object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(5532)
    ["cve_code"]=>
    string(14) "CVE-2020-14295"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(7.2)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(193) "A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries."
    ["date"]=>
    string(10) "2023-02-27"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(5) "cacti"
    ["repair_version"]=>
    string(19) "1.2.2.1-1+sercurity"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(1) {
      [0]=>
      string(168) "https://security-tracker.debian.org/tracker/CVE-2020-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295
https://nvd.nist.gov/vuln/detail/CVE-2020-14295"
    }
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(5532)
    ["cve_code"]=>
    string(14) "CVE-2020-14295"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(7.2)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(193) "A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries."
    ["date"]=>
    string(10) "2023-02-27"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(5) "cacti"
    ["repair_version"]=>
    string(19) "1.2.2.1-1+sercurity"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(168) "https://security-tracker.debian.org/tracker/CVE-2020-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295
https://nvd.nist.gov/vuln/detail/CVE-2020-14295"
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "5532"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}