object(app\admin\model\bug\Bug)#19 (37) {
  ["name":protected]=>
  string(3) "bug"
  ["autoWriteTimestamp":protected]=>
  string(7) "integer"
  ["createTime":protected]=>
  string(10) "createtime"
  ["updateTime":protected]=>
  string(10) "updatetime"
  ["deleteTime":protected]=>
  string(10) "deletetime"
  ["append":protected]=>
  array(0) {
  }
  ["connection":protected]=>
  array(0) {
  }
  ["parent":protected]=>
  NULL
  ["query":protected]=>
  NULL
  ["table":protected]=>
  NULL
  ["class":protected]=>
  string(23) "app\admin\model\bug\Bug"
  ["error":protected]=>
  NULL
  ["validate":protected]=>
  NULL
  ["pk":protected]=>
  NULL
  ["field":protected]=>
  array(0) {
  }
  ["except":protected]=>
  array(0) {
  }
  ["disuse":protected]=>
  array(0) {
  }
  ["readonly":protected]=>
  array(0) {
  }
  ["visible":protected]=>
  array(0) {
  }
  ["hidden":protected]=>
  array(0) {
  }
  ["data":protected]=>
  array(24) {
    ["id"]=>
    int(7233)
    ["cve_code"]=>
    string(14) "CVE-2021-29457"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(7.8)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(758) "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4."
    ["date"]=>
    string(10) "2022-01-23"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(5) "exiv2"
    ["repair_version"]=>
    string(16) "0.25.3-1+deb10u2"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    array(1) {
      [0]=>
      string(109) "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29457
https://nvd.nist.gov/vuln/detail/CVE-2021-29457"
    }
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["origin":protected]=>
  array(24) {
    ["id"]=>
    int(7233)
    ["cve_code"]=>
    string(14) "CVE-2021-29457"
    ["cnnvd"]=>
    NULL
    ["cncve"]=>
    NULL
    ["cvss_score"]=>
    float(7.8)
    ["system"]=>
    string(18) "桌面操作系统"
    ["desc"]=>
    string(758) "Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4."
    ["date"]=>
    string(10) "2022-01-23"
    ["level"]=>
    string(6) "高危"
    ["package"]=>
    string(5) "exiv2"
    ["repair_version"]=>
    string(16) "0.25.3-1+deb10u2"
    ["repair"]=>
    string(48) "sudo apt update && sudo apt dist-upgrade"
    ["prove"]=>
    string(166) "执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复"
    ["patch"]=>
    NULL
    ["references"]=>
    string(109) "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29457
https://nvd.nist.gov/vuln/detail/CVE-2021-29457"
    ["createtime"]=>
    NULL
    ["updatetime"]=>
    int(0)
    ["deletetime"]=>
    NULL
    ["visible"]=>
    int(1)
    ["name"]=>
    NULL
    ["cvss_info"]=>
    NULL
    ["sys_type"]=>
    string(18) "桌面操作系统"
    ["repair_date"]=>
    NULL
    ["cve_name"]=>
    NULL
  }
  ["relation":protected]=>
  array(0) {
  }
  ["auto":protected]=>
  array(0) {
  }
  ["insert":protected]=>
  array(0) {
  }
  ["update":protected]=>
  array(0) {
  }
  ["dateFormat":protected]=>
  bool(false)
  ["type":protected]=>
  array(0) {
  }
  ["isUpdate":protected]=>
  bool(true)
  ["replace":protected]=>
  bool(false)
  ["force":protected]=>
  bool(false)
  ["updateWhere":protected]=>
  array(1) {
    ["id"]=>
    array(2) {
      [0]=>
      string(2) "eq"
      [1]=>
      string(4) "7233"
    }
  }
  ["failException":protected]=>
  bool(false)
  ["useGlobalScope":protected]=>
  bool(true)
  ["batchValidate":protected]=>
  bool(false)
  ["resultSetType":protected]=>
  string(5) "array"
  ["relationWrite":protected]=>
  NULL
}