object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(5531)
    ["cve_code"]=>
    string(14) "CVE-2020-35112"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(8.8)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(478) "If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6."
    ["date"]=>
    string(10) "2023-02-26"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(11) "firefox-esr"
    ["repair_version"]=>
    string(20) "68.12.0esr-1~deb10u1"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(1) {
      [0]=>
      string(168) "https://security-tracker.debian.org/tracker/CVE-2020-35112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35112
https://nvd.nist.gov/vuln/detail/CVE-2020-35112"
    }
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(5531)
    ["cve_code"]=>
    string(14) "CVE-2020-35112"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(8.8)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(478) "If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6."
    ["date"]=>
    string(10) "2023-02-26"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(11) "firefox-esr"
    ["repair_version"]=>
    string(20) "68.12.0esr-1~deb10u1"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(168) "https://security-tracker.debian.org/tracker/CVE-2020-35112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35112
https://nvd.nist.gov/vuln/detail/CVE-2020-35112"
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "5531"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}