升級(jí)包下載:SP_003_n_upgrade_package_2022-03-15.zip
【增加插件詳情】
1、本次月度升級(jí)包主要新增為漏掃插件,數(shù)量為17613條
【影響范圍】
1、該升級(jí)包能在發(fā)布的Pro.2020.07.01.004855之后的任何版本上升級(jí)
2、升級(jí)成功后基礎(chǔ)庫(kù)不變,
漏洞庫(kù)升級(jí)后:Vul.2022.03.08.004050
基線庫(kù)升級(jí)后:Scb.2022.03.08.004050
3、升級(jí)結(jié)束后,機(jī)器不會(huì)重啟
漏洞部分列表:
('CVE-2009-4495', '目前廠商還沒(méi)有提供補(bǔ)丁或者升級(jí)程序,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商的主頁(yè)以獲取最新版本: http://yaws.hyber.org/')
('CVE-2010-1268', '目前廠商還沒(méi)有提供此漏洞的相關(guān)補(bǔ)丁或者升級(jí)程序,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商的主頁(yè)以獲取最新版本: http://fh54.de/2009/09/justvisual2/')
('CVE-2010-1266', '目前廠商還沒(méi)有提供此漏洞的相關(guān)補(bǔ)丁或者升級(jí)程序,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商的主頁(yè)以獲取最新版本: http://code.google.com/p/webmaidcms/')
('CVE-2010-1639', '目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)這個(gè)安全問(wèn)題,補(bǔ)丁下載鏈接: http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=f0eb394501ec21b9fe67f36cbf5db788711d4236')
('CVE-2010-1640', '目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)這個(gè)安全問(wèn)題,補(bǔ)丁下載鏈接: Ubuntu Ubuntu Linux 9.10 sparc Ubuntu clamav-testfiles_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/universe/c/clamav/clamav-testfi les_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb Ubuntu clamav-milter_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/universe/c/clamav/clamav-milter_0.95.3+df sg-1ubuntu0.09.10.2_sparc.deb Ubuntu clamav-freshclam_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-freshclam_0.95.3+dfs g-1ubuntu0.09.10.2_sparc.deb Ubuntu clamav-daemon_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-daemon_0.95.3+dfsg-1 ubuntu0.09.10.2_sparc.deb Ubuntu libclamav6_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/libclamav6_0.95.3+dfsg-1ubu ntu0.09.10.2_sparc.deb Ubuntu clamav_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav_0.95.3+dfsg-1ubuntu0 .09.10.2_sparc.deb Ubuntu libclamav-dev_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/libclamav-dev_0.95.3+dfsg-1 ubuntu0.09.10.2_sparc.deb Ubuntu clamav-dbg_0.95.3+dfsg-1ubuntu0.09.10.2_sparc.deb http://ports.ubuntu.com/pool/main/c/clamav/clamav-dbg_0.95.3+dfsg-1ubu ntu0.09.10.2_sparc.deb Ubuntu clamav-base_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-base_0.95. 3+dfsg-1ubuntu0.09.10.2_all.deb Ubuntu clamav-docs_0.95.3+dfsg-1ubuntu0.09.10.2_all.deb http://security.ubuntu.com/ubuntu/pool/main/c/clamav/clamav-docs_0.95. 3+dfsg-1ubuntu0.09.10.2_all.deb')
('CVE-2010-2849', '目前廠商還沒(méi)有提供此漏洞的相關(guān)補(bǔ)丁或者升級(jí)程序,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商的主頁(yè)以獲取最新版本: http://www.nubuilder.com/nubuilderwww/')
('CVE-2008-5949', '目前廠商還沒(méi)有提供補(bǔ)丁或者升級(jí)程序,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商的主頁(yè)以獲取最新版本: http://tiddlywiki.org/')
('CVE-2010-3434', '目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)此安全問(wèn)題,補(bǔ)丁獲取鏈接: http://www.clamav.net/lang/fr/download/sources/')
('CVE-2011-4862', '目前廠商已經(jīng)發(fā)布了升級(jí)補(bǔ)丁以修復(fù)此安全問(wèn)題,補(bǔ)丁獲取鏈接: http://www.freebsd.org/releases/7.3R/announce.html')
('CVE-1999-1484, CVE-2002-0228, CVE-2002-0472', 'CVE-1999-1484:目前,SecurityFocus人員不知道有任何供應(yīng)商為此問(wèn)題提供了補(bǔ)丁.如果您認(rèn)為我們的錯(cuò)誤或了解更多最新的信息,請(qǐng)發(fā)送郵件至:vuldb@securityfocus.com.\nCVE-2002-0228:目前SecurityFocus人員不知道有任何供應(yīng)商提供的補(bǔ)丁.如果您認(rèn)為我們搞錯(cuò)了或了解到更多的最新信息,請(qǐng)發(fā)送郵件至:vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.\nCVE-2002-0472:目前,SecurityFocus人員不知道有任何供應(yīng)商為此問(wèn)題提供的補(bǔ)丁.如果你f')
('CVE-2016-9263, CVE-2017-1000600', 'CVE-2016-9263:目前廠商暫未發(fā)布修復(fù)措施解決此安全問(wèn)題,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商主頁(yè)或參考網(wǎng)址以獲取解決辦法: https://wordpress.org/\nCVE-2017-1000600:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://wordpress.com/')
('CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438', 'CVE-2021-34798:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: httpd.apache.org/security/vulnerabilities_24.html\nCVE-2021-36160:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread.html/ree7519d71415ecdd170ff1889cab552d71758d2ba2904a17ded21a70@%3Ccvs.httpd.apache.org%3E\nCVE-2021-39275:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://httpd.apache.org/security/vulnerabilities_24.html\nCVE-2021-40438:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://access.redhat.com/security/cve/cve-2021-40438')
('CVE-2022-23181', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.75')
('CVE-2022-23181', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.75')
('CVE-2022-21371', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.oracle.com/security-alerts/cpujan2022.html')
('CVE-2021-45105', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd')
('CVE-2021-44832', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf')
('CVE-2019-17571, CVE-2020-9488, CVE-2020-9493, CVE-2021-4104, CVE-2022-23302,\n\n CVE-2022-23305, CVE-2022-23307', 'CVE-2019-17571:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://www.apache.org/\nCVE-2020-9488:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://issues.apache.org/jira/browse/LOG4J2-2819\nCVE-2020-9493:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread.html/r50d389c613ba6062a26aa57e163c09bfee4ff2d95d67331d75265b83@%3Cannounce.apache.org%3E\nCVE-2021-4104:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://logging.apache.org/log4j/2.x/security.html\nCVE-2022-23302:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w\nCVE-2022-23305:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y\nCVE-2022-23307:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh')
('CVE-2021-44228, CVE-2021-45046', 'CVE-2021-44228:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://logging.apache.org/log4j/2.x/security.html\nCVE-2021-45046:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://logging.apache.org/log4j/2.x/security.html.')
('CVE-2021-32037', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mongodb.org/browse/SERVER-59071')
('CVE-2021-32037', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mongodb.org/browse/SERVER-59071')
('CVE-2022-23707', '更新至7.17.0或更新版本.')
('CVE-2021-44141, CVE-2021-44142, CVE-2022-0336', 'CVE-2021-44141:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://access.redhat.com/security/cve/cve-2021-44141\nCVE-2021-44142:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.samba.org/samba/security/CVE-2021-44142.html\nCVE-2022-0336:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1')
('CVE-2022-0633', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/d257c28f-3c7e-422b-a5c2-e618ed3c0bf3')
('CVE-2022-24947, CVE-2022-24948', 'CVE-2022-24947:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c\nCVE-2022-24948:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b')
('CVE-2021-4191', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: http://about.gitlab.com/releases/2022/02/25/critical-security-release-gitlab-14-8-2-released/')
('CVE-2021-45326', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/go-gitea/gitea')
('CVE-2021-45328', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/go-gitea/gitea')
('CVE-2021-45327', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/go-gitea/gitea')
('CVE-2021-45325', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/go-gitea/gitea')
('CVE-2021-45330', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://github.com/go-gitea/gitea/issues/4336')
('CVE-2021-45331', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/')
('CVE-2021-45329', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/go-gitea/gitea')
('CVE-2022-23616', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mgjw-2wrp-r535')
('CVE-2022-23618', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv')
('CVE-2022-23617', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73')
('CVE-2022-23619', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f')
('CVE-2022-23620', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq')
('CVE-2022-23622', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr')
('CVE-2022-23621', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j')
('CVE-2022-23615', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r')
('CVE-2020-25717, CVE-2020-21913, CVE-2022-22991, CVE-2022-22989,\n\n CVE-2022-22990', 'CVE-2020-25717:目前廠商暫未發(fā)布修復(fù)措施解決此安全問(wèn)題,建議使用此軟件的用戶(hù)隨時(shí)關(guān)注廠商主頁(yè)或參考網(wǎng)址以獲取解決辦法: https://vigilance.fr/vulnerability/Samba-multiple-vulnerabilities-36843\nCVE-2020-21913:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://unicode-org.atlassian.net/browse/ICU-20850\nCVE-2022-22991, CVE-2022-22989, CVE-2022-22990:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117')
('CVE-2021-44736', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://support.lexmark.com/alerts/')
('CVE-2022-0332', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://moodle.org/mod/forum/discuss.php?d=431099&parent=1734813')
('CVE-2022-0333, CVE-2022-0334, CVE-2022-0335', 'CVE-2022-0333:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://moodle.org/mod/forum/discuss.php?d=431100&parent=1734814\nCVE-2022-0334:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://moodle.org/mod/forum/discuss.php?d=431102&parent=1734816\nCVE-2022-0335:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://moodle.org/mod/forum/discuss.php?d=431103')
('CVE-2021-24423', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/541974d6-2df8-4497-9aee-afd3b9024102')
('CVE-2021-25022', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/1801c7ae-2b5c-493f-969d-4bb19a9feb15')
('CVE-2021-24985', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/50be0ebf-fe6d-41e5-8af9-0d74f33aeb57')
('CVE-2021-25008', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/cb232354-f74d-48bb-b437-7bdddd1df42a')
('CVE-2021-25074', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://wpscan.com/vulnerability/f3c0a155-9563-4533-97d4-03b9bac83164')
('CVE-2022-23807', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.phpmyadmin.net/security/PMASA-2022-1/')
('CVE-2022-23807', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.phpmyadmin.net/security/PMASA-2022-1/')
('CVE-2022-23808', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.phpmyadmin.net/security/PMASA-2022-2/')
('CVE-2022-23808', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.phpmyadmin.net/security/PMASA-2022-2/')
('CVE-2021-44118, CVE-2021-44120, CVE-2021-44122, CVE-2021-44123', 'CVE-2021-44118:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.spip.net/spip/medias/commit/13c293fabd35e2c152379522c29432423936cbba\nCVE-2021-44120:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.spip.net/spip/spip/commit/d548391d799387d1e93cf1a369d385c72f7d5c81\nCVE-2021-44122:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.spip.net/spip/spip/commit/1b8e4f404c2441c15ca6540b9a6d8e50cff219db\nCVE-2021-44123:目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.spip.net/spip/spip/commit/1cf91def15966406ddd0488cf9d1ecd1ae82d47a')
('CVE-2021-4160', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f')
('CVE-2021-4160', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f')
('CVE-2021-46657', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25629')
('CVE-2021-46657', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25629')
('CVE-2021-46659', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25631')
('CVE-2021-46659', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25631')
('CVE-2021-46658', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25630')
('CVE-2021-46658', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://jira.mariadb.org/browse/MDEV-25630')
('CVE-2021-40033', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220112-01-infodis-cn')
('CVE-2021-40042', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20220112-01-invalid-cn')
('CVE-2021-45079', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://lists.debian.org/debian-security-announce/2022/msg00022.html')
('CVE-2021-44142', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://www.samba.org/samba/security/CVE-2021-44142.html')
('CVE-2021-44141', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,補(bǔ)丁獲取鏈接: https://access.redhat.com/security/cve/cve-2021-44141')
('CVE-2022-0336', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://launchpad.net/ubuntu/+source/samba/2:4.13.17~dfsg-0ubuntu0.21.10.1')
('CVE-2021-46661', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46661', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46662', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46662', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46663', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46663', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46664', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46664', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46665', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46665', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')
('CVE-2021-46666', '目前廠商已發(fā)布升級(jí)補(bǔ)丁以修復(fù)漏洞,詳情請(qǐng)關(guān)注廠商主頁(yè): https://mariadb.org/')