object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(11841)
    ["cve_code"]=>
    string(13) "CVE-2007-3670"
    ["cnnvd"]=>
    string(16) "CNNVD-200707-163"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(4.3)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(739) "Microsoft Internet Explorer 中的参数注入漏洞在安装了 Firefox 并注册了某些 URI 的系统上运行时,允许远程攻击者进行跨浏览器脚本攻击并通过 (1) FirefoxURL 或 (2) FirefoxHTML URI 中的 shell 元字符执行任意命令,这些元字符插入到调用 firefox.exe 时创建的命令行中。注意:关于该问题出在 Internet Explorer 还是 Firefox 中一直存在争议。截至 20070711 年,CVE 认为 IE 在调用 Firefox 时似乎无法正确分隔 URL 参数,并且该问题也可能出现在 IE 中的其他协议处理程序中。但是,Mozilla 已声明将通过“深度防御”修复程序解决该问题,该修复程序将“阻止 IE 向 Firefox 发送恶意数据”。"
    ["date"]=>
    string(10) "2024-11-11"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(8) "firefox;"
    ["repair_version"]=>
    NULL
    ["repair"]=>
    string(35) "软件包升级
dnf update firefox
"
    ["prove"]=>
    NULL
    ["patch"]=>
    NULL
    ["references"]=>
    array(39) {
      [0]=>
      string(61) "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/"
      [1]=>
      string(57) "http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html"
      [2]=>
      string(38) "http://www.securityfocus.com/bid/24837"
      [3]=>
      string(35) "http://secunia.com/advisories/25984"
      [4]=>
      string(72) "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565"
      [5]=>
      string(95) "http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/"
      [6]=>
      string(95) "http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx"
      [7]=>
      string(56) "http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/"
      [8]=>
      string(54) "http://www.virusbtn.com/news/virus_news/2007/07_11.xml"
      [9]=>
      string(62) "http://www.mozilla.org/security/announce/2007/mfsa2007-23.html"
      [10]=>
      string(66) "ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt"
      [11]=>
      string(79) "http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html"
      [12]=>
      string(63) "http://www.mandriva.com/security/advisories?name=MDKSA-2007:152"
      [13]=>
      string(68) "http://www.novell.com/linux/security/advisories/2007_49_mozilla.html"
      [14]=>
      string(35) "http://www.ubuntu.com/usn/usn-503-1"
      [15]=>
      string(52) "http://www.us-cert.gov/cas/techalerts/TA07-199A.html"
      [16]=>
      string(37) "http://www.kb.cert.org/vuls/id/358017"
      [17]=>
      string(41) "http://www.securitytracker.com/id?1018351"
      [18]=>
      string(41) "http://www.securitytracker.com/id?1018360"
      [19]=>
      string(35) "http://secunia.com/advisories/26096"
      [20]=>
      string(35) "http://secunia.com/advisories/26149"
      [21]=>
      string(35) "http://secunia.com/advisories/26216"
      [22]=>
      string(35) "http://secunia.com/advisories/26204"
      [23]=>
      string(35) "http://secunia.com/advisories/26271"
      [24]=>
      string(35) "http://secunia.com/advisories/26258"
      [25]=>
      string(35) "http://secunia.com/advisories/26572"
      [26]=>
      string(62) "http://www.mozilla.org/security/announce/2007/mfsa2007-40.html"
      [27]=>
      string(35) "http://secunia.com/advisories/28179"
      [28]=>
      string(35) "http://secunia.com/advisories/28363"
      [29]=>
      string(49) "http://www.vupen.com/english/advisories/2007/4272"
      [30]=>
      string(49) "http://www.vupen.com/english/advisories/2007/2473"
      [31]=>
      string(49) "http://www.vupen.com/english/advisories/2007/2565"
      [32]=>
      string(49) "http://www.vupen.com/english/advisories/2008/0082"
      [33]=>
      string(22) "http://osvdb.org/38017"
      [34]=>
      string(71) "http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html"
      [35]=>
      string(80) "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579"
      [36]=>
      string(80) "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"
      [37]=>
      string(58) "https://exchange.xforce.ibmcloud.com/vulnerabilities/35346"
      [38]=>
      string(60) "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
    }
    ["createtime"]=>
    int(1733118388)
    ["updatetime"]=>
    int(1733118388)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    string(46) "Microsoft Internet Explorer 跨站脚本漏洞"
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(11841)
    ["cve_code"]=>
    string(13) "CVE-2007-3670"
    ["cnnvd"]=>
    string(16) "CNNVD-200707-163"
    ["cncve"]=>
    string(1) "/"
    ["cvss_score"]=>
    float(4.3)
    ["system"]=>
    string(37) "红旗Asianux服务器操作系统 V8"
    ["desc"]=>
    string(739) "Microsoft Internet Explorer 中的参数注入漏洞在安装了 Firefox 并注册了某些 URI 的系统上运行时,允许远程攻击者进行跨浏览器脚本攻击并通过 (1) FirefoxURL 或 (2) FirefoxHTML URI 中的 shell 元字符执行任意命令,这些元字符插入到调用 firefox.exe 时创建的命令行中。注意:关于该问题出在 Internet Explorer 还是 Firefox 中一直存在争议。截至 20070711 年,CVE 认为 IE 在调用 Firefox 时似乎无法正确分隔 URL 参数,并且该问题也可能出现在 IE 中的其他协议处理程序中。但是,Mozilla 已声明将通过“深度防御”修复程序解决该问题,该修复程序将“阻止 IE 向 Firefox 发送恶意数据”。"
    ["date"]=>
    string(10) "2024-11-11"
    ["level"]=>
    string(6) "中危"
    ["package"]=>
    string(8) "firefox;"
    ["repair_version"]=>
    NULL
    ["repair"]=>
    string(35) "软件包升级
dnf update firefox
"
    ["prove"]=>
    NULL
    ["patch"]=>
    NULL
    ["references"]=>
    string(2089) "http://larholm.com/2007/07/10/internet-explorer-0day-exploit/;http://www.xs-sniper.com/sniperscope/IE-Pwns-Firefox.html;http://www.securityfocus.com/bid/24837;http://secunia.com/advisories/25984;http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=565;http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/;http://msinfluentials.com/blogs/jesper/archive/2007/07/10/blocking-the-firefox-gt-ie-0-day.aspx;http://www.theregister.co.uk/2007/07/11/ie_firefox_vuln/;http://www.virusbtn.com/news/virus_news/2007/07_11.xml;http://www.mozilla.org/security/announce/2007/mfsa2007-23.html;ftp://ftp.slackware.com/pub/slackware/slackware-12.0/ChangeLog.txt;http://support.novell.com/techcenter/psdb/07d098f99c9fe6956523beae37f32fda.html;http://www.mandriva.com/security/advisories?name=MDKSA-2007:152;http://www.novell.com/linux/security/advisories/2007_49_mozilla.html;http://www.ubuntu.com/usn/usn-503-1;http://www.us-cert.gov/cas/techalerts/TA07-199A.html;http://www.kb.cert.org/vuls/id/358017;http://www.securitytracker.com/id?1018351;http://www.securitytracker.com/id?1018360;http://secunia.com/advisories/26096;http://secunia.com/advisories/26149;http://secunia.com/advisories/26216;http://secunia.com/advisories/26204;http://secunia.com/advisories/26271;http://secunia.com/advisories/26258;http://secunia.com/advisories/26572;http://www.mozilla.org/security/announce/2007/mfsa2007-40.html;http://secunia.com/advisories/28179;http://secunia.com/advisories/28363;http://www.vupen.com/english/advisories/2007/4272;http://www.vupen.com/english/advisories/2007/2473;http://www.vupen.com/english/advisories/2007/2565;http://www.vupen.com/english/advisories/2008/0082;http://osvdb.org/38017;http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0160.html;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742;https://exchange.xforce.ibmcloud.com/vulnerabilities/35346;http://www.securityfocus.com/archive/1/473276/100/0/threaded"
    ["createtime"]=>
    int(1733118388)
    ["updatetime"]=>
    int(1733118388)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(21) "服务器操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    string(46) "Microsoft Internet Explorer 跨站脚本漏洞"
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(5) "11841"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}