

本文為英文版的機器翻譯版本，如內容有任何歧義或不一致之處，概以英文版為準。

# Amazon EMR 7.2.0 版
<a name="emr-720-release"></a>

## 7.2.0 支援的生命週期
<a name="emr-720-supported-lifecycle"></a>

下表說明 Amazon EMR 7.2.0 版支援的生命週期日期。


| 支援階段 | Date | 
| --- | --- | 
| 初始發行日期 | 2024 年 7 月 25 日 | 
| 標準支援，直到 | 2026 年 7 月 24 日 | 
| 終止支援 | 2026 年 7 月 25 日 | 
| 生命週期結束 | 2027 年 7 月 25 日 | 

## 7.2.0 應用程式版本
<a name="emr-720-app-versions"></a>

此版本包含下列應用程式：[https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Install-CloudWatch-Agent.html)、[https://delta.io/](https://delta.io/)、[https://flink.apache.org/](https://flink.apache.org/)、[http://hbase.apache.org/](http://hbase.apache.org/)[https://cwiki.apache.org/confluence/display/Hive/HCatalog](https://cwiki.apache.org/confluence/display/Hive/HCatalog)、[http://hadoop.apache.org/docs/current/](http://hadoop.apache.org/docs/current/)、[http://hive.apache.org/](http://hive.apache.org/)[https://hudi.apache.org](https://hudi.apache.org)、[http://gethue.com/](http://gethue.com/)、[https://iceberg.apache.org/](https://iceberg.apache.org/)[https://jupyter-enterprise-gateway.readthedocs.io/en/latest/](https://jupyter-enterprise-gateway.readthedocs.io/en/latest/)、[https://jupyterhub.readthedocs.io/en/latest/#](https://jupyterhub.readthedocs.io/en/latest/#)、[https://livy.incubator.apache.org/](https://livy.incubator.apache.org/)、[https://mxnet.incubator.apache.org/](https://mxnet.incubator.apache.org/)、[http://oozie.apache.org/](http://oozie.apache.org/)、、[https://phoenix.apache.org/](https://phoenix.apache.org/)[http://pig.apache.org/](http://pig.apache.org/)[https://prestodb.io/](https://prestodb.io/)[https://spark.apache.org/docs/latest/](https://spark.apache.org/docs/latest/)[http://sqoop.apache.org/](http://sqoop.apache.org/)、、、[https://www.tensorflow.org/](https://www.tensorflow.org/)、、、、[https://tez.apache.org/](https://tez.apache.org/)、、、[https://trino.io/](https://trino.io/)、 [https://zeppelin.incubator.apache.org/](https://zeppelin.incubator.apache.org/)和 [https://zookeeper.apache.org](https://zookeeper.apache.org)。

下表列出此 Amazon EMR 版本中提供的應用程式版本，以及前三個 Amazon EMR 版本 (如果適用) 中的應用程式版本。

如需完整了解各 Amazon EMR 版之應用程式版本的完整歷史記錄，請參閱以下主題：
+ [Amazon EMR 7.x 版中的應用程式版本](emr-release-app-versions-7.x.md)
+ [Amazon EMR 6.x 版之應用程式版本](emr-release-app-versions-6.x.md)
+ [Amazon EMR 5.x 版之應用程式版本](emr-release-app-versions-5.x.md)
+ [Amazon EMR 4.x 版之應用程式版本](emr-release-app-versions-4.x.md)


**應用程式版本資訊**  

|  | emr-7.3.0 | emr-7.2.0 | emr-7.1.0 | emr-7.0.0 | 
| --- | --- | --- | --- | --- | 
| AWS 適用於 Java 的 SDK | 2.25.70、1.12.747 | 2.23.18、1.12.705 | 2.23.18、1.12.656 | 2.20.160-amzn-0、1.12.569 | 
| Python | 3.9、3.11 | 3.9、3.11 | 3.9、3.11 | 3.9 | 
| Scala | 2.12.18 | 2.12.17 | 2.12.17 | 2.12.17 | 
| AmazonCloudWatchAgent | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300032.2-amzn-0 | 1.300031.1-amzn-0 | 
| Delta | 3.2.0-amzn-0 | 3.1.0 | 3.0.0 | 3.0.0 | 
| Flink | 1.18.1-amzn-2 | 1.18.1-amzn-1 | 1.18.1-amzn-0 | 1.18.0-amzn-0 | 
| Ganglia |  -  |  -  |  -  |  -  | 
| HBase | 2.4.17-amzn-7 | 2.4.17-amzn-6 | 2.4.17-amzn-5 | 2.4.17-amzn-4 | 
| HCatalog | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hadoop | 3.3.6-amzn-5 | 3.3.6-amzn-4 | 3.3.6-amzn-3 | 3.3.6-amzn-2 | 
| Hive | 3.1.3-amzn-12 | 3.1.3-amzn-11 | 3.1.3-amzn-10 | 3.1.3-amzn-9 | 
| Hudi | 0.15.0-amzn-0 | 0.14.1-amzn-1 | 0.14.1-amzn-0 | 0.14.0-amzn-1 | 
| Hue | 4.11.0 | 4.11.0 | 4.11.0 | 4.11.0 | 
| Iceberg | 1.5.2-amzn-0 | 1.5.0-amzn-0 | 1.4.3-amzn-0 | 1.4.2-amzn-0 | 
| JupyterEnterpriseGateway | 2.6.0 | 2.6.0 | 2.6.0 | 2.6.0 | 
| JupyterHub | 1.5.0 | 1.5.0 | 1.5.0 | 1.5.0 | 
| Livy | 0.8.0 培養 | 0.8.0 培養 | 0.8.0 培養 | 0.7.1-incubating | 
| MXNet |  -  | 1.9.1 | 1.9.1 | 1.9.1 | 
| Mahout |  -  |  -  |  -  |  -  | 
| Oozie | 5.2.1 | 5.2.1 | 5.2.1 | 5.2.1 | 
| Phoenix | 5.1.3 | 5.1.3 | 5.1.3 | 5.1.3 | 
| Pig | 0.17.0 | 0.17.0 | 0.17.0 | 0.17.0 | 
| Presto | 0.285-amzn-1 | 0.285-amzn-0 | 0.284-amzn-0 | 0.283-amzn-1 | 
| Spark | 3.5.1-amzn-1 | 3.5.1-amzn-0 | 3.5.0-amzn-1 | 3.5.0-amzn-0 | 
| Sqoop | 1.4.7 | 1.4.7 | 1.4.7 | 1.4.7 | 
| TensorFlow | 2.16.1 | 2.11.0 | 2.11.0 | 2.11.0 | 
| Tez | 0.10.2-amzn-10 | 0.10.2-amzn-9 | 0.10.2-amzn-8 | 0.10.2-amzn-7 | 
| Trino (PrestoSQL) | 442-amzn-0 | 436-amzn-0 | 435-amzn-0 | 426-amzn-1 | 
| Zeppelin | 0.11.1 | 0.10.1 | 0.10.1 | 0.10.1 | 
| ZooKeeper | 3.9.1-amzn-1 | 3.9.1-amzn-1 | 3.9.1-amzn-0 | 3.5.10 | 

# 7.2.0 發行元件詳細資訊
<a name="emr-720-release-components-details"></a>

如需 Amazon EMR 7.2.0 中 *Extras* 套件的詳細資訊，請參閱下表。


| 應用程式 | 應用程式類型 | 套件 | 套件類型 | 套件版本 | 
| --- | --- | --- | --- | --- | 
|  AmazonCloudWatchAgent  |  核心  |  Hadoop-hdfs-journalnode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  核心  |  ranger-kms  |  額外項目  |  2.0.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  核心  |  s3-dist-cp  |  額外項目  |  2.32.0-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  核心  |  zookeeper  |  額外項目  |  3.9.1.amzn.1-1.amzn2023  | 
|  AmazonCloudWatchAgent  |  核心  |  zookeeper-server  |  額外項目  |  3.9.1.amzn.1-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-client  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-hdfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-hdfs-datanode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  Hadoop-hdfs-journalnode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-hdfs-namenode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-httpfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-kms  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-mapreduce  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-mapreduce-historyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-yarn  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-yarn-nodemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-yarn-resourcemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hadoop-yarn-timelineserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Flink  |  核心  |  hudi  |  額外項目  |  0.14.1.amzn.1-1.amzn2023  | 
|  Flink  |  核心  |  ranger-kms  |  額外項目  |  2.0.0-1.amzn2023  | 
|  Flink  |  核心  |  hadoop  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  HBase  |  核心  |  s3-dist-cp  |  額外項目  |  2.32.0-1.amzn2023  | 
|  HCatalog  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  HCatalog  |  核心  |  mariadb-connector-java  |  額外項目  |  2.7.2-1  | 
|  Hive  |  核心  |  hadoop-httpfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Hive  |  核心  |  hive-hbase  |  額外項目  |  3.1.3.amzn.11-1.amzn2023  | 
|  Hive  |  核心  |  mariadb-connector-java  |  額外項目  |  2.7.2-1  | 
|  Hive  |  核心  |  s3-dist-cp  |  額外項目  |  2.32.0-1.amzn2023  | 
|  Phoenix  |  核心  |  s3-dist-cp  |  額外項目  |  2.32.0-1.amzn2023  | 
|  Spark  |  核心  |  spark-datanucleus  |  額外項目  |  3.5.1.amzn.0-1.amzn2023  | 
|  Tez  |  核心  |  hadoop-mapreduce  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  核心  |  hadoop-mapreduce-historyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Tez  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  bigtop-utils  |  額外項目  |  1.2.0-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-client  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-hdfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-hdfs-datanode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  Hadoop-hdfs-journalnode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-hdfs-namenode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-kms  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-mapreduce  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-mapreduce-historyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-yarn  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-yarn-nodemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-yarn-resourcemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-yarn-timelineserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hive  |  額外項目  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  核心  |  hive-hcatalog-server  |  額外項目  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  核心  |  mariadb-connector-java  |  額外項目  |  2.7.2-1  | 
|  Trino  |  核心  |  ranger-kms  |  額外項目  |  2.0.0-1.amzn2023  | 
|  Trino  |  核心  |  zookeeper  |  額外項目  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  核心  |  zookeeper-server  |  額外項目  |  3.9.1.amzn.1-1.amzn2023  | 
|  Trino  |  核心  |  bigtop-groovy  |  額外項目  |  2.5.4-1.amzn2023  | 
|  Trino  |  核心  |  bigtop-jsvc  |  額外項目  |  1.2.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Trino  |  核心  |  hadoop-lzo  |  額外項目  |  0.4.19-1.amzn2023  | 
|  Trino  |  核心  |  hive-hcatalog  |  額外項目  |  3.1.3.amzn.11-1.amzn2023  | 
|  Trino  |  核心  |  hive-jdbc  |  額外項目  |  3.1.3.amzn.11-1.amzn2023  | 
|  Zookeeper  |  核心  |  emrfs  |  額外項目  |  2.63.0-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-client  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-hdfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-hdfs-datanode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  Hadoop-hdfs-journalnode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-hdfs-namenode  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-httpfs  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-kms  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-mapreduce  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-mapreduce-historyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-yarn  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-yarn-nodemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-yarn-proxyserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-yarn-resourcemanager  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  hadoop-yarn-timelineserver  |  額外項目  |  3.3.6.amzn.4-1.amzn2023  | 
|  Zookeeper  |  核心  |  ranger-kms  |  額外項目  |  2.0.0-1.amzn2023  | 

# 7.2.0 常見漏洞和暴露
<a name="720-common-vulnerabilities-exposures"></a>

下表列出不會影響在 Amazon EMR 7.2.0 建議組態上執行之 EMR 叢集的所有 CVEs。Amazon EMR 取決於上游開放原始碼的修正可用性，並將在 Amazon EMR 驗證修正的 90 天內，提供最新的穩定版本做為核心引擎元件的一部分。

此資料表已於 2024 年 9 月 15 日更新。


| CVE ID | 嚴重性 | CVE 詳細資訊 URL | 
| --- | --- | --- | 
|  CVE-2015-1832  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-1832](https://nvd.nist.gov/vuln/detail/CVE-2015-1832)  | 
|  CVE-2015-4852  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-4852](https://nvd.nist.gov/vuln/detail/CVE-2015-4852)  | 
|  CVE-2015-7501  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-7501](https://nvd.nist.gov/vuln/detail/CVE-2015-7501)  | 
|  CVE-2016-5018  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-5018](https://nvd.nist.gov/vuln/detail/CVE-2016-5018)  | 
|  CVE-2017-1000487  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-1000487](https://nvd.nist.gov/vuln/detail/CVE-2017-1000487)  | 
|  CVE-2017-12629  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-12629](https://nvd.nist.gov/vuln/detail/CVE-2017-12629)  | 
|  CVE-2017-15095  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-15095](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)  | 
|  CVE-2017-15095  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-15095](https://nvd.nist.gov/vuln/detail/CVE-2017-15095)  | 
|  CVE-2017-17485  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-17485  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-17485](https://nvd.nist.gov/vuln/detail/CVE-2017-17485)  | 
|  CVE-2017-7525  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-7525](https://nvd.nist.gov/vuln/detail/CVE-2017-7525)  | 
|  CVE-2017-7657  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-7657](https://nvd.nist.gov/vuln/detail/CVE-2017-7657)  | 
|  CVE-2017-7658  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-7658](https://nvd.nist.gov/vuln/detail/CVE-2017-7658)  | 
|  CVE-2018-11307  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-11307  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-11307](https://nvd.nist.gov/vuln/detail/CVE-2018-11307)  | 
|  CVE-2018-14718  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14718](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)  | 
|  CVE-2018-14718  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14718](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)  | 
|  CVE-2018-14718  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14718](https://nvd.nist.gov/vuln/detail/CVE-2018-14718)  | 
|  CVE-2018-14719  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14719  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14719](https://nvd.nist.gov/vuln/detail/CVE-2018-14719)  | 
|  CVE-2018-14720  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14720](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)  | 
|  CVE-2018-14720  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14720](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)  | 
|  CVE-2018-14720  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14720](https://nvd.nist.gov/vuln/detail/CVE-2018-14720)  | 
|  CVE-2018-14721  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14721](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)  | 
|  CVE-2018-14721  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14721](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)  | 
|  CVE-2018-14721  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-14721](https://nvd.nist.gov/vuln/detail/CVE-2018-14721)  | 
|  CVE-2018-17190  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-17190](https://nvd.nist.gov/vuln/detail/CVE-2018-17190)  | 
|  CVE-2018-19360  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19360  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19360](https://nvd.nist.gov/vuln/detail/CVE-2018-19360)  | 
|  CVE-2018-19361  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19361  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19361](https://nvd.nist.gov/vuln/detail/CVE-2018-19361)  | 
|  CVE-2018-19362  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-19362  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-19362](https://nvd.nist.gov/vuln/detail/CVE-2018-19362)  | 
|  CVE-2018-7489  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2018-7489  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489)  | 
|  CVE-2019-10202  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10202](https://nvd.nist.gov/vuln/detail/CVE-2019-10202)  | 
|  CVE-2019-14379  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14379  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14379](https://nvd.nist.gov/vuln/detail/CVE-2019-14379)  | 
|  CVE-2019-14540  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14540](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)  | 
|  CVE-2019-14540  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14540](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)  | 
|  CVE-2019-14540  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14540](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)  | 
|  CVE-2019-14540  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14540](https://nvd.nist.gov/vuln/detail/CVE-2019-14540)  | 
|  CVE-2019-14892  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14892](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)  | 
|  CVE-2019-14892  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14892](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)  | 
|  CVE-2019-14892  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14892](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)  | 
|  CVE-2019-14892  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14892](https://nvd.nist.gov/vuln/detail/CVE-2019-14892)  | 
|  CVE-2019-14893  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14893](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)  | 
|  CVE-2019-14893  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14893](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)  | 
|  CVE-2019-14893  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14893](https://nvd.nist.gov/vuln/detail/CVE-2019-14893)  | 
|  CVE-2019-16335  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16335  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16335](https://nvd.nist.gov/vuln/detail/CVE-2019-16335)  | 
|  CVE-2019-16942  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16942](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)  | 
|  CVE-2019-16942  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16942](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)  | 
|  CVE-2019-16942  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16942](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)  | 
|  CVE-2019-16942  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16942](https://nvd.nist.gov/vuln/detail/CVE-2019-16942)  | 
|  CVE-2019-16943  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16943](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)  | 
|  CVE-2019-16943  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16943](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)  | 
|  CVE-2019-16943  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16943](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)  | 
|  CVE-2019-16943  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16943](https://nvd.nist.gov/vuln/detail/CVE-2019-16943)  | 
|  CVE-2019-17195  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17195](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)  | 
|  CVE-2019-17195  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17195](https://nvd.nist.gov/vuln/detail/CVE-2019-17195)  | 
|  CVE-2019-17267  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17267  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17267](https://nvd.nist.gov/vuln/detail/CVE-2019-17267)  | 
|  CVE-2019-17531  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17531](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)  | 
|  CVE-2019-17531  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17531](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)  | 
|  CVE-2019-17531  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17531](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)  | 
|  CVE-2019-17531  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17531](https://nvd.nist.gov/vuln/detail/CVE-2019-17531)  | 
|  CVE-2019-20330  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20330  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20330](https://nvd.nist.gov/vuln/detail/CVE-2019-20330)  | 
|  CVE-2019-20444  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20444  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444)  | 
|  CVE-2019-20445  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2019-20445  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445)  | 
|  CVE-2020-7692  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-7692](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)  | 
|  CVE-2020-7692  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-7692](https://nvd.nist.gov/vuln/detail/CVE-2020-7692)  | 
|  CVE-2020-8840  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-8840  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-8840](https://nvd.nist.gov/vuln/detail/CVE-2020-8840)  | 
|  CVE-2020-9480  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9480](https://nvd.nist.gov/vuln/detail/CVE-2020-9480)  | 
|  CVE-2020-9546  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9546  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9546](https://nvd.nist.gov/vuln/detail/CVE-2020-9546)  | 
|  CVE-2020-9547  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9547  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9547](https://nvd.nist.gov/vuln/detail/CVE-2020-9547)  | 
|  CVE-2020-9548  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2020-9548  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9548](https://nvd.nist.gov/vuln/detail/CVE-2020-9548)  | 
|  CVE-2021-26291  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-26291](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)  | 
|  CVE-2021-26291  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-26291](https://nvd.nist.gov/vuln/detail/CVE-2021-26291)  | 
|  CVE-2021-32797  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-32797](https://nvd.nist.gov/vuln/detail/CVE-2021-32797)  | 
|  CVE-2021-32798  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-32798](https://nvd.nist.gov/vuln/detail/CVE-2021-32798)  | 
|  CVE-2021-35958  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35958](https://nvd.nist.gov/vuln/detail/CVE-2021-35958)  | 
|  CVE-2021-37404  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37404](https://nvd.nist.gov/vuln/detail/CVE-2021-37404)  | 
|  CVE-2022-1471  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-1471  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471)  | 
|  CVE-2022-25168  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25168](https://nvd.nist.gov/vuln/detail/CVE-2022-25168)  | 
|  CVE-2022-26612  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-26612](https://nvd.nist.gov/vuln/detail/CVE-2022-26612)  | 
|  CVE-2022-32532  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-32532](https://nvd.nist.gov/vuln/detail/CVE-2022-32532)  | 
|  CVE-2022-33980  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-33980](https://nvd.nist.gov/vuln/detail/CVE-2022-33980)  | 
|  CVE-2022-37865  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-37865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865)  | 
|  CVE-2022-39135  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-39135](https://nvd.nist.gov/vuln/detail/CVE-2022-39135)  | 
|  CVE-2022-40664  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40664](https://nvd.nist.gov/vuln/detail/CVE-2022-40664)  | 
|  CVE-2022-42889  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42889](https://nvd.nist.gov/vuln/detail/CVE-2022-42889)  | 
|  CVE-2022-46337  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2022-46337  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46337](https://nvd.nist.gov/vuln/detail/CVE-2022-46337)  | 
|  CVE-2023-38647  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-38647  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-38647](https://nvd.nist.gov/vuln/detail/CVE-2023-38647)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2023-44981  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-44981](https://nvd.nist.gov/vuln/detail/CVE-2023-44981)  | 
|  CVE-2024-1597  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2024-1597  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2024-1597  |  關鍵  |  [https://nvd.nist.gov/vuln/detail/CVE-2024-1597](https://nvd.nist.gov/vuln/detail/CVE-2024-1597)  | 
|  CVE-2012-0881  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2012-0881  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2012-0881](https://nvd.nist.gov/vuln/detail/CVE-2012-0881)  | 
|  CVE-2013-4002  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2013-4002](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)  | 
|  CVE-2013-4002  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2013-4002](https://nvd.nist.gov/vuln/detail/CVE-2013-4002)  | 
|  CVE-2014-0114  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2014-0114](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)  | 
|  CVE-2014-0114  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2014-0114](https://nvd.nist.gov/vuln/detail/CVE-2014-0114)  | 
|  CVE-2015-2080  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-2080](https://nvd.nist.gov/vuln/detail/CVE-2015-2080)  | 
|  CVE-2015-2156  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-2156](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)  | 
|  CVE-2015-2156  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-2156](https://nvd.nist.gov/vuln/detail/CVE-2015-2156)  | 
|  CVE-2015-5237  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-5237](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)  | 
|  CVE-2015-5237  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-5237](https://nvd.nist.gov/vuln/detail/CVE-2015-5237)  | 
|  CVE-2015-6420  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2015-6420](https://nvd.nist.gov/vuln/detail/CVE-2015-6420)  | 
|  CVE-2016-1000338  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000338](https://nvd.nist.gov/vuln/detail/CVE-2016-1000338)  | 
|  CVE-2016-1000340  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000340](https://nvd.nist.gov/vuln/detail/CVE-2016-1000340)  | 
|  CVE-2016-1000342  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000342](https://nvd.nist.gov/vuln/detail/CVE-2016-1000342)  | 
|  CVE-2016-1000343  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000343](https://nvd.nist.gov/vuln/detail/CVE-2016-1000343)  | 
|  CVE-2016-1000344  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000344](https://nvd.nist.gov/vuln/detail/CVE-2016-1000344)  | 
|  CVE-2016-1000352  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-1000352](https://nvd.nist.gov/vuln/detail/CVE-2016-1000352)  | 
|  CVE-2016-6796  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2016-6796](https://nvd.nist.gov/vuln/detail/CVE-2016-6796)  | 
|  CVE-2017-1000034  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-1000034](https://nvd.nist.gov/vuln/detail/CVE-2017-1000034)  | 
|  CVE-2017-12612  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-12612](https://nvd.nist.gov/vuln/detail/CVE-2017-12612)  | 
|  CVE-2017-15288  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-15288](https://nvd.nist.gov/vuln/detail/CVE-2017-15288)  | 
|  CVE-2017-18640  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-18640](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)  | 
|  CVE-2017-18640  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-18640](https://nvd.nist.gov/vuln/detail/CVE-2017-18640)  | 
|  CVE-2017-5637  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-5637](https://nvd.nist.gov/vuln/detail/CVE-2017-5637)  | 
|  CVE-2017-7656  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-7656](https://nvd.nist.gov/vuln/detail/CVE-2017-7656)  | 
|  CVE-2017-7687  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-7687](https://nvd.nist.gov/vuln/detail/CVE-2017-7687)  | 
|  CVE-2017-9735  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-9735](https://nvd.nist.gov/vuln/detail/CVE-2017-9735)  | 
|  CVE-2017-9790  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2017-9790](https://nvd.nist.gov/vuln/detail/CVE-2017-9790)  | 
|  CVE-2018-10054  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-10054](https://nvd.nist.gov/vuln/detail/CVE-2018-10054)  | 
|  CVE-2018-10936  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-10936](https://nvd.nist.gov/vuln/detail/CVE-2018-10936)  | 
|  CVE-2018-11793  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-11793](https://nvd.nist.gov/vuln/detail/CVE-2018-11793)  | 
|  CVE-2018-11804  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-11804](https://nvd.nist.gov/vuln/detail/CVE-2018-11804)  | 
|  CVE-2018-12022  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12022  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12022](https://nvd.nist.gov/vuln/detail/CVE-2018-12022)  | 
|  CVE-2018-12023  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-12023  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-12023](https://nvd.nist.gov/vuln/detail/CVE-2018-12023)  | 
|  CVE-2018-3258  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-3258](https://nvd.nist.gov/vuln/detail/CVE-2018-3258)  | 
|  CVE-2018-3827  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-3827](https://nvd.nist.gov/vuln/detail/CVE-2018-3827)  | 
|  CVE-2018-3831  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-3831](https://nvd.nist.gov/vuln/detail/CVE-2018-3831)  | 
|  CVE-2018-5968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-5968](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)  | 
|  CVE-2018-5968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-5968](https://nvd.nist.gov/vuln/detail/CVE-2018-5968)  | 
|  CVE-2018-8012  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-8012](https://nvd.nist.gov/vuln/detail/CVE-2018-8012)  | 
|  CVE-2018-8768  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2018-8768](https://nvd.nist.gov/vuln/detail/CVE-2018-8768)  | 
|  CVE-2019-0204  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-0204](https://nvd.nist.gov/vuln/detail/CVE-2019-0204)  | 
|  CVE-2019-0205  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-0205  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-0205](https://nvd.nist.gov/vuln/detail/CVE-2019-0205)  | 
|  CVE-2019-10086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10086](https://nvd.nist.gov/vuln/detail/CVE-2019-10086)  | 
|  CVE-2019-10099  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10099](https://nvd.nist.gov/vuln/detail/CVE-2019-10099)  | 
|  CVE-2019-10172  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-10172](https://nvd.nist.gov/vuln/detail/CVE-2019-10172)  | 
|  CVE-2019-12086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-12086](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)  | 
|  CVE-2019-12086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-12086](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)  | 
|  CVE-2019-12086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-12086](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)  | 
|  CVE-2019-12086  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-12086](https://nvd.nist.gov/vuln/detail/CVE-2019-12086)  | 
|  CVE-2019-14439  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14439](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)  | 
|  CVE-2019-14439  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14439](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)  | 
|  CVE-2019-14439  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14439](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)  | 
|  CVE-2019-14439  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-14439](https://nvd.nist.gov/vuln/detail/CVE-2019-14439)  | 
|  CVE-2019-16869  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16869](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)  | 
|  CVE-2019-16869  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-16869](https://nvd.nist.gov/vuln/detail/CVE-2019-16869)  | 
|  CVE-2019-17566  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17566](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)  | 
|  CVE-2019-17566  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-17566](https://nvd.nist.gov/vuln/detail/CVE-2019-17566)  | 
|  CVE-2019-7611  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2019-7611](https://nvd.nist.gov/vuln/detail/CVE-2019-7611)  | 
|  CVE-2020-10650  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10650  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10650](https://nvd.nist.gov/vuln/detail/CVE-2020-10650)  | 
|  CVE-2020-10672  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10672  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10672](https://nvd.nist.gov/vuln/detail/CVE-2020-10672)  | 
|  CVE-2020-10673  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10673  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10673](https://nvd.nist.gov/vuln/detail/CVE-2020-10673)  | 
|  CVE-2020-10968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10968](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)  | 
|  CVE-2020-10968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10968](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)  | 
|  CVE-2020-10968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10968](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)  | 
|  CVE-2020-10968  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10968](https://nvd.nist.gov/vuln/detail/CVE-2020-10968)  | 
|  CVE-2020-10969  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10969](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)  | 
|  CVE-2020-10969  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10969](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)  | 
|  CVE-2020-10969  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10969](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)  | 
|  CVE-2020-10969  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-10969](https://nvd.nist.gov/vuln/detail/CVE-2020-10969)  | 
|  CVE-2020-11111  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11111  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11111](https://nvd.nist.gov/vuln/detail/CVE-2020-11111)  | 
|  CVE-2020-11112  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11112  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11112](https://nvd.nist.gov/vuln/detail/CVE-2020-11112)  | 
|  CVE-2020-11113  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11113  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11113](https://nvd.nist.gov/vuln/detail/CVE-2020-11113)  | 
|  CVE-2020-11619  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11619  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11619](https://nvd.nist.gov/vuln/detail/CVE-2020-11619)  | 
|  CVE-2020-11620  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11620  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11620](https://nvd.nist.gov/vuln/detail/CVE-2020-11620)  | 
|  CVE-2020-11988  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-11988](https://nvd.nist.gov/vuln/detail/CVE-2020-11988)  | 
|  CVE-2020-13692  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13692](https://nvd.nist.gov/vuln/detail/CVE-2020-13692)  | 
|  CVE-2020-13936  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13936](https://nvd.nist.gov/vuln/detail/CVE-2020-13936)  | 
|  CVE-2020-13949  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13949](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)  | 
|  CVE-2020-13949  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13949](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)  | 
|  CVE-2020-13949  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13949](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)  | 
|  CVE-2020-13949  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13949](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)  | 
|  CVE-2020-13949  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-13949](https://nvd.nist.gov/vuln/detail/CVE-2020-13949)  | 
|  CVE-2020-14060  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14060](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)  | 
|  CVE-2020-14060  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14060](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)  | 
|  CVE-2020-14060  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14060](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)  | 
|  CVE-2020-14060  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14060](https://nvd.nist.gov/vuln/detail/CVE-2020-14060)  | 
|  CVE-2020-14061  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14061](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)  | 
|  CVE-2020-14061  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14061](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)  | 
|  CVE-2020-14061  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14061](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)  | 
|  CVE-2020-14061  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14061](https://nvd.nist.gov/vuln/detail/CVE-2020-14061)  | 
|  CVE-2020-14062  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14062](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)  | 
|  CVE-2020-14062  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14062](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)  | 
|  CVE-2020-14062  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14062](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)  | 
|  CVE-2020-14062  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14062](https://nvd.nist.gov/vuln/detail/CVE-2020-14062)  | 
|  CVE-2020-14195  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-14195  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-14195](https://nvd.nist.gov/vuln/detail/CVE-2020-14195)  | 
|  CVE-2020-17533  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-17533](https://nvd.nist.gov/vuln/detail/CVE-2020-17533)  | 
|  CVE-2020-24616  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24616  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24616](https://nvd.nist.gov/vuln/detail/CVE-2020-24616)  | 
|  CVE-2020-24750  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-24750  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-24750](https://nvd.nist.gov/vuln/detail/CVE-2020-24750)  | 
|  CVE-2020-25649  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-25649  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-25649](https://nvd.nist.gov/vuln/detail/CVE-2020-25649)  | 
|  CVE-2020-28491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-28491](https://nvd.nist.gov/vuln/detail/CVE-2020-28491)  | 
|  CVE-2020-35211  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35211](https://nvd.nist.gov/vuln/detail/CVE-2020-35211)  | 
|  CVE-2020-35490  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35490  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35490](https://nvd.nist.gov/vuln/detail/CVE-2020-35490)  | 
|  CVE-2020-35491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35491  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35491](https://nvd.nist.gov/vuln/detail/CVE-2020-35491)  | 
|  CVE-2020-35728  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-35728  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-35728](https://nvd.nist.gov/vuln/detail/CVE-2020-35728)  | 
|  CVE-2020-36179  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36179  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36179](https://nvd.nist.gov/vuln/detail/CVE-2020-36179)  | 
|  CVE-2020-36180  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36180  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36180](https://nvd.nist.gov/vuln/detail/CVE-2020-36180)  | 
|  CVE-2020-36181  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36181  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36181](https://nvd.nist.gov/vuln/detail/CVE-2020-36181)  | 
|  CVE-2020-36182  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36182  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36182](https://nvd.nist.gov/vuln/detail/CVE-2020-36182)  | 
|  CVE-2020-36183  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36183  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36183](https://nvd.nist.gov/vuln/detail/CVE-2020-36183)  | 
|  CVE-2020-36184  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36184  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36184](https://nvd.nist.gov/vuln/detail/CVE-2020-36184)  | 
|  CVE-2020-36185  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36185  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36185](https://nvd.nist.gov/vuln/detail/CVE-2020-36185)  | 
|  CVE-2020-36186  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36186  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36186](https://nvd.nist.gov/vuln/detail/CVE-2020-36186)  | 
|  CVE-2020-36187  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36187  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36187](https://nvd.nist.gov/vuln/detail/CVE-2020-36187)  | 
|  CVE-2020-36188  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36188  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36188](https://nvd.nist.gov/vuln/detail/CVE-2020-36188)  | 
|  CVE-2020-36189  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36189  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36189](https://nvd.nist.gov/vuln/detail/CVE-2020-36189)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-36518  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-36518](https://nvd.nist.gov/vuln/detail/CVE-2020-36518)  | 
|  CVE-2020-9492  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2020-9492](https://nvd.nist.gov/vuln/detail/CVE-2020-9492)  | 
|  CVE-2021-20190  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-20190  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-20190](https://nvd.nist.gov/vuln/detail/CVE-2021-20190)  | 
|  CVE-2021-22573  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-22573  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-22573  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-22573](https://nvd.nist.gov/vuln/detail/CVE-2021-22573)  | 
|  CVE-2021-25646  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-25646](https://nvd.nist.gov/vuln/detail/CVE-2021-25646)  | 
|  CVE-2021-26919  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-26919](https://nvd.nist.gov/vuln/detail/CVE-2021-26919)  | 
|  CVE-2021-28165  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-28165](https://nvd.nist.gov/vuln/detail/CVE-2021-28165)  | 
|  CVE-2021-31684  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-31684  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-31684](https://nvd.nist.gov/vuln/detail/CVE-2021-31684)  | 
|  CVE-2021-33036  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-33036](https://nvd.nist.gov/vuln/detail/CVE-2021-33036)  | 
|  CVE-2021-33813  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-33813](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)  | 
|  CVE-2021-33813  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-33813](https://nvd.nist.gov/vuln/detail/CVE-2021-33813)  | 
|  CVE-2021-34538  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-34538  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-34538](https://nvd.nist.gov/vuln/detail/CVE-2021-34538)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35515  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35515](https://nvd.nist.gov/vuln/detail/CVE-2021-35515)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35516  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35516](https://nvd.nist.gov/vuln/detail/CVE-2021-35516)  | 
|  CVE-2021-35517  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-35517  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-35517](https://nvd.nist.gov/vuln/detail/CVE-2021-35517)  | 
|  CVE-2021-36090  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-36090  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-36090](https://nvd.nist.gov/vuln/detail/CVE-2021-36090)  | 
|  CVE-2021-37136  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-37136  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37136](https://nvd.nist.gov/vuln/detail/CVE-2021-37136)  | 
|  CVE-2021-37137  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-37137  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37137](https://nvd.nist.gov/vuln/detail/CVE-2021-37137)  | 
|  CVE-2021-37714  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-37714  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-37714](https://nvd.nist.gov/vuln/detail/CVE-2021-37714)  | 
|  CVE-2021-46877  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2021-46877](https://nvd.nist.gov/vuln/detail/CVE-2021-46877)  | 
|  CVE-2022-24758  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-24758](https://nvd.nist.gov/vuln/detail/CVE-2022-24758)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25647  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25647](https://nvd.nist.gov/vuln/detail/CVE-2022-25647)  | 
|  CVE-2022-25857  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-25857  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-25857](https://nvd.nist.gov/vuln/detail/CVE-2022-25857)  | 
|  CVE-2022-31197  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-31197](https://nvd.nist.gov/vuln/detail/CVE-2022-31197)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-3171  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3171](https://nvd.nist.gov/vuln/detail/CVE-2022-3171)  | 
|  CVE-2022-34169  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-34169](https://nvd.nist.gov/vuln/detail/CVE-2022-34169)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3509  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3509](https://nvd.nist.gov/vuln/detail/CVE-2022-3509)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-3510  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-3510](https://nvd.nist.gov/vuln/detail/CVE-2022-3510)  | 
|  CVE-2022-36364  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-36364](https://nvd.nist.gov/vuln/detail/CVE-2022-36364)  | 
|  CVE-2022-37866  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-37866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-37866  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-37866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)  | 
|  CVE-2022-40146  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40146](https://nvd.nist.gov/vuln/detail/CVE-2022-40146)  | 
|  CVE-2022-40149  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40149  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40149](https://nvd.nist.gov/vuln/detail/CVE-2022-40149)  | 
|  CVE-2022-40150  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40150  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40150](https://nvd.nist.gov/vuln/detail/CVE-2022-40150)  | 
|  CVE-2022-40152  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-40152  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-40152](https://nvd.nist.gov/vuln/detail/CVE-2022-40152)  | 
|  CVE-2022-41704  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-41704](https://nvd.nist.gov/vuln/detail/CVE-2022-41704)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42003  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42003](https://nvd.nist.gov/vuln/detail/CVE-2022-42003)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-42004  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42004](https://nvd.nist.gov/vuln/detail/CVE-2022-42004)  | 
|  CVE-2022-4244  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-4244](https://nvd.nist.gov/vuln/detail/CVE-2022-4244)  | 
|  CVE-2022-42890  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-42890](https://nvd.nist.gov/vuln/detail/CVE-2022-42890)  | 
|  CVE-2022-44729  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-44729  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-44729](https://nvd.nist.gov/vuln/detail/CVE-2022-44729)  | 
|  CVE-2022-45685  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45685  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45685](https://nvd.nist.gov/vuln/detail/CVE-2022-45685)  | 
|  CVE-2022-45688  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45688](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)  | 
|  CVE-2022-45688  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45688](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)  | 
|  CVE-2022-45688  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45688](https://nvd.nist.gov/vuln/detail/CVE-2022-45688)  | 
|  CVE-2022-45693  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-45693  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-45693](https://nvd.nist.gov/vuln/detail/CVE-2022-45693)  | 
|  CVE-2022-46751  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2022-46751  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2022-46751](https://nvd.nist.gov/vuln/detail/CVE-2022-46751)  | 
|  CVE-2023-1370  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1370  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1370](https://nvd.nist.gov/vuln/detail/CVE-2023-1370)  | 
|  CVE-2023-1428  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1428](https://nvd.nist.gov/vuln/detail/CVE-2023-1428)  | 
|  CVE-2023-1436  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-1436  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-1436](https://nvd.nist.gov/vuln/detail/CVE-2023-1436)  | 
|  CVE-2023-20883  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-20883](https://nvd.nist.gov/vuln/detail/CVE-2023-20883)  | 
|  CVE-2023-24580  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-24580](https://nvd.nist.gov/vuln/detail/CVE-2023-24580)  | 
|  CVE-2023-25194  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-25194  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-25194  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-25194](https://nvd.nist.gov/vuln/detail/CVE-2023-25194)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-2976  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-2976](https://nvd.nist.gov/vuln/detail/CVE-2023-2976)  | 
|  CVE-2023-31418  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-31418](https://nvd.nist.gov/vuln/detail/CVE-2023-31418)  | 
|  CVE-2023-32731  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-32731](https://nvd.nist.gov/vuln/detail/CVE-2023-32731)  | 
|  CVE-2023-34453  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34453  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34453](https://nvd.nist.gov/vuln/detail/CVE-2023-34453)  | 
|  CVE-2023-34454  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34454  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34454](https://nvd.nist.gov/vuln/detail/CVE-2023-34454)  | 
|  CVE-2023-34455  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34455  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34455](https://nvd.nist.gov/vuln/detail/CVE-2023-34455)  | 
|  CVE-2023-34610  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-34610](https://nvd.nist.gov/vuln/detail/CVE-2023-34610)  | 
|  CVE-2023-36053  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-36053](https://nvd.nist.gov/vuln/detail/CVE-2023-36053)  | 
|  CVE-2023-3635  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-3635  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-3635](https://nvd.nist.gov/vuln/detail/CVE-2023-3635)  | 
|  CVE-2023-36478  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-36478  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-36478](https://nvd.nist.gov/vuln/detail/CVE-2023-36478)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-39410  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-39410](https://nvd.nist.gov/vuln/detail/CVE-2023-39410)  | 
|  CVE-2023-41164  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-41164](https://nvd.nist.gov/vuln/detail/CVE-2023-41164)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43642  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43642](https://nvd.nist.gov/vuln/detail/CVE-2023-43642)  | 
|  CVE-2023-43665  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-43665](https://nvd.nist.gov/vuln/detail/CVE-2023-43665)  | 
|  CVE-2023-46120  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-46120](https://nvd.nist.gov/vuln/detail/CVE-2023-46120)  | 
|  CVE-2023-46695  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-46695](https://nvd.nist.gov/vuln/detail/CVE-2023-46695)  | 
|  CVE-2023-4759  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-4759](https://nvd.nist.gov/vuln/detail/CVE-2023-4759)  | 
|  CVE-2023-5072  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-5072  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-5072  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-5072](https://nvd.nist.gov/vuln/detail/CVE-2023-5072)  | 
|  CVE-2023-6378  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6378  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6378](https://nvd.nist.gov/vuln/detail/CVE-2023-6378)  | 
|  CVE-2023-6481  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2023-6481  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2023-6481](https://nvd.nist.gov/vuln/detail/CVE-2023-6481)  | 
|  CVE-2024-21634  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2024-21634](https://nvd.nist.gov/vuln/detail/CVE-2024-21634)  | 
|  CVE-2024-24680  |  HIGH (高)  |  [https://nvd.nist.gov/vuln/detail/CVE-2024-24680](https://nvd.nist.gov/vuln/detail/CVE-2024-24680)  | 

## 7.2.0 版本備註
<a name="emr-720-relnotes"></a>

下列版本備註包含 Amazon EMR 7.2.0 版的資訊。變更是相對於 7.2.0 版而言。

**新功能**
+ **應用程式升級**：Amazon EMR 7.2.0 application upgrades include Iceberg 1.5.0-amzn-0 and Delta 3.1.0。
+ Amazon EMR 新增支援，讓您可以將 HBase、Flink 和 Hive 等其他應用程式與 Amazon S3 Express One Zone 儲存類別搭配使用。
+ 此版本新增了讀取還原物件的功能，因此您可以使用`S3A`通訊協定從 S3 位置讀取 Glacier 物件。此功能適用於 Spark、Flink 和 Hive。
+ 具有受管擴展的節點標籤 - 根據市場類型或節點類型，將節點標籤與執行個體搭配使用，以改善 Amazon EMR 的自動擴展。如需詳細資訊，請參閱[在 Amazon EMR 中使用受管擴展](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-managed-scaling.html)。

**已知問題**
+ EMR Studio 不支援 Python 3.11。

**變更、強化功能和已解決的問題**
+ 此版本修正叢集上執行個體狀態指令碼中的問題，該指令碼會監控執行個體的運作狀態，該執行個體在節點上有大量執行緒和/或開啟的檔案控點時，會大量消耗過多的 CPU 和記憶體資源。
+  從 Spark 3.3.1 (EMR 6.10 版及更高版本支援） 開始，解除委任主機中的所有執行器都會設定為新的 `ExecutorState`，稱為 *DECOMMISSIONING* 狀態。Yarn 無法使用解除委任的執行器來配置任務，因此會視需要為正在執行的任務請求新的執行器。因此，如果您在使用 EMR Managed Scaling、EMR Auto Scaling 或 EMR-EC2 叢集上的任何自訂擴展機制時停用 Spark DRA，則 Yarn 可能會為每個任務請求允許的執行器上限。為了避免此問題，當您使用上述功能組合時，請將 `spark.dynamicAllocation.enabled` 屬性設為 `TRUE`（這是預設值）。此外，您也可以設定 Spark 任務的 `spark.dynamicAllocation.maxExecutors`和 `spark.dynamicAllocation.minExecutors` 屬性值來設定執行器限制下限和上限，以限制任務執行期間配置的執行器數量。
+ 此版本修正了內部步驟清除操作期間可能發生的死結問題。此操作會在步驟在 EMR 叢集上完成時管理步驟的生命週期。此問題會影響重要的 Amazon EMR 操作，例如步驟操作和擴展。
+ 此版本解決了具有特定預先存在日誌檔案AMIs 的自訂叢集可能導致 Amazon EMR 日誌管理常駐程式失敗的問題。
+ Amazon EMR 7.2.0 會將負責叢集管理和監控活動的 Amazon EMR 協助程式從 AWS SDK v1 升級到 v2。
+ 當您啟動具有 **Amazon EMR 5.36 或更高版本、6.6 或更高版本或 7.0 或更高版本的叢集時，Amazon EMR 會使用預設 Amazon EMR AMI 的最新 Amazon Linux 2023 或 Amazon Linux 2 版本。如需詳細資訊，請參閱[使用預設 Amazon Linux AMI for Amazon EMR](https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-default-ami.html)。    
[\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/zh_tw/emr/latest/ReleaseGuide/emr-720-release.html)

## 7.2.0 預設 Java 版本
<a name="emr-720-jdk"></a>

Amazon EMR 7.2 版和更新版本預設隨附支援 Corretto 17 (OpenJDK 上建置） 的應用程式 Amazon Corretto 17 (JDK 17)，但 Apache Livy 除外。

下表顯示 Amazon EMR 7.2.0 中應用程式的預設 Java 版本。如果您想要變更叢集上的預設 JVM，請遵循 [設定應用程式以使用特定 Java 虛擬機器](configuring-java8.md) 中的說明對在叢集上執行的每個應用程式進行操作。您只能對每個叢集使用一個 Java 執行期版本。Amazon EMR 不支援在相同叢集的不同執行期版本上執行不同的節點或應用程式。


| 應用程式 | Java/Amazon Corretto 版本 (預設為粗體) | 
| --- | --- | 
| Delta | 17、11、8 | 
| Flink | 17、11、8 | 
| HBase | 11、8 | 
| HCatalog | 17、11、8 | 
| Hadoop | 17、11、8 | 
| Hive | 17、11、8 | 
| Hudi | 17、11、8 | 
| Iceberg | 17、11、8 | 
| Livy | 17、11、8 | 
| Oozie | 17、11、8 | 
| Phoenix | 8 | 
| PrestoDB | 8 | 
| Spark | 17、11、8 | 
| Spark RAPIDS | 17、11、8 | 
| Sqoop | 8 | 
| Tez | 17、11、8 | 
| Trino | 21、17 | 
| Zeppelin | 8 | 
| Pig | 8 | 
| Zookeeper | 8 | 

## 7.2.0 元件版本
<a name="emr-720-components"></a>

Amazon EMR 在此版本安裝的元件列出如下。其中有一些屬於大數據應用程式套件。其他的則為 Amazon EMR 獨有，並安裝為系統程序和功能。這些通常會以 `emr` 或 `aws` 開頭。在最新 Amazon EMR 版本中的大數據應用程式套件，通常也是社群中可找到的最新版本。我們致力盡快提供 Amazon EMR 的社群版本。

Amazon EMR 中的某些元件與社群版本不同。這些元件具有版本標籤，格式為 `CommunityVersion-amzn-EmrVersion`。`EmrVersion` 從 0 開始。例如，假設有一個名為 `myapp-component` 的開放原始碼社群元件 2.2 版為了包含在不同 Amazon EMR 發行版本中而修改過三次，則其發行版本會列為 `2.2-amzn-2`。


| 元件 | 版本 | Description | 
| --- | --- | --- | 
| adot-java-agent | 1.31.0 | 從應用程式常駐程式收集指標的 Java 代理程式。 | 
| delta | 3.1.0 | Delta Lake 是一種適用於大型分析資料集的開放式資料表格式 | 
| emr-amazon-cloudwatch-agent | 1.300032.2-amzn-0 | 從 Amazon EC2 執行個體收集內部系統層級指標和自訂應用程式指標的應用程式。 | 
| emr-ddb | 5.4.0 | 適用於 Hadoop 生態系統應用程式的 Amazon DynamoDB 連接器。 | 
| emr-goodies | 3.11.0 | 適用 Hadoop 生態系統的超便利程式庫。 | 
| emr-kinesis | 3.15.0 | 適用於 Hadoop 生態系統應用程式的 Amazon Kinesis 連接器。 | 
| emr-notebook-env | 1.16.0 | 適用於 emr 筆記本的 Conda env，前者包含 Jupyter Enterprise Gateway | 
| emr-s3-dist-cp | 2.32.0 | 針對 Amazon S3 最佳化的分散式複製應用程式。 | 
| emr-s3-select | 2.11.0 | EMR S3Select Connector | 
| emr-wal-cli | 1.2.2 | 適用於 emrwal list/deletion 的 Cli。 | 
| emrfs | 2.63.0 | 適用於 Hadoop 生態系統應用程式的 Amazon S3 連接器。 | 
| flink-client | 1.18.1-amzn-1 | Apache Flink 命令列用戶端指令碼和應用程式。 | 
| flink-jobmanager-config | 1.18.1-amzn-1 | 管理 Apache Flink JobManager 的 EMR 節點上的資源。 | 
| hadoop-client | 3.3.6-amzn-4 | Hadoop 命令列用戶端，例如「hdfs」、「Hadoop」或「yarn」。 | 
| hadoop-hdfs-datanode | 3.3.6-amzn-4 | 用於存放區塊的 HDFS 節點層級服務。 | 
| hadoop-hdfs-library | 3.3.6-amzn-4 | HDFS 命令列用戶端和程式庫 | 
| hadoop-hdfs-namenode | 3.3.6-amzn-4 | 用於追蹤檔案名稱和區塊位置的 HDFS 服務。 | 
| hadoop-hdfs-journalnode | 3.3.6-amzn-4 | HDFS 檔案系統中的 Hadoop 服務，用於管理在 HA 叢集。 | 
| hadoop-httpfs-server | 3.3.6-amzn-4 | HDFS 操作的 HTTP 端點。 | 
| hadoop-kms-server | 3.3.6-amzn-4 | 以 Hadoop 金鑰供應商 API 為基礎的加密金鑰管理伺服器。 | 
| hadoop-mapred | 3.3.6-amzn-4 | 執行 MapReduce 應用程式的 MapReduce 執行引擎程式庫。 | 
| hadoop-yarn-nodemanager | 3.3.6-amzn-4 | 在個別節點用於管理容器的 YARN 服務。 | 
| hadoop-yarn-resourcemanager | 3.3.6-amzn-4 | 用於分配和管理叢集資源，以及分散式應用程式的 YARN 服務。 | 
| hadoop-yarn-timeline-server | 3.3.6-amzn-4 | 為 YARN 應用程式擷取目前和歷史資訊的服務。 | 
| hbase-hmaster | 2.4.17-amzn-6 | 負責區域協調和執行管理命令的 HBase 叢集服務。 | 
| hbase-region-server | 2.4.17-amzn-6 | 提供一或多個 HBase 區域的服務。 | 
| hbase-client | 2.4.17-amzn-6 | HBase 命令列用戶端。 | 
| hbase-rest-server | 2.4.17-amzn-6 | 為 HBase 提供 RESTful HTTP 端點的服務。 | 
| hbase-thrift-server | 2.4.17-amzn-6 | 提供 Thrift 端點到 HBase 的服務。 | 
| hbase-operator-tools | 2.4.17-amzn-6 | 適用於 Apache HBase 叢集的修復工具。 | 
| hcatalog-client | 3.1.3-amzn-11 | 操作 hcatalog-server 的「hcat」命令列用戶端。 | 
| hcatalog-server | 3.1.3-amzn-11 | 服務為分散式應用程式提供 HCatalog、表格和儲存管理層。 | 
| hcatalog-webhcat-server | 3.1.3-amzn-11 | HTTP 端點提供了 REST 介面至 HCatalog。 | 
| hive-client | 3.1.3-amzn-11 | Hive 命令列用戶端。 | 
| hive-hbase | 3.1.3-amzn-11 | Hive-hbase 用戶端。 | 
| hive-metastore-server | 3.1.3-amzn-11 | 為 Hadoop 操作的 SQL 提供存取 Hive 中繼儲存、存放中繼資料語意儲存庫的服務。 | 
| hive-server2 | 3.1.3-amzn-11 | 依 Web 請求接受 Hive 查詢的服務。 | 
| hudi | 0.14.1-amzn-1 | 增量處理架構，以低延遲和高效率強化資料管道。 | 
| hudi-presto | 0.14.1-amzn-1 | 用於使用 Hudi 執行 Presto 的套件程式庫。 | 
| hudi-trino | 0.14.1-amzn-1 | 用於使用 Hudi 執行 Trino 的套件程式庫。 | 
| hudi-spark | 0.14.1-amzn-1 | 用於使用 Hudi 執行 Spark 的套件程式庫。 | 
| hue-server | 4.11.0 | 使用 Hadoop 生態系統應用程式分析資料的 Web 應用程式 | 
| iceberg | 1.5.0-amzn-0 | Apache Iceberg 是一種適用於大型分析資料集的開放式資料表格式 | 
| jupyterhub | 1.5.0 | 適用於 Jupyter 筆記本的多使用者伺服器 | 
| livy-server | 0.8.0 培養 | 與 Apache Spark 互動的 REST 介面 | 
| nginx | 1.12.1 | nginx [engine x] 是 HTTP 和反向代理伺服器 | 
| mxnet | 1.9.1 | 靈活有效率的程式庫，具可擴展性，適用於深度學習。 | 
| mariadb-server | 5.5.68\$1 | MariaDB 資料庫伺服器。 | 
| nvidia-cuda | 11.8.0 | Nvidia 驅動程式和 Cuda 工具組 | 
| oozie-client | 5.2.1 | Oozie 命令列用戶端。 | 
| oozie-server | 5.2.1 | 接受 Oozie 工作流程要求的服務。 | 
| opencv | 4.7.0 | 開放原始碼電腦 Vision 程式庫。 | 
| phoenix-library | 5.1.3 | 適用於伺服器和用戶端的 phoenix 程式庫 | 
| phoenix-connectors | 5.1.3 | 適用於 Spark-3 的 Apache Phoenix 連接器 | 
| phoenix-query-server | 6.0.0 | 此為一輕量伺服器，可提供對 Avatica API 的 JDBC 存取以及通訊協定緩衝區和 JSON 格式存取  | 
| presto-coordinator | 0.285-amzn-0 | 在 presto-workers 之間接受查詢和執行管理查詢的服務。 | 
| presto-worker | 0.285-amzn-0 | 執行查詢各部分的服務。 | 
| presto-client | 0.285-amzn-0 | 安裝於 HA 叢集的待命主節點的 Presto 命令列用戶端，該主節點上的 Presto 伺服器未啟動。 | 
| trino-coordinator | 436-amzn-0 | 在 trino-workers 之間接受查詢和執行管理查詢的服務。 | 
| trino-worker | 436-amzn-0 | 執行查詢各部分的服務。 | 
| trino-client | 436-amzn-0 | 安裝於 HA 叢集的待命主節點的 Trino 命令列用戶端，該主節點上的 Trino 伺服器未啟動。 | 
| pig-client | 0.17.0 | Pig 命令列用戶端。 | 
| r | 4.3.2 | 統計運算 R 專案 | 
| ranger-kms-server | 2.0.0 | Apache Ranger Key Management System | 
| spark-client | 3.5.1-amzn-0 | Spark 命令列用戶端。 | 
| spark-history-server | 3.5.1-amzn-0 | 用於檢視完整 Spark 應用程式生命週期記錄事件的 Web 使用者介面。 | 
| spark-on-yarn | 3.5.1-amzn-0 | 適用於 YARN 的記憶體內執行引擎。 | 
| spark-yarn-slave | 3.5.1-amzn-0 | YARN 從屬所需的 Apache Spark 程式庫。 | 
| spark-rapids | 24.02.0-amzn-0 | Nvidia Spark RAPIDS 外掛程式使用 GPU 加速 Apache Spark。 | 
| sqoop-client | 1.4.7 | Apache Sqoop 命令列用戶端。 | 
| tensorflow | 2.11.0 | 適用於高效能數值運算的 TensorFlow 開放原始碼軟體程式庫。 | 
| tez-on-yarn | 0.10.2-amzn-9 | tez YARN 應用程式和程式庫。 | 
| tez-on-worker | 0.10.2-amzn-9 | 適用於工作節點的 tez YARN 應用程式和程式庫。 | 
| zeppelin-server | 0.10.1 | 能進行互動式資料分析，以 Web 為基礎的筆記型電腦。 | 
| zookeeper-server | 3.9.1-amzn-1 | 用於維護組態資訊、命名、提供分散式同步，並提供群組服務的集中化服務。 | 
| zookeeper-client | 3.9.1-amzn-1 | ZooKeeper 命令列用戶端。 | 

## 7.2.0 組態分類
<a name="emr-720-class"></a>

組態分類可讓您自訂應用程式。這些檔案通常對應於應用程式的組態 XML 檔案，例如 `hive-site.xml`。如需詳細資訊，請參閱[設定應用程式](emr-configure-apps.md)。

當您為執行中叢集的執行個體群組指定組態時，就會發生重新設定動作。Amazon EMR 只會為您修改的分類啟動重新設定動作。如需詳細資訊，請參閱[重新設定執行中叢集中的執行個體群組](emr-configure-apps-running-cluster.md)。


**emr-7.2.0 分類**  

| 分類 | Description | 重新設定動作 | 
| --- | --- | --- | 
| capacity-scheduler | 變更 Hadoop 中 capacity-scheduler.xml 檔案的值。 | Restarts the ResourceManager service. | 
| container-executor | 在 Hadoop YARN 的 container-executor.cfg 檔案中變更值。 | Not available. | 
| container-log4j | 變更 Hadoop YARN 的 container-log4j.properties 檔案中的值。 | Not available. | 
| core-site | 變更 Hadoop 中 core-site.xml 檔案的值。 | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Ranger KMS, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| docker-conf | 變更 Docker 相關設定。 | Not available. | 
| emrfs-site | 變更 EMRFS 設定。 | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts HBaseRegionserver, HBaseMaster, HBaseThrift, HBaseRest, HiveServer2, Hive MetaStore, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| flink-conf | 變更 flink-conf.yaml 設定。 | Restarts Flink history server. | 
| flink-log4j | 變更 Flink log4j.properties 設定。 | Restarts Flink history server. | 
| flink-log4j-session | 變更 Kubernetes/Yarn 工作階段的 Flink log4j-session.properties 設定。 | Restarts Flink history server. | 
| flink-log4j-cli | 變更 Flink log4j-cli.properties 設定。 | Restarts Flink history server. | 
| hadoop-env | 在 Hadoop 環境中變更所有 Hadoop 元件的值。 | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts PhoenixQueryserver, HiveServer2, Hive MetaStore, and MapReduce-HistoryServer. | 
| hadoop-log4j | 變更 Hadoop 中 log4j.properties 檔案的值。 | Restarts the Hadoop HDFS services SecondaryNamenode, Datanode, and Journalnode. Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Hadoop KMS, Hadoop Httpfs, and MapReduce-HistoryServer. | 
| hadoop-ssl-server | 變更 hadoop ssl 伺服器組態 | Not available. | 
| hadoop-ssl-client | 變更 hadoop ssl 用戶端組態 | Not available. | 
| hbase | Apache HBase 的 Amazon EMR 彙整設定。 | Custom EMR specific property. Sets emrfs-site and hbase-site configs. See those for their associated restarts. | 
| hbase-env | 變更 HBase 環境中的值。 | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-log4j | 變更 HBase 的 hbase-log4j.properties 檔案中的值。 | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-metrics | 變更 HBase 的 hadoop-metrics2-hbase.properties 檔案中的值。 | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. | 
| hbase-policy | 變更 HBase 的 hbase-policy.xml 檔案中的值。 | Not available. | 
| hbase-site | 變更 HBase 的 hbase-site.xml 檔案中的值。 | Restarts the HBase services RegionServer, HBaseMaster, ThriftServer, RestServer. Additionally restarts Phoenix QueryServer. | 
| hdfs-encryption-zones | 設定 HDFS 加密區域。 | This classification should not be reconfigured. | 
| hdfs-env | 變更 HDFS 環境中的值。 | Restarts Hadoop HDFS services Namenode, Datanode, and ZKFC. | 
| hdfs-site | 變更 HDFS 的 hdfs-site.xml 中的值。 | Restarts the Hadoop HDFS services Namenode, SecondaryNamenode, Datanode, ZKFC, and Journalnode. Additionally restarts Hadoop Httpfs. | 
| hcatalog-env | 變更 HCatalog 環境中的值。 | Restarts Hive HCatalog Server. | 
| hcatalog-server-jndi | 變更 HCatalog 的 jndi.properties 中的值。 | Restarts Hive HCatalog Server. | 
| hcatalog-server-proto-hive-site | 變更 HCatalog 的 proto-hive-site.xml 中的值。 | Restarts Hive HCatalog Server. | 
| hcatalog-webhcat-env | 變更 HCatalog WebHCat 環境中的值。 | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-log4j2 | 變更 HCatalog WebHCat 的 log4j2.properties 中的值。 | Restarts Hive WebHCat server. | 
| hcatalog-webhcat-site | 變更 HCatalog WebHCat 的 webhcat-site.xml 檔案中的值。 | Restarts Hive WebHCat server. | 
| hive | Apache Hive 的 Amazon EMR 彙整設定。 | Sets configurations to launch Hive LLAP service. | 
| hive-beeline-log4j2 | 變更 Hive 的 beeline-log4j2.properties 檔案中的值。 | Not available. | 
| hive-parquet-logging | 變更 Hive 的 parquet-logging.properties 檔案中的值。 | Not available. | 
| hive-env | 變更 Hive 環境中的值。 | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. | 
| hive-exec-log4j2 | 變更 Hive 的 hive-exec-log4j2.properties 檔案中的值。 | Not available. | 
| hive-llap-daemon-log4j2 | 變更 Hive 的 llap-daemon-log4j2.properties 檔案中的值。 | Not available. | 
| hive-log4j2 | 變更 Hive 的 hive-log4j2.properties 檔案中的值。 | Not available. | 
| hive-site | 變更 Hive 的 hive-site.xml 檔案中的值 | Restarts HiveServer2, HiveMetastore, and Hive HCatalog-Server. Runs Hive schemaTool CLI commands to verify hive-metastore. Also restarts Oozie and Zeppelin. | 
| hiveserver2-site | 變更 Hive Server2 的 hiveserver2-site.xml 檔案中的值 | Not available. | 
| hue-ini | 變更 Hue 的 ini 檔案中的值 | Restarts Hue. Also activates Hue config override CLI commands to pick up new configurations. | 
| httpfs-env | 變更 HTTPFS 環境中的值。 | Restarts Hadoop Httpfs service. | 
| httpfs-site | 變更 Hadoop 中 httpfs-site.xml 檔案的值。 | Restarts Hadoop Httpfs service. | 
| hadoop-kms-acls | 變更 Hadoop 中 kms-acls.xml 檔案的值。 | Not available. | 
| hadoop-kms-env | 變更 Hadoop KMS 環境中的值。 | Restarts Hadoop-KMS service. | 
| hadoop-kms-java-home | 變更 Hadoop 的 KMS Java Home | Not available. | 
| hadoop-kms-log4j | 變更 Hadoop 的 kms-log4j.properties 檔案中的值。 | Not available. | 
| hadoop-kms-site | 變更 Hadoop 中 kms-site.xml 檔案的值。 | Restarts Hadoop-KMS and Ranger-KMS service. | 
| hudi-env | 變更 Hudi 環境中的值。 | Not available. | 
| hudi-defaults | 變更 Hudi 的 hudi-defaults.conf 檔案中的值。 | Not available. | 
| iceberg-defaults | 變更 Iceberg 的 iceberg-defaults.conf 檔案中的值。 | Not available. | 
| delta-defaults | 變更 Delta 的 delta-defaults.conf 檔案中的值。 | Not available. | 
| jupyter-notebook-conf | 變更 Jupyter 筆記本中 jupyter\$1notebook\$1config.py 檔案的值。 | Not available. | 
| jupyter-hub-conf | 變更 JupyterHubs 中 jupyterhub\$1config.py 檔案的值。 | Not available. | 
| jupyter-s3-conf | 設定 Jupyter 筆記本 S3 持久性。 | Not available. | 
| jupyter-sparkmagic-conf | 變更 Sparkmagic 中 config.json 檔案的值。 | Not available. | 
| livy-conf | 變更 Livy 的 livy.conf 檔案中的值。 | Restarts Livy Server. | 
| livy-env | 變更 Livy 環境中的值。 | Restarts Livy Server. | 
| livy-log4j2 | 變更 Livy log4j2.properties 設定。 | Restarts Livy Server. | 
| mapred-env | 變更 MapReduce 應用程式環境中的值。 | Restarts Hadoop MapReduce-HistoryServer. | 
| mapred-site | 變更 MapReduce 應用程式 mapred-site.xml 檔案中的值。 | Restarts Hadoop MapReduce-HistoryServer. | 
| oozie-env | 變更 Oozie 環境中的值。 | Restarts Oozie. | 
| oozie-log4j | 變更 Oozie 的 oozie-log4j.properties 檔案中的值。 | Restarts Oozie. | 
| oozie-site | 變更 Oozie 的 oozie-site.xml 檔案中的值。 | Restarts Oozie. | 
| phoenix-hbase-metrics | 變更 Phoenix 的 hadoop-metrics2-hbase.properties 檔案中的值。 | Not available. | 
| phoenix-hbase-site | 變更 Phoenix 的 hbase-site.xml 檔案中的值。 | Not available. | 
| phoenix-log4j | 變更 Phoenix 中 log4j.properties 檔案的值。 | Restarts Phoenix-QueryServer. | 
| phoenix-metrics | 變更 Phoenix 的 hadoop-metrics2-phoenix.properties 檔案中的值。 | Not available. | 
| pig-env | 在 Pig 環境中變更值。 | Not available. | 
| pig-properties | 變更 Pig 的 pig.properties 檔案中的值。 | Restarts Oozie. | 
| pig-log4j | 變更 Pig 的 log4j.properties 檔案中的值。 | Not available. | 
| presto-log | 變更 Presto 的 log.properties 檔案中的值。 | Restarts Presto-Server (for PrestoDB) | 
| presto-config | 變更 Presto 的 config.properties 檔案中的值。 | Restarts Presto-Server (for PrestoDB) | 
| presto-password-authenticator | 變更 Presto 的 password-authenticator.properties 檔案中的值。 | Not available. | 
| presto-env | 變更 Presto 的 presto-env.sh 檔案中的值。 | Restarts Presto-Server (for PrestoDB) | 
| presto-node | 變更 Presto 的 node.properties 檔案中的值。 | Not available. | 
| presto-connector-blackhole | 變更 Presto 的 blackhole.properties 檔案中的值。 | Not available. | 
| presto-connector-cassandra | 變更 Presto 的 cassandra.properties 檔案中的值。 | Not available. | 
| presto-connector-hive | 變更 Presto 的 hive.properties 檔案中的值。 | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-jmx | 變更 Presto 的 jmx.properties 檔案中的值。 | Not available. | 
| presto-connector-kafka | 變更 Presto 的 kafka.properties 檔案中的值。 | Not available. | 
| presto-connector-lakeformation | 變更 Presto 的 lakeformation.properties 檔案中的值。 | Restarts Presto-Server (for PrestoDB) | 
| presto-connector-localfile | 變更 Presto 的 localfile.properties 檔案中的值。 | Not available. | 
| presto-connector-memory | 變更 Presto 的 memory.properties 檔案中的值。 | Not available. | 
| presto-connector-mongodb | 變更 Presto 的 mongodb.properties 檔案中的值。 | Not available. | 
| presto-connector-mysql | 變更 Presto 的 mysql.properties 檔案中的值。 | Not available. | 
| presto-connector-postgresql | 變更 Presto 的 postgresql.properties 檔案中的值。 | Not available. | 
| presto-connector-raptor | 變更 Presto 的 raptor.properties 檔案中的值。 | Not available. | 
| presto-connector-redis | 變更 Presto 的 redis.properties 檔案中的值。 | Not available. | 
| presto-connector-redshift | 變更 Presto 的 redshift.properties 檔案中的值。 | Not available. | 
| presto-connector-tpch | 變更 Presto 的 tpch.properties 檔案中的值。 | Not available. | 
| presto-connector-tpcds | 變更 Presto 的 tpcds.properties 檔案中的值。 | Not available. | 
| trino-log | 變更 Trino 的 log.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-config | 變更 Trino 的 config.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-password-authenticator | 變更 Trino 的 password-authenticator.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-env | 變更 Trino 的 trino-env.sh 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-node | 變更 Trino 的 node.properties 檔案中的值。 | Not available. | 
| trino-connector-blackhole | 變更 Trino 的 blackhole.properties 檔案中的值。 | Not available. | 
| trino-connector-cassandra | 變更 Trino 的 cassandra.properties 檔案中的值。 | Not available. | 
| trino-connector-delta | 變更 Trino 的 delta.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-connector-hive | 變更 Trino 的 hive.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-exchange-manager | 變更 Trino 的 exchange-manager.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-connector-iceberg | 變更 Trino 的 iceberg.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-connector-hudi | 變更 Trino 的 hudi.properties 檔案中的值。 | Restarts Trino-Server (for Trino) | 
| trino-connector-jmx | 變更 Trino 的 jmx.properties 檔案中的值。 | Not available. | 
| trino-connector-kafka | 變更 Trino 的 kafka.properties 檔案中的值。 | Not available. | 
| trino-connector-localfile | 變更 Trino 的 localfile.properties 檔案中的值。 | Not available. | 
| trino-connector-memory | 變更 Trino 的 memory.properties 檔案中的值。 | Not available. | 
| trino-connector-mongodb | 變更 Trino 的 mongodb.properties 檔案中的值。 | Not available. | 
| trino-connector-mysql | 變更 Trino 的 mysql.properties 檔案中的值。 | Not available. | 
| trino-connector-postgresql | 變更 Trino 的 postgresql.properties 檔案中的值。 | Not available. | 
| trino-connector-raptor | 變更 Trino 的 raptor.properties 檔案中的值。 | Not available. | 
| trino-connector-redis | 變更 Trino 的 redis.properties 檔案中的值。 | Not available. | 
| trino-connector-redshift | 變更 Trino 的 redshift.properties 檔案中的值。 | Not available. | 
| trino-connector-tpch | 變更 Trino 的 tpch.properties 檔案中的值。 | Not available. | 
| trino-connector-tpcds | 變更 Trino 的 tpcds.properties 檔案中的值。 | Not available. | 
| ranger-kms-dbks-site | 變更 Ranger KMS 之 dbks-site.xml 檔案中的值。 | Restarts Ranger KMS Server. | 
| ranger-kms-site | 變更 Ranger KMS 之 ranger-kms-site.xml 檔案中的值。 | Restarts Ranger KMS Server. | 
| ranger-kms-env | 變更 Ranger KMS 環境中的值。 | Restarts Ranger KMS Server. | 
| ranger-kms-logback | 變更 Ranger KMS 的 kms-logback.xml 檔案中的值。 | Not available. | 
| ranger-kms-db-ca | 變更 S3 上 CA 檔案的值，以使用 Ranger KMS 進行 MySQL SSL 連線。 | Not available. | 
| spark | Apache Spark 的 Amazon EMR 彙整設定。 | This property modifies spark-defaults. See actions there. | 
| spark-defaults | 變更 Spark 的 spark-defaults.conf 檔案中的值。 | Restarts Spark history server and Spark thrift server. | 
| spark-env | 變更 Spark 環境中的值。 | Restarts Spark history server and Spark thrift server. | 
| spark-hive-site | 變更 Spark 的 hive-site.xml 檔案中的值 | Not available. | 
| spark-log4j2 | 變更 Spark 中 log4j2.properties 檔案中的值。 | Restarts Spark history server and Spark thrift server. | 
| spark-metrics | 變更 Spark 中 metrics.properties 檔案的值。 | Restarts Spark history server and Spark thrift server. | 
| sqoop-env | 變更 Sqoop 環境中的值。 | Not available. | 
| sqoop-oraoop-site | 變更 Sqoop OraOop 的 oraoop-site.xml 檔案中的值。 | Not available. | 
| sqoop-site | 變更 Sqoop 的 sqoop-site.xml 檔案中的值。 | Not available. | 
| tez-site | 變更 Tez 的 tez-site.xml 檔案中的值。 | Restart Oozie and HiveServer2. | 
| yarn-env | 變更 YARN 環境中的值。 | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts MapReduce-HistoryServer. | 
| yarn-site | 變更 YARN 的 yarn-site.xml 檔案中的值。 | Restarts the Hadoop YARN services ResourceManager, NodeManager, ProxyServer, and TimelineServer. Additionally restarts Livy Server and MapReduce-HistoryServer. | 
| zeppelin-env | 變更 Zeppelin 環境中的值。 | Restarts Zeppelin. | 
| zeppelin-site | 變更 zeppelin-site.xml 中的組態設定。 | Restarts Zeppelin. | 
| zookeeper-config | 變更 ZooKeeper 的 zoo.cfg 檔案中的值。 | Restarts Zookeeper server. | 
| zookeeper-logback | 變更 ZooKeeper 的 logback.xml 檔案中的值。 | Restarts Zookeeper server. | 
| emr-metrics | 變更此節點的 emr 指標設定。 | Restarts the CloudWatchAgent service. | 

## 7.2.0 變更日誌
<a name="720-changelog"></a>


**變更 7.2.0 版本和版本備註的日誌**  

| Date | 事件 | Description | 
| --- | --- | --- | 
| 2025-09-03 | 文件修訂 | 已新增 Amazon EMR 7.2.0 版本備註 | 
| 2024-07-25 | 文件出版 | Amazon EMR 7.2.0 版本備註首次發佈 | 
| 2024-07-16 | 初始版本 | Amazon EMR 7.2.0 首次部署到初始商業區域 | 