漏掃/基線升級包

csv_vul_plugins_202112

來源:聚銘網(wǎng)絡(luò)    發(fā)布時間:2021-12-18    瀏覽次數(shù):
 

升級包下載:SP_003_n_upgrade_package_2021-12-13.zip


基線:
Oracle11g基線策略開發(fā) 

漏洞部分列表:
'CVE-2016-10161, CVE-2016-10158, CVE-2016-10168, CVE-2016-10167, CVE-2017-11147,CVE-2016-10160, CVE-2016-10159', 'CVE-2016-10161:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2\nCVE-2016-10158:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea\nCVE-2016-10168:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6\nCVE-2016-10167:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f\nCVE-2017-11147:目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: http://php.net/ChangeLog-7.php http://php.net/ChangeLog-5.php\nCVE-2016-10160:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be\nCVE-2016-10159:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93');
'CVE-2016-10161, CVE-2016-10158, CVE-2016-10168, CVE-2016-10167, CVE-2017-11147,CVE-2016-10160, CVE-2016-10159', 'CVE-2016-10161:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2\nCVE-2016-10158:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea\nCVE-2016-10168:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6\nCVE-2016-10167:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f\nCVE-2017-11147:目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: http://php.net/ChangeLog-7.php http://php.net/ChangeLog-5.php\nCVE-2016-10160:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be\nCVE-2016-10159:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93');
'CVE-2016-10159, CVE-2016-10160', 'CVE-2016-10159:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93\nCVE-2016-10160:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be');
'CVE-2016-10159, CVE-2016-10160', 'CVE-2016-10159:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/ca46d0acbce55019b970fcd4c1e8a10edfdded93\nCVE-2016-10160:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/b28b8b2fee6dfa6fcd13305c581bb835689ac3be');
'CVE-2016-10162, CVE-2017-5340, CVE-2016-7479', 'CVE-2016-10162:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://gist.github.com/anonymous/5949c2ca31fb5bb030773a8e78571444\nCVE-2017-5340:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12\nCVE-2016-7479:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/bcd64a9bdd8afcf7f91a12e700d12d12eedc136b');
'CVE-2016-10162, CVE-2017-5340, CVE-2016-7479', 'CVE-2016-10162:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://gist.github.com/anonymous/5949c2ca31fb5bb030773a8e78571444\nCVE-2017-5340:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/4cc0286f2f3780abc6084bcdae5dce595daa3c12\nCVE-2016-7479:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/bcd64a9bdd8afcf7f91a12e700d12d12eedc136b');
'CVE-2013-0454', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004289');
'CVE-2014-8143', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://www.samba.org/samba/security/CVE-2014-8143');
'CVE-2019-10218', '目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://www.samba.org/samba/security/CVE-2019-10218.html');
'CVE-2021-22940, CVE-2021-3672, CVE-2021-22931, CVE-2021-22939', 'CVE-2021-22940, CVE-2021-22939:目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://vigilance.fr/vulnerability/Node-Core-three-vulnerabilities-36118\nCVE-2021-3672:目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://www.suse.com/support/update/announcement/2021/suse-su-202114776-1/\nCVE-2021-22931:目前廠商已發(fā)布升級補丁以修復漏洞,詳情請關(guān)注廠商主頁: https://www.npmjs.com/package/node-core');
'CVE-2016-20012', '目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://github.com/openssh/openssh-portable/pull/270');
'CVE-2011-1907', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://www.isc.org/software/bind');
'CVE-2016-2088', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://kb.isc.org/article/AA-01351');
'CVE-2020-14145', '目前廠商暫未發(fā)布修復措施解決此安全問題,建議使用此軟件的用戶隨時關(guān)注廠商主頁或參考網(wǎng)址以獲取解決辦法: https://www.openssh.com/');
'CVE-2018-20685, CVE-2019-6109, CVE-2019-6110, CVE-2019-6111', 'CVE-2018-20685:目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2\nCVE-2019-6109, CVE-2019-6110, CVE-2019-6111:目前廠商已發(fā)布升級補丁以修復漏洞,詳情請關(guān)注廠商主頁: https://www.openssh.com/');
'CVE-2011-3656', '目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: https://bugzilla.mozilla.org/show_bug.cgi?id=667907');
'CVE-2010-4657', '目前廠商已發(fā)布升級補丁以修復漏洞,詳情請關(guān)注廠商主頁: https://www.php.net');
'CVE-2011-3336', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://securityreason.com/achievement_securityalert/102');
'CVE-2015-6527', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=70140');
'CVE-2017-8923, CVE-2017-9119', 'CVE-2017-8923:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=74577\nCVE-2017-9119:目前廠商暫未發(fā)布修復措施解決此安全問題,建議使用此軟件的用戶隨時關(guān)注廠商主頁或參考網(wǎng)址以獲取解決辦法: http://php.net/');
'CVE-2016-7480', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/bcd64a9bdd8afcf7f91a12e700d12d12eedc136b');
'CVE-2016-7480', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/php/php-src/commit/bcd64a9bdd8afcf7f91a12e700d12d12eedc136b');
'CVE-2016-9138', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.php.net/ChangeLog-7.php http://www.php.net/ChangeLog-5.php');
'CVE-2016-9935', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.php.net/ChangeLog-7.php http://www.php.net/ChangeLog-5.php');
'CVE-2016-9935', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.php.net/ChangeLog-7.php http://www.php.net/ChangeLog-5.php');
'CVE-2016-9936', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.php.net/ChangeLog-7.php');
'CVE-2016-9936', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.php.net/ChangeLog-7.php');
'CVE-2017-12932', '目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: http://php.net/ChangeLog-7.php');
'CVE-2017-12932', '目前廠商已發(fā)布升級補丁以修復漏洞,補丁獲取鏈接: http://php.net/ChangeLog-7.php');
'CVE-2014-3248', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://puppetlabs.com/security/cve/cve-2014-3248');
'CVE-2013-6497', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://blog.clamav.net/2014/11/clamav-0985-has-been-released.html');
'CVE-2014-3710', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=68283');
'CVE-2014-3710', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=68283');
'CVE-2013-2062, CVE-2013-2064, CVE-2013-2066, CVE-2013-2003, CVE-2013-2002, CVE-2013-2001, CVE-2013-2000, CVE-2013-2005, CVE-2013-2004, CVE-2013-1990, CVE-2013-1991, CVE-2013-1995, CVE-2013-1998, CVE-2013-1999, CVE-2013-1989, CVE-2013-1988, CVE-2013-1987, CVE-2013-1986, CVE-2013-1985, CVE-2013-1984, CVE-2013-1983, CVE-2013-1982, CVE-2013-1981, CVE-2013-1997', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.x.org/wiki/Development/Security/Advisory-2013-05-23');
'CVE-2014-3710', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=68283');
'CVE-2014-8118, CVE-2013-6435', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://rhn.redhat.com/errata/RHSA-2014-1976.html');
'CVE-2014-8104', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://openvpn.net/index.php/open-source/downloads.html');
'CVE-2013-2110', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=64879');
'CVE-2013-2465, CVE-2013-1571, CVE-2013-2407, CVE-2013-2412, CVE-2013-1500, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2450, CVE-2013-2452, CVE-2013-2453, CVE-2013-2443, CVE-2013-2472, CVE-2013-2459, CVE-2013-2470, CVE-2013-2471, CVE-2013-2447, CVE-2013-2473, CVE-2013-2448, CVE-2013-2463, CVE-2013-2445, CVE-2013-2461, CVE-2013-2469, CVE-2013-2446, CVE-2013-2444', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html');
'CVE-2013-1571, CVE-2013-2407, CVE-2013-2412, CVE-2013-1500, CVE-2013-2448, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456, CVE-2013-2457, CVE-2013-2450, CVE-2013-2452, CVE-2013-2453, CVE-2013-2465, CVE-2013-2445, CVE-2013-2472, CVE-2013-2459, CVE-2013-2470, CVE-2013-2471, CVE-2013-2443, CVE-2013-2458, CVE-2013-2449, CVE-2013-2473, CVE-2013-2447, CVE-2013-2460, CVE-2013-2463, CVE-2013-2461, CVE-2013-2469, CVE-2013-2446, CVE-2013-2444', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html');
'CVE-2013-2110', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugs.php.net/bug.php?id=64879');
'CVE-2013-3571', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.dest-unreach.org/socat/contrib/socat-secadv4.html');
'CVE-2013-1362', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.occamsec.com/vulnerabilities.html#nagios_metacharacter_vulnerability');
'CVE-2013-1929, CVE-2013-1767, CVE-2012-6545, CVE-2012-6544, CVE-2013-3224, CVE-2013-3222, CVE-2013-0914, CVE-2013-3231, CVE-2013-3235, CVE-2013-1773', 'CVE-2013-1929:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.openwall.com/lists/oss-security/2013/04/06/3\nCVE-2013-1767, CVE-2012-6545, CVE-2012-6544, CVE-2013-0914, CVE-2013-1773:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.kernel.org/\nCVE-2013-3224, CVE-2013-3222, CVE-2013-3231, CVE-2013-3235:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.openwall.com/lists/oss-security/2013/04/14/3');
'CVE-2013-2061', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://lists.opensuse.org/opensuse-updates/2013-11/msg00012.html');
'CVE-2002-2443', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637');
'CVE-2013-2178', '運行yum update fail2ban來更新系統(tǒng).');
'CVE-2015-3202', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://sources.debian.net/src/fuse/');
'CVE-2015-1158, CVE-2015-1159, CVE-2014-9679', 'CVE-2015-1158, CVE-2015-1159:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.cups.org/blog.php?L1082\nCVE-2014-9679:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://www.cups.org/blog.php');
'CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2014-8176, CVE-2015-3216, CVE-2015-4000', 'CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2014-8176:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://www.openssl.org/news/secadv_20150611.txt\nCVE-2015-3216:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://bugzilla.redhat.com/show_bug.cgi?id=1225994\nCVE-2015-4000:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,詳情請關(guān)注廠商主頁: https://weakdh.org/');
'CVE-2015-3237, CVE-2015-3236', 'CVE-2015-3237:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://curl.haxx.se/docs/adv_20150617B.html\nCVE-2015-3236:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://curl.haxx.se/docs/adv_20150617A.html');
'CVE-2013-1752', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.python.org/');
'CVE-2015-1547, CVE-2014-9655', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,詳情請關(guān)注廠商主頁: http://libtiff.maptools.org/');
'CVE-2015-3905', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://github.com/kohler/t1utils/blob/master/NEWS');
'CVE-2014-8108, CVE-2014-3580', 'CVE-2014-8108:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://subversion.apache.org/security/CVE-2014-8108-advisory.txt\nCVE-2014-3580:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://subversion.apache.org/security/CVE-2014-3580-advisory.txt');
'CVE-2015-3165, CVE-2015-3167, CVE-2015-3166', 'CVE-2015-3165:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.postgresql.org/docs/9.1/static/release-9-1-16.html\nCVE-2015-3167, CVE-2015-3166:目前廠商已發(fā)布升級補丁以修復漏洞,詳情請關(guān)注廠商主頁: http://www.postgresql.org');
'CVE-2015-0261, CVE-2015-2154', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.ca.tcpdump.org/beta/tcpdump-4.7.2.tar.gz');
'CVE-2015-4748, CVE-2015-2628, CVE-2015-2625, CVE-2015-2632, CVE-2015-2601, CVE-2015-4732, CVE-2015-2621, CVE-2015-2590, CVE-2015-4731, CVE-2015-4760, CVE-2015-4000, CVE-2015-2808, CVE-2015-4733, CVE-2015-4749', 'CVE-2015-4748, CVE-2015-2628, CVE-2015-2625, CVE-2015-2632, CVE-2015-2601, CVE-2015-4732, CVE-2015-2621, CVE-2015-2590, CVE-2015-4731, CVE-2015-4760, CVE-2015-4733, CVE-2015-4749:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\nCVE-2015-4000:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,詳情請關(guān)注廠商主頁: https://weakdh.org/\nCVE-2015-2808:目前廠商暫未發(fā)布修復措施解決此安全問題,建議使用此軟件的用戶隨時關(guān)注廠商主頁或參考網(wǎng)址以獲取解決辦法: https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf');
'CVE-2014-0196', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00');
'CVE-2013-4122', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.gentoo.org/security/en/glsa/glsa-201309-01.xml');
'CVE-2015-4748, CVE-2015-4749, CVE-2015-4731, CVE-2015-2621, CVE-2015-4733, CVE-2015-4732, CVE-2015-2659, CVE-2015-4760, CVE-2015-2808, CVE-2015-4000, CVE-2015-2628, CVE-2015-2625, CVE-2015-2601, CVE-2015-0383, CVE-2015-2632, CVE-2015-2590, CVE-2015-3149', 'CVE-2015-4748, CVE-2015-4749, CVE-2015-4731, CVE-2015-2621, CVE-2015-4733, CVE-2015-4732, CVE-2015-2659, CVE-2015-4760, CVE-2015-2628, CVE-2015-2625, CVE-2015-2601, CVE-2015-2632, CVE-2015-2590:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html\nCVE-2015-2808:目前廠商暫未發(fā)布修復措施解決此安全問題,建議使用此軟件的用戶隨時關(guān)注廠商主頁或參考網(wǎng)址以獲取解決辦法: https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf\nCVE-2015-4000:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,詳情請關(guān)注廠商主頁: https://weakdh.org/\nCVE-2015-0383:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\nCVE-2015-3149:目前廠商已發(fā)布升級補丁以修復漏洞,詳情請關(guān)注廠商主頁: http://openjdk.java.net/');
'CVE-2013-6438, CVE-2014-0098', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.apache.org/dist/httpd/CHANGES_2.4.9');
'CVE-2013-6339, CVE-2013-6338, CVE-2013-7112, CVE-2013-6337, CVE-2013-6336, CVE-2013-7114, CVE-2014-2299, CVE-2013-6340, CVE-2014-2281, CVE-2014-2283', 'CVE-2013-6339:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-64.html\nCVE-2013-6338:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-63.html\nCVE-2013-7112:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-66.html\nCVE-2013-6337:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-62.html\nCVE-2013-6336:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-61.html\nCVE-2013-7114:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-68.html\nCVE-2014-2299:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2014-04.html\nCVE-2013-6340:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2013-65.html\nCVE-2014-2281:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2014-01.html\nCVE-2014-2283:目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.wireshark.org/security/wnpa-sec-2014-03.html');
'CVE-2013-7345', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.darwinsys.com/file/');
'CVE-2013-7345', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.darwinsys.com/file/');
'CVE-2013-5705', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.modsecurity.org/');
'CVE-2013-5705', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: http://www.modsecurity.org/');
'CVE-2013-6369', '目前廠商已經(jīng)發(fā)布了升級補丁以修復此安全問題,補丁獲取鏈接: https://www.cl.cam.ac.uk/~mgk25/jbigkit/CHANGES');

 
 

上一篇:2021年12月17日聚銘安全速遞

下一篇:標準化更新-SAS_evt_n_upgrade_package_2021-12