object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(3502)
    ["cve_code"]=>
    string(13) "CVE-2018-2799"
    ["cnnvd"]=>
    string(17) "CNNVD-201804-1222"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(5.3)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(907) "Oracle Java SE(子组件:JAXP)的 Java SE、Java SE Embedded、JRockit 组件中存在漏洞。受影响的受支持版本为 Java SE:7u171、8u162 和 10;Java SE Embedded:8u161;JRockit:R28.3.17。该漏洞易于利用,允许未经身份验证的攻击者通过多种协议访问网络,从而破坏 Java SE、Java SE Embedded、JRockit。成功攻击此漏洞可导致未经授权的 Java SE、Java SE Embedded、JRockit 部分拒绝服务(部分 DOS)。注意:适用于 Java 的客户端和服务器部署。此漏洞可通过沙盒 Java Web Start 应用程序和沙盒 Java 小程序利用。它还可以通过向指定组件中的 API 提供数据来利用,而无需使用沙盒 Java Web Start 应用程序或沙盒 Java 小程序,例如通过 Web 服务。 CVSS 3.0 基本分数 5.3(可用性影响)。CVSS 向量:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)。"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(9) "xerces-j2"
    ["repair_version"]=>
    string(18) "xerces-j2-2.12.2-1"
    ["repair"]=>
    string(37) "软件包升级
dnf update xerces-j2
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(29) {
      [0]=>
      string(75) "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
      [1]=>
      string(41) "http://www.securitytracker.com/id/1040697"
      [2]=>
      string(39) "http://www.securityfocus.com/bid/103872"
      [3]=>
      string(56) "https://security.netapp.com/advisory/ntap-20180419-0001/"
      [4]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1191"
      [5]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1188"
      [6]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1206"
      [7]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1204"
      [8]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1202"
      [9]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1201"
      [10]=>
      string(45) "https://www.debian.org/security/2018/dsa-4185"
      [11]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1270"
      [12]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1278"
      [13]=>
      string(30) "https://usn.ubuntu.com/3644-1/"
      [14]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1724"
      [15]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1723"
      [16]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1722"
      [17]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1721"
      [18]=>
      string(45) "https://www.debian.org/security/2018/dsa-4225"
      [19]=>
      string(30) "https://usn.ubuntu.com/3691-1/"
      [20]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1975"
      [21]=>
      string(47) "https://access.redhat.com/errata/RHSA-2018:1974"
      [22]=>
      string(94) "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us"
      [23]=>
      string(111) "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
      [24]=>
      string(42) "https://security.gentoo.org/glsa/201903-14"
      [25]=>
      string(94) "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us"
      [26]=>
      string(127) "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E"
      [27]=>
      string(132) "https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E"
      [28]=>
      string(124) "https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E"
    }
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-10-31"
    ["cve_name"]=>
    string(32) "多款 Oracle 产品安全漏洞"
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(3502)
    ["cve_code"]=>
    string(13) "CVE-2018-2799"
    ["cnnvd"]=>
    string(17) "CNNVD-201804-1222"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(5.3)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(907) "Oracle Java SE(子组件:JAXP)的 Java SE、Java SE Embedded、JRockit 组件中存在漏洞。受影响的受支持版本为 Java SE:7u171、8u162 和 10;Java SE Embedded:8u161;JRockit:R28.3.17。该漏洞易于利用,允许未经身份验证的攻击者通过多种协议访问网络,从而破坏 Java SE、Java SE Embedded、JRockit。成功攻击此漏洞可导致未经授权的 Java SE、Java SE Embedded、JRockit 部分拒绝服务(部分 DOS)。注意:适用于 Java 的客户端和服务器部署。此漏洞可通过沙盒 Java Web Start 应用程序和沙盒 Java 小程序利用。它还可以通过向指定组件中的 API 提供数据来利用,而无需使用沙盒 Java Web Start 应用程序或沙盒 Java 小程序,例如通过 Web 服务。 CVSS 3.0 基本分数 5.3(可用性影响)。CVSS 向量:(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)。"
    ["date"]=>
    string(10) "2024-09-19"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(9) "xerces-j2"
    ["repair_version"]=>
    string(18) "xerces-j2-2.12.2-1"
    ["repair"]=>
    string(37) "软件包升级
dnf update xerces-j2
"
    ["prove"]=>
    string(164) "执行命令yum info PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(1771) "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html;http://www.securitytracker.com/id/1040697;http://www.securityfocus.com/bid/103872;https://security.netapp.com/advisory/ntap-20180419-0001/;https://access.redhat.com/errata/RHSA-2018:1191;https://access.redhat.com/errata/RHSA-2018:1188;https://access.redhat.com/errata/RHSA-2018:1206;https://access.redhat.com/errata/RHSA-2018:1204;https://access.redhat.com/errata/RHSA-2018:1202;https://access.redhat.com/errata/RHSA-2018:1201;https://www.debian.org/security/2018/dsa-4185;https://access.redhat.com/errata/RHSA-2018:1270;https://access.redhat.com/errata/RHSA-2018:1278;https://usn.ubuntu.com/3644-1/;https://access.redhat.com/errata/RHSA-2018:1724;https://access.redhat.com/errata/RHSA-2018:1723;https://access.redhat.com/errata/RHSA-2018:1722;https://access.redhat.com/errata/RHSA-2018:1721;https://www.debian.org/security/2018/dsa-4225;https://usn.ubuntu.com/3691-1/;https://access.redhat.com/errata/RHSA-2018:1975;https://access.redhat.com/errata/RHSA-2018:1974;https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us;https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0;https://security.gentoo.org/glsa/201903-14;https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us;https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E;https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E;https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E"
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    string(10) "2024-10-31"
    ["cve_name"]=>
    string(32) "多款 Oracle 产品安全漏洞"
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "3502"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}