"}, {"cve": "CVE-2021-43976", "epss": 0.00096, "percentile": 0.389, "modified": "2023-05-02"}, {"cve": "CVE-2021-44531", "epss": 0.00159, "percentile": 0.50919, "modified": "2023-05-02"}, {"cve": "CVE-2021-44532", "epss": 0.00198, "percentile": 0.56166, "modified": "2023-05-02"}, {"cve": "CVE-2021-44533", "epss": 0.00169, "percentile": 0.5244, "modified": "2023-05-02"}, {"cve": "CVE-2021-44832", "epss": 0.09463, "percentile": 0.93793, "modified": "2023-05-02"}, {"cve": "CVE-2021-45485", "epss": 0.00076, "percentile": 0.30735, "modified": "2023-05-02"}, {"cve": "CVE-2021-45486", "epss": 0.00048, "percentile": 0.14944, "modified": "2023-05-02"}, {"cve": "CVE-2021-45943", "epss": 0.00069, "percentile": 0.28127, "modified": "2023-05-02"}, {"cve": "CVE-2022-0001", "epss": 0.00046, "percentile": 0.12892, "modified": "2023-05-02"}, {"cve": "CVE-2022-0002", "epss": 0.00046, "percentile": 0.12892, "modified": "2023-05-02"}, {"cve": "CVE-2022-0286", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2022-0322", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2022-0778", "epss": 0.01367, "percentile": 0.84247, "modified": "2023-05-02"}, {"cve": "CVE-2022-0839", "epss": 0.00297, "percentile": 0.64758, "modified": "2023-05-02"}, {"cve": "CVE-2022-1011", "epss": 0.00043, "percentile": 0.07862, "modified": "2023-05-02"}, {"cve": "CVE-2022-1154", "epss": 0.00068, "percentile": 0.27697, "modified": "2023-05-02"}, {"cve": "CVE-2022-1271", "epss": 0.00143, "percentile": 0.48708, "modified": "2023-05-02"}, {"cve": "CVE-2022-1292", "epss": 0.66207, "percentile": 0.97371, "modified": "2023-05-02"}, {"cve": "CVE-2022-21428", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21429", "epss": 0.00176, "percentile": 0.53206, "modified": "2023-05-02"}, {"cve": "CVE-2022-21432", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21439", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21455", "epss": 0.00046, "percentile": 0.12841, "modified": "2023-05-02"}, {"cve": "CVE-2022-21500", "epss": 0.96974, "percentile": 0.99553, "modified": "2023-05-02"}, {"cve": "CVE-2022-21508", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21509", "epss": 0.00079, "percentile": 0.32696, "modified": "2023-05-02"}, {"cve": "CVE-2022-21510", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21511", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21512", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21513", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21514", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21515", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21516", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21517", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21518", "epss": 0.00047, "percentile": 0.14368, "modified": "2023-05-02"}, {"cve": "CVE-2022-21519", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21520", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21521", "epss": 0.00047, "percentile": 0.14368, "modified": "2023-05-02"}, {"cve": "CVE-2022-21522", "epss": 0.00052, "percentile": 0.18144, "modified": "2023-05-02"}, {"cve": "CVE-2022-21523", "epss": 0.00045, "percentile": 0.11932, "modified": "2023-05-02"}, {"cve": "CVE-2022-21524", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21525", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21526", "epss": 0.00056, "percentile": 0.21301, "modified": "2023-05-02"}, {"cve": "CVE-2022-21527", "epss": 0.00056, "percentile": 0.21301, "modified": "2023-05-02"}, {"cve": "CVE-2022-21528", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21529", "epss": 0.00056, "percentile": 0.21301, "modified": "2023-05-02"}, {"cve": "CVE-2022-21530", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21531", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21532", "epss": 0.00045, "percentile": 0.11932, "modified": "2023-05-02"}, {"cve": "CVE-2022-21533", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21534", "epss": 0.00056, "percentile": 0.21301, "modified": "2023-05-02"}, {"cve": "CVE-2022-21535", "epss": 0.00049, "percentile": 0.16331, "modified": "2023-05-02"}, {"cve": "CVE-2022-21536", "epss": 0.00167, "percentile": 0.52, "modified": "2023-05-02"}, {"cve": "CVE-2022-21537", "epss": 0.00056, "percentile": 0.21249, "modified": "2023-05-02"}, {"cve": "CVE-2022-21538", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21539", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21540", "epss": 0.00077, "percentile": 0.31308, "modified": "2023-05-02"}, {"cve": "CVE-2022-21541", "epss": 0.00083, "percentile": 0.33851, "modified": "2023-05-02"}, {"cve": "CVE-2022-21542", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21543", "epss": 0.00229, "percentile": 0.59554, "modified": "2023-05-02"}, {"cve": "CVE-2022-21544", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21545", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21547", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21548", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21549", "epss": 0.00055, "percentile": 0.20895, "modified": "2023-05-02"}, {"cve": "CVE-2022-21550", "epss": 0.01991, "percentile": 0.87109, "modified": "2023-05-02"}, {"cve": "CVE-2022-21551", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21552", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21553", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21554", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21555", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21556", "epss": 0.00046, "percentile": 0.12791, "modified": "2023-05-02"}, {"cve": "CVE-2022-21557", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21558", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21559", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21560", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21561", "epss": 0.00047, "percentile": 0.14368, "modified": "2023-05-02"}, {"cve": "CVE-2022-21562", "epss": 0.00056, "percentile": 0.21433, "modified": "2023-05-02"}, {"cve": "CVE-2022-21563", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21564", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21565", "epss": 0.00046, "percentile": 0.12841, "modified": "2023-05-02"}, {"cve": "CVE-2022-21566", "epss": 0.00104, "percentile": 0.4123, "modified": "2023-05-02"}, {"cve": "CVE-2022-21567", "epss": 0.00104, "percentile": 0.4123, "modified": "2023-05-02"}, {"cve": "CVE-2022-21568", "epss": 0.00047, "percentile": 0.14368, "modified": "2023-05-02"}, {"cve": "CVE-2022-21569", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21570", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21571", "epss": 0.00043, "percentile": 0.07982, "modified": "2023-05-02"}, {"cve": "CVE-2022-21572", "epss": 0.00045, "percentile": 0.11932, "modified": "2023-05-02"}, {"cve": "CVE-2022-21573", "epss": 0.00044, "percentile": 0.11105, "modified": "2023-05-02"}, {"cve": "CVE-2022-21574", "epss": 0.00052, "percentile": 0.18409, "modified": "2023-05-02"}, {"cve": "CVE-2022-21575", "epss": 0.00047, "percentile": 0.14428, "modified": "2023-05-02"}, {"cve": "CVE-2022-21576", "epss": 0.00047, "percentile": 0.14428, "modified": "2023-05-02"}, {"cve": "CVE-2022-21577", "epss": 0.00048, "percentile": 0.15019, "modified": "2023-05-02"}, {"cve": "CVE-2022-21578", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21579", "epss": 0.00048, "percentile": 0.15019, "modified": "2023-05-02"}, {"cve": "CVE-2022-21580", "epss": 0.00047, "percentile": 0.14428, "modified": "2023-05-02"}, {"cve": "CVE-2022-21581", "epss": 0.00046, "percentile": 0.12791, "modified": "2023-05-02"}, {"cve": "CVE-2022-21582", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21583", "epss": 0.00047, "percentile": 0.14428, "modified": "2023-05-02"}, {"cve": "CVE-2022-21584", "epss": 0.00048, "percentile": 0.15019, "modified": "2023-05-02"}, {"cve": "CVE-2022-21585", "epss": 0.00049, "percentile": 0.15154, "modified": "2023-05-02"}, {"cve": "CVE-2022-21586", "epss": 0.00048, "percentile": 0.15019, "modified": "2023-05-02"}, {"cve": "CVE-2022-21824", "epss": 0.00292, "percentile": 0.64478, "modified": "2023-05-02"}, {"cve": "CVE-2022-22720", "epss": 0.00309, "percentile": 0.65514, "modified": "2023-05-02"}, {"cve": "CVE-2022-22721", "epss": 0.00438, "percentile": 0.70994, "modified": "2023-05-02"}, {"cve": "CVE-2022-22946", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2022-22947", "epss": 0.97536, "percentile": 0.99984, "modified": "2023-05-02"}, {"cve": "CVE-2022-22963", "epss": 0.97501, "percentile": 0.99959, "modified": "2023-05-02"}, {"cve": "CVE-2022-22965", "epss": 0.97527, "percentile": 0.99979, "modified": "2023-05-02"}, {"cve": "CVE-2022-22968", "epss": 0.00052, "percentile": 0.18573, "modified": "2023-05-02"}, {"cve": "CVE-2022-22969", "epss": 0.00107, "percentile": 0.42045, "modified": "2023-05-02"}, {"cve": "CVE-2022-22970", "epss": 0.00071, "percentile": 0.29101, "modified": "2023-05-02"}, {"cve": "CVE-2022-22971", "epss": 0.00341, "percentile": 0.67108, "modified": "2023-05-02"}, {"cve": "CVE-2022-22976", "epss": 0.00082, "percentile": 0.33546, "modified": "2023-05-02"}, {"cve": "CVE-2022-22978", "epss": 0.05644, "percentile": 0.92105, "modified": "2023-05-02"}, {"cve": "CVE-2022-23181", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2022-23218", "epss": 0.00165, "percentile": 0.51735, "modified": "2023-05-02"}, {"cve": "CVE-2022-23219", "epss": 0.00193, "percentile": 0.55508, "modified": "2023-05-02"}, {"cve": "CVE-2022-23302", "epss": 0.00811, "percentile": 0.79308, "modified": "2023-05-02"}, {"cve": "CVE-2022-23305", "epss": 0.00357, "percentile": 0.67904, "modified": "2023-05-02"}, {"cve": "CVE-2022-23307", "epss": 0.01262, "percentile": 0.83575, "modified": "2023-05-02"}, {"cve": "CVE-2022-23308", "epss": 0.00217, "percentile": 0.58225, "modified": "2023-05-02"}, {"cve": "CVE-2022-23437", "epss": 0.00474, "percentile": 0.72078, "modified": "2023-05-02"}, {"cve": "CVE-2022-23457", "epss": 0.00193, "percentile": 0.55568, "modified": "2023-05-02"}, {"cve": "CVE-2022-23632", "epss": 0.00078, "percentile": 0.32334, "modified": "2023-05-02"}, {"cve": "CVE-2022-23772", "epss": 0.00155, "percentile": 0.50438, "modified": "2023-05-02"}, {"cve": "CVE-2022-23773", "epss": 0.00075, "percentile": 0.30472, "modified": "2023-05-02"}, {"cve": "CVE-2022-23806", "epss": 0.00247, "percentile": 0.61139, "modified": "2023-05-02"}, {"cve": "CVE-2022-24329", "epss": 0.00088, "percentile": 0.363, "modified": "2023-05-02"}, {"cve": "CVE-2022-24407", "epss": 0.00133, "percentile": 0.46969, "modified": "2023-05-02"}, {"cve": "CVE-2022-24728", "epss": 0.00183, "percentile": 0.54081, "modified": "2023-05-02"}, {"cve": "CVE-2022-24729", "epss": 0.00178, "percentile": 0.53528, "modified": "2023-05-02"}, {"cve": "CVE-2022-24735", "epss": 0.00066, "percentile": 0.27234, "modified": "2023-05-02"}, {"cve": "CVE-2022-24736", "epss": 0.00043, "percentile": 0.07823, "modified": "2023-05-02"}, {"cve": "CVE-2022-24801", "epss": 0.00378, "percentile": 0.68825, "modified": "2023-05-02"}, {"cve": "CVE-2022-24823", "epss": 0.00044, "percentile": 0.08403, "modified": "2023-05-02"}, {"cve": "CVE-2022-24839", "epss": 0.00127, "percentile": 0.46008, "modified": "2023-05-02"}, {"cve": "CVE-2022-24891", "epss": 0.00077, "percentile": 0.31599, "modified": "2023-05-02"}, {"cve": "CVE-2022-25169", "epss": 0.00127, "percentile": 0.46011, "modified": "2023-05-02"}, {"cve": "CVE-2022-25636", "epss": 0.00044, "percentile": 0.10574, "modified": "2023-05-02"}, {"cve": "CVE-2022-25647", "epss": 0.00092, "percentile": 0.37961, "modified": "2023-05-02"}, {"cve": "CVE-2022-25762", "epss": 0.00202, "percentile": 0.56608, "modified": "2023-05-01"}, {"cve": "CVE-2022-25845", "epss": 0.00154, "percentile": 0.50204, "modified": "2023-05-02"}, {"cve": "CVE-2022-27778", "epss": 0.00059, "percentile": 0.22867, "modified": "2023-05-02"}, {"cve": "CVE-2022-29577", "epss": 0.00116, "percentile": 0.43983, "modified": "2023-05-02"}, {"cve": "CVE-2022-29824", "epss": 0.00095, "percentile": 0.38764, "modified": "2023-05-02"}, {"cve": "CVE-2022-29885", "epss": 0.01481, "percentile": 0.84823, "modified": "2023-05-02"}, {"cve": "CVE-2022-30126", "epss": 0.00067, "percentile": 0.27379, "modified": "2023-05-02"}, {"cve": "CVE-2022-34169", "epss": 0.00101, "percentile": 0.40142, "modified": "2023-05-02"}], "vulnersScore": 7.7}, "_state": {"dependencies": 1701634330, "score": 1701634719, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "dd6b2e3d5acf7bdcbacee498cbc10d72"}, "affectedSoftware": [{"version": "23.1", "operator": "le", "name": "big data spatial and graph"}, {"version": "21.3", "operator": "le", "name": "oracle essbase"}, {"version": "12.2.0.1.30", "operator": "le", "name": "oracle global lifecycle management opatch"}, {"version": "21c", "operator": "le", "name": "oracle goldengate"}, {"version": "19c", "operator": "le", "name": "oracle stream analytics"}, {"version": "22.2.0", "operator": "le", "name": "oracle graph server and client"}, {"version": "22.1.1", "operator": "le", "name": "oracle rest data services"}, {"version": "22.1.0", "operator": "le", "name": "oracle spatial studio"}, {"version": "22.1.1.1.0", "operator": "le", "name": "oracle timesten in-memory database"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce guided search"}, {"version": "11.3.1", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.3.0", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce platform"}, {"version": "11.3.2", "operator": "le", "name": "oracle commerce merchandising"}, {"version": "10.0.1.5.0", "operator": "le", "name": "oracle communications instant messaging server"}, {"version": "12.0.0.5.1", "operator": "le", "name": "oracle communications offline mediation controller"}, {"version": "12.0.0.4.4", "operator": "le", "name": "oracle communications offline mediation controller"}, {"version": "7.5.0", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.2", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "7.4.1", "operator": "le", "name": "oracle communications unified inventory management"}, {"version": "12.0.0.4.0", "operator": "le", "name": "oracle communications billing and revenue management"}, {"version": "12.0.0.5.1", "operator": "le", "name": "oracle communications brm - elastic charging engine"}, {"version": "12.0.0.4.6", "operator": "le", "name": "oracle communications brm - elastic charging engine"}, {"version": "7.3", "operator": "le", "name": "oracle communications asap"}, {"version": "7.4.2", "operator": "le", "name": "oracle communications design studio"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core binding support function"}, {"version": "22.1.3", "operator": "le", "name": "oracle communications cloud native core binding support function"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core console"}, {"version": "22.1.2", "operator": "le", "name": "oracle communications cloud native core console"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core network repository function"}, {"version": "22.1.2", "operator": "le", "name": "oracle communications cloud native core network repository function"}, {"version": "22.1.1", "operator": "le", "name": "oracle communications cloud native core security edge protection proxy"}, {"version": "22.1.1", "operator": "le", "name": "oracle communications cloud native core network exposure function"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core network function cloud native environment"}, {"version": "22.1.2", "operator": "le", "name": "oracle communications cloud native core network function cloud native environment"}, {"version": "22.1.0", "operator": "le", "name": "oracle communications cloud native core network function cloud native environment"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core policy"}, {"version": "22.1.3", "operator": "le", "name": "oracle communications cloud native core policy"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core unified data repository"}, {"version": "5.0", "operator": "le", "name": "oracle enterprise operations monitor"}, {"version": "4.4", "operator": "le", "name": "oracle enterprise operations monitor"}, {"version": "4.3", "operator": "le", "name": "oracle enterprise operations monitor"}, {"version": "5.0", "operator": "le", "name": "oracle communications operations monitor"}, {"version": "4.4", "operator": "le", "name": "oracle communications operations monitor"}, {"version": "4.3", "operator": "le", "name": "oracle communications operations monitor"}, {"version": "22.1.1", "operator": "le", "name": "oracle communications cloud native core network slice selection function"}, {"version": "22.2.0", "operator": "le", "name": "oracle communications cloud native core service communication proxy"}, {"version": "8.2.5", "operator": "le", "name": "oracle communications core session manager"}, {"version": "8.4.5", "operator": "le", "name": "oracle communications core session manager"}, {"version": "9.1", "operator": "le", "name": "oracle communications session border controller"}, {"version": "9.0", "operator": "le", "name": "oracle communications session border controller"}, {"version": "8.4", "operator": "le", "name": "oracle communications session border controller"}, {"version": "8.2.5", "operator": "le", "name": "oracle communications unified session manager"}, {"version": "3.3", "operator": "le", "name": "oracle enterprise communications broker"}, {"version": "9.1", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "9.0", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "8.4", "operator": "le", "name": "oracle enterprise session border controller"}, {"version": "9.1", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "9.0", "operator": "le", "name": "oracle sd-wan edge"}, {"version": "11.1.2.0.000", "operator": "le", "name": "oracle crystal ball"}, {"version": "19.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "20.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "18.8.0", "operator": "le", "name": "primavera gateway"}, {"version": "21.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "17.12.0", "operator": "le", "name": "primavera gateway"}, {"version": "17.7", "operator": "le", "name": "primavera unifier"}, {"version": "21.12", "operator": "le", "name": "primavera unifier"}, {"version": "18.8", "operator": "le", "name": "primavera unifier"}, {"version": "20.12", "operator": "le", "name": "primavera unifier"}, {"version": "19.12", "operator": "le", "name": "primavera unifier"}, {"version": "19.12.0.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "18.8.0.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "20.12.0.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "21.12.0.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "17.12.0.0", "operator": "le", "name": "primavera p6 enterprise project portfolio management"}, {"version": "12.2.3", "operator": "le", "name": "oracle e-business suite information discovery"}, {"version": "12.2.9", "operator": "le", "name": "oracle applications framework"}, {"version": "12.2.4", "operator": "le", "name": "oracle user management"}, {"version": "12.2.3", "operator": "le", "name": "oracle workflow"}, {"version": "12.2.3", "operator": "le", "name": "oracle ireceivables"}, {"version": "12.2.3", "operator": "le", "name": "oracle irecruitment"}, {"version": "12.4.0.0", "operator": "le", "name": "enterprise manager ops center"}, {"version": "13.4.0.0", "operator": "le", "name": "enterprise manager base platform"}, {"version": "13.5.0.0", "operator": "le", "name": "enterprise manager base platform"}, {"version": "13.3.0.1", "operator": "le", "name": "oracle application testing suite"}, {"version": "14.5", "operator": "le", "name": "oracle banking branch"}, {"version": "14.5", "operator": "le", "name": "oracle banking cash management"}, {"version": "14.5", "operator": "le", "name": "oracle banking corporate lending process management"}, {"version": "14.5", "operator": "le", "name": "oracle banking credit facilities process management"}, {"version": "14.5", "operator": "le", "name": "oracle banking electronic data exchange for corporates"}, {"version": "14.2", "operator": "le", "name": "oracle banking liquidity management"}, {"version": "14.5", "operator": "le", "name": "oracle banking liquidity management"}, {"version": "14.5", "operator": "le", "name": "oracle banking origination"}, {"version": "14.5", "operator": "le", "name": "oracle banking supply chain finance"}, {"version": "14.5", "operator": "le", "name": "oracle banking trade finance process management"}, {"version": "14.5", "operator": "le", "name": "oracle banking virtual account management"}, {"version": "8.0.8.2.0", "operator": "le", "name": "oracle financial services crime and compliance management studio"}, {"version": "8.0.8.3.0", "operator": "le", "name": "oracle financial services crime and compliance management studio"}, {"version": "8.1.1.0", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.0.7.0", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.1.2.0", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.1.2.1", "operator": "le", "name": "oracle financial services analytical applications infrastructure"}, {"version": "8.1.1.0", "operator": "le", "name": "oracle financial services behavior detection platform"}, {"version": "8.0.7.0", "operator": "le", "name": "oracle financial services behavior detection platform"}, {"version": "8.0.8.0", "operator": "le", "name": "oracle financial services behavior detection platform"}, {"version": "8.0.7.1", "operator": "le", "name": "oracle financial services enterprise case management"}, {"version": "8.1.1.0", "operator": "le", "name": "oracle financial services enterprise case management"}, {"version": "8.0.8.1", "operator": "le", "name": "oracle financial services enterprise case management"}, {"version": "8.0.8.0", "operator": "le", "name": "oracle financial services enterprise case management"}, {"version": "8.0.7.2", "operator": "le", "name": "oracle financial services enterprise case management"}, {"version": "8.0.7.0", "operator": "le", "name": "oracle financial services trade-based anti money laundering enterprise edition"}, {"version": "8.0.8.0", "operator": "le", "name": "oracle financial services trade-based anti money laundering enterprise edition"}, {"version": "12.1", "operator": "le", "name": "oracle flexcube private banking"}, {"version": "14.0", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.1", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.3", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "14.5", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "12.4", "operator": "le", "name": "oracle flexcube universal banking"}, {"version": "14.5", "operator": "le", "name": "oracle banking trade finance"}, {"version": "2.7", "operator": "le", "name": "oracle banking deposits and lines of credit servicing"}, {"version": "2.7", "operator": "le", "name": "oracle banking party management"}, {"version": "2.9", "operator": "le", "name": "oracle banking platform"}, {"version": "2.12", "operator": "le", "name": "oracle banking platform"}, {"version": "2.6.2", "operator": "le", "name": "oracle banking platform"}, {"version": "2.9.0.1.0", "operator": "le", "name": "oracle financial services revenue management and billing"}, {"version": "3.0.0.0.0", "operator": "le", "name": "oracle financial services revenue management and billing"}, {"version": "4.0.0.0.0", "operator": "le", "name": "oracle financial services revenue management and billing"}, {"version": "2.9.0.0.0", "operator": "le", "name": "oracle financial services revenue management and billing"}, {"version": "5.2", "operator": "le", "name": "oracle flexcube core banking"}, {"version": "11.6", "operator": "le", "name": "oracle flexcube core banking"}, {"version": "11.10", "operator": "le", "name": "oracle flexcube core banking"}, {"version": "9.1", "operator": "le", "name": "oracle hospitality inventory management"}, {"version": "18.1", "operator": "le", "name": "oracle hospitality materials control"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle middleware common libraries and tools"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle middleware common libraries and tools"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle weblogic server"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle http server"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle http server"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle security service"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle security service"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle weblogic server proxy plug-in"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle weblogic server proxy plug-in"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle webcenter portal"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle bi publisher"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle coherence"}, {"version": "3.7.1.0", "operator": "le", "name": "oracle coherence"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle coherence"}, {"version": "14.1.1.0.0", "operator": "le", "name": "oracle coherence"}, {"version": "13.9.4.2.10", "operator": "le", "name": "oracle global lifecycle management nextgen oui framework"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle managed file transfer"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle managed file transfer"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle soa suite"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle soa suite"}, {"version": "12.2.1.3.0", "operator": "le", "name": "oracle webcenter content"}, {"version": "12.2.1.4.0", "operator": "le", "name": "oracle webcenter content"}, {"version": "5.9.0.0.0", "operator": "le", "name": "oracle business intelligence enterprise edition"}, {"version": "4.4.2", "operator": "le", "name": "oracle webcenter sites support tools"}, {"version": "9.2.0.52", "operator": "le", "name": "oracle health sciences empirica signal"}, {"version": "9.1.0.52", "operator": "le", "name": "oracle health sciences empirica signal"}, {"version": "3.0.0.0", "operator": "le", "name": "oracle health sciences data management workbench"}, {"version": "2.4.8.7", "operator": "le", "name": "oracle health sciences data management workbench"}, {"version": "2.5.2.1", "operator": "le", "name": "oracle health sciences data management workbench"}, {"version": "3.1.0.3", "operator": "le", "name": "oracle health sciences data management workbench"}, {"version": "8.2.1", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "8.1.0", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "8.2.0", "operator": "le", "name": "oracle healthcare foundation"}, {"version": "3.0.0.1", "operator": "le", "name": "oracle health sciences information manager"}, {"version": "3.0.1.0", "operator": "le", "name": "oracle health sciences information manager"}, {"version": "5.6", "operator": "le", "name": "oracle hospitality opera 5"}, {"version": "20.2.1", "operator": "le", "name": "oracle hospitality cruise shipboard property management system"}, {"version": "22.1.0", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "7u343", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "21.3.2", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "11.0.15.1", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "8u333", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "18.0.1.1", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "17.0.3.1", "operator": "le", "name": "oracle java se, oracle graalvm enterprise edition"}, {"version": "20.3.6", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "22.1.0", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "21.3.2", "operator": "le", "name": "oracle graalvm enterprise edition"}, {"version": "9.2.6.1", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.2.6.3", "operator": "le", "name": "jd edwards enterpriseone tools"}, {"version": "9.2.6.3", "operator": "le", "name": "jd edwards enterpriseone orchestrator"}, {"version": "8.0.29", "operator": "le", "name": "mysql enterprise monitor"}, {"version": "8.0.30", "operator": "le", "name": "mysql enterprise monitor"}, {"version": "8.0.25", "operator": "le", "name": "mysql enterprise monitor"}, {"version": "8.0.29", "operator": "le", "name": "mysql server"}, {"version": "8.0.28", "operator": "le", "name": "mysql server"}, {"version": "5.7.38", "operator": "le", "name": "mysql server"}, {"version": "8.0.29", "operator": "le", "name": "mysql workbench"}, {"version": "7.4.36", "operator": "le", "name": "mysql cluster"}, {"version": "8.0.29", "operator": "le", "name": "mysql cluster"}, {"version": "7.5.26", "operator": "le", "name": "mysql cluster"}, {"version": "7.6.22", "operator": "le", "name": "mysql cluster"}, {"version": "1.1.8", "operator": "le", "name": "mysql shell for vs code"}, {"version": "8.0.28", "operator": "le", "name": "mysql shell"}, {"version": "8.58", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "8.59", "operator": "le", "name": "peoplesoft enterprise peopletools"}, {"version": "12.2.0", "operator": "le", "name": "oracle policy automation"}, {"version": "12.2.0", "operator": "le", "name": "oracle policy automation for mobile devices"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail bulk data integration"}, {"version": "19.0", "operator": "le", "name": "oracle retail customer management and segmentation foundation"}, {"version": "17.0", "operator": "le", "name": "oracle retail customer management and segmentation foundation"}, {"version": "18.0", "operator": "le", "name": "oracle retail customer management and segmentation foundation"}, {"version": "13.2.5", "operator": "le", "name": "oracle retail extract transform and load"}, {"version": "19.0.1", "operator": "le", "name": "oracle retail financial integration"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail financial integration"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail financial integration"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail financial integration"}, {"version": "19.0.1", "operator": "le", "name": "oracle retail integration bus"}, {"version": "14.1.3.2", "operator": "le", "name": "oracle retail integration bus"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail integration bus"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail integration bus"}, {"version": "19.0.1", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail merchandising system"}, {"version": "15.0.2", "operator": "le", "name": "oracle retail customer insights"}, {"version": "16.0.2", "operator": "le", "name": "oracle retail customer insights"}, {"version": "18.0", "operator": "le", "name": "oracle retail order broker"}, {"version": "19.1", "operator": "le", "name": "oracle retail order broker"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail sales audit"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail sales audit"}, {"version": "15.0.3.1", "operator": "le", "name": "oracle retail allocation"}, {"version": "16.0.3", "operator": "le", "name": "oracle retail allocation"}, {"version": "18.0.3", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "20.0.1", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "17.0.4", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "21.0.1", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "19.0.2", "operator": "le", "name": "oracle retail xstore point of service"}, {"version": "19.0.1", "operator": "le", "name": "oracle retail pricing"}, {"version": "22.6", "operator": "le", "name": "siebel apps - field service"}, {"version": "6.2.1.0", "operator": "le", "name": "oracle agile engineering data management"}, {"version": "1.4.4", "operator": "le", "name": "oracle transportation management"}, {"version": "9.3.6", "operator": "le", "name": "oracle agile plm"}, {"version": "6.2.3", "operator": "le", "name": "oracle agile product lifecycle management for process"}, {"version": "6.2.2", "operator": "le", "name": "oracle agile product lifecycle management for process"}, {"version": "3.6.1", "operator": "le", "name": "oracle product lifecycle analytics"}, {"version": "21.0.2", "operator": "le", "name": "oracle autovue for agile product lifecycle management"}, {"version": "8.8", "operator": "le", "name": "oracle zfs storage appliance kit"}, {"version": "11", "operator": "le", "name": "oracle solaris"}, {"version": "10", "operator": "le", "name": "oracle solaris"}, {"version": "4.5.0.0.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.4.0.0.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.3.0.5.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.4.0.3.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.3.0.6.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "4.4.0.2.0", "operator": "le", "name": "oracle utilities framework"}, {"version": "6.1.36", "operator": "le", "name": "oracle vm virtualbox"}]}
{"freebsd": [{"lastseen": "2023-12-03T16:50:38", "description": "\n\nOracle reports:\n\nThis Critical Patch Update contains 34 new security patches plus\n\t additional third party patches noted below for Oracle MySQL. 10 of\n\t these vulnerabilities may be remotely exploitable without\n\t authentication, i.e., may be exploited over a network without\n\t requiring user credentials.\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2022-07-19T00:00:00", "type": "freebsd", "title": "MySQL -- Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-25032", "CVE-2022-1292", "CVE-2022-21455", "CVE-2022-21509", "CVE-2022-21515", "CVE-2022-21517", "CVE-2022-21519", "CVE-2022-21522", "CVE-2022-21525", "CVE-2022-21526", "CVE-2022-21527", "CVE-2022-21528", "CVE-2022-21529", "CVE-2022-21530", "CVE-2022-21531", "CVE-2022-21534", "CVE-2022-21535", "CVE-2022-21537", "CVE-2022-21538", "CVE-2022-21539", "CVE-2022-21547", "CVE-2022-21550", "CVE-2022-21553", "CVE-2022-21556", "CVE-2022-21569", "CVE-2022-21824", "CVE-2022-27778"], "modified": "2022-07-19T00:00:00", "id": "8E150606-08C9-11ED-856E-D4C9EF517024", "href": "https://vuxml.freebsd.org/freebsd/8e150606-08c9-11ed-856e-d4c9ef517024.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-12-03T16:50:38", "description": "\n\nNode.js reports:\n\nImproper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.\nCertificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)\nNode.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.\nIncorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)\nNode.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.\nPrototype pollution via console.table properties (Low)(CVE-2022-21824)\nDue to the formatting logic of the console.table() function it was not safe to allow user controlled input to be passed to the properties parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be __proto__. The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.\n\n\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 8.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 4.2}, "published": "2022-01-10T00:00:00", "type": "freebsd", "title": "Node.js -- January 2022 Security Releases", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-44531", "CVE-2021-44532", "CVE-2021-44533", "CVE-2022-21824"], "modified": "2022-01-10T00:00:00", "id": "972BA0E8-8B8A-11EC-B369-6C3BE5272ACD", "href": "https://vuxml.freebsd.org/freebsd/972ba0e8-8b8a-11ec-b369-6c3be5272acd.html", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:P"}}], "nessus": [{"lastseen": "2023-11-02T15:14:43", "description": "The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 8e150606-08c9-11ed-856e-d4c9ef517024 advisory.\n\n - zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. (CVE-2018-25032)\n\n - The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.\n Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n).\n Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd). (CVE-2022-1292)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). (CVE-2022-21455)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2022-21509, CVE-2022-21527, CVE-2022-21528)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21515)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21517, CVE-2022-21537)\n\n - Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21519)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21522)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21525, CVE-2022-21526, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21534)\n\n - Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: General/Core Client).\n Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL Shell. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Shell. CVSS 3.1 Base Score 2.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L). (CVE-2022-21535)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).\n Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). (CVE-2022-21538)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).\n (CVE-2022-21539)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21547)\n\n - Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior and and 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). (CVE-2022-21550)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). (CVE-2022-21556)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21569)\n\n - Due to the formatting logic of the console.table() function it was not safe to allow user controlled input to be passed to the properties parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be __proto__. The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to. (CVE-2022-21824)\n\n - A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no- clobber` is used together with `--remove-on-error`. (CVE-2022-27778)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-07-21T00:00:00", "type": "nessus", "title": "FreeBSD : MySQL -- Multiple vulnerabilities (8e150606-08c9-11ed-856e-d4c9ef517024)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-25032", "CVE-2022-1292", "CVE-2022-21455", "CVE-2022-21509", "CVE-2022-21515", "CVE-2022-21517", "CVE-2022-21519", "CVE-2022-21522", "CVE-2022-21525", "CVE-2022-21526", "CVE-2022-21527", "CVE-2022-21528", "CVE-2022-21529", "CVE-2022-21530", "CVE-2022-21531", "CVE-2022-21534", "CVE-2022-21535", "CVE-2022-21537", "CVE-2022-21538", "CVE-2022-21539", "CVE-2022-21547", "CVE-2022-21550", "CVE-2022-21553", "CVE-2022-21556", "CVE-2022-21569", "CVE-2022-21824", "CVE-2022-27778"], "modified": "2023-11-01T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:mysql-client80", "p-cpe:/a:freebsd:freebsd:mysql-server56", "p-cpe:/a:freebsd:freebsd:mysql-server57", "p-cpe:/a:freebsd:freebsd:mysql-server80", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_8E15060608C911ED856ED4C9EF517024.NASL", "href": "https://www.tenable.com/plugins/nessus/163329", "sourceData": "#\n# (C) Tenable, Inc.\n#\n# @NOAGENT@\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n#\n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163329);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/01\");\n\n script_cve_id(\n \"CVE-2018-25032\",\n \"CVE-2022-1292\",\n \"CVE-2022-21455\",\n \"CVE-2022-21509\",\n \"CVE-2022-21515\",\n \"CVE-2022-21517\",\n \"CVE-2022-21519\",\n \"CVE-2022-21522\",\n \"CVE-2022-21525\",\n \"CVE-2022-21526\",\n \"CVE-2022-21527\",\n \"CVE-2022-21528\",\n \"CVE-2022-21529\",\n \"CVE-2022-21530\",\n \"CVE-2022-21531\",\n \"CVE-2022-21534\",\n \"CVE-2022-21535\",\n \"CVE-2022-21537\",\n \"CVE-2022-21538\",\n \"CVE-2022-21539\",\n \"CVE-2022-21547\",\n \"CVE-2022-21550\",\n \"CVE-2022-21553\",\n \"CVE-2022-21556\",\n \"CVE-2022-21569\",\n \"CVE-2022-21824\",\n \"CVE-2022-27778\"\n );\n script_xref(name:\"IAVA\", value:\"2022-A-0291-S\");\n\n script_name(english:\"FreeBSD : MySQL -- Multiple vulnerabilities (8e150606-08c9-11ed-856e-d4c9ef517024)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple\nvulnerabilities as referenced in the 8e150606-08c9-11ed-856e-d4c9ef517024 advisory.\n\n - zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many\n distant matches. (CVE-2018-25032)\n\n - The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This\n script is distributed by some operating systems in a manner where it is automatically executed. On such\n operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of\n the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.\n Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n).\n Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd). (CVE-2022-1292)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported\n versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification access to critical data or all\n MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). (CVE-2022-21455)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server\n accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2022-21509, CVE-2022-21527, CVE-2022-21528)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions\n that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high\n privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable\n crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21515)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL\n Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21517, CVE-2022-21537)\n\n - Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported\n versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows unauthenticated\n attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of\n this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash\n (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21519)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported\n versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21522)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21525, CVE-2022-21526, CVE-2022-21529,\n CVE-2022-21530, CVE-2022-21531, CVE-2022-21553)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21534)\n\n - Vulnerability in the MySQL Shell product of Oracle MySQL (component: Shell: General/Core Client).\n Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows\n unauthenticated attacker with logon to the infrastructure where MySQL Shell executes to compromise MySQL\n Shell. Successful attacks require human interaction from a person other than the attacker. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service\n (partial DOS) of MySQL Shell. CVSS 3.1 Base Score 2.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L). (CVE-2022-21535)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).\n Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low\n privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service\n (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). (CVE-2022-21538)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well\n as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause\n a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality,\n Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).\n (CVE-2022-21539)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21547)\n\n - Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported\n versions that are affected are 7.4.36 and prior, 7.5.26 and prior, 7.6.22 and prior and and 8.0.29 and\n prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical\n communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL\n Cluster. Successful attacks require human interaction from a person other than the attacker. Successful\n attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3\n (Confidentiality, Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). (CVE-2022-21550)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification access to critical data or all\n MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash\n (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). (CVE-2022-21556)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21569)\n\n - Due to the formatting logic of the console.table() function it was not safe to allow user controlled\n input to be passed to the properties parameter while simultaneously passing a plain object with at least\n one property as the first parameter, which could be __proto__. The prototype pollution has very limited\n control, in that it only allows an empty string to be assigned to numerical keys of the object\n prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object\n these properties are being assigned to. (CVE-2022-21824)\n\n - A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-\n clobber` is used together with `--remove-on-error`. (CVE-2022-27778)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL\");\n # https://vuxml.freebsd.org/freebsd/8e150606-08c9-11ed-856e-d4c9ef517024.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?85ee4140\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-1292\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/01/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/07/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/07/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql-client80\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql-server56\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql-server57\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:mysql-server80\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"freebsd_package.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nvar flag = 0;\n\nvar packages = [\n 'mysql-client80<8.0.30',\n 'mysql-server56<5.6.52',\n 'mysql-server57<5.7.39',\n 'mysql-server80<8.0.30'\n];\n\nforeach var package( packages ) {\n if (pkg_test(save_report:TRUE, pkg: package)) flag++;\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : pkg_report_get()\n );\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-07-11T04:45:09", "description": "The remote Ubuntu 18.04 LTS / 20.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5537-1 advisory.\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2022-21509, CVE-2022-21527, CVE-2022-21528)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21515)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21517, CVE-2022-21537)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21522)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21525, CVE-2022-21526, CVE-2022-21529, CVE-2022-21530, CVE-2022-21531, CVE-2022-21553)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21534)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).\n Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). (CVE-2022-21538)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).\n (CVE-2022-21539)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21547)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21569)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-07-28T00:00:00", "type": "nessus", "title": "Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS : MySQL vulnerabilities (USN-5537-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2022-21509", "CVE-2022-21515", "CVE-2022-21517", "CVE-2022-21522", "CVE-2022-21525", "CVE-2022-21526", "CVE-2022-21527", "CVE-2022-21528", "CVE-2022-21529", "CVE-2022-21530", "CVE-2022-21531", "CVE-2022-21534", "CVE-2022-21537", "CVE-2022-21538", "CVE-2022-21539", "CVE-2022-21547", "CVE-2022-21553", "CVE-2022-21569"], "modified": "2023-07-10T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "cpe:/o:canonical:ubuntu_linux:22.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient20", "p-cpe:/a:canonical:ubuntu_linux:libmysqlclient21", "p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev", "p-cpe:/a:canonical:ubuntu_linux:mysql-client", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-router", "p-cpe:/a:canonical:ubuntu_linux:mysql-server", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-source-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-source-8.0", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-5.7", "p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-8.0"], "id": "UBUNTU_USN-5537-1.NASL", "href": "https://www.tenable.com/plugins/nessus/163522", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-5537-1. The text\n# itself is copyright (C) Canonical, Inc. See\n# <https://ubuntu.com/security/notices>. Ubuntu(R) is a registered\n# trademark of Canonical, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163522);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/07/10\");\n\n script_cve_id(\n \"CVE-2022-21509\",\n \"CVE-2022-21515\",\n \"CVE-2022-21517\",\n \"CVE-2022-21522\",\n \"CVE-2022-21525\",\n \"CVE-2022-21526\",\n \"CVE-2022-21527\",\n \"CVE-2022-21528\",\n \"CVE-2022-21529\",\n \"CVE-2022-21530\",\n \"CVE-2022-21531\",\n \"CVE-2022-21534\",\n \"CVE-2022-21537\",\n \"CVE-2022-21538\",\n \"CVE-2022-21539\",\n \"CVE-2022-21547\",\n \"CVE-2022-21553\",\n \"CVE-2022-21569\"\n );\n script_xref(name:\"USN\", value:\"5537-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 LTS / 22.04 LTS : MySQL vulnerabilities (USN-5537-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Ubuntu 18.04 LTS / 20.04 LTS host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the USN-5537-1 advisory.\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server\n accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). (CVE-2022-21509, CVE-2022-21527, CVE-2022-21528)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions\n that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high\n privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable\n crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21515)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL\n Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21517, CVE-2022-21537)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported\n versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21522)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21525, CVE-2022-21526, CVE-2022-21529,\n CVE-2022-21530, CVE-2022-21531, CVE-2022-21553)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21534)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption).\n Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low\n privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service\n (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L). (CVE-2022-21538)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are\n affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with\n network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability\n can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well\n as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause\n a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality,\n Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).\n (CVE-2022-21539)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21547)\n\n - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported\n versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged\n attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this\n vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete\n DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector:\n (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). (CVE-2022-21569)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-5537-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:M/C:N/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-21528\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/07/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/07/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/07/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:22.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqlclient21\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libmysqld-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-client-core-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-router\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-core-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-source-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-source-8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-testsuite-8.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2022-2023 Canonical, Inc. / NASL script (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('18.04' >< os_release || '20.04' >< os_release || '22.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 18.04 / 20.04 / 22.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar pkgs = [\n {'osver': '18.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'libmysqlclient20', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'libmysqld-dev', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-client', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-client-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-client-core-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-server', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-server-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-server-core-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-source-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-testsuite', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '18.04', 'pkgname': 'mysql-testsuite-5.7', 'pkgver': '5.7.39-0ubuntu0.18.04.2'},\n {'osver': '20.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'libmysqlclient21', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-client-core-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-router', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-server-core-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-source-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-testsuite', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '20.04', 'pkgname': 'mysql-testsuite-8.0', 'pkgver': '8.0.30-0ubuntu0.20.04.2'},\n {'osver': '22.04', 'pkgname': 'libmysqlclient-dev', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'libmysqlclient21', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-client', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-client-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-client-core-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-router', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-server', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-server-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-server-core-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-source-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-testsuite', 'pkgver': '8.0.30-0ubuntu0.22.04.1'},\n {'osver': '22.04', 'pkgname': 'mysql-testsuite-8.0', 'pkgver': '8.0.30-0ubuntu0.22.04.1'}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var osver = NULL;\n var pkgname = NULL;\n var pkgver = NULL;\n if (!empty_or_null(package_array['osver'])) osver = package_array['osver'];\n if (!empty_or_null(package_array['pkgname'])) pkgname = package_array['pkgname'];\n if (!empty_or_null(package_array['pkgver'])) pkgver = package_array['pkgver'];\n if (osver && pkgname && pkgver) {\n if (ubuntu_check(osver:osver, pkgname:pkgname, pkgver:pkgver)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'libmysqlclient-dev / libmysqlclient20 / libmysqlclient21 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-18T14:54:15", "description": "The 12.1.0.2, 19c, 21c, All Supported Versions, and None versions of Oracle Database Server installed on the remote host are affected by multiple vulnerabilities as referenced in the July 2022 CPU advisory.\n\n - Vulnerability in the Oracle Database - Enterprise Edition Sharding component of Oracle Database Server.\n For supported versions that are affected see note. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Oracle Database - Enterprise Edition Sharding executes to compromise Oracle Database - Enterprise Edition Sharding. While the vulnerability is in Oracle Database - Enterprise Edition Sharding, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Sharding. (CVE-2022-21510)\n\n - Vulnerability in the Oracle Database - Enterprise Edition Recovery component of Oracle Database Server. For supported versions that are affected see note. Easily exploitable vulnerability allows high privileged attacker having EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Recovery. Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Recovery. Note: None of the supported versions are affected. (CVE-2022-21511)\n\n - Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. (CVE-2022-21565)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-07-22T00:00:00", "type": "nessus", "title": "Oracle Oracle Database Server (Jul 2022 CPU)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-29505", "CVE-2020-29506", "CVE-2020-29507", "CVE-2020-35167", "CVE-2020-35169", "CVE-2021-41184", "CVE-2021-45943", "CVE-2022-0839", "CVE-2022-21432", "CVE-2022-21510", "CVE-2022-21511", "CVE-2022-21565", "CVE-2022-24729", "CVE-2022-24891"], "modified": "2023-10-17T00:00:00", "cpe": ["cpe:/a:oracle:database_server"], "id": "ORACLE_RDBMS_CPU_JUL_2022.NASL", "href": "https://www.tenable.com/plugins/nessus/163408", "sourceData": "##\n# (C) Tenable, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(163408);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/17\");\n\n script_cve_id(\n \"CVE-2020-29505\",\n \"CVE-2020-29506\",\n \"CVE-2020-29507\",\n \"CVE-2020-35167\",\n \"CVE-2020-35169\",\n \"CVE-2021-41184\",\n \"CVE-2021-45943\",\n \"CVE-2022-0839\",\n \"CVE-2022-21432\",\n \"CVE-2022-21510\",\n \"CVE-2022-21511\",\n \"CVE-2022-21565\",\n \"CVE-2022-24729\",\n \"CVE-2022-24891\"\n );\n script_xref(name:\"IAVA\", value:\"2022-A-0283\");\n\n script_name(english:\"Oracle Oracle Database Server (Jul 2022 CPU)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The 12.1.0.2, 19c, 21c, All Supported Versions, and None versions of Oracle Database Server installed on the remote host\nare affected by multiple vulnerabilities as referenced in the July 2022 CPU advisory.\n\n - Vulnerability in the Oracle Database - Enterprise Edition Sharding component of Oracle Database Server.\n For supported versions that are affected see note. Easily exploitable vulnerability allows low privileged\n attacker having Local Logon privilege with logon to the infrastructure where Oracle Database - Enterprise\n Edition Sharding executes to compromise Oracle Database - Enterprise Edition Sharding. While the\n vulnerability is in Oracle Database - Enterprise Edition Sharding, attacks may significantly impact\n additional products (scope change). Successful attacks of this vulnerability can result in takeover of\n Oracle Database - Enterprise Edition Sharding. (CVE-2022-21510)\n\n - Vulnerability in the Oracle Database - Enterprise Edition Recovery component of Oracle Database Server. For\n supported versions that are affected see note. Easily exploitable vulnerability allows high privileged\n attacker having EXECUTE ON DBMS_IR.EXECUTESQLSCRIPT privilege with network access via Oracle Net to compromise Oracle\n Database - Enterprise Edition Recovery. Successful attacks of this vulnerability can result in takeover of\n Oracle Database - Enterprise Edition Recovery. Note: None of the supported versions are affected. (CVE-2022-21511)\n\n - Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are\n 12.1.0.2, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure\n privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability\n can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible\n data. (CVE-2022-21565)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/docs/tech/security-alerts/cpujul2022cvrf.xml\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.oracle.com/security-alerts/cpujul2022.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate patch according to the July 2022 Oracle Critical Patch Update advisory.\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2022-0839\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2022/07/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/07/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/07/22\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:oracle:database_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Databases\");\n\n script_copyright(english:\"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"oracle_rdbms_query_patch_info.nbin\", \"oracle_rdbms_patch_info.nbin\");\n\n exit(0);\n}\n\ninclude('vcf_extras_oracle.inc');\n\nvar app_info = vcf::oracle_rdbms::get_app_info();\n\nvar constraints = [\n # RDBMS:\n {'min_version': '21.0', 'fixed_version': '21.7.0.0.220719', 'missing_patch':'34160444', 'os':'unix', 'component':'db'},\n {'min_version': '21.0', 'fixed_version': '21.7.0.0.220719', 'missing_patch':'34110698', 'os':'win', 'component':'db'},\n\n {'min_version': '19.0', 'fixed_version': '19.14.2.0.220719', 'missing_patch':'34110559', 'os':'unix', 'component':'db'},\n {'min_version': '19.0', 'fixed_version': '19.16.0.0.220719', 'missing_patch':'34110685', 'os':'win', 'component':'db'},\n {'min_version': '19.15', 'fixed_version': '19.15.1.0.220719', 'missing_patch':'34119532', 'os':'unix', 'component':'db'},\n {'min_version': '19.16', 'fixed_version': '19.16.0.0.220719', 'missing_patch':'34133642', 'os':'unix', 'component':'db'},\n\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.220719', 'missing_patch':'34057742, 34057733', 'os':'unix', 'component':'db'},\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.220719', 'missing_patch':'33883271', 'os':'win', 'component':'db'},\n\n # OJVM:\n {'min_version': '19.0', 'fixed_version': '19.16.0.0.220719', 'missing_patch':'34086870', 'os':'unix', 'component':'ojvm'},\n {'min_version': '19.0', 'fixed_version': '19.16.0.0.220719', 'missing_patch':'34086870', 'os':'win', 'component':'ojvm'},\n\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.220719', 'missing_patch':'34086863', 'os':'unix', 'component':'ojvm'},\n {'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.220719', 'missing_patch':'34185253', 'os':'win', 'component':'ojvm'}\n];\n\nvcf::oracle_rdbms::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-15T15:37:09", "description": "The version of xstream installed on the remote host is prior to 1.3.1-16. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2021-1729 advisory.\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39139)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39140)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39141, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39151, CVE-2021-39154)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39144)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. (CVE-2021-39150, CVE-2021-39152)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39153)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-12-10T00:00:00", "type": "nessus", "title": "Amazon Linux 2 : xstream (ALAS-2021-1729)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154"], "modified": "2023-03-10T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:xstream", "p-cpe:/a:amazon:linux:xstream-javadoc", "cpe:/o:amazon:linux:2"], "id": "AL2_ALAS-2021-1729.NASL", "href": "https://www.tenable.com/plugins/nessus/155989", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2021-1729.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155989);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/10\");\n\n script_cve_id(\n \"CVE-2021-39139\",\n \"CVE-2021-39140\",\n \"CVE-2021-39141\",\n \"CVE-2021-39144\",\n \"CVE-2021-39145\",\n \"CVE-2021-39146\",\n \"CVE-2021-39147\",\n \"CVE-2021-39148\",\n \"CVE-2021-39149\",\n \"CVE-2021-39150\",\n \"CVE-2021-39151\",\n \"CVE-2021-39152\",\n \"CVE-2021-39153\",\n \"CVE-2021-39154\"\n );\n script_xref(name:\"ALAS\", value:\"2021-1729\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2022-0035\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2023/03/31\");\n\n script_name(english:\"Amazon Linux 2 : xstream (ALAS-2021-1729)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Amazon Linux 2 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of xstream installed on the remote host is prior to 1.3.1-16. It is, therefore, affected by multiple\nvulnerabilities as referenced in the ALAS2-2021-1729 advisory.\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream. A user is only affected if using the version out of the box with\n JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works\n regardless of the version of the Java runtime. No user is affected, who followed the recommendation to\n setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18\n uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39139)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU\n type or parallel execution of such a payload resulting in a denial of service only by manipulating the\n processed input stream. No user is affected, who followed the recommendation to setup XStream's security\n framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a\n blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39140)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream. No user is affected, who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses\n no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39141,\n CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39151,\n CVE-2021-39154)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by\n manipulating the processed input stream. No user is affected, who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses\n no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39144)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to request data from internal resources that are not publicly\n available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is\n affected, who followed the recommendation to setup XStream's security framework with a whitelist limited\n to the minimal required types. If you rely on XStream's default blacklist of the [Security\n Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version\n 1.4.18. (CVE-2021-39150, CVE-2021-39152)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream, if using the version out of the box with Java runtime version 14\n to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's\n security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a\n blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39153)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://alas.aws.amazon.com/AL2/ALAS-2021-1729.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39140\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39141\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39144\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39146\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39147\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39148\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39149\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39154\");\n script_set_attribute(attribute:\"solution\", value:\n\"Run 'yum update xstream' to update your system.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-39139\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'VMware NSX Manager XStream unauthenticated RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/12/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:xstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:xstream-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nvar release = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nvar os_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nvar os_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar pkgs = [\n {'reference':'xstream-1.3.1-16.amzn2', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-javadoc-1.3.1-16.amzn2', 'release':'AL2', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xstream / xstream-javadoc\");\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-15T15:31:37", "description": "The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2021:3476-1 advisory.\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39139)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39140)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39141, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39151, CVE-2021-39154)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39144)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. (CVE-2021-39150, CVE-2021-39152)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39153)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-10-21T00:00:00", "type": "nessus", "title": "openSUSE 15 Security Update : xstream (openSUSE-SU-2021:3476-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154"], "modified": "2023-03-10T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:xstream", "p-cpe:/a:novell:opensuse:xstream-benchmark", "p-cpe:/a:novell:opensuse:xstream-javadoc", "p-cpe:/a:novell:opensuse:xstream-parent", "cpe:/o:novell:opensuse:15.3"], "id": "OPENSUSE-2021-3476.NASL", "href": "https://www.tenable.com/plugins/nessus/154285", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# openSUSE Security Update openSUSE-SU-2021:3476-1. The text itself\n# is copyright (C) SUSE.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(154285);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/10\");\n\n script_cve_id(\n \"CVE-2021-39139\",\n \"CVE-2021-39140\",\n \"CVE-2021-39141\",\n \"CVE-2021-39144\",\n \"CVE-2021-39145\",\n \"CVE-2021-39146\",\n \"CVE-2021-39147\",\n \"CVE-2021-39148\",\n \"CVE-2021-39149\",\n \"CVE-2021-39150\",\n \"CVE-2021-39151\",\n \"CVE-2021-39152\",\n \"CVE-2021-39153\",\n \"CVE-2021-39154\"\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2022-0035\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2023/03/31\");\n\n script_name(english:\"openSUSE 15 Security Update : xstream (openSUSE-SU-2021:3476-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe openSUSE-SU-2021:3476-1 advisory.\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream. A user is only affected if using the version out of the box with\n JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works\n regardless of the version of the Java runtime. No user is affected, who followed the recommendation to\n setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18\n uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39139)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU\n type or parallel execution of such a payload resulting in a denial of service only by manipulating the\n processed input stream. No user is affected, who followed the recommendation to setup XStream's security\n framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a\n blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39140)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream. No user is affected, who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses\n no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39141,\n CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39151,\n CVE-2021-39154)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by\n manipulating the processed input stream. No user is affected, who followed the recommendation to setup\n XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses\n no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39144)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to request data from internal resources that are not publicly\n available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is\n affected, who followed the recommendation to setup XStream's security framework with a whitelist limited\n to the minimal required types. If you rely on XStream's default blacklist of the [Security\n Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version\n 1.4.18. (CVE-2021-39150, CVE-2021-39152)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this\n vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by\n manipulating the processed input stream, if using the version out of the box with Java runtime version 14\n to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's\n security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a\n blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39153)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/1189798\");\n # https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPBFWNADZPOCG7HFCC7XX4AVNU7NTF4P/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c3ccd59b\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39140\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39141\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39144\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39146\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39147\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39148\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39149\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2021-39154\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected xstream, xstream-benchmark, xstream-javadoc and / or xstream-parent packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-39139\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'VMware NSX Manager XStream unauthenticated RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/10/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/10/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-benchmark\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xstream-parent\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.3\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar release = get_kb_item('Host/SuSE/release');\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, 'openSUSE');\nvar os_ver = pregmatch(pattern: \"^SUSE([\\d.]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'openSUSE');\nos_ver = os_ver[1];\nif (release !~ \"^(SUSE15\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, 'openSUSE', '15.3', release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'openSUSE ' + os_ver, cpu);\n\nvar pkgs = [\n {'reference':'xstream-1.4.18-3.14.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-benchmark-1.4.18-3.14.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-javadoc-1.4.18-3.14.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-parent-1.4.18-3.14.1', 'release':'SUSE15.3', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var cpu = NULL;\n var rpm_spec_vers_cmp = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = package_array['release'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (reference && release) {\n if (rpm_check(release:release, cpu:cpu, reference:reference, rpm_spec_vers_cmp:rpm_spec_vers_cmp)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'xstream / xstream-benchmark / xstream-javadoc / xstream-parent');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:37:36", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2021:3956 advisory.\n\n - xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139, CVE-2021-39153)\n\n - xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141)\n\n - xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145, CVE-2021-39151)\n\n - xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146, CVE-2021-39154)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149)\n\n - xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150)\n\n - xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-10-26T00:00:00", "type": "nessus", "title": "RHEL 7 : xstream (RHSA-2021:3956)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154"], "modified": "2023-11-28T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:xstream", "p-cpe:/a:redhat:enterprise_linux:xstream-javadoc"], "id": "REDHAT-RHSA-2021-3956.NASL", "href": "https://www.tenable.com/plugins/nessus/154419", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2021:3956. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(154419);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/28\");\n\n script_cve_id(\n \"CVE-2021-39139\",\n \"CVE-2021-39140\",\n \"CVE-2021-39141\",\n \"CVE-2021-39144\",\n \"CVE-2021-39145\",\n \"CVE-2021-39146\",\n \"CVE-2021-39147\",\n \"CVE-2021-39148\",\n \"CVE-2021-39149\",\n \"CVE-2021-39150\",\n \"CVE-2021-39151\",\n \"CVE-2021-39152\",\n \"CVE-2021-39153\",\n \"CVE-2021-39154\"\n );\n script_xref(name:\"RHSA\", value:\"2021:3956\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2022-0035\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2023/03/31\");\n\n script_name(english:\"RHEL 7 : xstream (RHSA-2021:3956)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2021:3956 advisory.\n\n - xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl\n (CVE-2021-39139, CVE-2021-39153)\n\n - xstream: Infinite loop DoS via unsafe deserialization of\n sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.*\n (CVE-2021-39141)\n\n - xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration\n (CVE-2021-39145, CVE-2021-39151)\n\n - xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue\n (CVE-2021-39146, CVE-2021-39154)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration\n (CVE-2021-39147)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator\n (CVE-2021-39148)\n\n - xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149)\n\n - xstream: Server-side request forgery (SSRF) via unsafe deserialization of\n com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150)\n\n - xstream: Server-side request forgery (SSRF) via unsafe deserialization of\n jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39140\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39141\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39144\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39146\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39147\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39148\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39149\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39151\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39153\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-39154\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:3956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997763\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997769\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997772\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997777\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997779\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997786\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997791\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997793\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997795\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1997801\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected xstream and / or xstream-javadoc packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-39139\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'VMware NSX Manager XStream unauthenticated RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_cwe_id(94, 434, 502, 835, 918);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/08/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/10/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xstream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xstream-javadoc\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '7')) audit(AUDIT_OS_NOT, 'Red Hat 7.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/debug',\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/optional/debug',\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/optional/os',\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/optional/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/os',\n 'content/dist/rhel-alt/server/7/7Server/armv8-a/aarch64/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/debug',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/optional/debug',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/optional/os',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/optional/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/os',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/supplementary/debug',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/supplementary/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/optional/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/os',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/client/7/7Client/x86_64/os',\n 'content/dist/rhel/client/7/7Client/x86_64/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/os',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/highavailability/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/highavailability/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/highavailability/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/optional/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/optional/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/optional/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/resilientstorage/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/resilientstorage/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/resilientstorage/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap-hana/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap-hana/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap-hana/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/sap/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/supplementary/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/supplementary/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/supplementary/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/optional/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/optional/os',\n 'content/dist/rhel/power/7/7Server/ppc64/optional/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/os',\n 'content/dist/rhel/power/7/7Server/ppc64/sap/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/sap/os',\n 'content/dist/rhel/power/7/7Server/ppc64/sap/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/supplementary/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/supplementary/os',\n 'content/dist/rhel/power/7/7Server/ppc64/supplementary/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/os',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/os',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/os',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/server/7/7Server/x86_64/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/os',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/os',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/highavailability/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/optional/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/resilientstorage/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/sap/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/supplementary/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/os',\n 'content/fastrack/rhel/client/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/os',\n 'content/fastrack/rhel/client/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/os',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/os',\n 'content/fastrack/rhel/computenode/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/power/7/ppc64/debug',\n 'content/fastrack/rhel/power/7/ppc64/optional/debug',\n 'content/fastrack/rhel/power/7/ppc64/optional/os',\n 'content/fastrack/rhel/power/7/ppc64/optional/source/SRPMS',\n 'content/fastrack/rhel/power/7/ppc64/os',\n 'content/fastrack/rhel/power/7/ppc64/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/os',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/optional/debug',\n 'content/fastrack/rhel/server/7/x86_64/optional/os',\n 'content/fastrack/rhel/server/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/debug',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/system-z/7/s390x/debug',\n 'content/fastrack/rhel/system-z/7/s390x/optional/debug',\n 'content/fastrack/rhel/system-z/7/s390x/optional/os',\n 'content/fastrack/rhel/system-z/7/s390x/optional/source/SRPMS',\n 'content/fastrack/rhel/system-z/7/s390x/os',\n 'content/fastrack/rhel/system-z/7/s390x/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/os',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/os',\n 'content/fastrack/rhel/workstation/7/x86_64/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'xstream-1.3.1-16.el7_9', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'xstream-javadoc-1.3.1-16.el7_9', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'xstream / xstream-javadoc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-17T10:24:54", "description": "The remote Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS / 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-5946-1 advisory.\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39139)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39140)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39141, CVE-2021-39145, CVE-2021-39146, CVE-2021-39147, CVE-2021-39148, CVE-2021-39149, CVE-2021-39151, CVE-2021-39154)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39144)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. (CVE-2021-39150, CVE-2021-39152)\n\n - XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. (CVE-2021-39153)\n\n - XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable. (CVE-2022-41966)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-03-13T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS / 22.04 LTS : XStream vulnerabilities (USN-5946-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-39139", "CVE-2021-39140", "CVE-2021-39141", "CVE-2021-39144", "CVE-2021-39145", "CVE-2021-39146", "CVE-2021-39147", "CVE-2021-39148", "CVE-2021-39149", "CVE-2021-39150", "CVE-2021-39151", "CVE-2021-39152", "CVE-2021-39153", "CVE-2021-39154", "CVE-2022-41966"], "modified": "2023-10-16T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:16.04:-:esm", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "cpe:/o:canonical:ubuntu_linux:20.04:-:lts", "cpe:/o:canonical:ubuntu_linux:22.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:libxstream-java"], "id": "UBUNTU_USN-5946-1.NASL", "href": "https://www.tenable.com/plugins/nessus/172496", "sourceData": "